SERA C

63 papers

YearTitle / Authors
201715th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2017, London, United Kingdom, June 7-9, 2017
Liz Bacon, Jixin Ma, Lachlan M. MacKinnon
2017A bisectional multivariate quadratic equation system for RFID anti-counterfeiting.
Xiaoyi Zhou, Xiaoming Yao, Honglei Li, Jixin Ma
2017A communication gateway architecture for ensuring privacy and confidentiality in incident reporting.
Christos Chatzigeorgiou, Lazaros Toumanidis, Dimitris Kogias, Charalampos Z. Patrikakis, Eric Jacksch
2017A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Jiameng Sun, Binrui Zhu, Jing Qin, Jixin Ma
2017A framework of software reusing engineering management.
Tao Xin, Liu Yang
2017A new graph ranking model for image saliency detection problem.
Yuanyuan Guan, Bo Jiang, Yun Xiao, Jin Tang, Bin Luo
2017A reliability evaluation model of distributed autonomous robotic system architectures.
Xin He, Changbin Xue, Qing Zhou, Kexin Lin
2017A robust algorithm of encrypted medical volume data retrieval based on 3D DWT and 3D DFT.
Shuangshuang Wang, Jingbing Li, Chunyan Zhang, Jintao Liang, Zhaohui Wang
2017A server selection strategy about cloud workflow based on QoS constraint.
Futian Wang, Ke Fang, Jin Tang, Cheng Zhang
2017A smart health service model for elders based on ECA-S rules.
Shujie Hu, Mengxing Huang, Wenlong Feng, Yu Zhang
2017A stochastic revelation on the deterministic morphological change of 3x+1.
Yucong Duan
2017ASTo: A tool for security analysis of IoT systems.
Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil A. Panaousis
2017An analysis of the health care platform in the cloud environment.
Honglei Li, Qi Chen, Xiaoyi Zhou
2017An automated code smell and anti-pattern detection approach.
Sevilay Velioglu, Yunus Emre Selçuk
2017An empirical investigation of the software integration success factors in GSD environment.
Muhammad Ilyas, Siffat Ullah Khan
2017An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain.
Chunyan Zhang, Jingbing Li, Shuangshuang Wang, Zhaohui Wang
2017An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
Ryan Heartfield, George Loukas, Diane Gan
2017An improved information hiding algorithm based on image.
Ziqian Yuan, Zijie Guan, Hao Feng
2017Analysis of perception of people to school mottos.
Rieko Fujita, Tokuro Matsuo, Teruhisa Hochin
2017Analysis of road traffic fatal accidents using data mining techniques.
Liling Li, Sharad Shrestha, Gongzhu Hu
2017Application of support vector machine with simulated annealing algorithm in MBR membrane pollution prediction.
Chunqing Li, Yingxin Tao
2017Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices.
Syed Sadiqur Rahman, Ryan Heartfield, William Oliff, George Loukas, Avgoustinos Filippoupolitis
2017Automatic facial expression recognition based on a deep convolutional-neural-network structure.
Ke Shan, Junqi Guo, Wenwan You, Di Lu, Rongfang Bie
2017Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph.
Lixu Shao, Yucong Duan, Xiaobing Sun, Quan Zou, Rongqi Jing, Jiami Lin
2017CloudSim4DWf: A CloudSim-extension for simulating dynamic workflows in a cloud environment.
Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem
2017Coordination support for integrating user centered design in distributed agile projects.
Ohoud Almughram, Sultan Alyahya
2017Curricular change management with Git and Drupal: A tool to support flexible curricular development workflows.
Abhishek Tirkey, Kevin A. Gary
2017Data analysis with multi-objective optimization algorithm: A study in smart traffic signal system.
Pengzhe Zhou, Zhiyi Fang, Hongliang Dong, Jiayue Liu, Shuaining Pan
2017Data structure and triangulation algorithm for non-uniform landscapes.
Yasunori Shiono, Takaaki Goto, Kensei Tsuchida
2017Detection and mitigation of wireless link layer attacks.
May Aye Chan Aung, Khin Phyo Thant
2017Effects of FSM minimization techniques on number of test paths in mobile applications MBT.
Maiada M. Shabaan, Haitham S. Hamza, Yasser M. K. Omar
2017Efficient composite event detection based on DHT protocol.
Amina Chaabane, Salma Bradai, Wassef Louati, Mohamed Jmaiel
2017Empirical research methods for software engineering: Keynote address.
Simon Xu
2017Enterprise map construction based on EOLN model.
Qiwen Zhang, Yunchuan Sun, Rongfang Bie
2017Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems.
William Oliff, Avgoustinos Filippoupolitis, George Loukas
2017Feature based disparity estimation using hill-climbing algorithm.
Tin Tin San, Nu War
2017Gabor-feature-based local generic representation for face recognition with single sample per person.
Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri
2017Generation of reducts and threshold functions using discernibility and indiscerniblity matrices.
Naohiro Ishii, Ippei Torii, Kazunori Iwata, Kazuya Odagiri, Toyoshiro Nakashima
2017Identifying and localizing the inter-consistency errors among UML use cases and activity diagrams: An approach based on functional and structural size measurements.
Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah
2017Image mosaicking for oversized documents with a multi-camera rig.
Zhen Wang, Feilin Han, Weidong Geng
2017LogSumExp for unlabeled data processing.
Taocheng Hu, Jinhui Yu
2017Manifold ranking weighted local maximal occurrence descriptor for person re-identification.
Foqin Wang, Xuehan Zhang, Jinxin Ma, Jin Tang, Aihua Zheng
2017Model driven development of mobile applications using drools knowledge-based rule.
Ei Ei Thu, Nwe Nwe
2017Modern predictive models for modeling the college graduation rates.
Emma A. Gunu, Carl Lee, Wilson K. Gyasi, Robert M. Roe
2017On blockchain-based anonymized dataset distribution platform.
Shinsaku Kiyomoto, Mohammad Shahriar Rahman, Anirban Basu
2017On the estimation of time series data of daily life.
Teruhisa Hochin, Hiroki Nomiya
2017On the use of visual clustering to identify landmarks in code navigation.
Sandeep Reddivari, Mahesh Kotapalli
2017Policy enforcement upon software based on microservice architecture.
Tugrul Asik, Yunus Emre Selçuk
2017Predicting gross domestic product using autoregressive models.
John Roush, Keith Siopes, Gongzhu Hu
2017Remote sensing of damage bridge structure of free vibration by using finite element method based on Jerk-Energy.
Mohamed Bouyahi, Tahar Ezzedine, Houria Rezig
2017Research on construction of semantic dictionary in the football field.
Jiguang Wu, Ying Li
2017Research on service recommendation reliability in mobile computing.
Weng Wen, Huaikou Miao
2017Reusable components for adding multi-tenancy to legacy applications.
Uwe Hohenstein, Preeti Koka
2017Salient object based action recognition using histogram of Changing Edge Orientation (HCEO).
Hnin Mya Aye, Sai Maung Maung Zaw
2017Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle.
Florian Kammüller, Juan Carlos Augusto, Simon Jones
2017Sentiment analysis on social media using morphological sentence pattern model.
Youngsub Han, Kwangmi Ko Kim
2017Software abstractions and architectures for smart cyber-physical systems: Keynote address.
Petr Hnetynka
2017Software performance prediction at source level.
Erh-Wen Hu, Bogong Su, Jian Wang
2017Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph.
Yucong Duan, Lixu Shao, Gongzhu Hu, Zhangbing Zhou, Quan Zou, Zhaoxin Lin
2017Study and realization of a CRM system in fuxin bank.
Qingxing Guo, Zhendong Xie, Xi Ning
2017The analysis and prediction of customer review rating using opinion mining.
Wararat Songpan
2017The impacts of consumer's health topic familiarity in seeking health information online.
Ira Puspitasari
2017Visualization of online datasets.
Christopher Johnston Downie, Taoxin Peng