| 2014 | 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014 |
| 2014 | A data structure for triangular dissection of multi-resolution images. Taiyou Kikuchi, Shinji Koka, Koichi Anada, Youzou Miyadera, Takeo Yaku |
| 2014 | A dialogue-based framework for the user experience reengineering of a legacy application. Angelo Martella, Roberto Paiano, Andrea Pandurino |
| 2014 | A framework for mobile elearning (mLearning) with analytical decision model. Jahangir Dewan, Morshed U. Chowdhury |
| 2014 | A machine learning technique for predicting the productivity of practitioners from individually developed software projects. Cuauhtémoc López Martín, Arturo Chavoya, Maria Elena Meda-Campaña |
| 2014 | A proposal of cloud-based home network system for multi-vendor services. Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura |
| 2014 | A requirements description language pLSC for probabilistic branches and three-stage events. Jinyu Kai, Huaikou Miao, Honghao Gao |
| 2014 | A rule-based framework for managing context-aware services based on heterogeneous and distributed Web services. Hiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura |
| 2014 | A self-tuned bat algorithm for optimization in radiation therapy treatment planning. Georgios Kalantzis, Yu Lei |
| 2014 | A source code plagiarism detecting method using alignment with abstract syntax tree elements. Hiroshi Kikuchi, Takaaki Goto, Mitsuo Wakatsuki, Tetsuro Nishino |
| 2014 | A theoretical exploration of the impact of packet loss on network intrusion detection. Sidney C. Smith, Robert J. Hammell, Travis W. Parker, Lisa M. Marvel |
| 2014 | AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance. Ayaz H. Khan, Mayez A. Al-Mouhamed, Anas Almousa, Allam Fatayar, A. R. Ibrahim, A. J. Siddiqui |
| 2014 | An application of 3D spiral visualization to the Uchida-Kraepelin psychodiagnostic test. Zhuang Heliang, Futoshi Sugimoto, Chieko Kato, Kensei Tsuchida |
| 2014 | An efficient reduction approach to test suite. Pan Liu |
| 2014 | An efficient structure for LKH key tree on secure multicast communications. Naoshi Sakamoto |
| 2014 | An energy balanced topology construction protocol for Wireless Sensor Networks. Soumya Saha, Lifford McLauchlan |
| 2014 | An improvement of micro area selection technique for the diffusion of ICT infrastructure. Motoi Iwashita, Takeshi Kurosawa, Akiya Inoue, Ken Nishimatsu |
| 2014 | An obfuscation method to build a fake call flow graph by hooking method calls. Kazumasa Fukuda, Haruaki Tamada |
| 2014 | Analysis and acceleration of NTRU lattice-based cryptographic system. Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Jiang |
| 2014 | Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. Limin Sha |
| 2014 | Applications of ultrasonic sensors and obrid-sensor in safety confirmation system for elders. Shenglin Mu, Shota Nakashima, Kanya Tanaka |
| 2014 | Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communication. Michiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi |
| 2014 | Brain activity measurement during program comprehension with NIRS. Yoshiharu Ikutani, Hidetake Uwano |
| 2014 | Can text mining technique be used as an alternative tool for qualitative research in education? Carl Lee, Chin-I Cheng, Aklilu Zeleke |
| 2014 | Collaborative filtering recommendation algorithm based on item attributes. Mengxing Huang, Longfei Sun, Wencai Du |
| 2014 | Comparing hierarchical dirichlet process with latent dirichlet allocation in bug report multiclass classification. Nachai Limsettho, Hideaki Hata, Ken-ichi Matsumoto |
| 2014 | Consideration of cross-validation in estimating objective scores of answer statements posted at Q&A sites. Yuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya |
| 2014 | Considerations on pauses and fundamental movements for transmitting traditional skills. Teruhisa Hochin, Hiroki Nomiya |
| 2014 | Converting PCAPs into Weka mineable data. Charles A. Fowler, Robert J. Hammell |
| 2014 | Design patterns applied for networked first person shooting game programming. Junfeng Qu, Yong Wei, Yinglei Song |
| 2014 | Designing and implementing service framework for virtual agents in home network system. Hiroyasu Horiuchi, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura |
| 2014 | Detection range fitting of slit type Obrid-Sensor. Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, Shintaro Okabe, Kanya Tanaka, Yuhki Kitazono, Seiichi Serikawa |
| 2014 | Developing and building a quality management system based on stakeholder behavior for enterprise architecture. Dominic M. Mezzanotte Sr., Josh Dehlinger |
| 2014 | Development of Leaving-bed Detection System to Prevent Midnight Prowl. Yuhki Takahashi, Yuhki Kitazono, Shota Nakashima |
| 2014 | Development of input assistance application for mobile devices for physically disabled. Naruki Shirahama, Yuki Sakuragi, Satoshi Watanabe, Naofumi Nakaya, Yukio Mori, Kazunori Miyamoto |
| 2014 | Dynamic artificial immune system and its application to File Transfer Scheduling optimization. Milad Dastan Zand, Mohammad Kalantari, Shahram Golzari |
| 2014 | Dynamic test case prioritization based on multi-objective. Xiaolin Wang, Hongwei Zeng |
| 2014 | Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) requirements. Haeng-Kon Kim |
| 2014 | Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices. Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng |
| 2014 | Error value driven fault analysis attack. Masaya Yoshikawa, Hikaru Goto, Kensaku Asahi |
| 2014 | Feature selection method based on crossed centroid for text categorization. Jieming Yang, Zhiying Liu, Zhaoyang Qu, Jing Wang |
| 2014 | Generation of reducts based on nearest neighbor relation. Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Kazunori Iwata |
| 2014 | Hierarchical speech recognition system using MFCC feature extraction and dynamic spiking RSOM. Tarek Behi, Najet Arous, Noureddine Ellouze |
| 2014 | High performance and grid computing with quality of service control. Sadiq M. Sait, Raed Al-Shaikh |
| 2014 | Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devices. Hao Qian, Daniel Andresen |
| 2014 | Microcredit risk assessment using crowdsourcing and social networks. Tofig Hasanov, Motoyuki Ozeki, Natsuki Oka |
| 2014 | Modeling web application for cross-browser compatibility testing. Xinxin Li, Hongwei Zeng |
| 2014 | Multisensory images evoked by olfactory stimuli: Crossmodal correspondences in human information processing. Kazuyoshi Ichihashi, Hideki Ichihashi |
| 2014 | New approach on PCA-based 3D face recognition and authentication. Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri |
| 2014 | New data warehouse designing approach based on principal component analysis. Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Henda Ben Ghézala |
| 2014 | Non-functional properties aware configuration selection in component-based systems. Mohammad Charaf Eddin, Zoubir Mammeri |
| 2014 | Novice and expert, how are they programming differently? Simon Xu |
| 2014 | ONTOSSN: Scientific social network ontology. Eya Ben Ahmed, Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Faïez Gargouri |
| 2014 | On simplification of chaotic neural network on incremental learning. Toshinori Deguchi, Toshiki Takahashi, Naohiro Ishii |
| 2014 | One dimensional ring type growing SOM with asymmetric neighborhood function and its application to a hand shape instruction learning system. Takashi Kuremoto, Takuhiro Otani, Masanao Obayashi, Kunikazu Kobayashi, Shingo Mabu |
| 2014 | Optimizing mapreduce with low memory requirements for shared-memory systems. Yasong Zheng, Yuanchao Xu, Haibo Meng, Xiaochun Ye, Lingjun Fan, Futao Miao, Dongrui Fan |
| 2014 | Padding free bank conflict resolution for CUDA-based matrix transpose algorithm. Ayaz H. Khan, Mayez A. Al-Mouhamed, Allam Fatayar, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony |
| 2014 | Pitfalls of analyzing a cross-company dataset of software maintenance and support. Masateru Tsunoda, Kenichi Ono |
| 2014 | Post processing for dense stereo matching by iterative local plane fitting. Hongbo Lu, Haibo Meng, Kun Du, Yuan Sun, Yuanchao Xu, Zhimin Zhang |
| 2014 | Proposal of eye-gaze recognize method for input interface without infra-red ray equipment. Kazuki Fukushima, Naruki Shirahama |
| 2014 | Questionnaire report on matter relating to software architecture evaluation. Hassan Almari, Clive Boughton |
| 2014 | Refinement/verification of early stage probabilistic software project schedules in the planning stage. Donghwoon Kwon, Robert J. Hammell |
| 2014 | Risk assessment quantification in life log service. Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai |
| 2014 | Scalable bootstrap clustering for massive data. Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi |
| 2014 | Security and privacy protocol for emerging smart RFID applications. Mohammad Fal Sadikin, Marcel Kyas |
| 2014 | Software development concerns in the building of service-oriented based enterprise systems. Chia-Chu Chiang |
| 2014 | Software ontology design to support organized open source software development. Md. Mahfuzus Salam Khan, Md. Anwarus Salam Khan, Takaaki Goto, Tetsuro Nishino, Narayan C. Debnath |
| 2014 | Strategy-guided requirements development and validation. Xiaofeng Cui, Richard F. Paige |
| 2014 | Survey of attribute based encryption. Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang |
| 2014 | Test image generation using segmental symbolic evaluation for unit testing. Tahir Jameel, Mengxiang Lin, He Li, Xiaomei Hou |
| 2014 | The analysis method focusing on peaks of darkness for the impression evaluation method by space. Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya |
| 2014 | Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effects. Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama |
| 2014 | Training of intelligent intrusion detection system using neuro fuzzy. Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia |
| 2014 | Unbinds data and tasks to improving the Hadoop performance. Kun Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang |
| 2014 | Using client-side access partitioning for data clustering in big data applications. Dapeng Liu, Shaochun Xu, Zengdi Cui |
| 2014 | Using goal net to model user stories in agile software development. Jun Lin, Han Yu, Zhiqi Shen, Chunyan Miao |
| 2014 | VM scheduling strategies based on artificial intelligence in Cloud Testing. Yang Zheng, Lizhi Cai, Shidong Huang, Zhihong Wang |
| 2014 | VMKit: Improving design and performance of Managed Runtime Environments. Bertil Folliot |