


default search action
SCSE 2015: Berkeley, CA, USA
- Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, SCSE'15, Berkeley, CA, USA, March 5-6, 2015. Procedia Computer Science 62, Elsevier 2015

- Mehdi Bahrami:

Welcome Message. 1-3
Keynote Speakers
- Balaji Prabhakar:

A Big Data Dashboard for Urban Mobility. 7-8 - Rick Kuhn:

Combinatorial Methods in Software Testing. 9-10 - Mukesh Singhal:

An Introduction to Multi-trapdoor Hash Functions and It's Applications. 11-12 - Jozo Dujmovic:

Soft Computing Methodology for Software Evaluation. 13-14
Tutorials and Workshops
- Todd Sedano, Cécile Péraire:

Using Essence Reflection Meetings in Team-based Project Courses. 15-16 - Mehdi Bahrami:

An Evaluation of Security and Privacy Threats for Cloud-based Applications. 17-18 - Mehmet Sahinoglu:

CLOURA: CLOUD Risk Assessor (with Stochastic & Non-Stochastic Simulations). 19-20 - Shivanand M. Handigund:

A Suigeneris Automated Software Testing Methodology. 21-22
Technical Papers Algorithms
- Hessa Al-Junaid

:
ANN Based Robotic Arm Visual Servoing Nonlinear System. 23-30 - Hikari Kato, Mayumi Takaya, Akihiro Yamamura

:
Analysis of a Monte Carlo Tree Search in Knight-Amazons. 31-38 - Kemal Akyol

, Elif Çalik
, Safak Bayir
, Baha Sen
, Abdullah Çavusoglu:
Analysis of Demographic Characteristics Creating Coronary Artery Disease Susceptibility Using Random Forests Classifier. 39-46 - Abdelaziz Fellah:

Real-Time Languages, Timed Alternating Automata, and Timed Temporal Logics: Relationships and Specifications. 47-54 - Todd Sedano, Cécile Péraire, Jason D. Lohn:

Towards Generating Essence Kernels Using Genetic Algorithms. 55-64 - Fatmah Yousef Assiri, James M. Bieman:

The Impact of Search Algorithms in Automated Program Repair. 65-72 - Talal Bonny

, Bassel Soudan
:
High Speed Database Sequence Comparison. 73-80
Software Requirements
- Nomi Baruah

:
Requirement Management in Agile Software Environment. 81-83
Fuzzy Logics
- Abdul Rahman

, Tanvir Ahmad
, M. M. Sufyan Beg
:
Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators. 84-91 - Bonthu Kotaiah

, M. V. S. Prasad, Raees Ahmad Khan:
An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert Systems. 92-98 - Rajani Kumari, Sandeep Kumar

, Vivek Kumar Sharma:
Fuzzified Expert System for Employability Assessment. 99-106 - Ronald R. Yager, Naif Alajlan

:
Fuzzy Measures in Multi-Criteria Decision Making. 107-115 - Luis Terán

:
Evaluation of Visualization of a Fuzzy-Based Recommender System for Political Community-Building. 116-125 - Shahab Saquib Sohail

, Jamshed Siddiqui, Rashid Ali
:
OWA based Book Recommendation Technique. 126-133 - Gulfam Ahamad, S. Kazim Naqvi, M. M. Sufyan Beg

, Tanvir Ahmed:
A Web based System for Cricket Talent Identification, Enhancement and Selection (C-TIES). 134-142 - Khalid Al Mutib, Ebrahim Mattar

, Mansour Alsulaiman:
Implementation of Fuzzy Decision Based Mobile Robot Navigation Using Stereo Vision. 143-150
Network Software and Software-defined Networking (SDN)
- Soni Chaturvedi

, A. A. Kurshid:
ASIC Implementation for Improved Character Recognition and Classification using SNN Model. 151-158 - Patrick G. Clark, Arvin Agah:

Modeling Firewalls for Behavior Analysis. 159-166 - Iehab Al Rassan, Haifa Alyahya

:
Tagged-Sub Optimal Code (TSC) Compression for Improving Performance of Web Services. 167-169 - Donald Cohen, K. Narayanaswamy:

Using First-Order Logic to Query Heterogeneous Internet Data Sources. 170-177 - Shivanand M. Handigund, Siddappa G. Makanur, M. Sreenivasa Rao:

Integration of Object Oriented Host Program with Network DBMS. 178-185 - Usha Rani Seshasayee

, Rathinam Manivasakan:
Jitter Buffer Modelling and Analysis for TDM over PSN. 186-195 - Alina Mirza, S. Mehak Kabir, Sara Ayub, Shahzad Amin Sheikh:

Impulsive Noise Cancellation of ECG signal based on SSRLS. 196-202
Software Security
- Ebru Celikel Cankaya, Than Kywe:

A Secure Healthcare System: From Design to Implementation. 203-212 - Neila Rjaibi

, Latifa Ben Arfa Rabai
:
Developing a Novel Holistic Taxonomy of Security Requirements. 213-220 - Adamu I. Abubakar, Haruna Chiroma, Sanah Abdullahi Muaz, Libabatu Baballe Ila:

A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems. 221-227 - Quamar Niyaz, Weiqing Sun, Mansoor Alam:

Impact on SDN Powered Network Services Under Adversarial Attacks. 228-235
Knowledge based Software Systems
- Shahrouz Moaven, Jafar Habibi, Razie Alidoosti, Alireza Parvizi-Mosaed:

Towards a Knowledge Based Approach to Style Driven Architecture Design. 236-244 - Edy Portmann

, Patrick Kaltenrieder
, Witold Pedrycz:
Knowledge Representation through Graphs. 245-248
Software Evaluation
- Yasmeen Alomair, Iftikhar Ahmad, Abdullah Sharaf Alghamdi:

A Review of Evaluation Methods and Techniques for Simulation Packages. 249-256
Software Testing
- Lan Lin, Jia He, Yong Zhang, Fengguang Song:

Quality Assurance through Rigorous Software Specification and Testing: A Case Study. 257-265 - Sangharatna Godboley

, Arun Sahani, Durga Prasad Mohapatra
:
ABCE: A Novel Framework for Improved Branch Coverage Analysis. 266-273
Programming Languages Aspect-Oriented Programming
- A. M. Shivaram, Shivanand M. Handigund:

An Ameliorated Methodology for the Abstraction of Object Oriented Features from Software Requirements Specification. 274-281 - Bernaridho I. Hutabarat:

New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of Programming. 282-286 - Azusa Kurihara, Akira Sasaki, Ken Wakita

, Hiroshi Hosobe:
A Programming Environment for Visual Block-Based Domain-Specific Languages. 287-296 - Alla Levina

, Sergey V. Taranov
:
Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution. 297-302 - Santosh Singh Rathore

, Sandeep Kumar
:
Predicting Number of Faults in Software System using Genetic Programming. 303-311 - Karel Cemus, Tomás Cerný

, Michael J. Donahoo:
Automated Business Rules Transformation into a Persistence Layer. 312-318
Big Data and Cloud Computing
- Mehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev:

CLOUD Computing: Cost-effective Risk Management with Additional Product Deployment. 319-325 - Er. Ramandeep Kaur:

Big Data- Is a Turnkey Solution. 326-331 - Ivan Prakasa, Osamu Shigo:

Global Collaboration Requirement Analysis System in Cloud Computing. 332-334 - Mehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev:

Cost-Efficient Risk Management with Reserve Repair Crew Planning in CLOUD Computing. 335-342 - Dustin Wright, Xing Yan, Pooja Srinivas, Atieh Kashani, Yusuf Öztürk:

A Cloud to Mobile Application for Consumer Behavior Modification. 343-351 - Ghazal Riahi:

E-learning Systems Based on Cloud Computing: A Review. 352-359
Software Reliability
- Néstor R. Barraza:

A Parametric Empirical Bayes Model to Predict Software Reliability Growth. 360-369
Optimization
- Kiyoshi Tsukakoshi, Kenichi Ida:

Gaussian Mixture Distribution Analysis as Estimation of Probability Density Function and it's the Periphery. 370-377 - Hiroshi Hosobe:

A Hierarchical Method for Solving Soft Nonlinear Constraints. 378-384 - Jasmeet Singh, Kshirasagar Naik, Veluppillai Mahinthan

:
Impact of Developer Choices on Energy Consumption of Software on Servers. 385-394 - Eiman Tamah Al-Shammari

:
Towards Search Engine Optimization: Feedback Collation. 395-402 - Solmaz Salehian, Shamala K. Subraminiam:

Unequal Clustering by Improved Particle Swarm Optimization in Wireless Sensor Network. 403-409 - Sherin Zafar

, M. K. Soni, M. M. Sufyan Beg
:
An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET. 410-418 - Eatedal Alabdulkreem, Hamed S. Al-Raweshidy

, Maysam F. Abbod
:
MRAI Optimization for BGP Convergence Time Reduction without Increasing the Number of Advertisement Messages. 419-426 - Srividhya Jeyaprakash, K. Alagarsamy:

A Distinctive Genetic Approach for Test-Suite Optimization. 427-434 - Haruna Chiroma, Nor Liyana Mohd Shuib

, Sanah Abdullahi Muaz, Adamu I. Abubakar, Lubabatu Baballe Ila, Jaafar Zubairu Maitama:
A Review of the Applications of Bio-inspired Flower Pollination Algorithm. 435-441 - Sandeep Kumar

, Rajani Kumari, Vivek Kumar Sharma:
Fitness Based Position Update in Spider Monkey Optimization Algorithm. 442-449 - Iman Rasekh:

A New Competitive Intelligence-based Strategy for Web Page Search. 450-456
Modelling and Simulation
- Mokhtaria Hacherouf, Safia Nait Bahloul

:
DTD2OWL2: A New Approach for the Transformation of the DTD to OWL. 457-466 - Shivanand M. Handigund, B. N. Arunakumari

:
An Ameliorated Methodology to Abstract Object Oriented Features from Programming System. 470-477 - Sabah Al-Fedaghi:

High-Level Representation of Time in Diagrammatic Specification. 478-486 - Hina Gull

, Saleh Alrashed, Sardar Zafar Iqbal
:
Validation of Usability Driven Web based Software Process Model using Simulation. 487-494 - Mark Allison

, Peter J. Clarke
, Xudong He:
A Generic Model of Execution for Synthesizing Interpreted Domain-Specific Models. 495-504 - Ananthi Sheshasaayee

, Roby Jose:
A Theoretical Framework for the Maintainability Model of Aspect Oriented Systems. 505-512 - A. Hegazy, M. Sakre, Eman Khater:

Arabic Ontology Model for Financial Accounting. 513-520 - Khaireddine Bacha, Mounir Zrigui:

Morphological Analysis in the Environment "TELA". 521-528 - Mourad Badri, Fadel Touré, Luc Lamontagne

:
Predicting Unit Testing Effort Levels of Classes: An Exploratory Study based on Multinomial Logistic Regression Modeling. 529-538
Mobile Applications
- Mahmood Ghaleb Al-Bashayreh

:
Domain Model Validation of Context-aware Mobile Patient Monitoring Systems. 539-546 - Yaser Mowafi, Dhiah el Diehn I. Abou-Tair

, Ahmad Zmily, Tareq Al-Aqarbeh, Marat Abilov, Viktor Dmitriyev
:
Exploring a Context-based Network Access Control for Mobile Devices. 547-554 - Maysoon F. Abulkhair, Arwa H. Alsahli, Kawther M. Taleb, Atheer M. Bahran, Fatimah M. Alzahrani, Hend A. Alzahrani, Lamiaa Fattouh Ibrahim

:
Mobile Platform Detect and Alerts System for Driver Fatigue. 555-564
Application of Soft Computing
- Urjaswala Vora

:
Precepts and Evolvability of Complex Systems. 565-574 - Ryo Onuma, Hiroki Nakayama, Shuhei Abe, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:

Strategic Accumulation and Organization of the Polish Contexts in Research Document Creation. 575-577 - Nasir Uddin, Fariha Hossain:

Evolution of Modern Management through Taylorism: An Adjustment of Scientific Management Comprising Behavioral Science. 578-584 - Alihossein Aryanfar

, Razali Yaakob
, Alfian Abdul Halin
, Md Nasir Sulaiman, Khairul Azhar Kasmiran
, Leila Mohammadpour
:
Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification. 585-592 - Sirshendu Guha:

Simulation Studies for Analysis of Inherent Resilience Properties of an Amine Regeneration Column used in a Gas Sweetening Unit. 593-602 - Mohit Mishra, Vaibhav Gupta, Utkarsh Chaturvedi, Kaushal K. Shukla

, Roman V. Yampolskiy:
A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer Factorization. 603-610 - Lagouge Kwanda Tartibu

, Bohua Sun
, M. A. E. Kaunda:
Optimal Design of A Standing Wave Thermoacoustic Refrigerator Using GAMS. 611-618 - G. V. S. Raju, C. Kishor Kumar Reddy

, L. V. Narasimha Prasad
:
Revealing of Earth Quake Magnitude Using Seismic Signals and Wavelet Transforms. 619-627 - Tomohiro Funayama, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:

Hybrid Analysis of Audience Gaze and Slide Construction to Obtain the Clues for Improving Presentations. 628-630 - Mona Awad Alkhattabi

:
Usability Evaluation of Tadarus: Student Perceptions. 631-636 - L. V. Narasimha Prasad

, C. Kishor Kumar Reddy
, Shobha Rani Depuru
:
Satellite Derived pH Estimation for Acidity in Precipitation Using Water Vapor and Nitrogen Dioxide Imagery. 637-648
Corrected Paper
- Reem Elkhouly, Ahmed El-Mahdy, Amr Elmasry:

2-Bit Branch Predictor Modeling Using Markov Model. 650-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














