default search action
17. CIT 2017: Helsinki, Finland
- 2017 IEEE International Conference on Computer and Information Technology, CIT 2017, Helsinki, Finland, August 21-23, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0958-3
CIT 2017: 17th International Conference on Computer and Information Technology
CIT 1: Machine Learning, Data Mining and Big Data Analytics
- Cheng Wu, Yiming Wang:
Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement Learning. 1-8 - Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He, Chensi Wu:
Predicting the Popularity of Online News Based on Multivariate Analysis. 9-15 - Yuanyue Guo, Jie Deng, Falin Liu, Dongjin Wang:
Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion. 16-22 - Alper Kursat Uysal, Yi Lu Murphey:
Sentiment Classification: Feature Selection Based Approaches Versus Deep Learning. 23-30
CIT 2: Social Networks and Optimization
- Kan Zhang, Zichao Zhang, Yanlei Wu, Jin Xu, Yunyun Niu:
A Core Theory Based Algorithm for Influence Maximization in Social Networks. 31-36 - Rafael Weingärtner, Carla Merkle Westphall:
A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers. 37-46 - Youssef Khaoula, Walid Boukadida, Michio Okada:
ROBOMO: Effects of a Motivational Intervention to Adress the Barriers During Science Learning. 47-54 - Nauber Gois, Pedro Porfírio Muniz de Farias, André L. V. Coelho:
A Multi-objective Metaheuristic Approach to Search-Based Stress Testing. 55-62
CIT 3: Wireless Networks and Communications I
- Jiachen Li, Jing Xu, Wei Liu, Shimin Gong, Kai Zeng:
Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks. 63-68 - Jiachen Li, Yue Mi, Shimin Gong, Jing Xu, Xiaoxia Huang, Yanyan Shen:
Cooperative Multi-relay Assisted Multicast Beamforming in Wirelessly Powered Communications. 69-74 - Charikleia Papatsimpa, Jean-Paul M. G. Linnartz:
Improved Presence Detection for Occupancy Control in Multisensory Environments. 75-80 - Ashraf A. Tahat, Claude D'Amours, Benoît Champagne:
Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems. 81-86 - Zhe Guo, Zheng Yan:
Dynamic MAC Protocol for Tactical Data Links. 87-92
CIT 4: Video and Audio Transmission
- Shih-Hsuan Yang, Chong-Cheng Zhong:
Fast Coding-Unit Mode Decision for HEVC Transrating. 93-100 - Yuki Maehara, Toshiro Nunome:
Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-view Video and Audio Transmission with MPEG-DASH. 101-106 - Tenager Mekonnen, Erkki Harjula, Arto Heikkinen, Timo Koskela, Mika Ylianttila:
Energy Efficient Event Driven Video Streaming Surveillance Using SleepyCAM. 107-113 - Ali Idri, Ibtissam Abnane:
Fuzzy Analogy Based Effort Estimation: An Empirical Comparative Study. 114-121
CIT 5: Wireless Networks and Communications II
- Mário Marques da Silva, Rui Dinis:
A Simplified Massive MIMO Approach Using Precoding. 122-127 - Andrei Popleteev:
Indoor Localization Using Ambient FM Radio RSS Fingerprinting: A 9-Month Study. 128-134 - Jonas Pontes, Demetrio Borges, Eric Borba, Victor Lira, Eduardo Tavares:
Assessment of TCP Parameters for Mobile Devices Concerning Performance and Energy Consumption. 135-141 - Marco Antonio Marques Marinho, Alexey V. Vinel, Felix Antreich, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas:
Antenna Array Based Localization Scheme for Vehicular Networks. 142-146 - Shin'ichi Koike:
A New Method of Error Reduction for Affine Projection Algorithm. 147-150
CIT 6: Machine Learning, Data Mining and Big Data Analytics II
- Kazuhiko Takahashi:
Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback Controller. 151-156 - Rafael Valero-Fernandez, David J. Collins, Colin Rigby, James Bailey:
Towards Accurate Predictions of Customer Purchasing Patterns. 157-161 - Ge Zhang, Haozhan Wang, Zhongzhi Luan, Weiguo Wu, Depei Qian:
Improving Performance for Geo-Distributed Data Process in Wide-Area. 162-167 - Ritu Chaturvedi, Christie I. Ezeife:
Predicting Student Performance in an ITS Using Task-Driven Features. 168-175 - Liyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang, Yongquan Feng:
An Adaptive Visualization Tool for High Order Discontinuous Galerkin Method with Quadratic Elements. 176-183
CIT 7: Network Security and Privacy
- Qiong Wang, Jialong Wang, Li Shen, Zhiying Wang:
A Software-Hardware Co-designed Methodology for Efficient Thread Level Speculation. 184-191 - Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Fast Transmission Mechanism for Secure VPLS Architectures. 192-196 - Sampsa Rauti, Ville Leppänen:
"You have a Potential Hacker's Infection": A Study on Technical Support Scams. 197-203 - Yilmaz Vural, Murat Aydos:
A New Approach to Utility-Based Privacy Preserving in Data Publishing. 204-209 - Ke Zhang, Martin Tomlinson, Mohammed Zaki Ahmed:
Best Random Codes Construction for Syndrome Coding Scheme. 210-214
CIT 8: Cloud Computing and Data Centre Networks
- Victor Lira, Eduardo Tavares, Meuse N. Oliveira Jr., Dennys Azevedo, Jonas Pontes:
A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual Networks. 215-222 - Huaqing Lin, Zheng Yan, Raimo Kantola:
CDController: A Cloud Data Access Control System Based on Reputation. 223-230 - Roger Daniel Francisco Ferreira, Rômulo Silva de Oliveira:
Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS. 231-236 - Mourad Elhadef:
Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison Rules. 237-244
CIT 9: Machine Learning, Data Mining and Big Data Analytics III
- Ali Idri, Ilham Kadi:
A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and Treatment. 245-252 - Jukka Ruohonen, Ville Leppänen:
Investigating the Agility Bias in DNS Graph Mining. 253-260 - Dongyang Zhao, Yangyang Zhou, Jin Xu:
The Enumeration of Flippable Edges in Maximal Planar Graphs. 261-267 - Lei Ni, Yuxin Wang, Haoyang Tang, Zhao Yin, Yanming Shen:
Accurate Localization Using LTE Signaling Data. 268-273 - Paresh Rathod, Timo Hämäläinen:
A Novel Model for Cybersecurity Economics and Analysis. 274-279
SecureEdge 2017: IEEE International Workshop on Secure and Resource-Efficient Edge Computing 2017
SecureEdge 1: Secure and Resource-Efficient Edge Computing I
- Hongyu Wang, Jin Xu, Bing Yao:
Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees. 280-285 - Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services. 286-291 - Toshihiko Yamakami:
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Platform as a Service. 292-296
SecureEdge 2: Secure and Resource-Efficient Edge Computing II
- Ehab Mufid Shafiq Alkhateeb:
Dynamic Malware Detection Using API Similarity. 297-301 - Klervie Toczé, Simin Nadjm-Tehrani:
Where Resources Meet at the Edge. 302-307 - Ihsan Mert Ozcelik, Niaz Chalabianloo, Gürkan Gür:
Software-Defined Edge Defense Against IoT-Based DDoS. 308-313
RACIT 2017: IEEE International Symposium on Recent Advances of Computer and Information Technologies 2017
RACIT 1: Advances of Computer and Information Technologies I
- Wei-Lune Tang, Shih-Hsuan Yang:
Investigation and Performance Evaluation of Scalable High Efficiency Video Coding. 314-319 - Jianren Gao, Yuxin Wang, Haoyang Tang, Zhao Yin, Lei Ni, Yanming Shen:
An Efficient Dynamic Ridesharing Algorithm. 320-325 - Abdoullah Fath-Allah, Laila Cheikhi, Ali Idri, Rafa E. Al-Qutaish:
A Best Practice Based E-Government Portals' Maturity Model - A Case Study. 326-331 - Tuomas Tenkanen, Timo Hämäläinen:
Security Assessment of a Distributed, Modbus-Based Building Automation System. 332-337 - Hao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, Shuai Ye:
Practical Performance Models for High-Order CFD Simulation. 338-344
RACIT 2: Advances of Computer and Information Technologies II
- Igor Kabashkin:
Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System. 345-350 - Guang-Yu Xiong, Timo R. Nyberg, Gang Xiong:
Changing for Win-Win: Change Management on Global Value Chain Optimization. 351-356 - Tingting Zhang, Zheng Chang, Tapani Ristaniemi, Guohua Liu:
3D Matrix-Based Visualization System of Association Rules. 357-362 - Guido Albertengo, Fikru Getachew Debele, Waqar Hassan, Dario Stramandino:
On the Performance of Web Services and Google Cloud Messaging. 363-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.