default search action
CSOC 2016
- Radek Silhavy, Roman Senkerik, Zuzana Komínková Oplatková, Petr Silhavy, Zdenka Prokopova:
Software Engineering Perspectives and Application in Intelligent Systems - Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol 2. Advances in Intelligent Systems and Computing 465, Springer 2016, ISBN 978-3-319-33620-6 - Yi-Horng Lai:
The Effect of Nutrition Education System for Elementary School Students in Nutrition Knowledge. 1-9 - Houssem Eddine Nouri, Olfa Belkahla Driss:
MATP: A Multi-agent Model for the University Timetabling Problem. 11-22 - M. Shahina Parveen, Gugulothu Narsimha:
Optimized Clustering with Statistical-Based Local Model for Replica Management in DDM over Grid. 23-33 - Margit Antal, Lehel Nemes:
The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results. 35-46 - P. T. Sowmya Naik, K. N. Narasimha Murthy:
Joint Algorithm for Traffic Normalization and Energy-Efficiency in Cellular Network. 47-57 - Viktor Potapov, Sergei Gushansky, Vyacheslav Guzik, Maxim Polenov:
Architecture and Software Implementation of a Quantum Computer Model. 59-68 - P. G. Sunitha Hiremath, C. V. Guru Rao:
MEEM: A Novel Middleware for Energy Efficiency in Mobile Adhoc Network. 69-80 - Pavel Pokorný, Markéta Mazácová:
A 3D Visualization Design and Realization of Otrokovice in the Nineteen-thirties. 81-92 - P. Amuthabala, M. Mohanapriya:
Cost Effective Framework for Complex and Heterogeneous Data Integration in Warehouse. 93-104 - N. R. Deepak, S. Balaji:
Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. 105-115 - Andreia Silva, Plácido Rogério Pinheiro, Adriano Bessa Albuquerque:
A Brief Analysis of Reported Problems in the Use of Function Points. 117-126 - Marum Simão Filho, Plácido Rogério Pinheiro, Adriano Bessa Albuquerque:
Task Allocation in Distributed Software Development Aided by Verbal Decision Analysis. 127-137 - Sayed Sayeed Ahmad, Manuj Darbari, Harsh Purohit:
Application of Evolutionary Algorithm in Supply Chain Management for Internet Marketing. 139-146 - Nassima Bouchareb, Nacer Eddine Zarour, Samir Aknine:
Intelligent Mechanism for Cloud Federation and Requirements Changes Management. 147-157 - Jan Vávra, Martin Hromada:
Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems. 159-169 - Petr Lukasik, Martin Sysel:
An Optimization Scheduler in the Intranet Grid. 171-180 - Bo Dong, Xue Wang:
A Hybrid Clustering Metric-Based Algorithm for Wireless Sensor Networks. 181-192 - Boguslaw Cyganek, Michal Wozniak:
On Robust Computation of Tensor Classifiers Based on the Higher-Order Singular Value Decomposition. 193-201 - Franco Cicirelli, Libero Nigro, Paolo F. Sciammarella:
Model Checking Mutual Exclusion Algorithms Using Uppaal. 203-215 - Nikita Danilov, Tatiana E. Shulga, Natalya Frolova, Nina Melnikova, Nataliia S. Vagarina, Elena Pchelintseva:
Software Usability Evaluation Based on the User Pinpoint Activity Heat Map. 217-225 - Dhanapal Jayalatchumy, Thambidurai Perumal:
Inflated Power Iteration Clustering Algorithm to Optimize Convergence Using Lagrangian Constraint. 227-237 - Jiri Vojtesek, Martin Pipis:
Virtualization of Operating System Using Type-2 Hypervisor. 239-247 - Serap Ergün, Tuncay Aydogan:
A New Game-Theoretical Approach in Network Routing: Algorithms and Their Performance Analysis in OMNeT++. 249-259 - Tomás Urbánek, Zdenka Prokopova, Radek Silhavy, Ales Kuncar:
Using Analytical Programming for Software Effort Estimation. 261-272 - N. S. Pradeep Kumar, H. N. Suresh:
Intra-frame Prediction Mode Decision for Efficient Compression and Signal Quality. 273-282 - Jan Tyrychtr, Martin Pelikan, Hana Stiková, Ivan Vrana:
Multidimensional Design of OLAP System for Context-Aware Analysis in the Ambient Intelligence Environment. 283-292 - Andreia Silva, Plácido Rogério Pinheiro, Adriano Bessa Albuquerque, Jônatas Barroso:
A Process for Creating the Elicitation Guide of Non-functional Requirements. 293-302 - Erki Eessaar:
A Data-Centric Algorithm for Identifying Use Cases. 303-316 - M. Lakshminarayana, Mrinal Sarvagya:
Algorithm to Balance Compression and Signal Quality Using Novel Compressive Sensing in Medical Images. 317-327 - Maxim Polenov, Andrey I. Kostyuk, Evgenia Muntyan, Vyacheslav Guzik, Vladislav Lukyanov:
Application of Virtualization Technology for Implementing Smart House Control Systems. 329-339 - Dora Lapkova, Lukas Kralik, Zuzana Komínková Oplatková, Milan Adamek:
Utilization of Motion Animation for Analysis of Basic Self-defense Techniques. 341-352 - Dora Lapkova, Lukas Kralik, Milan Adamek:
EMG Analysis for Basic Self-defense Techniques. 353-362 - Bogdan Walek, Ondrej Pektor, Radim Farana:
Proposal of the Web Application for Selection of Suitable Job Applicants Using Expert System. 363-373 - Denis V. Gruzenkin, Roman Yu. Tsarev, Alexander N. Pupkov:
Technique of Selecting Multiversion Software System Structure with Minimum Simultaneous Module Version Usage. 375-386 - Quân Nguyen-Le, Lam-Son Lê:
Expressing Pre-, Post-conditions, Attributes and Business Constraints in Artifact-Centric Business Processes Using Object Role Modeling. 387-397 - Clyde Meli, Zuzana Komínková Oplatková:
SPAM Detection: Naïve Bayesian Classification and RPN Expression-Based LGP Approaches Compared. 399-411 - Adriana Herden, Pedro Porfírio Muniz Farias, Adriano Bessa Albuquerque:
An Agile Approach to Improve Process-Oriented Software Development. 413-424 - Tomas Sochor, Tomas Gatek:
Ad-Hoc Routing Protocols Comparison Using Open-Source Simulation Tool. 425-433 - Ezzeddine Fatnassi, Jouhaina Chaouachi:
Discrete Event Simulation of Loading Unloading Operations in a Specific Intermodal Transportation Context. 435-444 - Matej Hires, Hashim Habiballa, Vilém Novák:
Parallelization of Fuzzy Logic Analysis for Pattern Recognition. 445-455 - Saddaf Rubab, Mohd Fadzil Hassan, Ahmad Kamil Mahmood, Syed Nasir Mehmood Shah:
Performance Management Using Autonomous Control-Based Distributed Coordination Approach in a Volunteer Grid Computing Environment. 457-469 - Maciej Majewski, Wojciech Kacalak:
Intelligent Speech Interaction of Devices and Human Operators. 471-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.