default search action
RACS 2019: Chongqing, China
- Chih-Cheng Hung, Qianbin Chen, Xianzhong Xie, Christian Esposito, Jun Huang, Juw Won Park, Qinghua Zhang:
Proceedings of the Conference on Research in Adaptive and Convergent Systems, RACS 2019, Chongqing, China, September 24-27, 2019. ACM 2019, ISBN 978-1-4503-6843-8
System software
- Yi-Shen Chen, Sheng-Wei Cheng, Tei-Wei Kuo:
Performance tuning case study on graphics processing unit-accelerated monte carlo simulations for proton therapy. 1-6 - Chin-Hsien Wu, Po-Ling Lin, Yu-Hun Hu, Ming-Yang Du:
A data sanitization method for mobile devices with NAND flash memory. 7-13 - Chin-Fu Kuo, Jian-Xing Lin, Yung-Feng Lu:
Energy-efficient scheduling algorithm for real-time tasks with multiple parallel segments in multiprocessor systems. 14-19 - Yung-Feng Lu, Hung-Ming Chen, Chin-Fu Kuo, Bo-Kai Tseng, Shih-Chun Chou:
Container-based load balancing for WebRTC applications. 20-26 - Xing Liu, GuangMing Sheng, Bing Shi, Christophe de Vaulx, Wenbi Rao, Qing Li:
MIPS CPU development with analogous teaching method for experimental teaching of digital logic and computer organization. 27-33 - Wei Li, Guanxi Shen, Jinbo Zhang:
An indoor environmental monitoring system for large buildings based on LoRaWAN. 34-38 - Chia-Hsueh Wu, Chen-Tui Hung, Ya-Shu Chen:
Energy-aware offloading for mobile computing with heterogeneous network. 39-44 - Baonan Xiao, Jianfeng Yang, Shixiao Wu, Qing Geng:
Using real-time image enhancement technique to improve prostate capsula detection. 45-50 - Evariste Ntaryamira, Cristian Maxim, Liliana Cucu-Grosjean:
Data consistency and temporal validity under the circular buffer communication paradigm. 51-56
Short papers (posters)
- Eunseok Choi, Jiman Hong:
Design and implementation of virtual machine control and streaming scheme using Linux kernel-based virtual machine hypercall for virtual mobile infrastructure. 57-60 - Sangmin Park, Bada Kim, Taeyeon Won, Junyoung Heo:
IoT-based floodgate control system. 61-62 - Taeyeon Won, Bada Kim, Sangmin Park, Junyoung Heo:
An IoT based distortion invariant motion detection using raspberry pi with mean shift algorithm. 63-64 - Seoyeon Kim, Jisu Park, Jaehyeok Jeong, Young-Sun Yun, Seongbae Eun, Jinman Jung:
Survey of IoT platforms supporting artificial intelligence. 65-66
Artificial intelligence & algorithms
- Rui Zhang, Jun Zhou, Lixiao Feng, Wei Ma:
Study of variable liquid fertilization control system based on fuzzy PID control. 67-70 - Chuang Wang, Jiakun Li, Tian Wang, Peng Shi, Hichem Snoussi, Xin Su:
Abnormal object detection and recognition in the complex construction site via cloud computing. 71-75 - Mahsa Shokri Varniab, Chih-Cheng Hung, Vahid Khalilzad-Sharghi:
Classification of multiclass datasets using genetic programming. 76-82 - Zhengze Zhu, Haiying Zhou, Kun Mean Hou, Kui Zhou, Sishan Wang, Jianping Lan, Jiayuan Gong, Dong Bi:
Modeling and control method of connected and autonomous vehicles(CAVs) in urban traffic network based on PC algorithm. 83-90 - Tingting Zhang, Guimiao Liu, Ling Xia, Xiaofeng Liu:
Human evaluation of virtual and real-world distance. 91-95 - Zhixiang Deng, Qian Sang, Yan Pan, Yuanxue Xin:
Application of deep learning for power control in the interference channel: a RNN-based approach. 96-100 - Qinglin Yang, Xiaofei Luo, Peng Li, Toshiaki Miyazaki, Xiaoyan Wang:
Computation offloading for fast CNN inference in edge computing. 101-106 - Dongyoun Kim, Sangwon Shin, Jinwoo Park, Sung Shin:
Development of a semantic scene conversion model for image-based localization at night. 107-112 - Youjeong Jang, Hyung-Do Choi, Fang Deng, Sung Shin:
Evaluation of deep learning models for information extraction from EMF-related literature. 113-116 - Ki Sun Park, Kyoung-Soon Hwang, Keon Myung Lee, Chan Sik Han, Jin Han:
Machine learning modeling assistance for non-expert developers. 117-122
Short papers (posters)
- Bada Kim, Taeyeon Won, Sangmin Park, Junyoung Heo:
Anomaly detection for deep-learning based license plate recognition in real time video. 123-124 - Boseon Hong, Bongjae Kim, Jeong-Dong Kim, Jeahyoun Koo:
Performance analysis of chinese cursive character recognition based on convolutional neural network. 125-127 - Heejin Kim, Younggwan Kim, Jiman Hong:
Cluster management framework for autonomic machine learning platform. 128-130 - Boseon Hong, Jinsung Cho, Bongjae Kim, Hong Min, Jiman Hong, Keon Myung Lee:
A study on supporting spiking neural network models based on multiple neuromorphic processors. 131-132
Image processing
- Hong Shen, Yuuki Kaiya:
Distinction of vegetable diseases by image processing. 133-136 - Kai Che, Yufeng Chen, Zhengtao Xiang, Guosheng Peng, Jian Lv, Yun Zhou:
Research of infrared image super-resolution reconstruction based on improved FSRCNN. 137-142 - Ling Xia, Tingting Zhang, Xiaofeng Liu:
Validity of deriving low order photometry parameters from light solid distribution. 143-146 - Chungyup Lee, Soohyeon Choi, Jung-Yeop Kim, Kwanghee Won:
Instance segmentation in urban scenes using inverse perspective mapping of 3D point clouds and 2D images. 147-152
Database & data mining
- Chengming Zou, Fanchao Zhao, Yi Xie, Haiying Zhou, Jun Qin:
Live migration in Greenplum database based on SDN via improved gray wolf optimization algorithm. 153-160 - Zhangyu Cheng, Chengming Zou, Jianwei Dong:
Outlier detection using isolation forest and local outlier factor. 161-168 - Jiwon Hong, Sung-Jun Park, Taeri Kim, Yung-Kyun Noh, Sang-Wook Kim, Dongphil Kim, Wonho Kim:
Malware classification for identifying author groups: a graph-based approach. 169-174
Network computing
- Yuchen Gan, Xin Su, Chang Choi, Zhou Zhou:
Clustered NFV service chaining scheme for ocean observations. 175-180 - Chi-Sheng Shih, Kai-Wei Yang:
Design and implementation of distributed traceability system for smart factories based on blockchain technology. 181-188 - Godwin Kobby Gakpo, Xin Su, Chang Choi:
Moving intelligence of mobile edge computing to maritime network. 189-193 - Gang Yang, Jun Huang, Longyan Xu, Yahong Zhai:
Energy scheduling mechanism for intelligent terminal with simultaneous wireless information and power transfer. 194-199 - Pengfei Wu, Jun Huang, Longyan Xu:
Energy-efficient power allocation in analogue network coding based multi-hop D2D communication. 200-205 - Yinping Ding, Jun Huang, Peng Zhou:
Performance analysis for multi-priority data flow scheduling in SDN. 206-211 - Junho Seo, Sungwon Lee, Muhammad Toaha Raza Khan, Dongkyun Kim:
Adaptive selection of configuration methods in 6LoWPAN based IoUT. 212-216 - Cissoko Moussa, Haibo Zhang, Hasan Shamim, Kaijian Liu:
Task offloading strategies based on workload balancing in ultra-dense networks. 217-223 - Hasan Shamim, Haibo Zhang, Cissoko Moussa, Kaijian Liu:
Effective capacity-aware resource allocation for 5G ultra dense network with hybrid access mode. 224-229 - Sangwon Shin, Soohyeon Choi, Kwanghee Won, Sung Y. Shin:
Preprocessed symmetric RSA authentication for wireless body area networks in space. 230-235 - Siri Guleng, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji:
Traffic big data assisted broadcast in vehicular networks. 236-240
Short papers (posters)
- Seungyeon Lee, Mhanwoo Heo, Kicheol Park, Bongjae Kim, Jiman Hong:
Enhancing the security of IoT gateway based on the classification of user security-sensitive data. 241-243
Software engineering
- Yang Zhang, Jiacheng Li, Jiaoman Du, Lei Li:
Time-dependent theme park routing problem. 244-249 - Xincheng Huang, Wei Jian, Cheng Yang, Yiren Li, Yun Gao, Zhihu Wang:
Sliding mode control of PMSM based on novel convergence reaching law. 250-255 - Abdulrahman Abu Elkhail, Jan Svacina, Tomás Cerný:
Intelligent token-based code clone detection system for large scale source code. 256-260 - Antonin Smid, Ruolin Wang, Tomás Cerný:
Case study on data communication in microservice architecture. 261-267
Security
- Geng Zhang, Jian Hou, Yang Wang, Yanan Wang, Jianguo Zhou:
Vulnerability analysis and optimization of power communication network. 268-275 - Seong Il Bae, Soo Han Kim, Eul Gyu Im:
Automatic hybrid analysis technique to improve botnet code coverage using fake server. 276-282 - Jong Youn Lee, Jun Young Chang, Eul Gyu Im:
DGA-based malware detection using DNS traffic analysis. 283-288 - YongJoo Lee, Keon Myung Lee:
Blockchain-based RBAC for user authentication with anonymity. 289-294 - Wenming Jiao, Heng Zhang, Qiyan Zang, Jian Zhang, Hongran Li:
Iris biometric feature hidden based on chaotic encryption. 295-299
Short papers (posters)
- Yena Lee, Yongmin Kim, Seungyeon Lee, Junyoung Heo, Jiman Hong:
Machine learning based Android malware classification. 300-302
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.