default search action
12th ICDIM 2017: Fukuoka, Japan
- Twelfth International Conference on Digital Information Management, ICDIM 2017, Fukuoka, Japan, September 12-14, 2017. IEEE 2017, ISBN 978-1-5386-0664-3
- Jolanta Mizera-Pietraszko:
Modelling swarm-intelligent systems for medical applications. 1-5 - Eric Torunski, M. Omair Shafiq, Anthony D. Whitehead:
Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces Debate. 6-14 - Ubon Thongsatapornwatana, Woraphon Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen:
Analysis of criminal behaviors for suspect vehicle detection. 15-20 - Lixin Fu:
Shortest path deliveries using density-based clustering. 21-26 - Prasit Usaphapanus, Krerk Piromsopa:
Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination. 27-31 - Nobuaki Onishi, Qiang Ma:
Factor analysis of investment trust products by using monthly reports and news articles. 32-37 - K. M. Mehedi Hasan Sonet, Md. Mustafizur Rahman, Pritom Mazumder, Abid Reza, Rashedur M. Rahman:
Analyzing patterns of numerously occurring heart diseases using association rule mining. 38-45 - Yui Kita, Jun Rekimoto:
Prediction of importance of figures in scholarly papers. 46-53 - Kensuke Baba:
Fast plagiarism detection based on simple document similarity. 54-58 - Daiki Namikoshi, Manabu Ohta, Atsuhiro Takasu, Jun Adachi:
CRF-based bibliography extraction from reference strings using a small amount of training data. 59-64 - Kenji Yamaguchi, Yukari Shirota:
Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theory. 65-69 - Yao-Liang Chung:
An improved algorithm for transmission in heterogeneous cellular networks. 70-74 - Yan Zhou, Taketoshi Ushiama:
A collaborative filtering method for interactive platforms. 75-80 - Toshihiko Yamakami:
A migration-oriented partial adaptation architecture for IoT-empowered city platform as a service. 81-85 - Tetsuro Kakeshita:
National survey of Japanese universities on computing education: Analysis of non-IT departments and courses. 86-91 - Kazuhiro Sumi, Tetsuro Kakeshita:
National servey of Japanese universities on computing education: Analysis of IT education for high school teacher license on IT. 92-97 - Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl:
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011. 98-102 - Mika Ohtsuki, Tetsuro Kakeshita, Mitsuhiro Takasaki:
National survey of Japanese universities on computing education: Analysis of educational computer system. 103-108 - Naoko Takahashi, Tetsuro Kakeshita:
National survey of Japanese universities on computing education: Analysis of informatics in general education. 109-114 - Yuan-Chin Lee, Chuan-Mu Tseng, Tzong-Jye Liu:
A HTTP botnet detection system based on ranking mechanism. 115-120 - Adeyemi Aladeokin, Pavol Zavarsky, Neelam Memon:
Analysis and compliance evaluation of cookies-setting websites with privacy protection laws. 121-126 - Chien-Lung Hsu, Tzu-Wei Lin, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen:
Privacy-preserved conference key distribution protocol. 127-132 - Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu:
A dynamic identity end-to-end authentication key exchange protocol for IoT environments. 133-138 - Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. 139-143 - Siba Mishra, Chiranjeev Kumar:
Improving the trust of end users in enterprise SOA using combinatorial group testing methods. 144-149 - Zbigniew Lipinski:
Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networks. 150-154 - Gabriel A. de Oliveira, Peron R. de Sousa, Antônio A. de A. Rocha, Pedro B. Velloso:
Transparent mobility or devices on the Internet using OpenFlow. 155-160 - Ming-Yi Zheng, Hung-Yuan Chen, Huan Chen, Yao-Chung Fan:
On cleaning and organizing context logs for mobile user profiling. 161-164 - Chin-Shiuh Shieh, Hao-Xiang Gu, Jhih-Ying Yan, Mong-Fong Horng:
SCTP-based service migration for VOD service. 165-168 - Hathairat Ketmaneechairat, Chutima Kongketwanich, Thitinun Naijit:
Recommender system for Thai food cooking on smartphone. 169-178 - Sharefah A. Al-Ghamdi, Joharah Khabti, Hend S. Al-Khalifa:
Exploring NLP web APIs for building Arabic systems. 175-178 - Xing Wang, Jason Lin, Ryan Vrecenar, Jyh-Charn Liu:
Syntactic role identification of mathematical expressions. 179-184 - Cristina Barros, Elena Lloret:
Analysing the influence of semantic knowledge in natural language generation. 185-190 - Jan Friedrich, Christoph Lindemann, Michael Petrifke:
Two-level dynamic index pruning. 191-196 - Hathairat Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon:
Mobile search engine for medicine information on smartphone. 197-201 - Sidik Soleman, Atsushi Fujii:
Toward plagiarism detection using citation networks. 202-208 - Zar Zar Wint, Theo Ducros, Masayoshi Aritsugi:
Spell corrector to social media datasets in message filtering systems. 209-215 - Sunantha Sodsee, Maytiyanin Komkhao:
Item recommending by item co-purchasing network and user preference. 216-221 - Rupal Sethi, B. Shekar:
Mining affordance-based substitution rules: A dynamic taxonomy approach. 222-227 - Chihiro Sakazume, Hiroyuki Kitagawa, Toshiyuki Amagasa:
DIO: Efficient interactive outlier analysis over dynamic datasets. 228-235 - Andre Petermann, Giovanni Micale, Giacomo Bergami, Alfredo Pulvirenti, Erhard Rahm:
Mining and ranking of generalized multi-dimensional frequent subgraphs. 236-245 - Arif Wicaksono, Sunya Sarapirome:
Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights. 246-251 - Daichi Minami, Taketoshi Ushiama:
Can you trust the user?: Collaborative trust estimation model for recommendations. 252-256 - Alton Y. K. Chua, Snehasish Banerjee:
Rumor verifications on Facebook: Click speech of likes, comments and shares. 257-262 - Alton Y. K. Chua, Rajiv George Aricat, Dion Goh:
Message content in the life of rumors: Comparing three rumor types. 263-268 - Grzegorz Osinski, Veslava Osinska, Brian Camacho:
Scientific visualizer in personal information management. 269-272 - Anna Marti Bigorra:
Measuring uncertainty to identify missing customer information relevant to the design process. 273-279 - Seung Jin Lim:
Mining and visualization of interpersonal interaction networks. 280-285 - Rami Ibrahim, M. Omair Shafiq:
Measurement and analysis of citizens requests to government for non-emergency services. 286-291 - Elhadi Belghache, Jean-Pierre Georgé, Marie-Pierre Gleizes:
DREAM: Dynamic data relation extraction using adaptive multi-agent systems. 292-297 - Pritish Patil, Jiayun Wang, Yuya Aratani, Kyoji Kawagoe:
Prototyping a recommendation system for Ukiyo-e using hybrid recommendation algorithm. 298-303 - Toshihiko Yamakami:
Toward positioning IoT-empowered service engineering in city platform as a service. 304-308 - Rangsipan Marukatat, Nutthapon Chinchaipong, Sirapop Prechalertpririya:
Tweets of Thailand: A tweet retrieval system for domestic tourism in Thailand. 309-312 - Fatia Kusuma Dewi, Satrio Baskoro Yudhoatmojo, Indra Budi:
Identification of opinion leader on rumor spreading in online social network Twitter using edge weighting and centrality measure weighting. 313-318 - Monlica Wattana, Tipwalee Boonsri:
Improvement of complete malaria cell image segmentation. 319-323 - Amjad Rehman:
Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysis. 324-327 - Xing Wang, Jyh-Charn Liu:
A content-constrained spatial (CCS) model for layout analysis of mathematical expressions. 334-339 - Hajime Tsubaki:
Analysis based on Japanese accented English characteristics categories for objective evaluation. 382-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.