MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation (English)
- New search for: Son, Hyun Seung
- New search for: Park, Young B.
- New search for: Kim, R. Young Chul
- New search for: Son, Hyun Seung
- New search for: Park, Young B.
- New search for: Kim, R. Young Chul
In:
Cluster Computing
;
22
, Suppl 1
; 2461-2470
;
2016
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation
-
Contributors:
-
Published in:Cluster Computing ; 22, Suppl 1 ; 2461-2470
-
Publisher:
- New search for: Springer US
- New search for: Springer Science + Business Media B.V
-
Place of publication:Dordrecht [u.a.]
-
Publication date:2016
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 / 54.32 / 54.25
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 Programmierung: Allgemeines / 54.32 Rechnerkommunikation / 54.25 Parallele Datenverarbeitung -
Source:
Table of contents – Volume 22, Issue Suppl 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop clusterYuvaraj, N. / SriPreethaa, K. R. et al. | 2017
- 11
-
A hybrid technique for gender classification with SLBP and HOG featuresAnnalakshmi, M. / Roomi, S. Mohamed Mansoor / Naveedh, A. Sheik et al. | 2018
- 21
-
Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computingSathiya, D. / Gomathy, B. et al. | 2018
- 33
-
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machineKumaresan, T. / Saravanakumar, S. / Balamurugan, R. et al. | 2017
- 47
-
An efficient categorization of liver cirrhosis using convolution neural networks for health informaticsSuganya, R. / Rajaram, S. et al. | 2017
- 57
-
Upkeeping secrecy in information extraction using ‘k’ division graph based postulatesKumar, B. Santhosh / Karthik, S. / Arunachalam, V. P. et al. | 2018
- 65
-
Revamping data access privacy preservation method against inside attacks in wireless sensor networksBabu, S. Sathees / Balasubadra, K. et al. | 2018
- 77
-
Software defect prediction techniques using metrics based on neural network classifierJayanthi, R. / Florence, Lilly et al. | 2018
- 89
-
Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision treeSuganthi, M. / Karunakaran, V. et al. | 2018
- 103
-
Multi-biometric authentication system using finger vein and iris in cloud computingIlankumaran, S. / Deisy, C. et al. | 2018
- 119
-
Association rules and deep learning for cryptographic algorithm in privacy preserving data miningRajesh, N. / Selvakumar, A. Arul Lawrence et al. | 2018
- 133
-
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithmViji, C. / Rajkumar, N. / Duraisamy, S. et al. | 2018
- 145
-
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree constructionTamilselvi, T. / Tholkappia Arasu, G. et al. | 2018
- 157
-
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networksSupraja, P. / Gayathri, V. M. / Pitchai, R. et al. | 2018
- 165
-
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviationGayathri, V. M. / Nedunchelian, R. et al. | 2018
- 177
-
An effective pose invariant face recognition system with the aid of ABC optimized ANFISAnantha Padmanabhan, S. / Krishna Kumar, N. J. et al. | 2018
- 189
-
Performance evaluation of support vector machine classification approaches in data miningChidambaram, S. / Srinivasagan, K. G. et al. | 2018
- 197
-
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patientsRajagopal, Renuka Devi / Murugan, Saravanan / Kottursamy, Kottilingam / Raju, V. et al. | 2018
- 207
-
Trust based resource selection with optimization techniqueSaravana Kumar, E. / Vengatesan, K. et al. | 2018
- 215
-
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifierRaja, J. / Gunasekaran, K. / Pitchai, R. et al. | 2018
- 229
-
Enhanced continuous and discrete multi objective particle swarm optimization for text summarizationPriya, V. / Umamaheswari, K. et al. | 2018
- 241
-
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networksRani, K. Sasi Kala / Deepa, S. N. et al. | 2017
- 255
-
Triple referee incentive mechanism for secure mobile adhoc networksVedhavathy, T. R. / Manikandan, M. S. K. et al. | 2018
- 265
-
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc networkBharathisindhu, P. / Selva Brunda, S. et al. | 2018
- 277
-
Probabilistic classification techniques to perform geographical labeling of web objectsAnjanKumar, K. N. / Chitra, S. / Satish Kumar, T. et al. | 2018
- 287
-
Chaotic social spider algorithm for load balance aware task scheduling in cloud computingArul Xavier, V. M. / Annadurai, S. et al. | 2018
- 299
-
Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environmentJagadeesan, S. / Parthasarathy, V. et al. | 2018
- 311
-
High performance feature selection algorithms using filter method for cloud-based recommendation systemMuthusankar, D. / Kalaavathi, B. / Kaladevi, P. et al. | 2018
- 323
-
Hybrid routing algorithm for improving path selection in sustainable networkJayanthi, N. / Valluvan, K. R. et al. | 2018
- 335
-
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chipIlamathi, K. / Rangarajan, P. et al. | 2018
- 347
-
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motorMohan Das, R. / Chandira Sekaran, E. et al. | 2018
- 361
-
Turtle edge encoding and flood fill based image compression schemeArockia Raj, Y. / Alli, P. et al. | 2018
- 379
-
Linear and non-linear proximal support vector machine classifiers for wind speed predictionRanganayaki, V. / Deepa, S. N. et al. | 2018
- 391
-
A silhouette based novel algorithm for object detection and tracking using information fusion of video framesJiang, Xiaoping / Sun, Jing / Ding, Hao / Li, Chenghua et al. | 2018
- 399
-
A new GLoSM embedded virtual machine model for big data services in cloud storage systemsKalai Arasan, K. / AnandhaKumar, P. et al. | 2018
- 407
-
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networksValliyammai, Chinnaiah / Bhuvaneswari, Anbalagan et al. | 2018
- 423
-
Detection of DoS attacks in cloud networks using intelligent rule based classification systemRajendran, Rakesh / Santhosh Kumar, S. V. N. / Palanichamy, Yogesh / Arputharaj, Kannan et al. | 2018
- 435
-
Hybrid metaheuristic algorithm for improving the efficiency of data clusteringMageshkumar, C. / Karthik, S. / Arunachalam, V. P. et al. | 2018
- 443
-
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite imagesNandibewoor, Archana / Hegadi, Ravindra et al. | 2018
- 451
-
Information security model of block chain based on intrusion sensing in the IoT environmentLi, Daming / Cai, Zhiming / Deng, Lianbing / Yao, Xiang / Wang, Harry Haoxiang et al. | 2018
- 469
-
Optimized energy efficient route assigning method using related node discovery algorithm in MANETAruna, R. / Subramanian, R. / Sengottuvelan, P. / Shanthini, J. et al. | 2018
- 481
-
Intelligent early warning model of early-stage overflow based on dynamic clusteringLiang, Haibo / Li, Guoliang / Liang, Wenlong et al. | 2017
- 493
-
Study of spectral reflectance reconstruction based on regularization matrix R methodWang, Ke / Wang, Huiqin / Wang, Zhan / Gu, Qinghua / Yin, Ying / Mao, Li / Lu, Ying et al. | 2017
- 503
-
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithmLi, Bei / Sun, Ying / Li, Gongfa / Kong, Jianyi / Jiang, Guozhang / Jiang, Du / Tao, Bo / Xu, Shuang / Liu, Honghai et al. | 2017
- 513
-
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environmentLu, Yong / Sun, Na et al. | 2017
- 521
-
Design of intelligent carpooling program based on big data analysis and multi-information perceptionZhou, Guiliang / Lv, Mengru / Bao, Tianwen / Mao, Lina / Huang, Kai et al. | 2017
- 533
-
Application of low impact development technology in rainwater drainage system reconstruction projectHu, Pengbo / Ma, Yue / Xue, Huifeng / Zhang, Feng et al. | 2017
- 545
-
Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiencyJing, Yun / Liu, Yingke / Bi, Mingkai et al. | 2017
- 555
-
High-speed vision extraction based on the CamShift algorithmZhang, ChunYu / Chen, Lei / Gou, Rui Bin et al. | 2017
- 565
-
Assessment of recommendation trust for access control in open networksZhao, Bin / Xiao, Chuangbai / Zhang, Yu / Zhai, Peng / Wang, Zhi et al. | 2018
- 573
-
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithmTian, Lingling / Jiang, Juncheng / Tian, L. et al. | 2018
- 583
-
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web clusterXiong, Zhi / Guo, Ting / Xue, Zhongliang / Cai, Weihong / Cai, Lingru / Luo, Nanfu et al. | 2018
- 597
-
Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networksLin, Haifeng / Bai, Di / Liu, Yunfei et al. | 2017
- 609
-
Evolutionary energy balanced ant colony algorithm based on WSNsChen, Yegang / Wang, Hongxiang et al. | 2017
- 623
-
Research on concurrency comparison modeling based on $$\pi $$ calculus in future computer technologyBu, Hao / zhu, Rong / Chen, Shihong / Tan, Xiaoqiong et al. | 2018
- 635
-
Implementation of flexible denim nickel copper rip stop textile antenna for medical applicationThangaselvi, E. / Meena alias Jeyanthi, K. et al. | 2018
- 647
-
Splicing image forgery identification based on artificial neural network approach and texture featuresAbrahim, Araz Rajab / Rahim, Mohd Shafry Mohd / Sulong, Ghazali Bin et al. | 2018
- 661
-
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networksVenu, Sivakumar / Zubair Rahman, A. M. J. Md. et al. | 2018
- 673
-
An augmented approach for pseudo-free groups in smart cyber-physical systemKumar, M. V. Ranjith / Bhalaji, N. / Singh, Swathi et al. | 2018
- 693
-
DSM: a dynamic scheduling method for concurrent workflows in cloud environmentXue, Shengjun / Peng, Yue / Xu, Xiaolong / Zhang, Jie / Shen, Chao / Ruan, Feng et al. | 2017
- 707
-
Identification of PIWI-interacting RNA modules by weighted correlation network analysisLiu, Yajun / Zhang, Junying / Li, Aimin / Zhang, Yuanyuan / Li, Yaoyao / Yuan, Xiguo / He, Zhongzhen / Liu, Zhaowen / Tuo, Shouheng et al. | 2017
- 719
-
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithmXiao, Zeyun / Tian, Bin / Lu, Xiaochun et al. | 2017
- 731
-
Scalable top-k keyword search in relational databasesXu, Yanwei et al. | 2017
- 749
-
The dynamic model of pulverized coal and waste plastic bonded together in flight combustion processLiu, Jihui / He, Zhijun / Zhang, Junhong et al. | 2017
- 759
-
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rockHuang, Yong-hui / Mao, Ze-ling / Zhang, Zhi-yu / Li, Xin-han / Yan, Lei et al. | 2017
- 769
-
Analysis on key dimension’s measurement error in high speed computingZhang, Jin / Wang, Shulin / Zhou, Yijun et al. | 2017
- 781
-
Fitting a cluster of line images under central catadioptric cameraDuan, Huixian / Wu, Yihong / Song, Lei / Wang, Jun / Liu, Na et al. | 2017
- 795
-
Residual Sarsa algorithm with function approximationQiming, Fu / Wen, Hu / Quan, Liu / Heng, Luo / Lingyao, Hu / Jianping, Chen et al. | 2017
- 809
-
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithmWei, Ming / Sun, Bo / Sun, Rong et al. | 2017
- 819
-
More efficient and effective tricks for deep action recognitionLiu, Zheyuan / Zhang, Xiaoteng / Song, Lei / Ding, Zhengyan / Duan, Huixian et al. | 2017
- 827
-
Distributed SVM face recognition based on HadoopZhang, Boping et al. | 2017
- 835
-
Assembly sequence planning method based on particle swarm algorithmWu, Yu-jia / Cao, Yan / Wang, Qiang-feng et al. | 2017
- 847
-
Semantic query graph based SPARQL generation from natural language questionsSong, Shengli / Huang, Wen / Sun, Yulong et al. | 2017
- 859
-
Layered constraint united scheduling model of multi-line lockPan, Xiang et al. | 2017
- 871
-
Memory-aware TLP throttling and cache bypassing for GPUsZhang, Jun / He, Yanxiang / Shen, Fanfan / Li, Qing’an / Tan, Hai et al. | 2017
- 885
-
Resource recommendation via user tagging behavior analysisLiu, Haibo et al. | 2017
- 895
-
A new DOA estimation algorithm based on compressed sensingYong, Zhang / Li-Yi, Zhang / Jian-Feng, Han / Zhe, Ban / Yi, Yang et al. | 2018
- 905
-
On the use of chaotic iterations to design keyed hash functionLin, Zhuosheng / Guyeux, Christophe / Yu, Simin / Wang, Qianxue / Cai, Shuting et al. | 2017
- 921
-
Improvement of malware detection and classification using API call sequence alignment and visualizationKim, Hyunjoo / Kim, Jonghyun / Kim, Youngsoo / Kim, Ikkyun / Kim, Kuinam J. / Kim, Hyuncheol et al. | 2017
- 931
-
Design and implementation of OpenGL SC 2.0 rendering pipelineBaek, Nakhoon / Kim, Kuinam J. et al. | 2017
- 937
-
Providing profiling information for OpenGL ES application programsKim, Kuinam J. / Baek, Nakhoon et al. | 2017
- 943
-
Prototype implementation of the OpenGL ES 2.0 shading language offline compilerBaek, Nakhoon / Kim, Kuinam J. et al. | 2017
- 949
-
A survey of deep learning-based network anomaly detectionKwon, Donghwoon / Kim, Hyunjoo / Kim, Jinoh / Suh, Sang C. / Kim, Ikkyun / Kim, Kuinam J. et al. | 2017
- 963
-
Testing the consistency of business data objects using extended static testing of CRUD matricesBures, Miroslav / Cerny, Tomas / Frajtak, Karel / Ahmed, Bestoun S. et al. | 2017
- 977
-
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networksLee, Dong Chun / Lee, Do Hyeon et al. | 2017
- 989
-
A real-time operating system supporting distributed shared memory for embedded control systemsTamura, Yuji / Doan, Truong Thi / Chiba, Takahiro / Yoo, Myungryun / Yokoyama, Takanori et al. | 2017
- 999
-
Customized video service system design and implementation: from taste to image-based consuming methodPark, Hyojin / Yang, Jinhong / Kim, Hyuncheol / Choi, Jun Kyun et al. | 2017
- 1011
-
B+-tree construction on massive data with HadoopNgu, Huynh Cong Viet / Huh, Jun-Ho et al. | 2017
- 1023
-
Priority-based scheduling using best channel in 6TiSCH networksLee, Tsung-Han / Chang, Lin-Huang / Liu, Yan-Wei / Liaw, Jiun-Jian / Chu, Hung-Chi et al. | 2017
- 1035
-
Optimized state update for mobile games in cloud networksKim, Hye-Young / Kim, Kuinam J. et al. | 2017
- 1043
-
An efficient scheduling multimedia transcoding method for DASH streaming in cloud environmentVan Ma, Linh / Park, Jaehyung / Nam, Jiseung / Jang, Jonghyun / Kim, Jinsul et al. | 2017
- 1055
-
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis techniqueCam, Nguyen Tan / Pham, Van-Hau / Nguyen, Tuan et al. | 2017
- 1065
-
Collaborative data analytics for smart buildings: opportunities and modelsLazarova-Molnar, Sanja / Mohamed, Nader et al. | 2017
- 1079
-
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysisTuan, Ly Hoang / Cam, Nguyen Tan / Pham, Van-Hau et al. | 2017
- 1087
-
W-Scheduler: whale optimization for task scheduling in cloud computingSreenu, Karnam / Sreelatha, M. et al. | 2017
- 1099
-
Dragonfly optimization and constraint measure-based load balancing in cloud computingPolepally, Vijayakumar / Shahu Chatrapati, K. et al. | 2017
- 1113
-
Secure provable data possession scheme with replication support in the cloud using TweaksAli, S. Ahamed / Ramakrishnan, M. et al. | 2017
- 1125
-
Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home systemLiu, Hua / Chen, Guo / Huang, Yanting et al. | 2017
- 1137
-
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computingBhaskaran, S. / Santhi, B. et al. | 2017
- 1151
-
A new recommendation algorithm combined with spectral clustering and transfer learningLi, Xiang / Wang, Zhijian et al. | 2017
- 1169
-
Accurate detection of user interest data in cloud computing environmentYu, Qiang / Liu, Qi et al. | 2017
- 1179
-
A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computingThillaiarasu, N. / ChenthurPandian, S. et al. | 2017
- 1189
-
Cluster and cloud computing framework for scientific metrology in flow controlWang, Yumin / Li, Jiangbo / Wang, Harry Haoxiang et al. | 2017
- 1199
-
Classification of sentence level sentiment analysis using cloud machine learning techniquesArulmurugan, R. / Sabarmathi, K. R. / Anandakumar, H. et al. | 2017
- 1211
-
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applicationsKethsy Prabavathy, A. / Devi Shree, J. et al. | 2017
- 1219
-
A FCM cluster: cloud networking model for intelligent transportation in the city of MacauCai, Zhiming / Deng, Lianbing / Li, Daming / Yao, Xiang / Cox, David / Wang, Haoxiang et al. | 2017
- 1229
-
Research on abnormal data detection method of web browser in cloud computing environmentDuan, Xindong et al. | 2017
- 1239
-
Improved continuous query plan with cluster weighted dominant querying in synthetic datasetsMadhankumar, M. / Suresh Gnana Dhas, C. et al. | 2017
- 1247
-
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environmentDaniel, Esther / Vasanthi, N. A. et al. | 2017
- 1259
-
Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural networkVeeraManickam, M. R. M. / Mohanapriya, M. / Pandey, Bishwajeet K. / Akhade, Sushma / Kale, S. A. / Patil, Reshma / Vigneshwar, M. et al. | 2018
- 1277
-
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloudGeorge, Ashok / Sumathi, A. et al. | 2018
- 1289
-
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale imagesKumar, S. Vijaya / Nagaraju, C. et al. | 2018
- 1313
-
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active TrustMehetre, Deepak C. / Roslin, S. Emalda / Wagh, Sanjeev J. et al. | 2018
- 1329
-
Cluster-based distributed architecture for prediction of student’s performance in higher educationRamanathan, L. / Parthasarathy, G. / Vijayakumar, K. / Lakshmanan, L. / Ramani, S. et al. | 2018
- 1345
-
Cluster based-image descriptors and fractional hybrid optimization for medical image retrievalYadav, Poonam et al. | 2018
- 1361
-
Implementing self adaptiveness in whale optimization for cluster head section in Internet of ThingsReddy, M. Praveen Kumar / Babu, M. Rajasekhara et al. | 2018
- 1373
-
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approachJagtap, Arvind Madhukar / Gomathi, N. et al. | 2018
- 1385
-
Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloudDevagnanam, J. / Elango, N. M. et al. | 2018
- 1401
-
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud modelAshok Kumar, C. / Vimala, R. / Aravind Britto, K. R. / Sathya Devi, S. et al. | 2018
- 1415
-
Lossless and robust privacy preservation of association rules in data sanitizationNavale, Geeta S. / Mali, Suresh N. et al. | 2018
- 1429
-
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systemsMunagala, Venkatesh / Satya Prasad, K. et al. | 2018
- 1443
-
Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimizationLei, Dingyou / Zhang, Peng / Zhang, Yinggui / Xia, Yangkun / Zhao, Shuo et al. | 2018
- 1459
-
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer visionLiu, Yongjun / Wei, Yangjie / Wang, Yi et al. | 2018
- 1469
-
Parallel image search application based on online hashing hierarchical rankingLi, Xiaofei / He, Di / Li, Jun-yi et al. | 2018
- 1479
-
Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmissionLiu, Sheng / Sun, Dongye / Wu, Ensi / Qin, Datong et al. | 2018
- 1495
-
Semantic feature hierarchical clustering algorithm based on improved regional merging strategyyu-feng, Yao et al. | 2018
- 1505
-
Research on the single image super-resolution method based on sparse Bayesian estimationYang, Yong-qiang et al. | 2018
- 1515
-
A novel improved deep convolutional neural network model for medical image fusionXia, Kai-jian / Yin, Hong-sheng / Wang, Jiang-qiang et al. | 2018
- 1529
-
Face recognition algorithm based on wavelet transform and local linear embeddingZhou, Yan / Wang, Yu / Wang, Xu-hui et al. | 2018
- 1541
-
Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communicationYin, Xiang-dong et al. | 2018
- 1549
-
Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network modelLi, Xiangong / Wang, Xufeng / Fang, Yu et al. | 2018
- 1559
-
Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography imagesLiu, Liu / Xu, Jin / Liu, Zheng et al. | 2018
- 1569
-
Application of computerized numerical modeling in multi-state wet wheel hub heat simulationsLiu, Sheng / Sun, Dongye / Wu, Ensi / Luo, Yong / Qin, Datong et al. | 2018
- 1581
-
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple partiesLi, Ye / Jiang, Zoe L. / Yao, Lin / Wang, Xuan / Yiu, S. M. / Huang, Zhengan et al. | 2017
- 1595
-
An improved anonymous authentication scheme for distributed mobile cloud computing servicesChaudhry, Shehzad Ashraf / Kim, I Luk / Rho, Seungmin / Farash, Mohammad Sabzinejad / Shon, Taeshik et al. | 2017
- 1611
-
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud servicesElmisery, Ahmed M. / Rho, Seungmin / Aborizka, Mohamed et al. | 2017
- 1639
-
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environmentManasrah, Ahmad M. / Aldomi, Ala’a / Gupta, B. B. et al. | 2017
- 1655
-
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social networkGao, Chong-zhi / Cheng, Qiong / Li, Xuan / Xia, Shi-bing et al. | 2018
- 1665
-
A bio-inspired leader election protocol for cognitive radio networksMurmu, Mahendra Kumar / Singh, Awadhesh Kumar et al. | 2018
- 1679
-
A localization and tracking scheme for target gangs based on big data of Wi-Fi locationsZhao, Fan / Shi, Wenqi / Gan, Yong / Peng, Ziru / Luo, Xiangyang et al. | 2018
- 1691
-
Online handwritten signature verification based on the most stable feature and partitionYang, Li / Jin, Xiaoyan / Jiang, Qi et al. | 2018
- 1703
-
Anonymous and formally verified dual signature based online e-voting protocolSaqib, Malik Najmus / Kiani, Junaid / Shahzad, Basit / Anjum, Adeel / Malik, Saif ur Rehman / Ahmad, Naveed / Khan, Atta ur Rehman et al. | 2018
- 1717
-
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvementJing, Zhengjun / Gu, Chunsheng / Yu, Zhimin / Shi, Peizhong / Gao, Chongzhi et al. | 2018
- 1729
-
Anomaly detection model based on data stream clusteringYin, Chunyong / Zhang, Sun / Yin, Zhichao / Wang, Jin et al. | 2017
- 1739
-
A distributed IDS architecture model for Smart Home systemsGajewski, Mariusz / Batalla, Jordi Mongay / Mastorakis, George / Mavromoustakis, Constandinos X. et al. | 2017
- 1751
-
A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practiceAl-Turjman, Fadi et al. | 2017
- 1765
-
A performance comparison of linux containers and virtual machines using Docker and KVMChae, MinSu / Lee, HwaMin / Lee, Kiyeol et al. | 2017
- 1777
-
The resource running time manager for integrated environmentJung, Daeyong / Jeong, Heeseok / Kim, Jaesung / Lee, Daewon / Kim, Myungil et al. | 2017
- 1787
-
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNsWang, Jin / Ju, Chunwei / Kim, Hye-jin / Sherratt, R. Simon / Lee, Sungyoung et al. | 2017
- 1797
-
Spatial task management method for location privacy aware crowdsourcingLi, Yan / Yi, Gangman / Shin, Byeong-Seok et al. | 2017
- 1805
-
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environmentRen, Yongjun / Wang, Jin / Feng, Xiujuan / Younn, Geumran / Kim, Jeong-Uk et al. | 2018
- 1815
-
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computingShim, Cheol / Cha, Kwang-ho / Choi, Min et al. | 2018
- 1827
-
Fast attack detection system using log analysis and attack tree generationKim, Duhoe / Kim, Yong-Hyun / Shin, Dongil / Shin, Dongkyoo et al. | 2018
- 1837
-
Big data and rule-based recommendation system in Internet of ThingsJeong, Hanjo / Park, Byeonghwa / Park, Minwoo / Kim, Ki-Bong / Choi, Kiseok et al. | 2017
- 1847
-
Development of healthcare service model using physical information data based on cluster sensing technologyKim, Bong-Hyun / Oh, Jai-Woo et al. | 2017
- 1861
-
Visualization of security event logs across multiple networks and its application to a CSOCSong, Boyeon / Choi, Jangwon / Choi, Sang-Soo / Song, Jungsuk et al. | 2017
- 1873
-
An empirical study on the influential factors affecting continuous usage of mobile cloud servicePark, Seong-Taek / Oh, Myeong-Ryoon et al. | 2017
- 1889
-
The supporting system for disabled person with the artificial hand controlled by muscle sensorJeong, Seungdo / Cho, Jungwon et al. | 2018
- 1899
-
Exposed body component-based harmful image detection in ubiquitous sensor dataJang, Seok-Woo / Jung, Myunghee et al. | 2018
- 1911
-
Word recommendation for English composition using big corpus data processingLee, Keon Myung / Han, Chan-Sik / Kim, Kwang-Il / Lee, Sang Ho et al. | 2018
- 1925
-
Chatbot-based heathcare service with a knowledge base for cloud computingChung, Kyungyong / Park, Roy C. et al. | 2018
- 1939
-
Research trend analysis on convergence and joint research of Korea using scientific papersYoo, Suhyeon / Kwon, O Young / Jeong, Dae-hyun et al. | 2017
- 1949
-
Development of a medical big-data mining process using topic modelingSong, Chang-Woo / Jung, Hoill / Chung, Kyungyong et al. | 2017
- 1959
-
Bucket-size balancing locality sensitive hashing using the map reduce paradigmLee, Kyung Mi / Jeong, Yoon-Su / Lee, Sang Ho / Lee, Keon Myung et al. | 2017
- 1973
-
The study on how to remove the shadow area for WSN based indoor disaster monitoring systemJung, Gang Hee / Park, Yoon Young / Kim, Se Yeob / Cho, Young Wook et al. | 2017
- 1985
-
Verifying a secure authentication protocol for IoT medical devicesBae, Woo-Sik et al. | 2017
- 1991
-
A study on secure user authentication and authorization in OAuth protocolChae, Cheol-Joo / Kim, Ki-Bong / Cho, Han-Jin et al. | 2017
- 2001
-
Cloud based u-healthcare network with QoS guarantee for mobile health serviceChung, Kyungyong / Park, Roy C. et al. | 2017
- 2017
-
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authenticationKang, Hyeok / Lee, Keun-Ho / Kim, Gui-Jung et al. | 2017
- 2027
-
A mutual refinement technique for big data retrieval using hash tag graphPrasanth, T. / Gunasekaran, M. et al. | 2017
- 2039
-
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching modelsKim, Suyi / Kim, So-Yeun / Choi, Kyungmee et al. | 2017
- 2049
-
A unified framework of trust prediction based on message passingOh, Hyun-Kyo / Kim, Jin-Woo / Kim, Sang-Wook / Lee, Kichun et al. | 2018
- 2063
-
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark clusterLee, Suan / Kang, Seok / Kim, Jinho / Yu, Eun Jung et al. | 2018
- 2089
-
Who is answering whom? Finding “Reply-To” relations in group chats with deep bidirectional LSTM networksGuo, Gaoyang / Wang, Chaokun / Chen, Jun / Ge, Pengcheng / Chen, Weijun et al. | 2018
- 2101
-
Evaluation of software quality-in-use attributes based on analysis network processKim, Seung-Hee / Kim, Woo-Je et al. | 2018
- 2115
-
Analyzing and visualizing comprehensive and personalized online product reviewsKim, Jooyoung / Kim, Dongsoo et al. | 2018
- 2129
-
PRODA: improving parallel programs on GPUs through dependency analysisWei, Xiong / Hu, Ming / Peng, Tao / Jiang, Minghua / Wang, Zhiying / Qin, Xiao et al. | 2017
- 2145
-
Moving average multi directional local features for speaker recognitionMahmood, Awais / Muhammad, Ghulam / Alsulaiman, Mansour / Dhahri, Habib / Othman, Esam M. Asem / Faisal, Mohammed et al. | 2018
- 2159
-
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanismShe, Wei / Li, Dingfang / Xia, Yongbo / Tian, Shasha et al. | 2018
- 2169
-
Optimized traffic control and data processing using IoTKuppusamy, P. / Kalpana, R. / Venkateswara Rao, P. V. et al. | 2018
- 2179
-
Task scheduling in a cloud computing environment using HGPSO algorithmSenthil Kumar, A. M. / Venkatesan, M. et al. | 2018
- 2187
-
Dynamic data-driven learning for self-healing avionicsImai, Shigeru / Chen, Sida / Zhu, Wennan / Varela, Carlos A. et al. | 2017
- 2211
-
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimationNino-Ruiz, Elias D. / Sandu, Adrian et al. | 2017
- 2223
-
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platformWang, Kewen / Khan, Mohammad Maifi Hasan / Nguyen, Nhan / Gokhale, Swapna et al. | 2017
- 2239
-
Transit-hub: a smart public transportation decision support system with multi-timescale analytical servicesSun, Fangzhou / Dubey, Abhishek / White, Jules / Gokhale, Aniruddha et al. | 2018
- 2255
-
A simulation analysis method based on PSO-RBF model and its applicationFei, Xi / Youfu, Sun / Xuejun, Ruan et al. | 2018
- 2263
-
Apriori semantic processing orienting at the business English parallel corpus characteristics in business contractXin, Lu et al. | 2018
- 2273
-
Anti load disturbance method for AC servo motor power systemLv, Haoliang / Zhou, Xiaojun et al. | 2018
- 2285
-
Intelligent distribution characteristic analysis of heavy metals in reservoir sedimentsMin, Wang / Wen, Cheng / Jie-Hui, Ren / Ting, Meng / Tian, Wan et al. | 2018
- 2293
-
Distortion less secret image sharing scheme for Internet of Things systemLi, Li / Hossain, M. Shamim / El-Latif, Ahmed A. Abd / Alhamid, M. F. et al. | 2017
- 2309
-
An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technologyAlmogren, Ahmad et al. | 2018
- 2317
-
A cloud-based virtual caregiver for elderly people in a cyber physical IoT systemRahman, Md. Abdur / Hossain, M. Shamim et al. | 2018
- 2331
-
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networksKim, Hyuncheol et al. | 2018
- 2341
-
Design of network threat detection and classification based on machine learning on cloud computingKim, Hyunjoo / Kim, Jonghyun / Kim, Youngsoo / Kim, Ikkyun / Kim, Kuinam J. et al. | 2018
- 2351
-
The study on the application of virtual reality in adapted physical educationKang, Sunyoung / Kang, Seungae et al. | 2018
- 2357
-
Low-quality multivariate spatio-temporal serial data preprocessingYu, Tao / Li, Le / Chen, Lajiao / Song, Weijing et al. | 2017
- 2371
-
Performance optimization and evaluation for parallel processing of big data in earth system modelsWang, Yuzhu / Hao, Huiqun / Zhang, Junqiang / Jiang, Jinrong / He, Juanxiong / Ma, Yan et al. | 2017
- 2383
-
A distributed incremental information acquisition model for large-scale text dataSun, Shengtao / Gong, Jibing / Zomaya, Albert Y. / Wu, Aizhi et al. | 2017
- 2395
-
A novel disk I/O scheduling framework of virtualized storage systemLi, Dingding / Dong, Mianxiong / Tang, Yong / Ota, Kaoru et al. | 2018
- 2407
-
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-levelWang, Zhuowei / Xiong, Naixue / Wang, Hao / Cheng, Lianglun / Zhao, Wuqing et al. | 2018
- 2425
-
Score level multibiometrics fusion approach for healthcareEl-Latif, Ahmed A. Abd / Hossain, M. Shamim / Wang, Ning et al. | 2017
- 2437
-
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcareElmougy, Samir / Hossain, M. Shamim / Tolba, Ahmed S. / Alhamid, Mohammed F. / Muhammad, Ghulam et al. | 2017
- 2461
-
MCCFG: an MOF-based multiple condition control flow graph for automatic test case generationSon, Hyun Seung / Park, Young B. / Kim, R. Young Chul et al. | 2016
- 2471
-
An iterative sampling method for online aggregationZhang, Zhiqiang / Hu, Jianghua / Xie, Xiaoqin / Pan, Haiwei / Feng, Xiaoning et al. | 2017
- 2485
-
Mirrored and hybrid disk arrays and their reliabilityThomasian, Alexander et al. | 2018
- 2495
-
Iot based real time trafic control using cloud computingVardhana, M. / Arunkumar, N. / Abdulhay, Enas / Vishnuprasad, P. V. et al. | 2018
- 2505
-
An efficient DDoS detection based on SU-Genetic feature selectionWang, Chundong / Yao, Honglei / Liu, Zheli et al. | 2018
- 2517
-
IoT based fall detection and ambient assisted system for the elderlyChandra, I. / Sivakumar, N. / Gokulnath, Chandra Babu / Parthasarathy, P. et al. | 2018
- 2527
-
On the role of message broker middleware for many-task computing on a big-data platformNguyen, Cao Ngoc / Lee, Jaehwan / Hwang, Soonwook / Kim, Jik-Soo et al. | 2018
- 2541
-
Correction to: Runtime self-monitoring approach of business process compliance in cloud environmentsBarnawi, Ahmed / Awad, Ahmed / Elgammal, Amal / Shawi, Radwa El / Almalaise, Abdullah / Sakr, Sherif et al. | 2018