


default search action
12th ICDIM 2017: Fukuoka, Japan
- Twelfth International Conference on Digital Information Management, ICDIM 2017, Fukuoka, Japan, September 12-14, 2017. IEEE 2017, ISBN 978-1-5386-0664-3

- Jolanta Mizera-Pietraszko

:
Modelling swarm-intelligent systems for medical applications. 1-5 - Eric Torunski, M. Omair Shafiq, Anthony D. Whitehead:

Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces Debate. 6-14 - Ubon Thongsatapornwatana

, Woraphon Lilakiatsakun, Akkarach Kawbunjun
, Tossapon Boongoen
:
Analysis of criminal behaviors for suspect vehicle detection. 15-20 - Lixin Fu:

Shortest path deliveries using density-based clustering. 21-26 - Prasit Usaphapanus, Krerk Piromsopa

:
Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination. 27-31 - Nobuaki Onishi, Qiang Ma

:
Factor analysis of investment trust products by using monthly reports and news articles. 32-37 - K. M. Mehedi Hasan Sonet, Md. Mustafizur Rahman, Pritom Mazumder, Abid Reza, Rashedur M. Rahman

:
Analyzing patterns of numerously occurring heart diseases using association rule mining. 38-45 - Yui Kita, Jun Rekimoto:

Prediction of importance of figures in scholarly papers. 46-53 - Kensuke Baba:

Fast plagiarism detection based on simple document similarity. 54-58 - Daiki Namikoshi, Manabu Ohta, Atsuhiro Takasu, Jun Adachi:

CRF-based bibliography extraction from reference strings using a small amount of training data. 59-64 - Kenji Yamaguchi, Yukari Shirota:

Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theory. 65-69 - Yao-Liang Chung:

An improved algorithm for transmission in heterogeneous cellular networks. 70-74 - Yan Zhou, Taketoshi Ushiama:

A collaborative filtering method for interactive platforms. 75-80 - Toshihiko Yamakami:

A migration-oriented partial adaptation architecture for IoT-empowered city platform as a service. 81-85 - Tetsuro Kakeshita:

National survey of Japanese universities on computing education: Analysis of non-IT departments and courses. 86-91 - Kazuhiro Sumi, Tetsuro Kakeshita:

National servey of Japanese universities on computing education: Analysis of IT education for high school teacher license on IT. 92-97 - Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl:

Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011. 98-102 - Mika Ohtsuki, Tetsuro Kakeshita, Mitsuhiro Takasaki:

National survey of Japanese universities on computing education: Analysis of educational computer system. 103-108 - Naoko Takahashi, Tetsuro Kakeshita:

National survey of Japanese universities on computing education: Analysis of informatics in general education. 109-114 - Yuan-Chin Lee, Chuan-Mu Tseng, Tzong-Jye Liu:

A HTTP botnet detection system based on ranking mechanism. 115-120 - Adeyemi Aladeokin, Pavol Zavarsky, Neelam Memon:

Analysis and compliance evaluation of cookies-setting websites with privacy protection laws. 121-126 - Chien-Lung Hsu, Tzu-Wei Lin

, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen:
Privacy-preserved conference key distribution protocol. 127-132 - Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin

, Huang-Chia Lu:
A dynamic identity end-to-end authentication key exchange protocol for IoT environments. 133-138 - Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. 139-143 - Siba Mishra

, Chiranjeev Kumar
:
Improving the trust of end users in enterprise SOA using combinatorial group testing methods. 144-149 - Zbigniew Lipinski:

Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networks. 150-154 - Gabriel A. de Oliveira, Peron R. de Sousa, Antônio A. de A. Rocha, Pedro B. Velloso

:
Transparent mobility or devices on the Internet using OpenFlow. 155-160 - Ming-Yi Zheng, Hung-Yuan Chen, Huan Chen, Yao-Chung Fan

:
On cleaning and organizing context logs for mobile user profiling. 161-164 - Chin-Shiuh Shieh, Hao-Xiang Gu, Jhih-Ying Yan, Mong-Fong Horng:

SCTP-based service migration for VOD service. 165-168 - Hathairat Ketmaneechairat, Chutima Kongketwanich, Thitinun Naijit:

Recommender system for Thai food cooking on smartphone. 169-178 - Sharefah A. Al-Ghamdi, Joharah Khabti

, Hend S. Al-Khalifa:
Exploring NLP web APIs for building Arabic systems. 175-178 - Xing Wang, Jason Lin

, Ryan Vrecenar, Jyh-Charn Liu:
Syntactic role identification of mathematical expressions. 179-184 - Cristina Barros, Elena Lloret

:
Analysing the influence of semantic knowledge in natural language generation. 185-190 - Jan Friedrich, Christoph Lindemann, Michael Petrifke:

Two-level dynamic index pruning. 191-196 - Hathairat Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon:

Mobile search engine for medicine information on smartphone. 197-201 - Sidik Soleman, Atsushi Fujii:

Toward plagiarism detection using citation networks. 202-208 - Zar Zar Wint, Theo Ducros, Masayoshi Aritsugi:

Spell corrector to social media datasets in message filtering systems. 209-215 - Sunantha Sodsee, Maytiyanin Komkhao

:
Item recommending by item co-purchasing network and user preference. 216-221 - Rupal Sethi, B. Shekar:

Mining affordance-based substitution rules: A dynamic taxonomy approach. 222-227 - Chihiro Sakazume, Hiroyuki Kitagawa

, Toshiyuki Amagasa
:
DIO: Efficient interactive outlier analysis over dynamic datasets. 228-235 - Andre Petermann, Giovanni Micale

, Giacomo Bergami
, Alfredo Pulvirenti, Erhard Rahm
:
Mining and ranking of generalized multi-dimensional frequent subgraphs. 236-245 - Arif Wicaksono

, Sunya Sarapirome:
Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights. 246-251 - Daichi Minami, Taketoshi Ushiama:

Can you trust the user?: Collaborative trust estimation model for recommendations. 252-256 - Alton Y. K. Chua, Snehasish Banerjee

:
Rumor verifications on Facebook: Click speech of likes, comments and shares. 257-262 - Alton Y. K. Chua, Rajiv George Aricat

, Dion Goh:
Message content in the life of rumors: Comparing three rumor types. 263-268 - Grzegorz Osinski

, Veslava Osinska
, Brian Camacho:
Scientific visualizer in personal information management. 269-272 - Anna Marti Bigorra

:
Measuring uncertainty to identify missing customer information relevant to the design process. 273-279 - Seung Jin Lim:

Mining and visualization of interpersonal interaction networks. 280-285 - Rami Ibrahim

, M. Omair Shafiq:
Measurement and analysis of citizens requests to government for non-emergency services. 286-291 - Elhadi Belghache, Jean-Pierre Georgé

, Marie-Pierre Gleizes:
DREAM: Dynamic data relation extraction using adaptive multi-agent systems. 292-297 - Pritish Patil, Jiayun Wang

, Yuya Aratani, Kyoji Kawagoe:
Prototyping a recommendation system for Ukiyo-e using hybrid recommendation algorithm. 298-303 - Toshihiko Yamakami:

Toward positioning IoT-empowered service engineering in city platform as a service. 304-308 - Rangsipan Marukatat

, Nutthapon Chinchaipong, Sirapop Prechalertpririya:
Tweets of Thailand: A tweet retrieval system for domestic tourism in Thailand. 309-312 - Fatia Kusuma Dewi, Satrio Baskoro Yudhoatmojo, Indra Budi

:
Identification of opinion leader on rumor spreading in online social network Twitter using edge weighting and centrality measure weighting. 313-318 - Monlica Wattana, Tipwalee Boonsri:

Improvement of complete malaria cell image segmentation. 319-323 - Amjad Rehman:

Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysis. 324-327 - Xing Wang, Jyh-Charn Liu:

A content-constrained spatial (CCS) model for layout analysis of mathematical expressions. 334-339 - Hajime Tsubaki:

Analysis based on Japanese accented English characteristics categories for objective evaluation. 382-333

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














