


default search action
10th SoCPaR 2018: Marrakech, Morocco
- Ana Maria Madureira

, Ajith Abraham, Niketa Gandhi, Catarina Silva, Mário Antunes:
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, SoCPaR 2018, Porto, Portugal, December 13-15, 2018. Advances in Intelligent Systems and Computing 942, Springer 2020, ISBN 978-3-030-17064-6 - Michele Della Ventura

:
Shaping the Music Perception of an Automatic Music Composition: An Empirical Approach for Modelling Music Expressiveness. 1-10 - Zamali Tarmudi

, Norzanah Abd Rahman
:
Diverse Ranking Approach in MCDM Based on Trapezoidal Intuitionistic Fuzzy Numbers. 11-21 - Houda Zaim, Mohammed Ramdani, Adil Haddi

:
Decision Tree and MCDA Under Fuzziness to Support E-Customer Satisfaction Survey. 22-32 - Ibrahim Almarashdeh

, Kamal Eldin Eldaw
, Mutasem Alsmadi
, Usama Badawi
, Firas Haddad
, Osama Ahmed Abdelkader
, Ghaith M. Jaradat
, Ayman Alkhaldi, Yousef Qawqzeh:
Search Convenience and Access Convenience: The Difference Between Website Shopping and Mobile Shopping. 33-42 - Marta Barbosa

, Pedro Moreira
, Rogério Ribeiro, Luís Coelho
:
Automatic Classification and Segmentation of Low-Grade Gliomas in Magnetic Resonance Imaging. 43-50 - Vincent F. Adegoke

, Daqing Chen, Ebad Banissi, Safia Barsikzai:
Enhancing Ensemble Prediction Accuracy of Breast Cancer Survivability and Diabetes Diagnostic Using Optimized EKF-RBFN Trained Prototypes. 51-65 - Luís Vilaça, Paula Viana

, Pedro Carvalho
, Maria Teresa Andrade
:
Improving Audiovisual Content Annotation Through a Semi-automated Process Based on Deep Learning. 66-75 - Ana Patrícia Rocha, José Maria Fernandes

, Hugo Miguel Pereira Choupina
, Maria do Carmo Vilas-Boas
, João Paulo Silva Cunha
:
Subject Identification Based on Gait Using a RGB-D Camera. 76-85 - Young-Hun Kim, Jaeyoung Kim, Jong-Myon Kim:

Leakage Detection of a Boiler Tube Using a Genetic Algorithm-like Method and Support Vector Machines. 86-93 - Sachin Kumar

, Marina I. Nezhurina:
Sentiment Analysis on Tweets for Trains Using Machine Learning. 94-104 - Ryu Fukushima, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:

A Genetic Algorithm for Superior Solution Set Search Problem. 105-115 - Marcos Pires, Petia Georgieva

:
An Intelligent Tool for Detection of Phishing Messages. 116-125 - Molham Chikhalsouk, Balasubramanian Esakki

, Khalid Zhouri, Yassin Nmir:
Discrete Wavelet Transform Application in Variable Displacement Pumps Condition Monitoring. 126-136 - Lígia Sousa, Diogo Braga, Ana Madureira

, Luís Pinto Coelho
, Francesco Renna
:
Characterizing Parkinson's Disease from Speech Samples Using Deep Structured Learning. 137-146 - Yuta Obinata, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:

Combinatorial Optimization Method Considering Distance in Scheduling Problem. 147-157 - Se-Jong Kang, Jae-Young Kim, In-Kyu Jeong, M. M. Manjurul Islam

, Kichang Im, Jong-Myon Kim:
An Improved Gas Classification Technique Using New Features and Support Vector Machines. 158-166 - Hongran Wang, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda:

Superior Relation Based Firefly Algorithm in Superior Solution Set Search. 167-176 - Joana Cósta, Catarina Silva, Bernardete Ribeiro

:
Learning in Twitter Streams with 280 Character Tweets. 177-184 - Nelson Oliveira, Joana Cósta

, Catarina Silva, Bernardete Ribeiro
:
Retweet Predictive Model for Predicting the Popularity of Tweets. 185-193 - Abderrazak Chahi

, Youssef El Merabet
, Yassine Ruichek
, Raja Touahni:
Handcrafted Descriptors-Based Effective Framework for Off-line Text-Independent Writer Identification. 194-206 - Cláudio A. D. Silva, Carlos Grilo

, Catarina Silva:
Server Load Prediction on Wikipedia Traffic: Influence of Granularity and Time Window. 207-216 - Paulo A. Salgado

, Paulo Afonso
:
Evolutionary Genes Algorithm to Path Planning Problems. 217-225 - Anouar Yatribi, Mostafa Belkasmi, Fouad Ayoub:

An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage. 226-237 - João Pedro Dias

, Hugo Sereno Ferreira
, Angelo Martins
:
A Blockchain-Based Scheme for Access Control in e-Health Scenarios. 238-247 - Guilherme Vieira Pinto, João Pedro Dias

, Hugo Sereno Ferreira
:
Blockchain-Based PKI for Crowdsourced IoT Sensor Information. 248-257 - Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:

The Design of a Cloud Forensics Middleware System Base on Memory Analysis. 258-267 - Siham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui:

Privacy Enhancement of Telecom Processes Interacting with Charging Data Records. 268-277 - Timo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier

:
Warning of Affected Users About an Identity Leak. 278-287 - Daniel José Franco

, Rui Miguel Soares Silva
, Abdullah Muhammed
, Omar Khasro Akram
, Andreia Graça:
Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices. 288-297 - Faouzi Jaïdi

:
A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment. 298-307 - Bruno Tavares

, Filipe Figueiredo Correia
, André Restivo
, João Pascoal Faria
, Ademar Aguiar
:
A Survey of Blockchain Frameworks and Applications. 308-317 - Patrício Domingues

, Miguel Frade
, João Mota Parreira:
Filtering Email Addresses, Credit Card Numbers and Searching for Bitcoin Artifacts with the Autopsy Digital Forensics Software. 318-328 - Heini Ahde, Sampsa Rauti, Ville Leppänen

:
A Survey on the Use of Data Points in IDS Research. 329-337 - Mário Antunes

, Carlos Rabadão
:
Cybersecurity and Digital Forensics - Course Development in a Higher Education Institution. 338-348 - Ivan Gaidarski

, Zlatogor Minchev
, Rumen Andreev:
Model Driven Architectural Design of Information Security System. 349-359 - Gonçalo Carnaz

, Vítor Beires Nogueira
, Mário Antunes
, Nuno M. Fonseca Ferreira
:
An Automated System for Criminal Police Reports Analysis. 360-369 - Ana Subtil

, Maria Rosário de Oliveira, Rui Valadas, António Pacheco
, Paulo Salvador:
Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models. 370-380 - Kazuhiro Kono, Takaaki Yoshida, Shoken Ohshiro, Noboru Babaguchi:

Passive Video Forgery Detection Considering Spatio-Temporal Consistency. 381-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














