CS & IT
Conference Proceedings
menu
Home
Current issue
Archives
Contact
search
CS&IT Conference Proceedings
Home
Current issue
Archives
Contact
search
Search
×
search
keyboard_arrow_up
Volume 6, Number 6, May 2016
The Sixth International Conference on Computer Science, Engineering and Information Technology (CCSEIT 2016) ,
May 21 ~ 22, 2016, Vienna, Austria
Volume Editors : Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-51-9
Smart as a Cryptographic Processor
Saroja Kanchi, Nozar Tabrizi and Cody Hayden, Kettering University, USA
Effects of The Different Migration Periods on Parallel Multi-Swarm PSO
S¸aban Gülcü
1
and Halife Kodaz
2
,
1
Necmettin Erbakan University, Turkey and
2
Selcuk University, Turkey
Applications of the Erlang B and C Formulas to Model a Network of Banking Computer Systems - Moving Towards Green IT and Performant Banking
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU, The Bucharest University of Economic Studies, Romania
Configuration of a Guidance Process for Software Process Modeling
Hamid Khemissa
1
and Mourad Oussalah
2
,
1
USTHB University, Algeria and
2
University of Nantes, France
Using Mutation in Fault Localization
Chenglong Sun and Tian Huang, Chinese Academy of Sciences, China
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks
Dan Wu and Sonia Bhatti, University of Windsor, Canada
Weights Stagnation in Dynamic Local Search for SAT
Abdelraouf Ishtaiwi, University of Petra, Jordan
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep Learning Model
Luca Petricca
1
, Tomas Moss
2
, Gonzalo Figueroa
2
and Stian Broen
1
,
1
Broentech Solutions A.S., Norway and
2
Orbiton A.S. Horten, Norway
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Josip Arnerić
1
and Tea Poklepović
2
,
1
University of Zagreb, Croatia and
2
University of Split, Croatia
Modified Vortex Search Algorithm for Real Parameter Optimization
Berat Dogˇan, Inonu University, Turkey
Analysis of Rising Tutition Rates in The United States Based on Clustering Analysis and Regression Models
Long Cheng and Chenyu You, Rensselaer Polytechnic Institute, USA
Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster
Christine Niyizamwiyitira and Lars Lundberg, Blekinge Institute of Technology, Sweden
Exploring Peer-To-Peer Data Mining
Andrea Marcozzi and Gianluca Mazzini, Lepida SpA, Italy
Enhanced Protocol for Wireless Content-Centric Network
Chan-Min Park, Rana Asif Rehman, Tran Dinh Hieu and Byung-Seo Kim, Hongik University, Republic of Korea
Projection Profile Based Number Plate Localization and Recognition
Sandipan Chowdhury
1
, Arindam Das
2
, and Punitha P
2
,
1
University of Calcutta, India and
2
HCL Technologies, India
A Text Mining Research Based on LDA Topic Modelling
Zhou Tong and Haiyi Zhang, Acadia University, Canada
Management Architecture for Dynamic Federated Identity Management
Daniela Pöhn and Wolfgang Hommel, Leibniz Supercomputing Centre, Germany
Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios
Nithya Shree R, Rajeshwari Sah and Shreyank N Gowda, R.V.College of Engineering, India
Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand Gender-Related Skeletal Muscle Aging
Abdouladeem Dreder, Muhammad Atif Tahir, Huseyin Seker and Muhammad Naveed Anwar, The University of Northumbria, United Kingdom
Vulnerabilities of the SSL/TLS Protocol
Jelena Ćurguz, Post of Republic of Srpska in Banja Luka, Bosnia and Herzegovina
Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational Memory in Centers R&D
Marco Javier Suárez Barón, UNITEC/FODESEP, Colombia
settings
Editorial Board
book
Most Cited Articels
list
Indexing
help
FAQ