Proceedings of 34th International Conference on Computers and Their Applications51 articles•483 pages•Published: March 13, 2019 PapersSession M-A2: Computers in Education: | Pages 1-7 | Pages 8-16 | Pages 17-26 | Pages 27-35 | Session M-P1: Computational Issues: | Pages 36-44 | Pages 45-54 | Pages 55-64 | Pages 65-74 | Session M-P2: Algorithms I: | Pages 75-82 | Pages 83-92 | Pages 93-98 | Pages 99-106 | Session M-P3: Computer Security: | Pages 107-116 | Pages 117-126 | Pages 127-136 | Pages 137-143 | Pages 144-154 | Session M-P4: Programming and Software Engineering: | Pages 155-167 | Pages 168-179 | Pages 180-190 | Pages 191-202 | Pages 203-209 | Session T-A2: Computers in Healthcare: | Pages 210-218 | Pages 219-224 | Pages 225-235 | Pages 236-246 | Session T-P1: Visualization: | Pages 247-256 | Pages 257-264 | Pages 265-270 | Pages 271-281 | Session T-P2: Algorithms II: | Pages 282-291 | Pages 292-300 | Pages 301-309 | Pages 310-316 | Session T-P3: Special Session on Software Engineering Applications: | Pages 317-324 | Pages 325-335 | Pages 336-344 | Pages 345-355 | Session T-P4: Cloud Computing: | Pages 356-367 | Pages 368-377 | Pages 378-386 | Pages 387-396 | Pages 397-406 | Session W-A1: Computers in Manufacturing and Business: | Pages 407-417 | Pages 418-427 | Pages 428-437 | Pages 438-443 | Session W-A2: Applications: | Pages 444-453 | Pages 454-463 | Pages 464-474 | Pages 475-483 |
Keyphrases3-D printing, 3D printing, ABS, abstract interpretation, abstract syntax tree, Acceleration data, ACL Authentication, Additive Manufacturing2, Address Verification, Advanced Encryption Standard, AES, agent-based modeling, Agile Methods, Aircraft wing, Android, anomaly detection, Apache Kafka, Apache Spark, application development, Architecture, archive, artificial financial predictors, back-stepping control, behavior, Behaviour, behaviour-based detection, Biological Software, Botnet Detection, breast cancer, CANFIS, CDR, Chinese, CIS relationship with other computing disciplines, Cloud2, Cloud Computing3, Cloud Security2, Cloud Service Provider Selection, Clustering, code, Cognitive Radio Networks, collaborative, Command Line Interface, communication, compiler, Complexity., Composite, Computation Tree Logic, computational biology, Computer Information Systems curriculum, Computer Networks, Computer Science Education, conflict resolution, Contamination, cooperative communication, CTA mapping, Cyber Security, Cybersecurity, Data Communications, Data Encryption, Data Mining, Data Security, Data Warehouse, database, database audit, deadlock, deadlock detection, Delivery Model, demand, Design, Design Science, distance measure, distributed stream processing, Domain Generation Algorithm, driving, Drowsy, Dynamic Spectrum Access, e-commerce, EEG, Electronic Brake System (EBS), Electronic Maternity Records, emergency, ethnicity, eXtensible Access Control Markup Language, facial expressions, FDM, File Entropy, File Monitoring, filtering, financial time series, finite element analysis, FPGA., Framework security, Genius, GeoGebra., GIS, Global Position Data, glyph, GPGPU, Graph Database System, Healthcare social network, Hidden Markov Models, High-Level Synthesis, HLS, HTC Vive, HTTP/2.0, Human Computer Interaction, Human Computer Interaction (HCI), image processing, incident tracking, Inductive Logic Programming, Information Extraction, information representation, Information Security Risk Management, Injection molding, Integrated Development Environment, Integrity, intelligent parking, Intelligent Transportation Systems, Intrusion Detection, IoT, IS risk, IT leadership, JavaScript, K-means clustering, kanji, kinematics, leader-follower platoon, Leadership Style, locomotion, logogram, Lyapunov stability, Lyrics Database, machine learning3, magnet, malware detection, mHealth, Minkowski distance, mobile development, model checking, Multi Layer Perceptron, Multipath., music recommendation, musicology, MusiXmatch, Natural Language Processing, NetLogo, network, Network Security, neuro-fuzzy based identification, non-stationary signal, null pointer exception, octagon domain, Optimization, Oracle® database, parallel algorithms, parking lot occupancy, Personal Health Records, personalized recommendation, physical layer security, polyhedron model, prediction, Prediction of Event, prefecthing web requests, Prefetching, Privacy, Process-Resource Graph, prognosis, Progressive Web Apps, projectile motion, pTree., Ransomware, Rapid Tooling, Raspberry Pi, ray, real-time, Real-Time Constraints, Recommendation Systems, Regression, relay assignment, removal, Rendezvous Algorithm, reporting, Reputation, Resource Allocation Graph, reuse, risk management, road impact factor, road quality, route planning, RStudio, Saudi Arabia, secrecy capacity, Security5, self-driving vehicle, Sentiment Analysis, similarity, SLA, Smooth path planning, software development lifecycle, software functionality, software porting, software requirements, software security, Software Specifications, sort real numbers, sorting, spatial ability, spatial visualization, spherical geometry, Spherical Tilings, square Euclidean distance, static analysis, survival analysis, TDARMA modeling, Telecom Data Mining, tiered architecture, Time variance, time-frequency distribution, Top-n Neighbor, transactional leadership, transformational leadership, triple negative breast cancer, Trust, trust evaluation, Trusted Cloud, TV coefficients, Underwater Acoustic Sensor Networks, Underwater embedded system, user interface2, user similarity, verification, vertical processing, Virtual Reality, Virtual Reality (VR), Vision 2030, web development |
|