Conference | Author | Title |
CIT-82 | Qiong Wang, Jialong Wang, Li Shen and Zhiying Wang | A Software-Hardware Co-Designed Methodology for Efficient Thread Level Speculation |
CIT-75 | Kan Zhang, Zichao Zhang and Yanlei Wu | A Core Theory based Algorithm for Influence Maximization in Social Networks |
CIT-31 | Ke Zhang, Martin Tomlinson and Mohammed Zaki Ahmed | Best random codes construction for syndrome coding scheme |
CIT-43 | Ritu Chaturvedi and Christie Ezeife | Predicting Student Performance in an ITS using Task-driven Features |
CIT-61 | Shih-Hsuan Yang and Chong-Cheng Zhong | Fast Coding-Unit Mode Decision for HEVC Transrating |
CIT-64 | Mourad Elhadef | Using Game Theory To Solve the Fault Diagnosis Problem Under Symmetric Comparison Rules |
CIT-80 | Cheng Wu and Yiming Wang | Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-scale Reinforcement Learning |
CIT-30 | Rafael Weingärtner and Carla Merkle Westphall | A design towards personally identifiable information control and awareness in OpenID Connect identity providers |
CIT-84 | Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He and Chensi Wu | Predicting the Popularity of Online News Based on Multivariate Analysis |
CIT-91 | Jiachen Li, Jing Xu, Wei Liu, Shimin Gong and Kai Zeng | Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks |
CIT-101 | Jiachen Li, Yue Mi, Shimin Gong, Jing Xu, Xiaoxia Huang and Yanyan Shen | Cooperative Multi-Relay Assisted Multicast Beamforming in Wirelessly Power Communications |
CIT-55 | Liyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang and Yongquan Feng | An adaptive visualization tool for high order discontinuous galerkin method with quadratic elements |
CIT-63 | Victor Lira, Eduardo Tavares, Meuse Oliveira Jr and Dennys Azevedo | A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual Networks |
CIT-74 | Charikleia Papatsimpa and Jean Paul Linnartz | Improved Presence detection for Occupancy Control in Multisensory Environments |
CIT-93 | Marco Antonio Marques Marinho, Alexey Vinel, Felix Antreich, Joao Paulo Carvalho Lustosa Da Costa and Edison Pignaton de Freitas | Antenna Array Based Localization Scheme for Vehicular Networks |
CIT-96 | Yuanyue Guo and Jie Deng | Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion |
CIT-37 | Alper Kursat Uysal and Yi Lu Murphey | Sentiment classification: Feature selection based approaches versus deep learning |
CIT-32 | De-Thu Huynh and Hai Chu | Energy Efficiency Optimization in D2D Multimedia Communications using Adaptive Genetic Algorithm |
CIT-57 | Ichiro Satoh | Specifying Cooperative Logistics |
CIT-92 | Hossein Sharifi Noghabi, Habib Rajabi Mashhadi and Kambiz Shojaee G. | Generalized Differential Evolution |
CIT-103 | Renatus Mushi | The Influence of Values of Mobile Phone Technology on Intention and Usage: A case of Tanzanian SMEs |
CIT-51 | Khaoula Youssef, Walid Boukadida and Michio Okada | A Motivating Social Robot To Help Achieving Cognitive Consonance During STEM Learning |
CIT-66 | Madhusanka Liyanage, Andrei Gurtov and Mika Ylianttila | Fast Transmission Mechanism for Secure VPLS Architectures |
CIT-68 | Chaw Su Hlaing and Aye Thida | Myanmar Text to Speech System by using Phoneme Concatenation Method |
CIT-11 | Shin'Ichi Koike | A New Method of Error Reduction for Affine Projection Algorithm |
CIT-39 | Wei Li and Peng Ren | Optimal Frame-Level Bit Allocation in HEVC with Distortion Dependency model |
CIT-88 | Ali Idri and Ilham Kadi | A data mining-based approach for cardiovascular dysautonomias diagnosis and treatment |
CIT-27 | Ali Idri and Ibtissam Abnane | Fuzzy Analogy based Effort Estimation: An Empirical Comparative Study |
CIT-54 | Dongyang Zhao, Yangyang Zhou and Jin Xu | The Enumeration of Flippable Edges in Maximal Planar Graphs |
CIT-79 | Francisco Nauber Gois, Pedro PorfÍrio Muniz Farias and AndrÉ Coelho | A multi-objective metaheuristic approach to search-based stress testing |
CIT-85 | Jukka Ruohonen and Ville Leppänen | Investigating the Agility Bias in DNS Graph Mining |
Conference | Author | Title |
CIT-19 | Yuki Maehara and Toshiro Nunome | Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-View Video and Audio Transmission with MPEG-DASH |
CIT-23 | Jonas Pontes, Demetrio Borges, Eric Borba and Eduardo Tavares | Assessment of TCP parameters for mobile devices concerning performance and energy consumption |
CIT-59 | Tin Tin San and Nu War | Local Stereo Matching Under Radiometric Variations |
CIT-5 | Mário Marques Da Silva and Rui Dinis | A Simplified Massive MIMO Approach using Precoding |
CIT-21 | Liang-Hua Chen, Hsin-Wen Chang and Chih-Wen Su | Player Tracking for Tactics Analysis |
CIT-40 | Omid Bushehrian and Shayeste Esmail Nejad | A Cellular Learning Automata method for trust management in Health-Care pervasive environments |
CIT-52 | Nor Asilah Khairi and Asral Bahari Jambek | Improved K-RLE Data Compression Algorithm for Internet of Things (IoT) Application |
CIT-34 | Lei Ni, Yanming Shen, Yuxin Wang, Haoyang Tang and Zhao Yin | Accurate Localization using LTE Signaling Data |
CIT-99 | Ivan Salvadori, Bruno C. N. Oliveira, Alexis Huf, Eduardo Camilo Inacio and Frank Siqueira | Improving Integration of Data-based Microservices through Ontology Alignment |
CIT-100 | Ashraf Tahat, Claude D'Amours and Benoit Champagne | Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems |
CIT-44 | Huaqing Lin, Zheng Yan and Raimo Kantola | CDController: A Cloud Data Access Control System based on Reputation |
CIT-56 | Yilmaz Vural and Murat Aydos | A New Approach to Utility-based Privacy Preserving in Data Publishing |
CIT-77 | Sampsa Rauti and Ville Leppänen | "You have a potential hacker's infection": A study on technical support scams |
CIT-86 | Ge Zhang, Zhongzhi Luan and Weiguo Wu | Improving Performance for Geo-Distributed Data Process in Wide -Area |
CIT-6 | Roger D. F. Ferreira and Rômulo S. Oliveira | Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS |
CIT-13 | Kazuhiko Takahashi | Remarks on Adaptive-type Hypercomplex-valued Neural Network-based Feedforward Feedback Controller |
CIT-22 | Zhe Guo and Zheng Yan | Dynamic MAC protocol for Tactical Data Links |
CIT-49 | Tenager Mekonnen, Erkki Harjula, Arto Heikkinen, Timo Koskela and Mika Ylianttila | Energy Efficient Event Driven Video Streaming Surveillance Using sleepyCAM |
CIT-97 | Andrei Popleteev | Indoor localization using ambient FM radio fingerprinting: A 9-month study |
CIT-62 | Paresh Rathod and Timo Hämäläinen | A Novel Model for Cybersecurity Economics and Analysis |
CIT-76 | K-P Lam, Rafael Valero-Fernandez, David Collins, Collin Rigby and James Bailey | Towards Accurate Predictions of Customer Purchasing Patterns |
CIT-83 | Yixiang Huang | Network Anomaly Detection Based On Two-Phases Classification Method |
CIT-105 | Rima Grati and Khouloud Boukadi | Big Data and Cloud Computing: A systematic mapping study |