Default Cover Image

2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)

Nov. 29 2016 to Dec. 2 2016

Agadir, Morocco

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Foreword — Message from the general chairsFreely available from IEEE.pp. 1-2
Organizing committeeFreely available from IEEE.pp. 1-2
GENUS: An ETL tool treating the Big Data VarietyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Data placement strategy for massive data applications based on FCA approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A new recommendation algorithm for reducing dimensionality and improving accuracyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Clustering data stream under a belief function frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Imperfect top-k skyline query with confidence levelFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Abstracts generation as information retrieval resultsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Universal metadata repository for document analysis and recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Investigation on sentiment analysis for Arabic reviewsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Assessing gene-disease relationship with multifunctional genes using GOFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Class-association rules pruning using regularizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards a dynamic and polarity-aware social user profile modelingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Semi-supervised outlier detection via bipartite graph clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Communication-aware VM consolidation based on formal concept analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A scalable maximum-clique algorithm using Apache SparkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Prediction of Amazon spot price based on chaos theory using ANFIS modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Data-intensive service composition in Cloud Computing: State-of-the-artFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Adaptive Cloud Resource Allocation scheme to minimize SLO response time violationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Parallel triangular matrix system solving on CPU-GPU systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
High-level synthesis for FPGA design based-SLAM applicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An efficient hybrid prediction approach for predicting cloud consumer resource needsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Toward a universal learning-based image quality metric with reference for stereoscopic imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Advanced physical optical model for simulating rainbowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Salient Region Detector for structured imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Text detection in natural scene images using two masks filteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
OFSF-BC: Online feature selection framework for binary classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient image search system with multi-scale database using profile-based pre-selection and coarse matchingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Age estimation using local matched filter binary patternFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Machine perception in gender recognition using RGB-D sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Person re-identification based on combined Gaussian weighted Fisher vectorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A new approach of action recognition based on Motion Stable Shape (MSS) featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Complementary features for traffic sign detection and recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Skyline-based approach for natural scene identificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A survey of secondary studies in software process improvementFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Defining a UML profile for the consistency of design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Quality evaluation of cardiac decision support systems using ISO 25010 standardFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Potential-fault cache-based regression test selectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An UML class recommender system for software designFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A genetic algorithm feature selection based approach for Arabic Sentiment ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Ensuring consistent dynamic adaptation: An approach from design to runtimeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Interval valued intuitionistic fuzzy weight techniques for TOPSIS methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Crosslingual automatic diacritization for Egyptian Colloquial DialectFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Intelligent Tunisian Arabic morphological analyzerFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Interoperable Arabic language resources building and exploitation in SAFAR platformFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Automatic speech recognition errors detection using supervised learning techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Developing Turkish sentiment lexicon for sentiment analysis using online news mediaFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Mobile app conceptual browser: Online marketplaces information extractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
FlyAntClass: Intelligent move for ant based clustering algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A new polynomial cluster deletion subproblemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An new model for robot navigation based on AprioriAll algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Bayesian network for discovering the interests of authorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Patterns to distribute mobility simulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Intelligent multi agent system based solution for data protection in the cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
QLAR: A Q-learning based adaptive routing for MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards a dynamic QoS management in IMS transport layer via SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Geographic interest forwarding in NDN-based wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Event-driven wireless sensor networks based on consensusFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A novel IEEE 802.15.6 CSMA/CA service differentiationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Performance evaluation of RPL metrics in environments with strained transmission rangesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Mobility support over RPL using sensor nodes speed classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A GQVM approach to secure WeBhouse ETL processes developmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Intrusion detection based on genetic fuzzy classification systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Anomaly behavior analysis for building automation systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A classification methodology for security patterns to help fix software weaknessesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy risk assessment and users' awareness for mobile apps permissionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Anomaly behavior analysis of website vulnerability and securityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Metamodeling approach for creating an abstract representation of simulation tools conceptsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Using heading hierarchy for non-taxonomic relation extractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Lexicon approach to multidimensional analysis of tweets opinionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A probabilistic model for web service composition in uncertain mobile contextsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Promoting active participation of the learners in an authoring based learning movie systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Generation of an adaptive e-learning domain model based on a fuzzy logic approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
iXercise: An immersive platform for exercise intervention for special needs populationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mobile application to support dyslexia diagnostic and reading practiceFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 100 out of 223