Default Cover Image

2015 Computer Science and Information Technologies (CSIT)

Sept. 28 2015 to Oct. 2 2015

Yerevan, Armenia

Table of Contents

Organizing committeeFreely available from IEEE.pp. 1-1
Copyright pageFreely available from IEEE.pp. 1-1
ForewordFreely available from IEEE.pp. 1-1
Table of contentsFreely available from IEEE.pp. 1-3
Towards deductive verification of concurrent Linux kernel code with JessieFull-text access may be available. Sign in or learn about subscription options.pp. 5-10
Power optimization approach of ORCA processor for 32/28nm technology nodeFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Primitive recursion on higher typesFull-text access may be available. Sign in or learn about subscription options.pp. 23-32
Predicate transformers for local description unitsFull-text access may be available. Sign in or learn about subscription options.pp. 33-36
On the tt-complete set which is tt-mitotic but not btt-mitoticFull-text access may be available. Sign in or learn about subscription options.pp. 37-40
A complete characterization of hyperidentities of the variety of weakly idempotent latticesFull-text access may be available. Sign in or learn about subscription options.pp. 41-43
Frontal cellular automata for the study of non-equilibrium lattice modelsFull-text access may be available. Sign in or learn about subscription options.pp. 44-46
Constraint satisfaction problems on specific subsets of the n-dimensional unit cubeFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
On Hamiltonian bypasses in digraphs with the condition of Y. ManoussakisFull-text access may be available. Sign in or learn about subscription options.pp. 53-63
Some properties of Hadamard matricesFull-text access may be available. Sign in or learn about subscription options.pp. 64-65
On interval edge-colorings of bipartite graphsFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Method for fire and smoke detection in monitored forest areasFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
Document image segmentation based on wavelet featuresFull-text access may be available. Sign in or learn about subscription options.pp. 82-84
Multithreaded signal preprocessing approach for inertial sensors of smartphoneFull-text access may be available. Sign in or learn about subscription options.pp. 85-89
Efficient secure pattern search algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 90-94
Determination of camera displacement using image stereo pairFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
LLVM-based code clone detection frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 100-104
Programming into graphs of a new generation and the single graphical shell for all languagesFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Augmenting JavaScript JIT with ahead-of-time compilationFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Dynamic voltage and frequency scaling for 3D Classical Spin Glass applicationFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Traffic anomaly detection and DDOS attack recognition using diffusion map technologiesFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Time-periodic quantum point interactionsFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
A theorem on higher-order differences of two-state Markov chainsFull-text access may be available. Sign in or learn about subscription options.pp. 137-138
Limitations of Agronet system in e-projects: Case study of CroatiaFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Numerical solution of nonlocal contact problems for elliptic equationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-147
Information technologies applications for sign languages investigationsFull-text access may be available. Sign in or learn about subscription options.pp. 148-150
On validity of personalized planning and integrated testing algorithms in reproducible gamesFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Clustering of random networks under topological constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
On assessment of performance of systems by combining on-the-job and expert attributes scalesFull-text access may be available. Sign in or learn about subscription options.pp. 160-163
Authors indexFreely available from IEEE.pp. 164-164
Showing 40 out of 40