Volume 6, Number 6, May 2016
The Sixth International Conference on Computer Science, Engineering and Information Technology (CCSEIT 2016) Vienna, Austria, May 21~22, 2016
Volume Editors : Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-51-9 Download full Proceedings
Smart as a Cryptographic Processor
Saroja Kanchi, Nozar Tabrizi and Cody Hayden, Kettering University, USA
Effects of The Different Migration Periods on Parallel Multi-Swarm PSO
S¸aban Gülcü1 and Halife Kodaz2, 1Necmettin Erbakan University, Turkey and 2Selcuk University, Turkey
Applications of the Erlang B and C Formulas to Model a Network of Banking Computer Systems -
Moving Towards Green IT and Performant Banking
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU,
The Bucharest University of Economic Studies, Romania
Configuration of a Guidance Process for Software Process Modeling
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB University, Algeria and 2University of Nantes, France
Using Mutation in Fault Localization
Chenglong Sun and Tian Huang, Chinese Academy of Sciences, China
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks
Dan Wu and Sonia Bhatti, University of Windsor, Canada
Weights Stagnation in Dynamic Local Search for SAT
Abdelraouf Ishtaiwi, University of Petra, Jordan
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep
Learning Model
Luca Petricca1, Tomas Moss2, Gonzalo Figueroa2 and Stian Broen1,
1Broentech Solutions A.S., Norway and 2Orbiton A.S. Horten, Norway
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Josip Arnerić1 and Tea Poklepović2, 1University of Zagreb, Croatia and 2University of Split, Croatia
Modified Vortex Search Algorithm for Real Parameter Optimization
Berat Dogˇan, Inonu University, Turkey
Analysis of Rising Tutition Rates in The United States Based on Clustering Analysis and Regression Models
Long Cheng and Chenyu You, Rensselaer Polytechnic Institute, USA
Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster
Christine Niyizamwiyitira and Lars Lundberg, Blekinge Institute of Technology, Sweden
Exploring Peer-To-Peer Data Mining
Andrea Marcozzi and Gianluca Mazzini, Lepida SpA, Italy
Enhanced Protocol for Wireless Content-Centric Network
Chan-Min Park, Rana Asif Rehman, Tran Dinh Hieu and Byung-Seo Kim, Hongik University, Republic of Korea
Projection Profile Based Number Plate Localization and Recognition
Sandipan Chowdhury1, Arindam Das2, and Punitha P2, 1University of Calcutta, India and
2HCL Technologies, India
A Text Mining Research Based on LDA Topic Modelling
Zhou Tong and Haiyi Zhang, Acadia University, Canada
Management Architecture for Dynamic Federated Identity Management
Daniela Pöhn and Wolfgang Hommel, Leibniz Supercomputing Centre, Germany
Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in
Indoor Scenarios
Nithya Shree R, Rajeshwari Sah and Shreyank N Gowda, R.V.College of Engineering, India
Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand
Gender-Related Skeletal Muscle Aging
Abdouladeem Dreder, Muhammad Atif Tahir, Huseyin Seker and Muhammad Naveed Anwar,
The University of Northumbria, United Kingdom
Vulnerabilities of the SSL/TLS Protocol
Jelena Ćurguz, Post of Republic of Srpska in Banja Luka, Bosnia and Herzegovina
Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational
Memory in Centers R&D
Marco Javier Suárez Barón, UNITEC/FODESEP, Colombia