CATA 2019: Author IndexAuthor | Papers |
---|
A | Abelha, António | Smart Mobile Computing in Pregnancy Care | Abufardeh, Sameer | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | Al-Mubaid, Hisham | A Study of Computer Information Systems Discipline with Layout and Analysis | Al-Shoshan, Abdullah | TDARMA Model Estimation Using the MLS and the TF Distribution | Alangari, Abdulaziz | A Study of Computer Information Systems Discipline with Layout and Analysis | Alannsary, Mohammed O. | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | Albarakati, Hussain | Weighted Record Sample for Underwater Seismic Monitoring Application | Aldwairi, Tamer | Planning Computational Biology Projects Using Agile Approach | Aljahdali, Sultan | A Study of Computer Information Systems Discipline with Layout and Analysis | Almashfi, Nabil | Analyzing JavaScript Programs Using Octagon Domain | Alruwaythi, Maryam | User Behavior and Trust Evaluation in Cloud Computing | Alsyefi, Saleh | Implementation of Security and Privacy Aspects in a Healthcare Social Network | Ammar, Reda | Weighted Record Sample for Underwater Seismic Monitoring Application | Ammel, Luke | Web Request Predictions | Appleton, Randy | Web Request Predictions | Arad, Behnam | Customized Intrusion Detection Based on a Database Audit Log | B | Backens, Jonathan | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | Batinov, Georgi | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | Bolling, Nicholas | Virtual Reality Physics Lab | Boominathan, Balaji | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | Bossard, Antoine | Refining the Unrestricted Character Encoding for Japanese | Braga, Jorge | Smart Mobile Computing in Pregnancy Care | Breda, Ana Maria D'Azevedo | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra | Bridgelall, Raj | Data Driven Analytics of Road Quality | Brown, Benjamin | Virtual Reality Physics Lab | C | Carthen, Chase | An Alternative Natural Action Interface for Virtual Reality | Cheok, Ka C | Smooth Trajectory Planning for Autonomous Leader-Follower Robots Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | Chew, Christopher | Behaviour Based Ransomware Detection | Choudhury, Prasenjit | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | Courtney, Chaney | Vetting Anti-patterns in Java to Kotlin Translation | D | Daoud, Luka | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | Dascalu, Sergiu | Virtual Reality Physics Lab An Alternative Natural Action Interface for Virtual Reality | Debnath, Narayan | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | Delaney, Samuel | RealPi - A Real Time Operating System on the Raspberry Pi | Dewitty Jr, Robert | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | Dos Santos Dos Santos, José Manuel | New classes of monohedral spherical tilings by non-convex spherical hexagons and non-convex spherical Pentagons with GeoGebra | Duhan, Christopher | Parking Lot Occupancy Tracking Through Image Processing | Dutta Pramanik, Pijush Kanti | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | E | Egbert, Dwight | RealPi - A Real Time Operating System on the Raspberry Pi | El-Sheikh, Eman | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | Elfouly, Raafat | Weighted Record Sample for Underwater Seismic Monitoring Application | Ellis, Kevin | Parking Lot Occupancy Tracking Through Image Processing | Enem, Anthony | Parking Lot Occupancy Tracking Through Image Processing | Etesami, Faryar | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | F | Faizi, Salman | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues Secured Cloud for Enterprise Computing | Farhat, Ana | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | Fischer, Michael | A Novel Multi-radio Rendezvous Algorithm for Cognitive Radio Networks | Fonseca, Francisca | Smart Mobile Computing in Pregnancy Care | Frost, Andrew | An Alternative Natural Action Interface for Virtual Reality | G | Gargouri, Faiez | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | Ghosh, Tirthankar | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | Ginn, Dustin | Emergency Communications Database with Ticketing Archive for Training New Employees | Goffinet, Tyler | An Alternative Natural Action Interface for Virtual Reality | Griffin, Terry | Parking Lot Occupancy Tracking Through Image Processing | Gupta, Bidyut | Study of Secured Full-Stack Web Development | H | Hagen, Kyle | Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data | Han, Yijie | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations | Harris Jr, Frederick C. | RealPi - A Real Time Operating System on the Raspberry Pi | Hatano, Ryo | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | Hausawi, Yasser M. | Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 | Hossain, Mohammad | A New Method of Calculating Squared Euclidean Distance (SED) Using pTree Technology and Its Performance Analysis | Hough, Jill | Data Driven Analytics of Road Quality | Huang, Pin-Yen Huang | Evaluation of Secrecy Rate in Cooperative Communication System | Hussein, Fady | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | I | Ivanova, Reni | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | Iyengar, Kiran | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | J | Jain, Minni | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | Jammal, Wasseem | A Multi-Stage Detection Technique for DNS-Tunneled Botnets | Jin, Ying | XACML Implementation Based on Graph Databases | Johnson, Tina | NetLogo and GIS: A Powerful Combination | K | Kaja, Krishna | XACML Implementation Based on Graph Databases | Kambhampaty, Krishna | User Behavior and Trust Evaluation in Cloud Computing | Kanaan, Yasmine | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | Kaneko, Keiichi | Refining the Unrestricted Character Encoding for Japanese | Karkouda, Kawthar | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | Kato, Kasumi | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | Kumar, Vimal | Behaviour Based Ransomware Detection | L | Laitinen, Connor | Web Request Predictions | Le, Thomas | Customized Intrusion Detection Based on a Database Audit Log | Le, Vinh | Virtual Reality Physics Lab | Le, Vinh | An Alternative Natural Action Interface for Virtual Reality | Lee, Haesun | Emergency Communications Database with Ticketing Archive for Training New Employees | Lee, Ilhyun | Emergency Communications Database with Ticketing Archive for Training New Employees | Lewis, Christopher | Virtual Reality Physics Lab | Liang, Hsin-Ying | Evaluation of Secrecy Rate in Cooperative Communication System | Liu, Lifeng | A Compiler-assisted locality aware CTA Mapping Scheme | Liu, Meilin | A Compiler-assisted locality aware CTA Mapping Scheme | Liu, Ziping | Study of Secured Full-Stack Web Development | Lopez, Marcos | Parking Lot Occupancy Tracking Through Image Processing | Lu, Lunjin | Analyzing JavaScript Programs Using Octagon Domain | M | Machado, José | Smart Mobile Computing in Pregnancy Care | Maji, Giridhar | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | Malnor, Cody | Web Request Predictions | Mandal, Sharmistha | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | Medina-Ochoa, Juan-Pablo | Learning Financial Time Series for Prediction of the Stock Exchange Market | Miller, Les | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | Mitchell, William | Customized Intrusion Detection Based on a Database Audit Log | Mullens, Christopher | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | Munoz, Andrew | Virtual Reality Physics Lab | N | Nabli, Ahlem | TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud | Naito, Daichi | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning | Nakada, Hidemoto | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | Neilsen, Mitchell | Vetting Anti-patterns in Java to Kotlin Translation | Nishiyama, Hiroyuki | Prediction of Drowsy Driving Using EEG and Facial Expression by Machine Learning Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | Nygard, Kendall | Software Engineering Principles and Security Vulnerabilities User Behavior and Trust Evaluation in Cloud Computing Data Driven Analytics of Road Quality | O | Oguchi, Masato | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | Ohnishi, Takashi | Effect of Magnet Shapes on Metal Contamination Removal | Ohwada, Hayato | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | Okamoto, Takashi | Effect of Magnet Shapes on Metal Contamination Removal | Okonofua, Henry | An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | Ono, Yusuke | Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning | Oweis, Sami | Smooth Trajectory Planning for Autonomous Leader-Follower Robots | Owrang Ojaboni, Mohammad | Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer | P | Patanasakpinyo, Thitivatr | Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | Peixoto, Hugo | Smart Mobile Computing in Pregnancy Care | Periyasamy, Kasi | Implementation of Security and Privacy Aspects in a Healthcare Social Network | R | Rafla, Nader | Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS) | Rahim Taleqani, Ali | Data Driven Analytics of Road Quality | Rahman, Shawon | Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues Secured Cloud for Enterprise Computing An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations | Rastogi, Aakanksha | Software Engineering Principles and Security Vulnerabilities | Rogers, Julian | Finite Element Analysis of 3D Printed Aircraft Wing | Rosas-Romero, Roberto | Learning Financial Time Series for Prediction of the Stock Exchange Market | S | Sahli, Ramsey | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | Saluja, Vasu | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | Scully-Allison, Connor | Virtual Reality Physics Lab An Alternative Natural Action Interface for Virtual Reality | Sen, Soumya | A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining | Shenify, Mohamed | A Study of Computer Information Systems Discipline with Layout and Analysis | Singh, Pradeep Kumar | A Novel Neighborhood Calculation Method by Assessing Users' Varying Preferences in Collaborative Filtering | Slater, Ben | Web Request Predictions | Sneha, Mishra | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations | Sulaiman, Adel | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | Syed, Md Usman Gani | An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations | T | Takefusa, Atsuko | Construction Scheme of a Scalable Distributed Stream Processing Infrastructure Using Ray and Apache Kafka | W | Walker, Broday | NetLogo and GIS: A Powerful Combination | Wang, Chongjun | A Compiler-assisted locality aware CTA Mapping Scheme | Watanuki, Keiichi | Effect of Magnet Shapes on Metal Contamination Removal | Webb, Trey | Improving the Performance of 3D Printed Molds for Plastic Injection Molding | Whitney, Kofi | Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task | Woo, Jay | An Alternative Natural Action Interface for Virtual Reality | Y | Yadav, Prakarsh | L,M&A: An Algorithm for Music Lyrics Mining and Sentiment Analysis | Yang, Cheng-Ying | Evaluation of Secrecy Rate in Cooperative Communication System | Z | Zandbergen, William | Virtual Reality Physics Lab | Zareh, Hormoz | Finite Element Analysis of 3D Printed Aircraft Wing |
|
|