callback( { "result":{ "query":":facetid:toc:\"db/conf/racs/racs2019.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.18" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"57", "@dc":"57", "@oc":"57", "@id":"43407768", "text":":facetid:toc:db/conf/racs/racs2019.bht" } }, "hits":{ "@total":"57", "@computed":"57", "@sent":"57", "@first":"0", "hit":[{ "@score":"1", "@id":"2262325", "info":{"authors":{"author":[{"@pid":"87/3144-2","text":"Xing Liu 0002"},{"@pid":"252/8785","text":"GuangMing Sheng"},{"@pid":"77/2542","text":"Bing Shi"},{"@pid":"06/5497","text":"Christophe de Vaulx"},{"@pid":"21/1352","text":"Wenbi Rao"},{"@pid":"181/2689","text":"Qing Li"}]},"title":"MIPS CPU development with analogous teaching method for experimental teaching of digital logic and computer organization.","venue":"RACS","pages":"27-33","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/0002SSVRL19","doi":"10.1145/3338840.3355658","ee":"https://doi.org/10.1145/3338840.3355658","url":"https://dblp.org/rec/conf/racs/0002SSVRL19"}, "url":"URL#2262325" }, { "@score":"1", "@id":"2262326", "info":{"authors":{"author":[{"@pid":"252/8750","text":"Seong Il Bae"},{"@pid":"252/8817","text":"Soo Han Kim"},{"@pid":"39/14","text":"Eul Gyu Im"}]},"title":"Automatic hybrid analysis technique to improve botnet code coverage using fake server.","venue":"RACS","pages":"276-282","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/BaeKI19","doi":"10.1145/3338840.3355670","ee":"https://doi.org/10.1145/3338840.3355670","url":"https://dblp.org/rec/conf/racs/BaeKI19"}, "url":"URL#2262326" }, { "@score":"1", "@id":"2262327", "info":{"authors":{"author":[{"@pid":"24/8544","text":"Kai Che"},{"@pid":"64/5715","text":"Yufeng Chen"},{"@pid":"15/5512","text":"Zhengtao Xiang"},{"@pid":"252/8807","text":"Guosheng Peng"},{"@pid":"225/6329","text":"Jian Lv"},{"@pid":"69/5182","text":"Yun Zhou"}]},"title":"Research of infrared image super-resolution reconstruction based on improved FSRCNN.","venue":"RACS","pages":"137-142","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/CheCXPLZ19","doi":"10.1145/3338840.3355660","ee":"https://doi.org/10.1145/3338840.3355660","url":"https://dblp.org/rec/conf/racs/CheCXPLZ19"}, "url":"URL#2262327" }, { "@score":"1", "@id":"2262328", "info":{"authors":{"author":[{"@pid":"186/3056","text":"Yi-Shen Chen"},{"@pid":"140/2107","text":"Sheng-Wei Cheng"},{"@pid":"07/3181","text":"Tei-Wei Kuo"}]},"title":"Performance tuning case study on graphics processing unit-accelerated monte carlo simulations for proton therapy.","venue":"RACS","pages":"1-6","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ChenCK19","doi":"10.1145/3338840.3355638","ee":"https://doi.org/10.1145/3338840.3355638","url":"https://dblp.org/rec/conf/racs/ChenCK19"}, "url":"URL#2262328" }, { "@score":"1", "@id":"2262329", "info":{"authors":{"author":[{"@pid":"252/8784","text":"Zhangyu Cheng"},{"@pid":"02/7406","text":"Chengming Zou"},{"@pid":"45/2761","text":"Jianwei Dong"}]},"title":"Outlier detection using isolation forest and local outlier factor.","venue":"RACS","pages":"161-168","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ChengZD19","doi":"10.1145/3338840.3355641","ee":"https://doi.org/10.1145/3338840.3355641","url":"https://dblp.org/rec/conf/racs/ChengZD19"}, "url":"URL#2262329" }, { "@score":"1", "@id":"2262330", "info":{"authors":{"author":[{"@pid":"137/7215","text":"Eunseok Choi"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Design and implementation of virtual machine control and streaming scheme using Linux kernel-based virtual machine hypercall for virtual mobile infrastructure.","venue":"RACS","pages":"57-60","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ChoiH19","doi":"10.1145/3338840.3355690","ee":"https://doi.org/10.1145/3338840.3355690","url":"https://dblp.org/rec/conf/racs/ChoiH19"}, "url":"URL#2262330" }, { "@score":"1", "@id":"2262331", "info":{"authors":{"author":[{"@pid":"17/7672","text":"Zhixiang Deng"},{"@pid":"55/7141","text":"Qian Sang"},{"@pid":"88/3327","text":"Yan Pan"},{"@pid":"174/9928","text":"Yuanxue Xin"}]},"title":"Application of deep learning for power control in the interference channel: a RNN-based approach.","venue":"RACS","pages":"96-100","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/DengSPX19","doi":"10.1145/3338840.3355668","ee":"https://doi.org/10.1145/3338840.3355668","url":"https://dblp.org/rec/conf/racs/DengSPX19"}, "url":"URL#2262331" }, { "@score":"1", "@id":"2262332", "info":{"authors":{"author":[{"@pid":"252/8835","text":"Yinping Ding"},{"@pid":"51/5022-2","text":"Jun Huang 0002"},{"@pid":"23/5823","text":"Peng Zhou"}]},"title":"Performance analysis for multi-priority data flow scheduling in SDN.","venue":"RACS","pages":"206-211","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/DingHZ19","doi":"10.1145/3338840.3355652","ee":"https://doi.org/10.1145/3338840.3355652","url":"https://dblp.org/rec/conf/racs/DingHZ19"}, "url":"URL#2262332" }, { "@score":"1", "@id":"2262333", "info":{"authors":{"author":[{"@pid":"234/3762","text":"Abdulrahman Abu Elkhail"},{"@pid":"227/6016","text":"Jan Svacina"},{"@pid":"17/8995","text":"Tomás Cerný"}]},"title":"Intelligent token-based code clone detection system for large scale source code.","venue":"RACS","pages":"256-260","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ElkhailSC19","doi":"10.1145/3338840.3355654","ee":"https://doi.org/10.1145/3338840.3355654","url":"https://dblp.org/rec/conf/racs/ElkhailSC19"}, "url":"URL#2262333" }, { "@score":"1", "@id":"2262334", "info":{"authors":{"author":[{"@pid":"252/8765","text":"Godwin Kobby Gakpo"},{"@pid":"54/3643-2","text":"Xin Su 0002"},{"@pid":"61/7024","text":"Chang Choi"}]},"title":"Moving intelligence of mobile edge computing to maritime network.","venue":"RACS","pages":"189-193","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/Gakpo0C19","doi":"10.1145/3338840.3355647","ee":"https://doi.org/10.1145/3338840.3355647","url":"https://dblp.org/rec/conf/racs/Gakpo0C19"}, "url":"URL#2262334" }, { "@score":"1", "@id":"2262335", "info":{"authors":{"author":[{"@pid":"252/8793","text":"Yuchen Gan"},{"@pid":"54/3643-2","text":"Xin Su 0002"},{"@pid":"61/7024","text":"Chang Choi"},{"@pid":"67/2535","text":"Zhou Zhou"}]},"title":"Clustered NFV service chaining scheme for ocean observations.","venue":"RACS","pages":"175-180","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/Gan0CZ19","doi":"10.1145/3338840.3355637","ee":"https://doi.org/10.1145/3338840.3355637","url":"https://dblp.org/rec/conf/racs/Gan0CZ19"}, "url":"URL#2262335" }, { "@score":"1", "@id":"2262336", "info":{"authors":{"author":[{"@pid":"235/8419","text":"Siri Guleng"},{"@pid":"18/8282","text":"Celimuge Wu"},{"@pid":"25/950","text":"Tsutomu Yoshinaga"},{"@pid":"53/4376","text":"Yusheng Ji"}]},"title":"Traffic big data assisted broadcast in vehicular networks.","venue":"RACS","pages":"236-240","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/GulengWYJ19","doi":"10.1145/3338840.3355683","ee":"https://doi.org/10.1145/3338840.3355683","url":"https://dblp.org/rec/conf/racs/GulengWYJ19"}, "url":"URL#2262336" }, { "@score":"1", "@id":"2262337", "info":{"authors":{"author":[{"@pid":"252/8762","text":"Boseon Hong"},{"@pid":"10/4050","text":"Jinsung Cho"},{"@pid":"07/6461","text":"Bongjae Kim"},{"@pid":"47/1976","text":"Hong Min"},{"@pid":"35/2218","text":"Jiman Hong"},{"@pid":"35/717","text":"Keon Myung Lee"}]},"title":"A study on supporting spiking neural network models based on multiple neuromorphic processors.","venue":"RACS","pages":"131-132","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/HongCKMHL19","doi":"10.1145/3338840.3355692","ee":"https://doi.org/10.1145/3338840.3355692","url":"https://dblp.org/rec/conf/racs/HongCKMHL19"}, "url":"URL#2262337" }, { "@score":"1", "@id":"2262338", "info":{"authors":{"author":[{"@pid":"252/8762","text":"Boseon Hong"},{"@pid":"07/6461","text":"Bongjae Kim"},{"@pid":"15/5695","text":"Jeong-Dong Kim"},{"@pid":"252/8829","text":"Jeahyoun Koo"}]},"title":"Performance analysis of chinese cursive character recognition based on convolutional neural network.","venue":"RACS","pages":"125-127","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/HongKKK19","doi":"10.1145/3338840.3355687","ee":"https://doi.org/10.1145/3338840.3355687","url":"https://dblp.org/rec/conf/racs/HongKKK19"}, "url":"URL#2262338" }, { "@score":"1", "@id":"2262339", "info":{"authors":{"author":[{"@pid":"148/4316","text":"Jiwon Hong"},{"@pid":"40/9208","text":"Sung-Jun Park"},{"@pid":"252/8828","text":"Taeri Kim"},{"@pid":"54/6443","text":"Yung-Kyun Noh"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"212/8534","text":"Dongphil Kim"},{"@pid":"39/6144","text":"Wonho Kim"}]},"title":"Malware classification for identifying author groups: a graph-based approach.","venue":"RACS","pages":"169-174","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/HongPKNKKK19","doi":"10.1145/3338840.3355684","ee":"https://doi.org/10.1145/3338840.3355684","url":"https://dblp.org/rec/conf/racs/HongPKNKKK19"}, "url":"URL#2262339" }, { "@score":"1", "@id":"2262340", "info":{"authors":{"author":[{"@pid":"214/8714","text":"Xincheng Huang"},{"@pid":"16/6589","text":"Wei Jian"},{"@pid":"49/1457","text":"Cheng Yang"},{"@pid":"252/8740","text":"Yiren Li"},{"@pid":"90/2817","text":"Yun Gao"},{"@pid":"149/7952","text":"Zhihu Wang"}]},"title":"Sliding mode control of PMSM based on novel convergence reaching law.","venue":"RACS","pages":"250-255","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/HuangJYLGW19","doi":"10.1145/3338840.3355645","ee":"https://doi.org/10.1145/3338840.3355645","url":"https://dblp.org/rec/conf/racs/HuangJYLGW19"}, "url":"URL#2262340" }, { "@score":"1", "@id":"2262341", "info":{"authors":{"author":[{"@pid":"227/6334","text":"Youjeong Jang"},{"@pid":"180/7455","text":"Hyung-Do Choi"},{"@pid":"08/3786","text":"Fang Deng"},{"@pid":"93/5851","text":"Sung Shin"}]},"title":"Evaluation of deep learning models for information extraction from EMF-related literature.","venue":"RACS","pages":"113-116","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/JangCDS19","doi":"10.1145/3338840.3355678","ee":"https://doi.org/10.1145/3338840.3355678","url":"https://dblp.org/rec/conf/racs/JangCDS19"}, "url":"URL#2262341" }, { "@score":"1", "@id":"2262342", "info":{"authors":{"author":[{"@pid":"252/8831","text":"Wenming Jiao"},{"@pid":"55/826-1","text":"Heng Zhang 0001"},{"@pid":"252/8779","text":"Qiyan Zang"},{"@pid":"07/314","text":"Jian Zhang"},{"@pid":"247/8632","text":"Hongran Li"}]},"title":"Iris biometric feature hidden based on chaotic encryption.","venue":"RACS","pages":"295-299","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/JiaoZZZL19","doi":"10.1145/3338840.3355674","ee":"https://doi.org/10.1145/3338840.3355674","url":"https://dblp.org/rec/conf/racs/JiaoZZZL19"}, "url":"URL#2262342" }, { "@score":"1", "@id":"2262343", "info":{"authors":{"author":[{"@pid":"12/704","text":"Heejin Kim"},{"@pid":"34/8693","text":"Younggwan Kim"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Cluster management framework for autonomic machine learning platform.","venue":"RACS","pages":"128-130","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/KimKH19","doi":"10.1145/3338840.3355691","ee":"https://doi.org/10.1145/3338840.3355691","url":"https://dblp.org/rec/conf/racs/KimKH19"}, "url":"URL#2262343" }, { "@score":"1", "@id":"2262344", "info":{"authors":{"author":[{"@pid":"192/2232","text":"Seoyeon Kim"},{"@pid":"207/8774","text":"Jisu Park"},{"@pid":"227/6285","text":"Jaehyeok Jeong"},{"@pid":"75/6981","text":"Young-Sun Yun"},{"@pid":"24/8145","text":"Seongbae Eun"},{"@pid":"34/8009","text":"Jinman Jung"}]},"title":"Survey of IoT platforms supporting artificial intelligence.","venue":"RACS","pages":"65-66","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/KimPJYEJ19","doi":"10.1145/3338840.3355694","ee":"https://doi.org/10.1145/3338840.3355694","url":"https://dblp.org/rec/conf/racs/KimPJYEJ19"}, "url":"URL#2262344" }, { "@score":"1", "@id":"2262345", "info":{"authors":{"author":[{"@pid":"61/5110","text":"Dongyoun Kim"},{"@pid":"252/8820","text":"Sangwon Shin"},{"@pid":"61/1326","text":"Jinwoo Park"},{"@pid":"93/5851","text":"Sung Shin"}]},"title":"Development of a semantic scene conversion model for image-based localization at night.","venue":"RACS","pages":"107-112","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/KimSPS19","doi":"10.1145/3338840.3355676","ee":"https://doi.org/10.1145/3338840.3355676","url":"https://dblp.org/rec/conf/racs/KimSPS19"}, "url":"URL#2262345" }, { "@score":"1", "@id":"2262346", "info":{"authors":{"author":[{"@pid":"227/6129","text":"Bada Kim"},{"@pid":"227/6237","text":"Taeyeon Won"},{"@pid":"18/6359","text":"Sangmin Park"},{"@pid":"89/2343","text":"Junyoung Heo"}]},"title":"Anomaly detection for deep-learning based license plate recognition in real time video.","venue":"RACS","pages":"123-124","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/KimWPH19","doi":"10.1145/3338840.3355685","ee":"https://doi.org/10.1145/3338840.3355685","url":"https://dblp.org/rec/conf/racs/KimWPH19"}, "url":"URL#2262346" }, { "@score":"1", "@id":"2262347", "info":{"authors":{"author":[{"@pid":"88/663","text":"Chin-Fu Kuo"},{"@pid":"252/8738","text":"Jian-Xing Lin"},{"@pid":"68/2876","text":"Yung-Feng Lu"}]},"title":"Energy-efficient scheduling algorithm for real-time tasks with multiple parallel segments in multiprocessor systems.","venue":"RACS","pages":"14-19","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/KuoLL19","doi":"10.1145/3338840.3355649","ee":"https://doi.org/10.1145/3338840.3355649","url":"https://dblp.org/rec/conf/racs/KuoLL19"}, "url":"URL#2262347" }, { "@score":"1", "@id":"2262348", "info":{"authors":{"author":[{"@pid":"252/8797","text":"Jong Youn Lee"},{"@pid":"252/8752","text":"Jun Young Chang"},{"@pid":"39/14","text":"Eul Gyu Im"}]},"title":"DGA-based malware detection using DNS traffic analysis.","venue":"RACS","pages":"283-288","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LeeCI19","doi":"10.1145/3338840.3355672","ee":"https://doi.org/10.1145/3338840.3355672","url":"https://dblp.org/rec/conf/racs/LeeCI19"}, "url":"URL#2262348" }, { "@score":"1", "@id":"2262349", "info":{"authors":{"author":[{"@pid":"252/8806","text":"Chungyup Lee"},{"@pid":"252/8780","text":"Soohyeon Choi"},{"@pid":"76/6374","text":"Jung-Yeop Kim"},{"@pid":"227/6278","text":"Kwanghee Won"}]},"title":"Instance segmentation in urban scenes using inverse perspective mapping of 3D point clouds and 2D images.","venue":"RACS","pages":"147-152","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LeeCKW19","doi":"10.1145/3338840.3355677","ee":"https://doi.org/10.1145/3338840.3355677","url":"https://dblp.org/rec/conf/racs/LeeCKW19"}, "url":"URL#2262349" }, { "@score":"1", "@id":"2262350", "info":{"authors":{"author":[{"@pid":"252/8824","text":"Seungyeon Lee"},{"@pid":"207/8796","text":"Mhanwoo Heo"},{"@pid":"239/8641","text":"Kicheol Park"},{"@pid":"07/6461","text":"Bongjae Kim"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Enhancing the security of IoT gateway based on the classification of user security-sensitive data.","venue":"RACS","pages":"241-243","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LeeHPKH19","doi":"10.1145/3338840.3355686","ee":"https://doi.org/10.1145/3338840.3355686","url":"https://dblp.org/rec/conf/racs/LeeHPKH19"}, "url":"URL#2262350" }, { "@score":"1", "@id":"2262351", "info":{"authors":{"author":[{"@pid":"177/0978","text":"Yena Lee"},{"@pid":"192/6782","text":"Yongmin Kim"},{"@pid":"252/8824","text":"Seungyeon Lee"},{"@pid":"89/2343","text":"Junyoung Heo"},{"@pid":"35/2218","text":"Jiman Hong"}]},"title":"Machine learning based Android malware classification.","venue":"RACS","pages":"300-302","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LeeKLHH19","doi":"10.1145/3338840.3355693","ee":"https://doi.org/10.1145/3338840.3355693","url":"https://dblp.org/rec/conf/racs/LeeKLHH19"}, "url":"URL#2262351" }, { "@score":"1", "@id":"2262352", "info":{"authors":{"author":[{"@pid":"252/8832","text":"YongJoo Lee"},{"@pid":"35/717","text":"Keon Myung Lee"}]},"title":"Blockchain-based RBAC for user authentication with anonymity.","venue":"RACS","pages":"289-294","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LeeL19","doi":"10.1145/3338840.3355673","ee":"https://doi.org/10.1145/3338840.3355673","url":"https://dblp.org/rec/conf/racs/LeeL19"}, "url":"URL#2262352" }, { "@score":"1", "@id":"2262353", "info":{"authors":{"author":[{"@pid":"64/6025","text":"Wei Li"},{"@pid":"252/8811","text":"Guanxi Shen"},{"@pid":"36/8119","text":"Jinbo Zhang"}]},"title":"An indoor environmental monitoring system for large buildings based on LoRaWAN.","venue":"RACS","pages":"34-38","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LiSZ19","doi":"10.1145/3338840.3355667","ee":"https://doi.org/10.1145/3338840.3355667","url":"https://dblp.org/rec/conf/racs/LiSZ19"}, "url":"URL#2262353" }, { "@score":"1", "@id":"2262354", "info":{"authors":{"author":[{"@pid":"68/2876","text":"Yung-Feng Lu"},{"@pid":"70/3994","text":"Hung-Ming Chen"},{"@pid":"88/663","text":"Chin-Fu Kuo"},{"@pid":"252/8782","text":"Bo-Kai Tseng"},{"@pid":"20/5098","text":"Shih-Chun Chou"}]},"title":"Container-based load balancing for WebRTC applications.","venue":"RACS","pages":"20-26","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/LuCKTC19","doi":"10.1145/3338840.3355655","ee":"https://doi.org/10.1145/3338840.3355655","url":"https://dblp.org/rec/conf/racs/LuCKTC19"}, "url":"URL#2262354" }, { "@score":"1", "@id":"2262355", "info":{"authors":{"author":[{"@pid":"252/8801","text":"Cissoko Moussa"},{"@pid":"99/5971-11","text":"Haibo Zhang 0011"},{"@pid":"252/8781","text":"Hasan Shamim"},{"@pid":"161/9405","text":"Kaijian Liu"}]},"title":"Task offloading strategies based on workload balancing in ultra-dense networks.","venue":"RACS","pages":"217-223","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/MoussaZSL19","doi":"10.1145/3338840.3355665","ee":"https://doi.org/10.1145/3338840.3355665","url":"https://dblp.org/rec/conf/racs/MoussaZSL19"}, "url":"URL#2262355" }, { "@score":"1", "@id":"2262356", "info":{"authors":{"author":[{"@pid":"252/8800","text":"Evariste Ntaryamira"},{"@pid":"188/5414","text":"Cristian Maxim"},{"@pid":"18/2956","text":"Liliana Cucu-Grosjean"}]},"title":"Data consistency and temporal validity under the circular buffer communication paradigm.","venue":"RACS","pages":"51-56","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/NtaryamiraMC19","doi":"10.1145/3338840.3355682","ee":"https://doi.org/10.1145/3338840.3355682","url":"https://dblp.org/rec/conf/racs/NtaryamiraMC19"}, "url":"URL#2262356" }, { "@score":"1", "@id":"2262357", "info":{"authors":{"author":[{"@pid":"227/6031","text":"Ki Sun Park"},{"@pid":"12/3378","text":"Kyoung-Soon Hwang"},{"@pid":"35/717","text":"Keon Myung Lee"},{"@pid":"237/1023","text":"Chan Sik Han"},{"@pid":"73/968","text":"Jin Han"}]},"title":"Machine learning modeling assistance for non-expert developers.","venue":"RACS","pages":"117-122","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ParkHLHH19","doi":"10.1145/3338840.3355680","ee":"https://doi.org/10.1145/3338840.3355680","url":"https://dblp.org/rec/conf/racs/ParkHLHH19"}, "url":"URL#2262357" }, { "@score":"1", "@id":"2262358", "info":{"authors":{"author":[{"@pid":"18/6359","text":"Sangmin Park"},{"@pid":"227/6129","text":"Bada Kim"},{"@pid":"227/6237","text":"Taeyeon Won"},{"@pid":"89/2343","text":"Junyoung Heo"}]},"title":"IoT-based floodgate control system.","venue":"RACS","pages":"61-62","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ParkKWH19","doi":"10.1145/3338840.3355688","ee":"https://doi.org/10.1145/3338840.3355688","url":"https://dblp.org/rec/conf/racs/ParkKWH19"}, "url":"URL#2262358" }, { "@score":"1", "@id":"2262359", "info":{"authors":{"author":[{"@pid":"239/8310","text":"Junho Seo"},{"@pid":"61/5584","text":"Sungwon Lee"},{"@pid":"197/9926","text":"Muhammad Toaha Raza Khan"},{"@pid":"66/2701","text":"Dongkyun Kim"}]},"title":"Adaptive selection of configuration methods in 6LoWPAN based IoUT.","venue":"RACS","pages":"212-216","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/SeoLKK19","doi":"10.1145/3338840.3355657","ee":"https://doi.org/10.1145/3338840.3355657","url":"https://dblp.org/rec/conf/racs/SeoLKK19"}, "url":"URL#2262359" }, { "@score":"1", "@id":"2262360", "info":{"authors":{"author":[{"@pid":"252/8781","text":"Hasan Shamim"},{"@pid":"99/5971-11","text":"Haibo Zhang 0011"},{"@pid":"252/8801","text":"Cissoko Moussa"},{"@pid":"161/9405","text":"Kaijian Liu"}]},"title":"Effective capacity-aware resource allocation for 5G ultra dense network with hybrid access mode.","venue":"RACS","pages":"224-229","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ShamimZML19","doi":"10.1145/3338840.3355666","ee":"https://doi.org/10.1145/3338840.3355666","url":"https://dblp.org/rec/conf/racs/ShamimZML19"}, "url":"URL#2262360" }, { "@score":"1", "@id":"2262361", "info":{"authors":{"author":[{"@pid":"74/3247","text":"Hong Shen"},{"@pid":"252/8761","text":"Yuuki Kaiya"}]},"title":"Distinction of vegetable diseases by image processing.","venue":"RACS","pages":"133-136","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ShenK19","doi":"10.1145/3338840.3355653","ee":"https://doi.org/10.1145/3338840.3355653","url":"https://dblp.org/rec/conf/racs/ShenK19"}, "url":"URL#2262361" }, { "@score":"1", "@id":"2262362", "info":{"authors":{"author":[{"@pid":"63/1414","text":"Chi-Sheng Shih 0001"},{"@pid":"229/6622","text":"Kai-Wei Yang"}]},"title":"Design and implementation of distributed traceability system for smart factories based on blockchain technology.","venue":"RACS","pages":"181-188","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ShihY19","doi":"10.1145/3338840.3355646","ee":"https://doi.org/10.1145/3338840.3355646","url":"https://dblp.org/rec/conf/racs/ShihY19"}, "url":"URL#2262362" }, { "@score":"1", "@id":"2262363", "info":{"authors":{"author":[{"@pid":"252/8820","text":"Sangwon Shin"},{"@pid":"252/8780","text":"Soohyeon Choi"},{"@pid":"227/6278","text":"Kwanghee Won"},{"@pid":"84/775","text":"Sung Y. Shin"}]},"title":"Preprocessed symmetric RSA authentication for wireless body area networks in space.","venue":"RACS","pages":"230-235","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ShinCWS19","doi":"10.1145/3338840.3355675","ee":"https://doi.org/10.1145/3338840.3355675","url":"https://dblp.org/rec/conf/racs/ShinCWS19"}, "url":"URL#2262363" }, { "@score":"1", "@id":"2262364", "info":{"authors":{"author":[{"@pid":"252/8794","text":"Antonin Smid"},{"@pid":"34/7464","text":"Ruolin Wang"},{"@pid":"17/8995","text":"Tomás Cerný"}]},"title":"Case study on data communication in microservice architecture.","venue":"RACS","pages":"261-267","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/SmidWC19","doi":"10.1145/3338840.3355659","ee":"https://doi.org/10.1145/3338840.3355659","url":"https://dblp.org/rec/conf/racs/SmidWC19"}, "url":"URL#2262364" }, { "@score":"1", "@id":"2262365", "info":{"authors":{"author":[{"@pid":"252/8748","text":"Mahsa Shokri Varniab"},{"@pid":"71/4625","text":"Chih-Cheng Hung"},{"@pid":"45/7673","text":"Vahid Khalilzad-Sharghi"}]},"title":"Classification of multiclass datasets using genetic programming.","venue":"RACS","pages":"76-82","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/VarniabHK19","doi":"10.1145/3338840.3355656","ee":"https://doi.org/10.1145/3338840.3355656","url":"https://dblp.org/rec/conf/racs/VarniabHK19"}, "url":"URL#2262365" }, { "@score":"1", "@id":"2262366", "info":{"authors":{"author":[{"@pid":"39/2813","text":"Chuang Wang"},{"@pid":"69/7673","text":"Jiakun Li"},{"@pid":"25/3246-2","text":"Tian Wang 0002"},{"@pid":"172/7638","text":"Peng Shi"},{"@pid":"11/2394","text":"Hichem Snoussi"},{"@pid":"54/3643-2","text":"Xin Su 0002"}]},"title":"Abnormal object detection and recognition in the complex construction site via cloud computing.","venue":"RACS","pages":"71-75","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/WangL0SS019","doi":"10.1145/3338840.3355648","ee":"https://doi.org/10.1145/3338840.3355648","url":"https://dblp.org/rec/conf/racs/WangL0SS019"}, "url":"URL#2262366" }, { "@score":"1", "@id":"2262367", "info":{"authors":{"author":[{"@pid":"227/6237","text":"Taeyeon Won"},{"@pid":"227/6129","text":"Bada Kim"},{"@pid":"18/6359","text":"Sangmin Park"},{"@pid":"89/2343","text":"Junyoung Heo"}]},"title":"An IoT based distortion invariant motion detection using raspberry pi with mean shift algorithm.","venue":"RACS","pages":"63-64","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/WonKPH19","doi":"10.1145/3338840.3355689","ee":"https://doi.org/10.1145/3338840.3355689","url":"https://dblp.org/rec/conf/racs/WonKPH19"}, "url":"URL#2262367" }, { "@score":"1", "@id":"2262368", "info":{"authors":{"author":[{"@pid":"247/9290","text":"Chia-Hsueh Wu"},{"@pid":"252/8818","text":"Chen-Tui Hung"},{"@pid":"53/599","text":"Ya-Shu Chen"}]},"title":"Energy-aware offloading for mobile computing with heterogeneous network.","venue":"RACS","pages":"39-44","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/WuHC19","doi":"10.1145/3338840.3355671","ee":"https://doi.org/10.1145/3338840.3355671","url":"https://dblp.org/rec/conf/racs/WuHC19"}, "url":"URL#2262368" }, { "@score":"1", "@id":"2262369", "info":{"authors":{"author":[{"@pid":"92/1320","text":"Pengfei Wu"},{"@pid":"51/5022-2","text":"Jun Huang 0002"},{"@pid":"252/8788","text":"Longyan Xu"}]},"title":"Energy-efficient power allocation in analogue network coding based multi-hop D2D communication.","venue":"RACS","pages":"200-205","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/WuHX19","doi":"10.1145/3338840.3355651","ee":"https://doi.org/10.1145/3338840.3355651","url":"https://dblp.org/rec/conf/racs/WuHX19"}, "url":"URL#2262369" }, { "@score":"1", "@id":"2262370", "info":{"authors":{"author":[{"@pid":"56/3359","text":"Chin-Hsien Wu"},{"@pid":"252/8759","text":"Po-Ling Lin"},{"@pid":"252/8808","text":"Yu-Hun Hu"},{"@pid":"252/8821","text":"Ming-Yang Du"}]},"title":"A data sanitization method for mobile devices with NAND flash memory.","venue":"RACS","pages":"7-13","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/WuLHD19","doi":"10.1145/3338840.3355639","ee":"https://doi.org/10.1145/3338840.3355639","url":"https://dblp.org/rec/conf/racs/WuLHD19"}, "url":"URL#2262370" }, { "@score":"1", "@id":"2262371", "info":{"authors":{"author":[{"@pid":"11/42","text":"Ling Xia"},{"@pid":"82/5445","text":"Tingting Zhang"},{"@pid":"95/6332-6","text":"Xiaofeng Liu 0006"}]},"title":"Validity of deriving low order photometry parameters from light solid distribution.","venue":"RACS","pages":"143-146","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/XiaZL19","doi":"10.1145/3338840.3355662","ee":"https://doi.org/10.1145/3338840.3355662","url":"https://dblp.org/rec/conf/racs/XiaZL19"}, "url":"URL#2262371" }, { "@score":"1", "@id":"2262372", "info":{"authors":{"author":[{"@pid":"252/8772","text":"Baonan Xiao"},{"@pid":"81/4869","text":"Jianfeng Yang"},{"@pid":"15/3556","text":"Shixiao Wu"},{"@pid":"33/1118","text":"Qing Geng"}]},"title":"Using real-time image enhancement technique to improve prostate capsula detection.","venue":"RACS","pages":"45-50","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/XiaoYWG19","doi":"10.1145/3338840.3355681","ee":"https://doi.org/10.1145/3338840.3355681","url":"https://dblp.org/rec/conf/racs/XiaoYWG19"}, "url":"URL#2262372" }, { "@score":"1", "@id":"2262373", "info":{"authors":{"author":[{"@pid":"36/4658","text":"Gang Yang"},{"@pid":"51/5022-2","text":"Jun Huang 0002"},{"@pid":"252/8788","text":"Longyan Xu"},{"@pid":"252/8795","text":"Yahong Zhai"}]},"title":"Energy scheduling mechanism for intelligent terminal with simultaneous wireless information and power transfer.","venue":"RACS","pages":"194-199","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/YangHXZ19","doi":"10.1145/3338840.3355650","ee":"https://doi.org/10.1145/3338840.3355650","url":"https://dblp.org/rec/conf/racs/YangHXZ19"}, "url":"URL#2262373" }, { "@score":"1", "@id":"2262374", "info":{"authors":{"author":[{"@pid":"244/9322","text":"Qinglin Yang"},{"@pid":"160/6200","text":"Xiaofei Luo"},{"@pid":"83/6353-17","text":"Peng Li 0017"},{"@pid":"48/366","text":"Toshiaki Miyazaki"},{"@pid":"47/5358-3","text":"Xiaoyan Wang 0003"}]},"title":"Computation offloading for fast CNN inference in edge computing.","venue":"RACS","pages":"101-106","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/YangLLMW19","doi":"10.1145/3338840.3355669","ee":"https://doi.org/10.1145/3338840.3355669","url":"https://dblp.org/rec/conf/racs/YangLLMW19"}, "url":"URL#2262374" }, { "@score":"1", "@id":"2262375", "info":{"authors":{"author":[{"@pid":"92/428","text":"Geng Zhang"},{"@pid":"23/5537-5","text":"Jian Hou 0005"},{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"77/4673","text":"Yanan Wang"},{"@pid":"91/2961","text":"Jianguo Zhou"}]},"title":"Vulnerability analysis and optimization of power communication network.","venue":"RACS","pages":"268-275","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZhangHWWZ19","doi":"10.1145/3338840.3355643","ee":"https://doi.org/10.1145/3338840.3355643","url":"https://dblp.org/rec/conf/racs/ZhangHWWZ19"}, "url":"URL#2262375" }, { "@score":"1", "@id":"2262376", "info":{"authors":{"author":[{"@pid":"06/6785-93","text":"Yang Zhang 0093"},{"@pid":"18/5576","text":"Jiacheng Li"},{"@pid":"180/5226","text":"Jiaoman Du"},{"@pid":"13/7007","text":"Lei Li"}]},"title":"Time-dependent theme park routing problem.","venue":"RACS","pages":"244-249","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZhangLDL19","doi":"10.1145/3338840.3355644","ee":"https://doi.org/10.1145/3338840.3355644","url":"https://dblp.org/rec/conf/racs/ZhangLDL19"}, "url":"URL#2262376" }, { "@score":"1", "@id":"2262377", "info":{"authors":{"author":[{"@pid":"82/5445","text":"Tingting Zhang"},{"@pid":"252/8766","text":"Guimiao Liu"},{"@pid":"11/42","text":"Ling Xia"},{"@pid":"95/6332-6","text":"Xiaofeng Liu 0006"}]},"title":"Human evaluation of virtual and real-world distance.","venue":"RACS","pages":"91-95","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZhangLXL19","doi":"10.1145/3338840.3355664","ee":"https://doi.org/10.1145/3338840.3355664","url":"https://dblp.org/rec/conf/racs/ZhangLXL19"}, "url":"URL#2262377" }, { "@score":"1", "@id":"2262378", "info":{"authors":{"author":[{"@pid":"60/2536","text":"Rui Zhang"},{"@pid":"99/3847","text":"Jun Zhou"},{"@pid":"115/6013","text":"Lixiao Feng"},{"@pid":"32/32","text":"Wei Ma"}]},"title":"Study of variable liquid fertilization control system based on fuzzy PID control.","venue":"RACS","pages":"67-70","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZhangZFM19","doi":"10.1145/3338840.3355642","ee":"https://doi.org/10.1145/3338840.3355642","url":"https://dblp.org/rec/conf/racs/ZhangZFM19"}, "url":"URL#2262378" }, { "@score":"1", "@id":"2262379", "info":{"authors":{"author":[{"@pid":"252/8809","text":"Zhengze Zhu"},{"@pid":"11/6532","text":"Haiying Zhou"},{"@pid":"87/1103","text":"Kun Mean Hou"},{"@pid":"96/6879","text":"Kui Zhou"},{"@pid":"202/6280","text":"Sishan Wang"},{"@pid":"252/8746","text":"Jianping Lan"},{"@pid":"252/8770","text":"Jiayuan Gong"},{"@pid":"252/8760","text":"Dong Bi"}]},"title":"Modeling and control method of connected and autonomous vehicles(CAVs) in urban traffic network based on PC algorithm.","venue":"RACS","pages":"83-90","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZhuZHZWLGB19","doi":"10.1145/3338840.3355663","ee":"https://doi.org/10.1145/3338840.3355663","url":"https://dblp.org/rec/conf/racs/ZhuZHZWLGB19"}, "url":"URL#2262379" }, { "@score":"1", "@id":"2262380", "info":{"authors":{"author":[{"@pid":"02/7406","text":"Chengming Zou"},{"@pid":"252/8758","text":"Fanchao Zhao"},{"@pid":"51/4462","text":"Yi Xie"},{"@pid":"11/6532","text":"Haiying Zhou"},{"@pid":"36/2844","text":"Jun Qin"}]},"title":"Live migration in Greenplum database based on SDN via improved gray wolf optimization algorithm.","venue":"RACS","pages":"153-160","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/racs/ZouZXZQ19","doi":"10.1145/3338840.3355640","ee":"https://doi.org/10.1145/3338840.3355640","url":"https://dblp.org/rec/conf/racs/ZouZXZQ19"}, "url":"URL#2262380" }, { "@score":"1", "@id":"2296834", "info":{"authors":{"author":[{"@pid":"71/4625","text":"Chih-Cheng Hung"},{"@pid":"07/1671","text":"Qianbin Chen"},{"@pid":"80/3135","text":"Xianzhong Xie"},{"@pid":"89/6036","text":"Christian Esposito 0001"},{"@pid":"51/5022-2","text":"Jun Huang 0002"},{"@pid":"41/6773","text":"Juw Won Park"},{"@pid":"20/772","text":"Qinghua Zhang"}]},"title":"Proceedings of the Conference on Research in Adaptive and Convergent Systems, RACS 2019, Chongqing, China, September 24-27, 2019.","venue":"RACS","publisher":"ACM","year":"2019","type":"Editorship","key":"conf/racs/2019","doi":"10.1145/3338840","ee":"https://doi.org/10.1145/3338840","url":"https://dblp.org/rec/conf/racs/2019"}, "url":"URL#2296834" } ] } } } )