default search action
7. SoICT 2016: Ho Chi Minh City, Vietnam
- Huynh Quyet Thang, Nguyen Manh Hung:
Proceedings of the Seventh Symposium on Information and Communication Technology, SoICT 2016, Ho Chi Minh City, Vietnam, December 8-9, 2016. ACM 2016, ISBN 978-1-4503-4815-7
Tutorials
- Abdelhamid Mellouk:
New provider services for convergence technologies based on quality of experience and quality of service paradigms. 1
Invited talks
- Eryk Dutkiewicz:
Radio spectrum research for emerging IoT and 5G networks: applications to smart buildings and smart cities. 2 - Sungyoung Lee, Maqbool Hussain:
Smart CDSS and authoring tool. 3-4 - Tam Vu:
Pediatric mobile healthcare: opportunities, challenges, and solutions. 5 - André Langevin:
Quantitative approaches for road maintenance. 6
AI and big data
- Nguyen Bui, Bay Vo, Van-Nam Huynh, Chun-Wei Lin, Loan T. T. Nguyen:
Mining closed high utility itemsets in uncertain databases. 7-14 - Sergey D. Dvoenko, Denis O. Pshenichny:
A recovering of violated metric in machine learning. 15-21 - Van The Huy, Duong Tuan Anh:
An efficient implementation of anytime k-medoids clustering for time series under dynamic time warping. 22-29 - Duc-Hau Le, Dai-Phong Nguyen, Anh-Minh Dao:
Significant path selection improves the prediction of novel drug-target interactions. 30-35 - Xuan Tuan Le, Marc Bui, Jean Marie Cohen:
A computational paradigm for the simulation of complex epidemic diseases. 36-43 - Nguyen Le Nguyen, Nguyen Xuan Toan, Dinh Dien:
Vietnamese plagiarism detection method. 44-51 - Thai-Le Luong, Quoc-Tuan Truong, Hai-Trieu Dang, Xuan-Hieu Phan:
Domain identification for intention posts on online social media. 52-57 - Luong Van Do, Duong Tuan Anh:
Some improvements for time series subsequence join based on pearson correlation coefficients. 58-65 - Hy Nguyen, Tung Le, Viet-Thang Luong, Minh-Quoc Nghiem, Dien Dinh:
The combination of similarity measures for extractive summarization. 66-72 - Van Son Nguyen, Quang-Dung Pham, Minh Hoàng Hà:
Improving the connectivity of a bus system: a case study of Ho Chi Minh city. 73-78 - Vinh-Tiep Nguyen, Minh-Triet Tran, Thanh Duc Ngo, Duy-Dinh Le, Duc Anh Duong:
Searching a specific person in a specific location using deep features. 79-86 - Quang-Trung Nguyen, The Duy Bui:
MapReduce based for speech classification. 87-91 - Karim Sayadi, Quang Vu Bui, Marc Bui:
Distributed implementation of the latent Dirichlet allocation on Spark. 92-98 - Van-Dai Ta, Chuan-Ming Liu:
Stock market analysis using clustering techniques: the impact of foreign ownership on stock volatility in Vietnam. 99-106 - Xuan Hien Ta, Benoit Gaudou, Dominique Longin, Edouard Amouroux, Tuong Vinh Ho:
Emotion in the evacuation process: formal model and simulation. 107-114 - Tran Khanh Hiep, Nguyen Minh Duc, Quoc Trung Bui:
Local search approach for the pairwise constrained clustering problem. 115-122 - Nhi-Thao Tran, Viet-Thang Luong, Ngan Luu-Thuy Nguyen, Minh-Quoc Nghiem:
Effective attention-based neural architectures for sentence compression with bidirectional long short-term memory. 123-130 - Tran Van Long:
iRadviz: an inversion radviz for class visualization of multivariate data visualization. 131-138 - Tuyen Manh Hua, Trong Khanh Nguyen, Hai Van Dinh Thi, Thi Ngoc Anh Nguyen:
Towards a decision support system for municipal waste collection by integrating geographical information system map, smart devices and agent-based model. 139-146 - Ly Vu, Dong Van Tra, Quang Uy Nguyen:
Learning from imbalanced data for encrypted traffic identification problem. 147-152 - Haiying Xia, Kaiyue Jin, Frank Jiang, Quang-Anh Tran:
A novel method of cervical cell image segmentation via region merging and SLIC. 153-158 - Ngo Xuan Bach, Vu Thanh Hai, Tu Minh Phuong:
Cross-domain sentiment classification with word embeddings and canonical correlation analysis. 159-166 - Zhosan Yulia, Olga Krasotkina, Vadim Mottl:
Sparse logistic regression with supervised selectivity for predictors selection in credit scoring. 167-172
Information networks and communication systems
- Duy An Ha, Kha Tho Nguyen, John K. Zao:
Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol. 173-179 - Hai Dang Thanh, Thi Tam Nguyen, Le Hoang Son, Vinh Trong Le:
A novel energy-balanced unequal fuzzy clustering algorithm for 3D wireless sensor networks. 180-186 - Van Ho, Ioanis Nikolaidis:
Modeling time-varying topologies of duty-cycled wireless sensor networks. 187-194 - Minh Duc Le, The De Vu, Duc Hieu Nguyen, Tien Hai Ho, Duc Hai Nguyen, Tran Vu Pham:
KELI: a key-value-with-links in-memory store for realtime applications. 195-201 - Quan Le Trung:
An open-source framework for integration of wireless ad-hoc drivers into Linux kernel. 202-209 - Trong-Minh Hoang, Tuan-Nguyen Lang, Thi Nguyen:
Analyzing the multi hop connectivity performance in Brownian underwater wireless sensor networks. 210-215 - Thi-Thu-Trang Ngo, Hieu T. Bui, Nhan D. Nguyen:
A simple performance analysis of IM-DD OFDM WDM systems in long range PON application. 216-221 - Thi-Thuy-Lien Nguyen, Tuan-Minh Pham, Huynh Thi Thanh Binh:
Adaptive multipath routing for network functions virtualization. 222-228 - Dinh-Chien Nguyen, Thai Son Nguyen, Fang Rong Hsu:
An algorithm for DNA sequence hiding in H.264/AVC video. 229-234 - Nguyen Thi Thanh Nga, Nguyen Kim Khanh, Son Ngo Hong:
Entropy correlation and its impact on routing with compression in wireless sensor network. 235-242 - Thanh Nguyen-Duc, Nguyen Quang-Hung, Nam Thoai:
BFD-NN: best fit decreasing-neural network for online energy-aware virtual machine allocation problems. 243-250 - Cuong Pham, Dat Tang, Ken-ichi Chinen, Razvan Beuran:
CyRIS: a cyber range instantiation system for facilitating security training. 251-258 - Toan Phan Thanh, Loc Nguyen The, Cuong Nguyen Doan:
A robus and effective MODE algorithm for workflow scheduling in cloud enveronment. 259-264 - Truong Thao Nguyen, Ikki Fujiwara, Michihiro Koibuchi:
A diagonal cabling approach to data center and HPC systems. 265-271 - Van Tong, Giang Nguyen:
A method for detecting DGA botnet based on semantic and cluster analysis. 272-277 - Michel Toulouse, Hai Le, Cao Vien Phung, Denis Hock:
Robust consensus-based network intrusion detection in presence of Byzantine attacks. 278-285 - Huy Vu, Tien D. Nguyen, Chi Q. Nguyen, Van K. Nguyen:
An efficient geographic algorithm for routing in the proximity of a large hole in wireless sensor networks. 286-293
Human-computer interaction
- Pham Cong Thang, Andrei V. Kopylov:
Parametric procedures for image denoising with flexible prior model. 294-301 - Dao Duy Son, Dinh Viet Sang, Huynh Thi Thanh Binh, Nguyen Thi Thuy:
Label associated dictionary pair learning for face recognition. 302-307 - Dang N. H. Thanh, Dinh Viet Sang, Sergey D. Dvoenko:
Colour image denoising based on a combined model. 308-315 - Atsushi Kojima, Katunobu Itou:
Prominence detection for presentation training system. 316-322 - Hoa M. Le, Thi-Oanh Nguyen, Dung Ngo-Tien:
Fully automated multi-label image annotation by convolutional neural network and adaptive thresholding. 323-330 - Van Sinh Nguyen, Ha Manh Tran, Nguyen Tien Thanh:
Filling holes on the surface of 3D point clouds based on tangent plane of hole boundary points. 331-338 - Viet Anh Nguyen, Thanh Ha Le, Thuy Thi Nguyen:
Single camera based fall detection using motion and human shape features. 339-344 - Thuy Thi Thanh Pham, Thi-Lan Le, Trung-Kien Dao:
Fusion of wifi and visual signals for person tracking. 345-351 - Hiroshi Suzuki, Reiko Hishiyama:
An analysis of expert knowledge transmission using machine translation services. 352-359 - Hoang Thien Van, Giang Van Vu, Thai Hoang Le:
Fingerprint enhancement for direct grayscale minutiae extraction by combining MFRAT and Gabor filters. 360-367 - Duc-Hoang Vo, Huu-Hung Huynh, Thanh-Nghia Nguyen, Jean Meunier:
Automatic hand gesture segmentation for recognition of Vietnamese sign language. 368-373 - Nang Hung Van Nguyen, Minh Tuan Pham, Phuc Hao Do:
Marker selection for human activity recognition using combination of conformal geometric algebra and principal component regression. 374-379
Software engineering and applied computing
- Sufyan Basri, Nazri Kama, Faizura Haneem, Saiful Adli Ismail:
Predicting effort for requirement changes during software development. 380-387 - Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
An efficient instance hiding scheme. 388-395 - Thi-Lan Ngo, Quang-Vu Duong, Son Bao Pham, Xuan-Hieu Phan:
Speech act classification in Vietnamese Utterance and its application in smart mobile voice interaction. 396-402 - Linh Manh Pham, Truong-Thang Nguyen:
AutoBot: a versatile platform for management of legacy applications in the cloud. 403-410 - Masashi Takemoto, Ryota Suzuki, Katsuhiko Umeno, Masayuki Yashiro, Tetsuya Ryuchi, Kohta Ohshima, Naoya Kitagawa, Hironori Nakajo:
Design of real-time advanced lens free imager. 411-416 - Giang Son Tran, Thi Phuong Nghiem, Tuong Vinh Ho, Chi Mai Luong:
Extended process scheduler for improving user experience in multi-core mobile systems. 417-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.