


default search action
2. CSCESM 2015: Lodz, Poland
- Second International Conference on Computer Science, Computer Engineering, and Social Media, CSCESM 2015, Lodz, Poland, September 21-23, 2015. IEEE 2015, ISBN 978-1-4799-1790-7

- Irmeli Makitalo, Janne Tuominen, Riina Timonen, Ilkka Tikanmaki:

Social media guidelines for maritime transport crises situations in the EU area. 1-6 - Johannes Schick

, Martin Kuboschek, Wolfram-Manfred Lippe:
Modeling communicational and informational content in Facebook with context specific methods. 7-12 - Antti Miettinen, Jani Nousiainen, Jyri Rajamäki, Juha S. Knuuttila:

The usage of social media in crisis communication. 13-18 - Wojciech Wieczorek

, Arkadiusz Nowakowski
:
Grammatical inference for the construction of opening books. 19-22 - Tae-Hak Kim, Seong-Jin Kim:

A study on facility maintenance information composition and sophisticated technology utilization measures. 23-26 - Yusuke Kawakami, Tetsuo Hattori, Yoshiro Imai, Yo Horikawa, Haruna Matsushita, R. P. C. Janaka Rajapakse

:
Automated color image arrangement method for multiple-peak image. 27-30 - Jussi Simola

, Jyri Rajamäki:
How a real-time video solution can affect to the level of preparedness in situation centers. 31-36 - Sami Savolainen, Marika Ridell, Marko Lehtonen, Paresh Rathod:

eGuard. 37-42 - Shoug Alfadhli, Asmaa Alsumait:

Fun Academic Cloud Computing. 43-48 - Jonathan Dunne, David Malone

, Jason Flood:
Social testing: A framework to support adoption of continuous delivery by small medium enterprises. 49-54 - Nikos Dimokas

, Kostas Kalogirou, Pavlos Spanidis, Evangelos Bekiaris:
Building adaptive user interface using cloud computing. 55-60 - Christopher Ruff, Florian Maier, Tobias Muller, Holger Kett:

Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises. 61-66 - Andrea Horch

, Holger Kett, Anette Weisbecker:
Extracting product unit attributes from product offers by using an ontology. 67-71 - Seong-Jin Kim, Tae-Hak Kim:

A study on the integrated construction cost management method with reflection of the characteristics of public construction works in South Korea. 72-75 - Kaiyu Wan, Vangalur S. Alagar:

Service integration in the Internet of Things. 76-82 - Marcin Mironczuk

:
The cascading knowledge discovery in databases process in the information system development. 83-89 - Rauno Pirinen, Jyri Rajamäki:

Mechanism of critical and resilient digital services for design theory. 90-95 - Abdullah H. Alsharif

, Nada Y. Philip:
A framework for smoking cessation in the Kingdom Of Saudi Arabia using smart mobile phone technologies (Smoke Mind). 96-102 - Paresh Rathod, Viljami Julkunen, Tero Kaisti, Janne Nissila:

Automatic acceptance testing of the web application security with ITU-T X.805 framework. 103-108 - Geonlyang Kim, Yong-Sung Jeon, Jeong-Nyeo Kim:

The Secure Urgent Situation Propagation System using the Mobile Security Solution. 109-114 - Kihyun Kim, Taeson Yoon:

Analysis and solutions to publicize Gonu. 115-123 - Shuting Hou:

An algorithm of calligraphy beautification based on improved velocity and width model. 124-127 - Jyri Rajamäki, Juha S. Knuuttila, Harri Ruoslahti, Pasi Patama, Jouni Viitanen:

Building trust between citizens and their governments. 128-133 - Ramamoorthy Luxman, Xiao Liu:

Implementation of back-stepping integral controller for a gesture driven quad-copter with human detection and auto follow feature. 134-138 - Kihyun Kim:

Random number visualization using the TRNG. 139-142 - Johannes Harungguan Sianipar, Christoph Meinel:

A verification mechanism for cloud brokerage system. 143-148 - Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim:

Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval. 149-152 - Anne Huotari, Ilkka Tikanmaki:

An online training for the EU Common Information Sharing Environment. 153-156 - Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki:

The real time picture sharing in the cloud service. 157-162 - Kuldeep Singh, Amanat Boparai, Vrinda Handa, Sudesh Rani

:
Performance analysis of security attacks and improvements of routing protocols in MANET. 163-169 - Mohammed Alotaibi

, Islam Choudhury:
A social robotics children diabetes management and educational system for Saudi Arabia: System architecture. 170-174 - Sulaiman Al Sheibani:

Internet addiction: A structured literature review and future research directions. 175-181 - Mabruk Fekihal, Ibrahim Jaluta, Dinesh Kumar Saini

:
TB±tree: Index structure for Information Retrieval Systems. 182-186 - Laura Tarkkanen, Mari Aro:

Scenario work in international development project. 187-191 - Laura Tarkkanen, Mari Aro:

Using scenarios to showcase how RPAS can be implemented in border surveillance. 192-197 - Riku Leppanen:

Enhancing situation awareness through real-time video. 198-203 - Kaci Bourdache, Tina El-Nemr:

Use of Remotely Piloted Aircraft Systems in Arctic and comparable extreme environments in civil security scenarios. 204-208 - Manel Slokom, Raouia Ayachi:

Towards a new possibilistic collaborative filtering approach. 209-216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














