SEDE 2019:Keyword Index

KeywordPapers
A
AForgeUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
AForge.NETUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
AndroidEvaluation of Mobile Augmented Reality Application for Building Evacuation
Android AppCloud Based Framework to Integrate Map, GPS, and Android Apps
Architectural decayOn Architectural Decay Prediction and Detection in Real-Time Software Systems
Architectural Rationale DocumentationDocumenting architectural rationale using source code annotations: An exploratory study
architectural smellOn Architectural Decay Prediction and Detection in Real-Time Software Systems
architectural violationOn Architectural Decay Prediction and Detection in Real-Time Software Systems
architecture conformanceOn Architectural Decay Prediction and Detection in Real-Time Software Systems
Augmented RealityEvaluation of Mobile Augmented Reality Application for Building Evacuation
B
Bayesian algorithmCyber Threat Discovery from Dark Web
Big DataHuman-Centric Situational Awareness and Big Data Visualization
Vertical Data Processing for Mining Big Data: A Predicate Tree Approach
blob detectionUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Boarder DetectionUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Boolean operationsVertical Data Processing for Mining Big Data: A Predicate Tree Approach
Bradley Local ThresholdingUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Building EvacuationEvaluation of Mobile Augmented Reality Application for Building Evacuation
C
chin tuck against resistanceDesign and Development of the CTAR All-Star
Cloud ComputingHomomorphic Encryption and Data Security in the Cloud
Cloud Based Framework to Integrate Map, GPS, and Android Apps
clustering/grouping algorithmCloud Based Framework to Integrate Map, GPS, and Android Apps
code decayOn Architectural Decay Prediction and Detection in Real-Time Software Systems
Creational PatternsCreational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics
CryptographyHomomorphic Encryption and Data Security in the Cloud
Cyber AnalyticCyber Threat Discovery from Dark Web
cyber threat intelligenceCyber Threat Discovery from Dark Web
D
Data ClassificationSocio-Analyzer: A Sentiment Analysis Using Social Media Data
Data MiningVertical Data Processing for Mining Big Data: A Predicate Tree Approach
data visualizationHuman-Centric Situational Awareness and Big Data Visualization
Deep Web or DarknetCyber Threat Discovery from Dark Web
defect analysisAdaptation of Orthogonal Defect Classification for Mobile Applications
defect classificationAdaptation of Orthogonal Defect Classification for Mobile Applications
Defect density analysisSoftware Defect Density Analysis
Defect density predictionSoftware Defect Density Analysis
design patternsCreational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics
driftOn Architectural Decay Prediction and Detection in Real-Time Software Systems
dynamic programmingEnvironmental extreme events detection: A survey
DysphagiaDesign and Development of the CTAR All-Star
E
edge detectionUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
educational gameQuack: A Youth-Targeted Game for English Comprehension
Educational ModulesMotivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List
EncryptionHomomorphic Encryption and Data Security in the Cloud
environmentA lightweight environment for 2D visual applications
ErosionOn Architectural Decay Prediction and Detection in Real-Time Software Systems
Event ManagementARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
event schedulingARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
Exploit TypeCyber Threat Discovery from Dark Web
Extreme Value TheoryEnvironmental extreme events detection: A survey
F
FestivalARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
Finantial metricsROI Estimation in a Scrum Project: A case study
free-ridingA Peer-to-Peer Reputation Evaluation System
full stackARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
fully homomorphicHomomorphic Encryption and Data Security in the Cloud
Fuzzy LogicA Peer-to-Peer Reputation Evaluation System
G
game theme-based learningMotivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List
GitHubOpen Source Software Survivability Prediction Using Multi Layer Perceptron
GoogleUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
graphicsA lightweight environment for 2D visual applications
GTIMotivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List
H
hacker forumsCyber Threat Discovery from Dark Web
Human Computer InteractionComparison of University Course Search Interfaces
Quack: A Youth-Targeted Game for English Comprehension
Human-Centric ApproachHuman-Centric Situational Awareness and Big Data Visualization
I
Immersive EnvironmentHuman-Centric Situational Awareness and Big Data Visualization
information visualizationA lightweight environment for 2D visual applications
ISBSGSoftware Defect Density Analysis
L
libraryA lightweight environment for 2D visual applications
M
machine learningSocio-Analyzer: A Sentiment Analysis Using Social Media Data
Open Source Software Survivability Prediction Using Multi Layer Perceptron
Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics
machine learning classificationCyber Threat Discovery from Dark Web
magicUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Magic The GatheringUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
mapCloud Based Framework to Integrate Map, GPS, and Android Apps
MicroserviceARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
MLPOpen Source Software Survivability Prediction Using Multi Layer Perceptron
mobile applicationEvaluation of Mobile Augmented Reality Application for Building Evacuation
Adaptation of Orthogonal Defect Classification for Mobile Applications
O
OCRUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Open Source SoftwareOpen Source Software Survivability Prediction Using Multi Layer Perceptron
Optical Character RecognitionUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
Orthogonal Defect Classification (ODC)Adaptation of Orthogonal Defect Classification for Mobile Applications
OutliersEnvironmental extreme events detection: A survey
P
P2P networkA Peer-to-Peer Reputation Evaluation System
partially homomorphicHomomorphic Encryption and Data Security in the Cloud
payment processingARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
portalsARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
PostgresUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
PostgreSQLUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
predicate treesVertical Data Processing for Mining Big Data: A Predicate Tree Approach
Project softwareROI Estimation in a Scrum Project: A case study
Q
Quadrilateral TransformationUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
query approximationScalable Correlated Sampling for Join Query Estimations on Big Data
query size estimationScalable Correlated Sampling for Join Query Estimations on Big Data
R
RehabilitationDesign and Development of the CTAR All-Star
reputation systemA Peer-to-Peer Reputation Evaluation System
ROIROI Estimation in a Scrum Project: A case study
S
samplingScalable Correlated Sampling for Join Query Estimations on Big Data
ScrumROI Estimation in a Scrum Project: A case study
search engineComparison of University Course Search Interfaces
Sentiment AnalysisSocio-Analyzer: A Sentiment Analysis Using Social Media Data
Situational AwarenessHuman-Centric Situational Awareness and Big Data Visualization
sliding windowEnvironmental extreme events detection: A survey
SMQIIMotivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List
software architectureOn Architectural Decay Prediction and Detection in Real-Time Software Systems
Documenting architectural rationale using source code annotations: An exploratory study
software complexityOpen Source Software Survivability Prediction Using Multi Layer Perceptron
Software EngineeringQuack: A Youth-Targeted Game for English Comprehension
somewhat homomorphicHomomorphic Encryption and Data Security in the Cloud
Source Code AnnotationsDocumenting architectural rationale using source code annotations: An exploratory study
Speed GainVertical Data Processing for Mining Big Data: A Predicate Tree Approach
T
TesseractUtilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards
thresholdEnvironmental extreme events detection: A survey
Tree-based AlgorithmCyber Threat Discovery from Dark Web
U
User Interface (UI)Comparison of University Course Search Interfaces
V
vertical processingVertical Data Processing for Mining Big Data: A Predicate Tree Approach
Virtual RealityMotivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List
Human-Centric Situational Awareness and Big Data Visualization
VuforiaEvaluation of Mobile Augmented Reality Application for Building Evacuation
W
web applicationARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems
web designComparison of University Course Search Interfaces