Accepted Posters of womENcourage 2016

 

Author(s) Title
Ahd Aljarf, Saad Amin, John Filippas and James Shuttelworth

Detection System for Grey and Colour Images Based on Extracting Features of Difference Image and Renormalized Histogram
(View abstract)

Shada Alsalamah, Abeer Alfutamani, Lamia Alashaikh, Ghada Aldayel, Maha Alqahtanni and Shaden Alsabti

"Watch" my Health
(View abstract)

 

Caroline Haigh

Implementation and analysis of deep competitive neural networks
(View abstract)

Tzanina Saveta, Irini Fundulaki and Axel-Cyrille Ngonga Ngomo

Benchmarking Linking and Versioning Systems for Big Data
(View abstract)

Dolça Tellols, Karem Samsó, Inmaculada Rodríguez and Anna Puig

Cultural Probes for the Gamification of Energy Awareness
(View abstract)

Nisha Panwar

Peripheral Authentication for Autonomous Vehicles
(View abstract)

Ileana Driva

Maritime Cyber Security for Navigation and Control Systems
(View abstract)

Eirini Aikaterini Degkleri, Antonios A. Chariton, Panagiotis Ilia, Panagiotis Papadopoulos and Evangelos P. Markatos

Leveraging DNS for timely SSL Certificate Revocation
(View abstract)

Rachid Guerraoui and Mahsa Taziki

A User-aware Clicking Platform for Recommenders
(View abstract)

Tereza Parilová

Dyslexia Assistive Tool for Users Speaking Czech
(View abstract)

Elena de La Guía and Maria-Dolores Lozano

Digitalizing Real Environments to Improve Learning
(View abstract)

Ananya Gupta

Multidimensional Big Data Classification Using Decision Trees and Neural Networks

(View abstract)

Laura Espínola, Daniel Franco and Emilio Luque

Improving MPI Communications in Cloud
(View abstract)

Anitta Patience Namanya

Malicious PE Static Scoring method using Evidence Combinational Theory with Fuzzy Hashing.
(View abstract)

Cecilia Jaramillo, Dolores Rexachs, Emilo Luque and Francisco Epelde

Nosocomial infection simulator using ABMS techniques
(View abstract)

Tayyaba Nafees, Natalie Coull, Ian Ferguson and Adam Sampson

Bridging the Void between Software Engineers and Security Experts
(View abstract)

Eva Papadogiannaki and Sotiris Ioannidis

An Efficient Scheduling Approach for Concurrent Packet Processing Applications on Heterogeneous Systems
(View abstract)

Mina Rezaei, Haojin Yang and Christoph Meinel

Brain Abnormality Detection with Deep Convolutional Neural Network
(View abstract)

Fayiq Alghamdi

Women in computing in Saudi Arabia
(View abstract)

Sarnali Basak

Modelling Hemispheric Interactions: Explaining
IQ Differences Between The Sexes
(View abstract)

Jin Cui and Fabrice Valois

Simba: Similar-evolution Based Data Aggregation in Wireless Sensor Networks
(View abstract)

Tanja Daub

Using Practical Reasoning to Increase Satisfaction with Group Decisions - A Case Study

Soukaina Cherkaoui, Hervé Rivano and Razvan Stanica

Evaluation and optimization of LTE-A Random Access Channel capacity for M2M communications
(View abstract)

Danuta Sorina Chisca, Mohamed Siala, Gilles Simonin and Barry O'Sullivan

Popular Matching: A Constraint Programming Approach
(View abstract)

Janine Breßler

Humanoid robots in the context of assisted living for the elderly.
(View abstract)

Pamela Lins Bezerra and Julie McCann

Energy Neutral Operation: An energy efficient methodology for wireless sensor networks
(View abstract)

Ana-Maria Sutii, Tom Verhoeff and Mark Van Den Brand

Metamodel-independent modularisation of models with MetaMod
(View abstract)

Agata Mosinska-Domanska, Raphael Sznitman and Pascal Fua

Active Learning for Delineation of Curvilinear Structures
(View abstract)

Argyro Avgoustaki, Giorgos Flouris, Irini Fundulaki and Dimitris Plexousakis

Provenance Management for Evolving RDF Datasets
(View abstract)

Webdesign: Paul Wiesinger ( paul.wiesinger /\t jku.at )
Suggesions or questions can be submitted via this Google-Form.