


default search action
46th COMPSAC 2022: Los Alamitos, CA, USA
- Hong Va Leong, Sahra Sedigh Sarvestani, Yuuichi Teranishi, Alfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey, Ji-Jiang Yang, Hossain Shahriar:
46th IEEE Annual Computers, Software, and Applications Conferenc, COMPSAC 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-8810-5 - Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the Standing Committee Vice Chairs. xl - Hong Va Leong, Sahra Sedigh Sarvestani
, Yuuichi Teranishi:
Message from the 2022 Program Chairs-in-Chief. xl - Sorel Reisman:
Welcome - from Sorel Reisman COMPSAC Standing Committee Chair. xl - Yiwei Fang, Guan Wang, Ruilin Zeng, Xiaoyu Wang, Hai-Bao Chen:
Automatic Monitoring System for Engines Motion Attitude Based on Video Image Detection. 1-7 - Alfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey
, Ji-Jiang Yang:
IEEE COMPSAC 2022 Co-Located Workshops Summary. 1-3 - Lili Xiao, Huibiao Zhu, Mengda He, Shengchao Qin
:
Algebraic Semantics for C++11 Memory Model. 1-6 - Wook-Sung Yoo, Hwapyeong Song, Hyunduck Kim:
Collaborative Research on Rapid Periodontitis Test. 1-2 - Xiao Li, Xiao Chen, Dongfei Wang, Zhijun Guo, Kun Niu:
Deep Speaker Embedding with Multi-Part Information Aggregation in Frequency-Time Domain for ASV. 8-13 - Yuki Miyashita, Tomoki Yamauchi
, Toshiharu Sugawara:
Distributed and Asynchronous Planning and Execution for Multi-agent Systems through Short-Sighted Conflict Resolution. 14-23 - Ji-Il Park, Minseong Choi, Seungho Han, YeongSeok Lee, Jinwoo Cho, Hyoseo Choi, Minsu Cho
, Minyoung Lee, Kyung-Soo Kim:
Development of ROS-based Small Unmanned Platform for Acquiring Autonomous Driving Dataset in Various Places and Weather Conditions. 24-31 - Gusseppe Bravo Rocca, Peini Liu, Jordi Guitart, Ajay Dholakia, David Ellison, Miroslav Hodak:
Human-in-the-loop online multi-agent approach to increase trustworthiness in ML models through trust scores and data augmentation. 32-37 - Yu Wang, Fang Liu
:
Efficient Reinforcement Learning from Demonstration Using Local Ensemble and Reparameterization with Split and Merge of Expert Policies. 38-47 - Carlo Vitucci
, Daniel Sundmark, Marcus Jägemar, Jakob Danielsson, Alf Larsson
, Thomas Nolte:
A Reliability-oriented Faults Taxonomy and a Recovery-oriented Methodological Approach for Systems Resilience. 48-55 - Yintan Ai, Yajun Cui, Zhenyu Liu, Xiaomin Zhang, Hua Li, Xianrong Wang:
Integrated Construction of Service Function Chain and Business System Based on Colored Petri Net. 56-61 - Francesco Terrosi
, Andrea Ceccarelli
, Andrea Bondavalli
:
Failure modes and failure mitigation in GPGPUs: a reference model and its application. 62-72 - Holland Schutte, Chase Phelps, Aniruddha Marathe
, Tanzima Z. Islam:
LIBNVCD: An Extendable and User-friendly Multi-GPU Performance Measurement Tool. 73-82 - Rim Ben Fekih, Mariam Lahami
, Mohamed Jmaiel, Ahmed Ben Ali, Philippe Genestier:
Towards Model checking approach for Smart contract validation in the EIP-1559 Ethereum. 83-88 - Gabriele Capannini, Jan Carlson, Roger Mellander:
Reliable Visibility Algorithms for Emergency Stop Systems in Smart Industries. 89-94 - Nektarios Moumoutzis, Marios Christoulakis, Chara Xanthaki, Yiannis Maragkoudakis, Stavros Christodoulakis, Desislava Paneva-Marinova
, Lilia Pavlova:
eShadow+: Mixed Reality Storytelling Inspired by Traditional Shadow Theatre. 95-100 - Jannatul Ferdause Tumpa, Riddhiman Adib, Dipranjan Das, Nathalie Abenoza, Andrew Zolot, Velinka Medic, Judy Kim, Jay Romant, Sheikh Iqbal Ahamed:
mTOCS: Mobile Teleophthalmology in Community Settings to improve Eye-health in Diabetic Population. 100-109 - Nearchos Paspallis, Nicos Kasenides, Andriani Piki
:
A Software Architecture for Developing Distributed Games that Teach Coding and Algorithmic Thinking. 101-110 - Kang Yi, Siyu Yan, Lei Liu, Jingwen Zhu, Weiyun Liang, Jing Xu:
CCSS: An Effective Object Detection System for Classroom Crowd Statistics. 111-116 - Weifeng Xu, Lin Deng
, Dianxiang Xu:
Towards Designing Shared Digital Forensics Instructional Materials. 117-122 - Rui Zhao, Harvey P. Siy, Chulwoo Pack
, Leen-Kiat Soh, Myoungkyu Song:
An Intelligent Tutoring System for API Misuse Correction by Instant Quality Feedback. 123-128 - Lorenzo Canale, Laura Farinetti:
SQL Murder Mystery: a serious game to learn querying databases. 129-138 - Marina Marchisio, Fabio Roman
, Matteo Sacchet, Enrico Spinello:
Teachers' perception of higher education in a transition scenario. 139-144 - Henry C. B. Chan, Yi Dou, Yue Jiang, Ping Li
:
A 4C Model for Hyflex Classrooms. 145-150 - João Almeida, Vasco Amaral:
Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projects. 151-160 - Miguel Appleton Fernandes, Vasco Amaral:
A Simulation Framework for UML Education. 161-166 - Elisa Corino, Cecilia Fissore
, Marina Marchisio:
Data Driven Learning activities within a Digital Learning Environment to study the specialized language of Mathematics. 167-176 - Alexander Schieweck
, Rachel Murphy, Rafflesia Khan, Ciara Breathnach, Tiziana Margaria:
Evolution of the Historian Data Entry Application: Supporting Transcribathons in the Digital Humanities through MDD. 177-186 - Akshay Kumar Dileep, Ajay Bansal, James Cunningham:
Early Detection of At-Risk Students in a Calculus Course. 187-194 - Xin Xu, Nan Wang, Hu Jin, Yang Liu, Kun Li:
NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified Hawkes. 195-200 - Yorick Spenrath, Marwan Hassani, Boudewijn F. van Dongen:
BitBooster: Effective Approximation of Distance Metrics via Binary Operations. 201-210 - Le You, Han Jiang, Jinyong Hu, Chorng Hwa Chang, Lingxi Chen, Xintong Cui, Mengyang Zhao:
GPU-accelerated Faster Mean Shift with euclidean distance metrics. 211-216 - Panagiotis Monachelis, Panagiotis Kasnesis
, Lazaros Toumanidis
, Charalampos Z. Patrikakis, Pericles Papadopoulos:
Evaluation and Visualization of Trustworthiness in Social Media - EUNOMIA's approach. 217-222 - Yangyang Wang, Liping Hua, Hui Zhao, Lingfeng Yang:
Unsupervised Markdown Feature-Aware Keywords Extraction Towards Technology Blogs. 223-228 - Zhenjie Shao, Ying Qian, Liang Dou:
TBPM-DDIE: Transformer Based Pretrained Method for predicting Drug-Drug Interactions Events. 229-234 - Rahul Anilkumar, Benjamin Melone, Michael Patsula, Christophe Tran, Christopher Wang, Kevin Dick, Hoda Khalil, Gabriel A. Wainer
:
Canadian Jobs amid a Pandemic: Examining the Relationship between Professional Industry and Salary to Regional Key Performance Indicators. 235-240 - Laura Colley, Andrew Dybka, Adam Gauthier, Jacob Laboissonniere, Alexandre Mougeot, Nayeeb Mowla, Kevin Dick, Hoda Khalil, Gabriel A. Wainer
:
Elucidation of the Relationship Between a Song's Spotify Descriptive Metrics and its Popularity on Various Platforms. 241-249 - You Liang, Aerambamoorthy Thavaneswaran:
Long Term Interval Forecasts of Demand using Data-Driven Dynamic Regression Models. 250-259 - Dong Li, Yingying Xiao, Zhuanming Gao, Ningsi Li:
Graph Embedding Based on Feature Propagation for Community Detection. 260-265 - Dominik Raab
, Eric Fezer, Johannes Breitenbach, Hermann Baumgartl, Daniel Sauter
, Ricardo Buettner:
A Deep Learning-Based Model for Automated Quality Control in the Pharmaceutical Industry. 266-271 - Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng:
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*. 272-279 - Zhenyu Zhang
, Junjie Zhu
, Ryan Hildebrant, Nalini Venkatasubramanian, Shangping Ren:
Using Domain Knowledge to Assist Process Scenario Discoveries. 280-288 - Etienne Gael Tajeuna, Mohamed Bouguessa, Shengrui Wang:
A Longitudinal Study of Customer Electricity Load Profiles. 289-294 - Rongbo Chen, Kunpeng Xu
, Jean-Marc Patenaude, Shengrui Wang:
Dynamic Cross-sectional Regime Identification for Financial Market Prediction. 295-300 - Fatima Zahra Errounda, Yan Liu:
A Mobility Forecasting Framework with Vertical Federated Learning. 301-310 - Yinan Li, Fang Liu
:
Adaptive Noisy Data Augmentation for Regularized Estimation and Inference of Generalized Linear Models. 311-320 - Zishan Qin, Yimin Wu, Jiayan Pei, Jinwei Lu, Shizhao Huang, Liqun Liu:
Related Questions Retrieval Model in Stack Overflow based on Semantic Matching. 321-326 - Jiachen Ma, Lin He, Sheikh Iqbal Ahamed, Piyush Saxena:
An Autonomous Data Collection Pipeline for Online Time-Sync Comments. 327-336 - Ling Tong
, Jake Luo, Jazzmyne Adams, Kristen Osinski, Xiaoyu Liu
, David Friedland:
A Clustering-Aided Approach for Diagnosis Prediction: A Case Study of Elderly Fall. 337-342 - Junwei Lv, Xuegang Hu:
A Baseline for Early Classification of Time Series in An Open World. 343-351 - Jinjiang Li, Xianyu Zhu, Runchang Jia, Bin Liu, Cong Yu:
Apple-YOLO: A Novel Mobile Terminal Detector Based on YOLOv5 for Early Apple Leaf Diseases. 352-361 - Zicheng Wang, Bo Cui, Wenhan Hou:
A Dynamic Load Balancing Scheme Based on Network Sharding in Private Ethereum Blockchain. 362-367 - Mingyi Liu, Zhongjie Wang, Tianyu Jiang, Xiaofei Xu, Quan Z. Sheng
, Stephan Reiff-Marganiec:
External Service Sensing in an Uncertain World. 368-373 - Hangli Ge
, Lifeng Lin, Renhe Jiang
, Takashi Michikata, Noboru Koshizuka:
Multi-weighted Graphs Learning for Passenger Count Prediction on Railway Network. 374-382 - Zekun Li
, Baolong Guo, Chao Wang, Mengyan Guo:
A Fourier Descriptor for Bone Point Segmentation using inner distance in remote sensing images. 383-387 - Stefano Tata, Luca Cagliero:
A scalable approach to detect Contrasting Consecutive Patterns in time series data. 388-394 - Cristian Turetta, Florenc Demrozi
, Graziano Pravadelli:
A freely available system for human activity recognition based on a low-cost body area network. 395-400 - Liming Xu, Dave Towey
, Andrew P. French, Steve Benford
:
Connecting Everyday Objects with the Metaverse: A Unified Recognition Framework. 401-406 - Nivedha Rajaram:
Online Identity Theft Index Scorer and Recommendation Service. 407-408 - Liang Ye, Shun Ding, Chenyun Liu, Wenhao Zhu:
Network Traffic Prediction Based on Double-Synchronized Periodic LSTM. 409-410 - Allison Hsu, Ying-Feng Hsu:
Computer Education of the Primary Years Programme Exhibition at International Baccalaureate Schools During the COVID-19 Pandemic. 411-412 - Mehmet Aktas, Tolga Ovatman:
UML Statechart Anti-Patterns. 413-414 - Irene Benedetto, Lorenzo Canale, Laura Farinetti, Luca Cagliero
, Moreno La Quatra
:
Leveraging summarization techniques in educational technology systems. 415-416 - Dipannoy Das Gupta, Pranta Biswas, Mahmuda Naznin
:
CacheQueue: Efficient Cache Queue Usage in a NDN. 417-418 - Ahmad Rajeh Saifan, Nabeel Al-Yateem, Jacqueline Maria Dias
, Fatma Refaat Ahmed, Muhammad Arsyad Subu
, Syed Azizur Rahman, Amina Al-Marzouqi, Sheikh Iqbal Ahamed:
Technology as a Distracter for Providing Humanistic Care in Technology Dependent Care Units. 421-423 - Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. 424-425 - Eriko Segawa, Yusuke Sakumoto:
Preliminary Study for the Impact of Small Eigenvalues on Laplacian Anomaly Detection of Dynamic Networks. 426-427 - Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. 428-429 - Nanami Tsuji, Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki:
Spectral Formula for the Expected First Meeting Time of Diverse Random Walks on a Graph. 430-431 - Sandeep Reddivari:
An Agile Framework for Security Requirements: A Preliminary Investigation. 432-433 - Joseph Allen, Sandeep Reddivari:
Efficient Parallel Wikipedia Internal Link Extraction for NLP-Assisted Requirements Understanding. 434-435 - Sandeep Reddivari, Ahmed Moussa:
ReNego: A Requirements Negotiation Tool based on Voting of Social Choice Theory. 436-437 - Sandeep Reddivari, Jeffery Wolbert:
Calculating Requirements Similarity Using Word Embeddings. 438-439 - Prerit Datta
, Moitrayee Chatterjee
:
Finding Your Feet In Cybersecurity: A Reddit Text Mining Approach. 440-441 - Md. Jobair Hossain Faruk
, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. 442-443 - Md. Jobair Hossain Faruk
, Arleen Joy Patinga, Lorna Migiro, Hossain Shahriar, Sweta Sneha:
Leveraging Healthcare API to transform Interoperability: API Security and Privacy. 444-445 - Hironori Washizaki:
Software Engineering in Digital Transformation and Diversity: Preliminary Literature Review. 446-447 - Seungoh Han, Ah-Young Nho, Wei Teng Kwan, Benjamin Paglia, Jacob Visniski, Minji Lee, Eric T. Matson, Minsun Lee:
EHDNet: Enhanced Human Detection Network for Search and Rescue. 448-449 - Jagan Mohan Reddy
, Muthukumaran K, Hossain Shahriar, Victor Clincy, Nazmus Sakib:
Comprehensive Feature Extraction for Cross-Project Software Defect Prediction. 450-451 - Md Abdullah Al Hafiz Khan, Hossain Shahriar:
MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises. 452-453 - Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. 454-455 - Jamalia Sultana
, Mahmuda Naznin
:
Breaking the Barrier with a Multi-Domain SER. 456-461 - Blake Gaines, Ethan Mann, Swapna S. Gokhale:
An Analysis of the Early Dialogue on Vaccine Passports on Twitter. 462-467 - Jean Marie Tshimula, Sharmistha Gray, Belkacem Chikhaoui, Shengrui Wang:
Emotion Detection in Law Enforcement Interviews. 468-475 - Yuqian Zhuang, Liang Wang, Zhiwen Zheng, Hao Hu, Haijun Wu, Xianping Tao:
Towards Emotion-awareness in Programming Education with Behavior-based Emotion Estimation. 476-485 - Maria Helena Franciscatto, Marcos Didonet Del Fabro, Celio Trois, Luis Carlos Erpen De Bona, Jordi Cabot, Leon Augusto Okida Gonçalves:
Talk to Your Data: a Chatbot System for Multidimensional Datasets. 486-495 - Tristin Cory, Razib Iqbal:
Multi-Scale Speaker Vectors for Zero-Shot Speech Synthesis. 496-501 - Masud Rabbani, Kazi Shafiul Alam
, Lin He, Shiyu Tian, Mohammad Syam, Iysa Iqbal, Anushka Kolli, Hansika Kolli, Syeda Shefa, Bipasha Sobhani, Paramita Basak Upama, Sheikh Iqbal Ahamed:
Towards a Survey on Universal Human Vital Signs with prototype for Detection and Record Electronically Acceptable Medical-data (dDream). 502-511 - Masud Rabbani, Shiyu Tian, Adib Ahmed Anik, Jake Luo, Min Sook Park, Jeff Whittle, Sheikh Iqbal Ahamed, Hyunkyoung Oh:
Towards Developing a Voice-activated Self-monitoring Application (VoiS) for Adults with Diabetes and Hypertension. 512-519 - Paramita Basak Upama, Md. Jobair Hossain Faruk
, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman
:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. 520-529 - Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk
, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman
, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? 530-538 - Dafina Jeaca, Nicu-Cosmin Ursache
, Andrei Panu:
Towards a Commercial Pipeline for Field Crop Identification. 539-544 - Ricardo Buettner, Johannes Breitenbach, Kai Wannenwetsch, Isabel Ostermann, Rene Priel:
A Systematic Literature Review of Virtual and Augmented Reality Applications for Maintenance in Manufacturing. 545-552 - César Batista, Bruno Proença, Everton Cavalcante
, Thaís Batista, Felipe de Morais, Henrique Medeiros:
Towards a Multi-Tenant Microservice Architecture: An Industrial Experience. 553-562 - Kyosuke Yamate, Masanari Kondo, Yutaro Kashiwa, Yasutaka Kamei, Naoyasu Ubayashi:
Hey APR! Integrate Our Fault Localization Skill: Toward Better Automated Program Repair. 563-568 - Tsukasa Nakamura, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi:
Evaluating Automated Program Repair Techniques using Introductory Programming Course Datasets. 569-574 - Chaoming Liu, Wenhao Zhu, Xiaoyu Zhang, Qiuhong Zhai:
Exploiting Syntactic Information to Boost the Fine-tuning of Pre-trained Models. 575-582 - Norihiro Okui
, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota:
Identification of an IoT Device Model in the Home Domain Using IPFIX Records. 583-592 - Mengxi Zhou
, Rajiv Ramnath:
A Structure-Focused Deep Learning Approach for Table Recognition from Document Images. 593-601 - Junfan Jin, Junxiang Chen, Jilin Zhang, Tao Li, Ruixiang Qian, Feng Liu, Li Zhou, Yongjian Ren:
Web table data integration based on smart campus scenarios to resolve name disambiguation of scientific research personnel. 602-607 - Natsumi Matsui, Ayumi Ohnishi, Tsutomu Terada, Masahiko Tsukamoto:
Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in AR. 608-613 - Elliott Wen, Jiaxing Shen:
DSPBooster: Offloading Unmodified Mobile Applications to DSPs for Power-performance Optimal Execution. 614-623 - Ajay Kattepur, Sushanth David:
Madelyn: Multi-Domain Multi-Agent Reinforcement Learning for Data-center Networks. 624-629 - Kuan-Wei Lu
, Pangfeng Liu, Ding-Yong Hong
, Jan-Jan Wu:
Efficient Dual Batch Size Deep Learning for Distributed Parameter Server Systems. 630-639 - Zhanguo Liu, Gang Xu, Ruijie Hang, Yuan Cheng, Baoqi Huang, Xiangyu Bai:
A Routing Algorithm based on Social Closeness and Spatio-Temporal Interaction Degree. 640-647 - Koki Makida, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo:
A Tree Construction Method for Distributed Video Collection and Composition on the Same World Broadcasting System. 648-657 - Soma Yamamoto, Ryo Nakamura, Hiroyuki Ohsaki:
Implementation and Evaluation of Flow-level Network Simulator for Large-scale ICN Networks. 658-663 - Zhengxin Li, Sikai Tao, Ruixun Zhang, Hongpeng Wang:
GSDNet: An Anti-interference Cochlea Segmentation Model Based on GAN. 664-669 - Xiali Li, Yandong Chen, Licheng Wu:
QSAR for anti-ERα compounds using sparrow search algorithm optimized BP neural network. 670-675 - Giovanni Mezzina, Daniela De Venuto:
Automatic Accuracy versus Complexity Characterization for Embedded Emotion-Sensing Platforms in Healthcare Applications. 676-683 - Md Abdullah Al Hafiz Khan, Nirmalya Roy:
Cross-Domain Unseen Activity Recognition Using Transfer Learning. 684-693 - Luisa Bissoli, Davide Bonacina, Nicolò Dalla Riva, Florenc Demrozi
, Marin Jereghi, Nicola Marchiotto, Giovanni Perbellini, Bruno Pernice, Erica Pizzocaro, Graziano Pravadelli, Giuseppe Recchia, Anna Lia Sacerdoti, Cristian Turetta, Mauro Zamboni:
A virtual coaching platform to support therapy compliance in obesity. 694-699 - Lin He, Jiachen Ma, Sheikh Iqbal Ahamed, Piyush Saxena:
Quantitative Multidimensional Stress Assessment from Facial Videos using Deep Learning. 710-715 - Ruilin Lai, Gansen Zhao:
ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing. 716-725 - Shuvo Bardhan:
A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack Graphs. 726-735 - Kostyantyn Vorobyov, François Gauthier, Sora Bae, Padmanabhan Krishnan, Rebecca O'Donoghue:
Synthesis of Java Deserialisation Filters from Examples. 736-745 - Wenyuan Li, Jiahao He
, Gansen Zhao, Jinji Yang, Shuangyin Li, Ruilin Lai, Ping Li, Hua Tang, Haoyu Luo, Ziheng Zhou:
EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts. 746-756 - Lili Sun, Chenggang Wu, Zhe Wang, Yan Kang, Bowen Tang:
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines. 757-766 - Chuki Hayama, Yoko Kamidoi, Shin'ichi Wakabayashi:
Introduction of a New Method for Preventing Recipient Unapproved Transactions to Bitcoin Wallet. 767-772 - Feng Jiang, Yamei Xia, Wenbin Yao, Tianbo Lu
, Xiaoyan Zhang:
A Node-labeling-based Method for Evaluating the Anonymity of Tor Network. 773-778 - Rikima Mitsuhashi
, Takahiro Shinagawa
:
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification. 779-788 - Marietheres Dietz, Daniel Schlette, Günther Pernul:
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. 789-797 - Farzana Ahamed Bhuiyan, Stacy J. Prowell
, Hossain Shahriar, Fan Wu, Akond Rahman
:
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects. 798-808 - Blaz Podgorelec
, Lukas Alber, Thomas Zefferer:
What is a (Digital) Identity Wallet? A Systematic Literature Review. 809-818 - Yan Huang, Xian Xu:
Two-stage cost-sensitive local models for heterogeneous cross-project defect prediction. 819-828 - Xiaocao Hu, Hui Wang:
Category-Aware App Permission Recommendation based on Sparse Linear Model. 829-837 - Nasos Grigoropoulos
, Spyros Lalis:
Fractus: Orchestration of Distributed Applications in the Drone-Edge-Cloud Continuum. 838-848 - Menghan Li, Li Yang, Qing Xia
, Mingzhe Fang, Geng Liang, Chun Zuo:
STPChain: a Crowdsourced Software Engineering Method for Software Traceability and Fine-grained Privacy Based on Blockchain. 849-859 - Wagner S. De Souza, Fernando O. Pereira, Vanessa G. Albuquerque, Jorge Melegati
, Eduardo M. Guerra
:
A Framework Model to Support A/B Tests at the Class and Component Level. 860-865 - Zhiyu Zhang, Tao Wang, An Li, Wenbo Zhang:
Adaptive Auto-Scaling of Delay-Sensitive Serverless Services with Reinforcement Learning. 866-871 - Peimu Li, Jiaqi Yin, Huibiao Zhu, Lili Xiao, Miroslav Popovic
:
Formal Analysis and Verification of DPSTM v2 Architecture Using CSP. 872-877 - João Francisco Lino Daniel
, Alfredo Goldman, Eduardo Martins Guerra:
Are knowledge and usage of microservices patterns aligned? An exploratory study with professionals. 878-883 - Armin Moin, Moharram Challenger
, Atta Badii, Stephan Günnemann:
Supporting AI Engineering on the IoT Edge through Model-Driven TinyML. 884-893 - Xiao He, Letian Tang, Yi Liu:
MerGen: A Smart Code Merging Approach for Automatically Generated Code. 894-903 - Guoqing Yan, Sen Chen, Yude Bai, Xiaohong Li:
Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection? 904-913 - Anas Dakkak, Aiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson:
Customer Support In The Era of Continuous Deployment: A Software-Intensive Embedded Systems Case Study. 914-923 - Yaxin Wang, Liang Wang, Hao Hu, Jing Jiang, Hongyu Kuang
, Xianping Tao:
The Influence of Sponsorship on Open-Source Software Developers' Activities on GitHub. 924-933 - Sun Bo, Xinjun Mao, Shuo Yang, Long Chen:
Towards An Efficient Searching Approach of ROS Message by Knowledge Graph. 934-943 - Bogumila Hnatkowska, Adrianna Kozierkiewicz, Marcin Pietranik:
Compatibility Checking of Compound Business Rules Expressed in Natural Language Against Domain Specification. 944-949 - Kento Tanaka
, Toshiaki Aoki, Tatsuji Kawai, Takashi Tomita, Daisuke Kawakami, Nobuo Chida:
A Formal Specification Language Based on Positional Relationship Between Objects in Automated Driving Systems. 950-955 - Chaoran Luo, Yueyang Hu, Su Zhang, Ying Zhang, Yi Liu, Xingchun Diao, Gang Huang:
Fission: Autonomous, Scalable Sharding for IoT Blockchain. 956-965 - Jonathan Cristóvão Ferreira da Silva
, Mateus Coelho Silva, Ricardo A. R. Oliveira
:
Towards a novel wearable solution for citrus inspection using Edge AI. 966-971 - Kisoo Kim, Hyunju Kim, Dongman Lee:
A Correlation-based Real-time Segmentation Scheme for Multi-user Collaborative Activities. 972-981 - Tuanjie Shao, Dongkun Shin:
Structured Pruning for Deep Convolutional Neural Networks via Adaptive Sparsity Regularization. 982-987 - Ahmed Ali Alhazmi
, Khulud Alawaji, T. J. OConnor:
MPO: MQTT-Based Privacy Orchestrator for Smart Home Users. 988-993 - Yepu Wang, Yiting Wang
, Chuyue Zhong, Yijun Zhao:
Assessing Deep Learning Approaches in Detecting Masked Facial Expressions. 994-997 - Wei Liu, Jiarui Zhang, Yijun Zhao:
A Comparison of Deep Learning and Traditional Machine Learning Approaches in Detecting Cognitive Impairment Using MRI Scans. 998-1001 - Hwapyeong Song, Wook-Sung Yoo, Wael Zatar:
Interactive Bridge Inspection Research using Drone. 1002-1005 - Jia-Liang Tian, Qin-Yan Zhang, Hai-Zhen Li, Qing Wang, Yi Lei, Lin Zang, Xuemei Gao, Ji-Jiang Yang:
Study of facial generation methods after orthodontic treatment. 1006-1011 - Ryo Kikawa, Katsunori Oyama, Kouichi Genda:
Radiation mapping using a double exponential attenuation model for UAV sensing in forest area. 1012-1015 - Alan Norkham, Mikalus Chalupa, Noah Gardner
, Md Abdullah Al Hafiz Khan, Xinyue Zhang
, Chih-Cheng Hung:
Reinforcement Learning Agent for Path Planning with Expert Demonstration. 1016-1019 - Florian Hofer
, Clemens Kuen:
Off-the-shelf LoRaWAN: Experimenting on the prospect of a low-cost rapid prototyping solution. 1020-1025 - Motoyuki Ohmori
:
A Novel Passive L1/L2 Edge Loop Detection Observing MAC addresses of L3 Core Switches. 1026-1031 - Akira Sato, Kazunori Fujiwara, Kenichi Yoshida, Shuji Sannomiya:
Benefit of third-party name server operations in DNS configuration. 1032-1037 - Norimasa Takana
, Hiroki Kashiwazaki
:
Design and evaluation of a dedicated information environment with both portability and confidentiality. 1038-1043 - Hisashi Sagayama, Ryotaro Matsuo, Hiroyuki Ohsaki:
On the Effect of Communication Link Heterogeneity on Content Delivery Delay in Information-Centric Delay Tolerant Networks. 1044-1049 - Duong Dinh Tran
, Kazuhiro Ogata:
IPSG: Invariant Proof Score Generator. 1050-1055 - Antonio Costantino Marceddu
, Renato Ferrero
, Bartolomeo Montrucchio
:
Mask and respirator detection: analysis and potential solutions for a frequently ill-conditioned problem. 1056-1061 - Kwok Sun Cheng, Tae-Hyuk Ahn, Myoungkyu Song:
Debugging Support for Machine Learning Applications in Bioengineering Text Corpora. 1062-1069 - Rimma Dzhusupova
, Jan Bosch, Helena Holmström Olsson:
Challenges in developing and deploying AI in the engineering, procurement and construction industry. 1070-1075 - Beverly Abadines Quon
, Jean-Luc Gaudiot:
Concept drift detection for distributed multi-model machine learning systems. 1076-1080 - Tobias Gentner, Johannes Breitenbach, Timon Neitzel, Jacob Schulze, Ricardo Buettner:
A Systematic Literature Review of Machine Learning Applications for Process Monitoring and Control in Semiconductor Manufacturing. 1081-1086 - Benjamin Amankwata, Kenneth K. Fletcher:
Contexts Embedding for Sequential Service Recommendation. 1087-1092 - Akond Rahman
, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu:
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries. 1093-1097 - Ömer Faruk Tuna, Ferhat Özgür Çatak, Mustafa Taner Eskil:
Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial Robustness. 1098-1103 - Lamia Parven Khan, Tasfia Tahsin Anika, Suraka Iban Hanif, Rashedur M. Rahman:
Network Intrusion Detection Using Stack-Ensemble ANN. 1104-1109 - Pranshu Srivastava, Kaustubh Ijardar, Anuj Joshi, Nikumani Choudhury, Anakhi Hazarika
:
Token Based Energy-efficient Offloading Schemes for IoV Networks. 1110-1116 - Anakhi Hazarika
, Pranav Sistla, Vineet Venkatesh, Nikumani Choudhury:
Approximating CNN Computation for Plant Disease Detection. 1117-1122 - Kushagra Lavania, Gaurang Gupta, D. V. N. Siva Kumar:
A Secure and Efficient Fine-Grained Deletion Approach over Encrypted Data. 1123-1128 - Stephen Ryan, Barbara Steffen:
Towards Multi-Perspective Consulting in times of Disruption. 1129-1134 - Barbara Steffen, Frederik Möller:
Linking Multi-Perspectives to Enable Educated Decision Making in Digital Platform Design. 1135-1140 - Sonam Ramchand, Tariq Mahmood:
Big data architectures for data lakes: A systematic literature review. 1141-1146 - Johannes Breitenbach, Friedrich Seidenspinner, Furkan Vural, Philipp Beisswanger, Ricardo Buettner:
A Systematic Literature Review of Machine Learning Approaches for Optimization in Additive Manufacturing. 1147-1152 - Dragi Kimovski
, Christian Bauer, Narges Mehran, Radu Prodan:
Big Data Pipeline Scheduling and Adaptation on the Computing Continuum. 1153-1158 - Aleena Thomas, Nikolay Nikolov
, Antoine Pultier, Dumitru Roman, Brian Elvesæter, Ahmet Soylu:
SIM-PIPE DryRunner: An approach for testing container-based big data pipelines and generating simulation data. 1159-1164 - Shirin Tahmasebi, Amirhossein Layegh, Nikolay Nikolov
, Amir Hossein Payberah, Khoa Dinh, Vlado Mitrovic, Dumitru Roman, Mihhail Matskin:
Dataclouddsl: Textual and Visual Presentation of Big Data Pipelines. 1165-1171 - Dario Benvenuti
, Leonardo Falleroni, Andrea Marrella, Fernando Perales
:
An Interactive Approach to Support Event Log Generation for Data Pipeline Discovery. 1172-1177 - Adrian F. Spataru, Gabriel Iuhasz
, Silviu Panica:
TUFA: A TOSCA extension for the specification of accelerator-aware applications in the Cloud Continuum. 1178-1183 - Zhiyun Yin, Yujie Li, Jintong Cai, Huimin Lu:
Robotic Grasp Detection for Parallel Grippers: A Review. 1184-1187 - Keisuke Hamamoto, Huimin Lu, Yujie Li, Tohru Kamiya, Yoshihisa Nakatoh, Seiichi Serikawa:
Grasp Position Estimation from Depth Image Using Stacked Hourglass Network Structure. 1188-1192 - Yuya Sawano, Takuya Watanabe, Yoshiaki Terashima, Ryozo Kiyohara:
Localization Method for SLAM using an Autonomous Cart as a Guard Robot. 1193-1198 - Hayato Fukatsu, Tomoya Kawakami:
A Safe Route Recommendation Method Based on Driver Characteristics from Telematics Data. 1199-1204 - Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:
A Real-Time Background Replacement Method Based on Estimated Depth for AR Applications. 1205-1210 - Takafumi Sakai, Kenshin Hata, Takuya Wada, Katsuhiro Naito:
IoT platform using information flow to reduce load on cloud. 1211-1216 - Hashim Abu-gellban, Yu Zhuang, Long Hoang Nguyen, Zhenkai Zhang, Essa Imhmed
:
CSDLEEG: Identifying Confused Students Based on EEG Using Multi-View Deep Learning. 1217-1222 - Shannon Angel, Akbar Siami Namin:
Conceptual Mappings of Conventional Software and Machine Learning-based Applications Development. 1223-1230 - Hongfei Du, Emre Barut, Juntao Su:
Build Connections Between Two Groups of Images Using Deep Learning Method. 1231-1236 - Ayda Demir, Luis Felipe Gutiérrez, Stephen B. Bayne, Argenis V. Bilbao:
Temperature Prediction in Microgrids Using LSTMs: A Case Study. 1237-1242 - Mohamed Zouidine
, Mohammed Khalil:
A Comparative Study of Pre-trained Word Embeddings for Arabic Sentiment Analysis. 1243-1248 - Saroj Gopali
, Zulfiqar Ali Khan, Bipin Chhetri, Bimal Karki, Akbar Siami Namin:
Vulnerability Detection in Smart Contracts Using Deep Learning. 1249-1255 - Adam B. Bouttell, Sijin Lee, Carson K. Leung
, Martin J. Levesque, Seunggon Son, Weihong Zhang, Alfredo Cuzzocrea:
Predictive Analytics for Supporting Environmental Sustainability and Disaster Management. 1256-1261 - Kyle R. Boch, Freyja C. Kristjanson, Carson K. Leung
, Yu Liu, Andrea M. Unrau, Shuai April Zhang, Alfredo Cuzzocrea:
Mining Popular Topics from the Media. 1262-1267 - Kenichi Yoshida:
Interpreting Attention of Stock Price Prediction. 1268-1273 - You Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Wei Qiao, Melody Ghahramani, Sulalitha Bowala:
A Novel Optimal Profit Resilient Filter Pairs Trading Strategy for Cryptocurrencies. 1274-1279 - Aerambamoorthy Thavaneswaran, You Liang, Sulalitha Bowala, Alex Paseka, Melody Ghahramani:
Deep Learning Predictions for Cryptocurrencies. 1280-1285 - Saulo dos Santos, Japjeet Singh, Ruppa K. Thulasiram, Shahin Kamali, Louis Sirico, Lisa Loud:
A New Era of Blockchain-Powered Decentralized Finance (DeFi) - A Review. 1286-1292 - Guan-Chen Pan, Pangfeng Liu, Jan-Jan Wu:
A Cloud-Native Online Judge System. 1293-1298 - Justice Banson, Caroline D. Hardin
:
Assessing Student Participation and Engagement Using Discord. 1299-1305 - Arumalla Mohit Krishna, Pranav Sistla, Nikumani Choudhury, Hirak Ranjan Das:
Plug & Play Device for Hybrid Smart Classroom: A Prototype Development. 1306-1311 - Kangzhong Wang, Eugene Yujun Fu
, Grace Ngai, Hong Va Leong:
Identifying Key Learning Factors in Service-Leaning Programs Using Machine Learning. 1312-1317 - Yepu Wang, Yiting Wang
, Chuyue Zhong, Yijun Zhao:
US County-level Risk Factors Associated with COVID-19 Exacerbation During the Vaccination Era. 1318-1323 - Anais Dawson, Shameem Ahmed, Moushumi Sharmin, Wesley Deneke:
Lessons Learned from the Design and Evaluation of InterViewR: A Mixed-Reality Based Interview Training Simulation Platform for Individuals with Autism. 1324-1330 - Shaina Raza, Brian Schwartz, Nancy Ondrusek:
A Question-Answering System on COVID-19 Scientific Literature. 1331-1336 - Johannes Breitenbach, Jan Gross, Manuel Wengert, James Anurathan, Rico Bitsch, Zafer Kosar, Emre Tuelue, Ricardo Buettner:
A Systematic Literature Review of Deep Learning Approaches in Smart Meter Data Analytics. 1337-1342 - Luca Barbierato, Daniele Salvatore Schiera, Rossano Scoccia, Alessandro Margara, Lorenzo Bottaccioli, Edoardo Patti:
COMET: Co-simulation of Multi-Energy Systems for Energy Transition. 1343-1348 - Paolo Lazzeroni, Gianmarco Lorenti
, Francesco Moraglio, Maurizio Repetto:
Modeling of Renewable Energy Communities: the RECoupled approach. 1349-1354 - Alessandro Aliberti, Filippo Boni, Alessandro Perol, Marco Zampolli, Rémi Jacques Philibert Jaboeuf, Paolo Tosco, Enrico Macii, Edoardo Patti:
Comparative Analysis of Neural Networks Techniques for Lithium-ion Battery SOH Estimation. 1355-1361 - Alberto Bocca, Alberto Macii
, Enrico Macii:
A Nonlinear Two-Parameter Model for the Spatial Analysis of Solar Irradiation. 1362-1367 - Christoph Susen, Philipp Nenninger
, Christian Fimmers, Simon Storms, Werner Herfs:
Comparison of Frequency Bands for Wireless Communication in Forests Using LoRa Modulation. 1368-1374 - Andreas Mäkilä, Anna Friebe, Leif Enblom, Per Erik Strandberg, Tiberiu Seceleanu
:
A Generic Software Architecture for PoE Power Sourcing Equipment. 1375-1380 - Zhang Liu, Liang Xiao, Jianxia Chen, He Yu, Yunlong Ye:
An Emotion-fused Medical Knowledge Graph and its Application in Decision Support. 1381-1388 - Muhammad Arsyad Subu
, Nabeel Al-Yateem, Imam Waluyo, Jacqueline Maria Dias
, Syed Azizur Rahman, Fatma Refaat Ahmed, Siti A. Murono, Sheikh Iqbal Ahamed, Ahmad Rajeh Saifan, Tilawaty Aprina, Amina Al-Marzouqi:
Relationship between Internet Addiction and Stress Levels among Adolescents in East Jakarta, Jakarta Province, Indonesia. 1389-1392 - Syed Azizur Rahman, Swetha Variyath, Nabeel Al-Yateem, Sheikh Iqbal Ahamed, Amina Al-Marzouqi, Muhammad Arsyad Subu
, Jacqueline Maria Dias
, Ahmad Rajeh Saifan, Fatma Refaat Ahmed:
Technology Utilization in Health Science Education during Covid-19: Experience from University of Sharjah. 1393-1395 - Zhi-Heng Cui, Qin-Yan Zhang, Jing-Wei Zhang, Xue Sun, Qing Wang, Yi Lei, Lin Zang, Li Zhao, Ji-Jiang Yang:
Application of Improved Mask R-CNN Algorithm Based on Gastroscopic Image in Detection of Early Gastric Cancer. 1396-1401 - Jagan Moahan Reddy Danda
, Kumar Priyansh, Hossain Shahriar, Hisham Haddad, Alfredo Cuzzocrea, Nazmus Sakib:
Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients. 1402-1407 - Afonso Ueslei Da Fonseca
, Bruno M. Rocha, Emilia Alves Nogueira, Gabriel da Silva Vieira, Deborah S. A. Fernandes, Junio Cesar de Lima, Júlio César Ferreira, Fabrízzio Alphonsus A. M. N. Soares
:
Tuberculosis Detection in Chest Radiography: A Combined Approach of Local Binary Pattern Features and Monarch Butterfly Optimization Algorithm. 1408-1413 - Dawei Li, Jianqiang Li, Zhichao Zhu, Tariq Mahmood
:
Chinese Medical Named Entity Recognition Based on Multi-word Segmentation and Multi-layer BILSTM. 1414-1419 - Liyin Yang, Jianqiang Li, Zhichao Zhu, Xiangmin Dong, Faheem Akhtar:
Chinese Medical Event Extraction Based on Hybrid Neural Network. 1420-1425 - Boya Li, Jianqiang Li, Zhichao Zhu, Linna Zhao, Wenxiu Cheng:
A Deep Learning based Method for Microscopic Object Localization and Classification. 1426-1431 - Huifeng Zhao, Zhilong Ma, Yu Guan
, Jianqiang Li, Yu-Chih Wei:
High Myopia Detection Method On Fundus Images Based On Curriculum Learning. 1432-1437 - Shuo Zhang, Jianqiang Li, Muhammad Sufyan, Yinlong Xiao, Xiangmin Dong:
A speech understanding-based method for recognizing psychological medical speech feelings. 1438-1443 - Dinesh Chowdary Attota, Durga Nagarjuna Tadikonda, Shruthi Pethe, Md Abdullah Al Hafiz Khan:
An Ensembled Method For Diabetic Retinopathy Classification using Transfer Learning. 1444-1449 - Vamsi Krishna Dhulipalla, Md Abdullah Al Hafiz Khan:
Mental workload classification from non-invasive fNIRs signals through deep convolutional neural network. 1450-1455 - Faheem Akhtar, Jianqiang Li, Zahid Hussain Khand, Yu-Chih Wei, Khalid Hussain, Sana Fatima:
An Efficient Small for Gestational Age Prognosis System Using Stacked Generalization Scheme (SGS). 1456-1461 - Emna Souidi, Lamia Zouhaier, Yousra Bendaly Hlaoui:
IoT for Real-time Accessibility Ontology Population to Context-awareness Adapt User Interfaces. 1462-1467 - Amina Jandoubi, Mohamed Taha Bennani
, Abdelaziz El Fazziki:
Faultload time model of the MQTT protocol publish service. 1468-1473 - Shuvo Bardhan, Mitsuhiro Hatada:
Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network Traffic. 1474-1480 - Araya Kibrom Desta, Shuji Ohira
, Ismail Arai
, Kazutoshi Fujikawa:
U-CAN: A Convolutional Neural Network Based Intrusion Detection for Controller Area Networks. 1481-1488 - Ying-Feng Hsu, Araki Ryusei, Morito Matsuoka:
Real Network DDoS Pattern Analysis and Detection. 1489-1494 - Yun Gao
, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network. 1495-1501 - Michael Menard, Tommy Nelson, Milan Shahi, Hugh Morton, Adam DeTavernier, Harvey P. Siy, Rui Zhao, Myoungkyu Song:
A Feasibility Study of Using Code Clone Detection for Secure Programming Education. 1502-1507 - Henry C. B. Chan:
LeG for Enhancing Student Communication and Learning Experience. 1508-1512 - Chawanangwa Lupafya
, Dharini Balasubramaniam
:
A Framework for Considering Uncertainty in Software Systems. 1519-1524 - Jun Wang, Samuel Sungmin Cho, Myoungkyu Song:
RepChaBug: Automatically Repairing Incorrect Change Bugs in Software Evolution. 1525-1530 - Zhenyu Liu, Xuanyu Lou, Yajun Cui, Yingdong Zhao, Hua Li:
Colored Petri Net Reusing for Service Function Chaining Validation. 1531-1535 - Yepeng Ding
, Hiroyuki Sato:
Self-Sovereign Identity as a Service: Architecture in Practice. 1536-1543 - Solomon J. Akuma, Eslam G. AbdAllah:
Impacts of Radio Frequency IDentification (RFID) Technology in Business Continuity. 1544-1549 - Sad Rafik, Paul Lachat
, Nadia Bennani, Veronika Rehn-Sonigo:
Towards a Distributed Inference Detection System in a Multi-Database Context. 1550-1554 - Sascha Schiegg
, Armin Gerl:
Trade-off between Privacy, Quality and Risk: Anonymization Strategy Evaluation for Data Warehouses. 1555-1560 - Xuesong Hai, Jing Liu:
PPDS: Privacy Preserving Data Sharing for AI applications Based on Smart Contracts. 1561-1566 - Yongfeng Gu
, Yue Ning
, Hao Ding, Kecai Gu, Daohong Jian, Zhou Xu, Hua Wu, Jun Zhou:
A Self-adaptive Indicator Selection Approach for Solving Credit Risk Assessment. 1567-1572 - Po-Chih Chen, Chih-Hung Chang, Yu-Wei Chan, Yin-Te Tsai, William C. Chu:
An Approach to Real-Time Fall Detection based on OpenPose and LSTM. 1573-1578 - Alexander Heireth Enge, Abylay Satybaldy, Mariusz Nowostawski:
An architectural framework for enabling secure decentralized P2P messaging using DIDComm and Bluetooth Low Energy. 1579-1586 - Hideaki Goto:
Disruption-tolerant Local Authentication Method for Continuous and Secure In-Flight Wireless LAN. 1587-1591 - Stuart McDonald
, Dave Towey
, Vladimir Brusic
:
Social Impact of Smart Environments: Software Engineering Perspectives and Challenges. 1592-1597 - Kun Shang
, Stuart McDonald, Giampaolo Buticchi, Vladimir Brusic
:
The development of ethically informed standards for intelligent monitoring systems of electric machines. 1598-1605 - Jianing Liu, Jia Shi, Jun Xie, Xinyun Zhang, Zichuan Zhang, John C. Grundy, Tanjila Kanij:
A Curated Personas and Design Guidelines Tool for Better Supporting Diverse End-users. 1606-1613 - Shloak Rathod
:
Exploring Author Profiling for Fake News Detection. 1614-1619 - Sunanda Guha, Razib Iqbal:
DESCo: Detecting Emotions from Smart Commands. 1620-1625 - Amin Fakhartousi, Sofia Meacham, Keith Phalp:
Autonomic Dominant Resource Fairness (A-DRF) in Cloud Computing. 1626-1631 - Stefan Kuhn
, Ricardo Moreira Borges
, Francesco Venturini
, Maurizio Sansotera:
Dataset Size and Machine Learning - Open NMR Databases as a Case Study. 1632-1636 - Orion Staskal, Josh Simac, Logan Swayne, Kristin Y. Rozier:
Translating SysML Activity Diagrams for nuXmv Verification of an Autonomous Pancreas. 1637-1642 - Fahad Alotaibi, Thai Son Hoang, Michael J. Butler:
High-Level Rigorous Template for Analysing Safety Properties of Self-driving Vehicle Systems. 1643-1648 - Rifat Nawaz, Tanjina Afrin Sharna, Md. Noor Hossain Akand, Rashedur M. Rahman:
Measurement of Human Heart Rate: A Cost-Effective Solution to Monitor Cardiovascular Health. 1649-1653 - Salvatore D'Antonio, Federica Uccello
:
Data Provenance for healthcare: a blockchain-based approach. 1655-1660 - Anna Sabatini
, Luca Vollero:
Graph Signal Processing for IoT Sensor Networks. 1661-1666 - Anna Sabatini, Eleonora Nicolai, Luca Vollero:
Detection of floating objects in liquids. 1667-1671 - Ben Nguyen, Mark J. D. Shinnie, Carson K. Leung
, Michael R. Kuzie, Nikola N. Kokilev, Sukhmandeep Kaur:
A Data Science Solution for Mining Weather Data and Transportation Data for Smart Cities. 1672-1677 - Stefania Mauro
, Shravan Shinde, Maurizio Arnone, Victor Marques Zamith, Giovanni De Rosa, Davide Pietroni:
The role of awareness of mobility offer and nudges in increasing sustainable mobility habits of citizens: a case study from the Munich region. 1678-1683 - Vittorio Capocasale
, Stefano Musso, Guido Perboli
:
Interplanetary File System in Logistic Networks: a Review. 1684-1689 - Johannes Breitenbach, Jan Gross, Daniel Dittrich, Pauline Neumann, Alexander Schilling
, Esra Zaman, Ricardo Buettner:
A Systematic Literature Review of Current IoT-Based Approaches for Improving Sustainable Public Transportation in Smart Cities. 1690-1695 - Davide La Gamba, Miriam Pirra, Francesco Deflorio
, Luis Montesano
, Angela Carboni
, Maurizio Arnone:
Discrete Choice Experiments to identify user preference for electric mobility. 1696-1701 - Stefano Musso, Guido Perboli
, Michela Apruzzese, Giulia Renzi, Natalia Selini:
Innovative Business Models in Ports' Logistics. 1702-1707 - Laura Epifanovskaya, Reginald Meeson, Christopher McCormack, Jinseo R. Lee, Robert C. Armstrong, Jackson R. Mayo:
Algorithmic Input Generation for More Effective Software Testing. 1708-1715 - Imran Ashraf
, W. K. Chan:
An Empirical Study on the Effects of Entry Function Pairs in Fuzzing Smart Contracts. 1716-1721 - Zhihao Ying
, Anthony Bellotti, Dave Towey
, Tsong Yueh Chen, Zhi Quan Zhou:
Using Metamorphic Relation Violation Regions to Support a Simulation Framework for the Process of Metamorphic Testing. 1722-1727 - Sangharatna Godboley, Arpita Dutta, Pisipati Radha Krishna, Durga Prasad Mohapatra
:
SSG-AFL: Vulnerability detection for Reactive Systems using Static Seed Generator based AFL. 1728-1733 - Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono:
Analysis of Privacy Compliance by Classifying Multiple Policies on the Web. 1734-1741 - Qingren Zeng, Jiahao He
, Gansen Zhao, Shuangyin Li, Jingji Yang, Hua Tang, Haoyu Luo:
EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features. 1742-1749 - Haowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen:
An Extention of Lazy Abstraction and Refinement for Program Verification. 1750-1755 - Jiyoun Randolph, Md. Jobair Hossain Faruk
, Bilash Saha, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib:
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework. 1756-1761 - Nicolas D. Ahn, Sepehr Amir-Mohammadian:
Instrumenting Microservices for Concurrent Audit Logging: Beyond Horn Clauses. 1762-1767 - Mohammad Taneem Bin Nazim, Md. Jobair Hossain Faruk
, Hossain Shahriar, Md Abdullah Khan, Mohammad Masum, Nazmus Sakib, Fan Wu:
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection. 1768-1773 - Alvi Ataur Khalil
, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman
:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. 1774-1779 - Shahriar Sobhan, Timothy Williams, Md. Jobair Hossain Faruk
, Juan Rodriguez Cardenas, Masrura Tasnim, Edwin Mathew, Jack Wright, Hossain Shahriar:
A Review of Dark Web: Trends and Future Directions. 1780-1785 - Ricardo Buettner, Johannes Breitenbach, Jan Gross, Isabell Krueger, Hari Gouromichos, Marvin Listl, Louis Leicht, Thorsten Klier:
A Systematic Literature Review of Machine Learning Approaches for Detecting Events and Disturbances in Smart Grid Systems. 1786-1791 - Hirotsugu Kinoshita, Tetsuya Morizumi:
An access control model considering with transitions of access rights based on the blockchain. 1792-1797 - Soin Abdoul Kassif Traore, Maria Valero, Hossain Shahriar, Liang Zhao, Sheikh Iqbal Ahamed, Ahyoung Lee:
Enabling Cyberanalytics using IoT Clusters and Containers. 1798-1803 - George O. M. Yee:
Improving the Derivation of Sound Security Metrics. 1804-1809 - Shion Maeda, Misato Nakabayashi, Tetsuya Okuda:
Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification. 1810-1815 - Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Automated Two-Stage Approach for Damage Detection of Surface Defects in Historical Buildings. 1816-1821 - Kedong Chai, Yue Li
:
Cultural Heritage Assets Optimization Workflow for Interactive System Development. 1822-1827 - Mayssa Bessifi, Ahlem Ben Younes, Leila Ben Ayed:
An Approach for the Specification and Verification of Hadoop-MapReduce Workflow. 1828-1831

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.