default search action
34th SAC 2019: Limassol, Cyprus
- Chih-Cheng Hung, George A. Papadopoulos:
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019. ACM 2019, ISBN 978-1-4503-5933-7
Theme: AI and agents: BIO - Bioinformatics track
- Souad Bouasker, Sadok Ben Yahia, Gayo Diallo:
An insight into biological datamining based on rarity and correlation as constraints. 3-10 - Sameh K. Mohamed, Aayah Nounu, Vít Novácek:
Drug target discovery using knowledge graph embeddings. 11-18 - Aliasghar Shahrjooihaghighi, Hichem Frigui, Xiang Zhang, Xiaoli Wei, Biyun Shi, Craig J. McClain:
Ensemble feature selection for biomarker discovery in mass spectrometry-based metabolomics. 19-24 - Ameni Trabelsi, Biyun Shi, Xiaoli Wei, Hichem Frigui, Xiang Zhang, Craig McClain, Aliasghar Shahrjooihaghighi:
Molecule specific normalization for protein and metabolite biomarker discovery. 25-31
Theme: Software design and development: BPMEA - Business process management & enterprise architecture track
- Marco Comuzzi, Alfonso E. Márquez Chamorro, Manuel Resinas:
A hybrid reliability metric for SLA predictive monitoring. 32-39 - Johann Eder, Marco Franceschetti, Julius Köpke:
Controllability of business processes with temporal variables. 40-47 - Guangming Li, Renata Medeiros de Carvalho, Wil M. P. van der Aalst:
Object-centric behavioral constraint models: a hybrid model for behavioral and data perspectives. 48-56 - Alessandro Terragni, Marwan Hassani:
Optimizing customer journey using process mining and sequence-aware recommendation. 57-65 - Konrad Schneid, Claus A. Usener, Sebastian Thöne, Herbert Kuchen, Christian Tophinke:
Static analysis of BPMN-based process-driven applications. 66-74 - Sheila Katherine Venero, Júlio Cesar dos Reis, Leonardo Montecchi, Cecília Mary Fischer Rubira:
Towards a metamodel for supporting decisions in knowledge-intensive processes. 75-84 - Mohammad Javad Amiri, Divyakant Agrawal:
VIEW: an incremental approach to verify evolving workflows. 85-93
Theme: Software design and development: BPMEA - Business process management & enterprise architecture track: Poster papers
- Stefan Schönig, Claudio Di Ciccio, Jan Mendling:
Configuring SQL-based process mining for performance and storage optimisation. 94-97 - Elena Gómez-Martínez, Francisco J. Pérez Blanco, Juan de Lara, Juan Manuel Vara, Esperanza Marcos:
Formal support of process chain networks using model-driven engineering and Petri nets. 98-100 - Diana Jlailaty, Daniela Grigori, Khalid Belhajjame:
On the elicitation and annotation of business activities based on emails. 101-103
Theme: Distributed systems: CC - Cloud computing track
- Alfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava:
A programming model and middleware for high throughput serverless computing applications. 106-113 - Tianyu Gao, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Ruxia Li, Mingrui Xu:
Minimizing financial cost of scientific workflows under deadline constraints in multi-cloud environments. 114-121 - Ojus Thomas Lee, Vijay Sharma, S. D. Madhu Kumar, Priya Chandran:
Modelling multi level consistency in erasure code based storage systems. 122-129 - Sergio Mendes, José Simão, Luís Veiga:
Oversubscribing micro-clouds with energy-aware containers scheduling. 130-137 - Gabriel P. Fernandez, Andrey Brito:
Secure container orchestration in the cloud: policies and implementation. 138-145 - Antonis Michalas:
The lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharing. 146-155
Theme: Distributed systems: CC - Cloud computing track: Poster papers
- Eddy Truyen, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. 156-159 - Merlin George, Anu Mary Chacko, Sudeep Koshy Kurien, Naseer Ali:
Diabetes care in cloud - research challenges. 160-162
Theme: Distributed systems: CCNIV - communication, computing and networking in internet of vehicles track
- Philip Wendland, Guenter Schaefer, Reiner S. Thomä:
An application-oriented evaluation of LTE-V's mode 4 for V2V communication. 165-173 - Dimitrios Mbakoyiannis, Othon Tomoutzoglou, George Kornaros:
Secure over-the-air firmware updating for automotive electronic control units. 174-181 - Salman Memon, Muthucumaru Maheswaran:
Using machine learning for handover optimization in vehicular fog computing. 182-190
Theme: Distributed systems: CCNIV - communication, computing and networking in internet of vehicles track: Poster papers
- Lukás Chrpa, Mauro Vallati, Simon Parkinson:
Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks. 191-194
Theme: AI and agents: CIVIA - Computational intelligence and video & image analysis track
- Zackary P. T. Sin, Peter H. F. Ng, Simon C. K. Shiu, Fu-Lai Chung, Hong Va Leong:
2D character animating networks: bringing static characters to move via motion transfer. 196-203 - Willian Tessaro Lunardi, Holger Voos, Luiz Henrique Cherri:
An effective hybrid imperialist competitive algorithm and tabu search for an extended flexible job shop scheduling problem. 204-211 - Ravi Bansal, Sandip Chakraborty:
Visual content based video retrieval on natural language queries. 212-219
Theme: AI and agents: COMBI - Advances in COMputational biomedical imaging track
- Jonathan S. Ramos, Carolina Yukari Veludo Watanabe, Marcello H. Nogueira-Barbosa, Agma J. M. Traina:
BGrowth: an efficient approach for the segmentation of vertebral compression fractures in magnetic resonance imaging. 220-227
Theme: System software and security: CPS - Cyber-physical systems track
- Shashank Gaur, Luís Almeida, Eduardo Tovar:
AdaptC: programming adaptation policies for WSN applications. 229-235 - Yixin Li, Jinyu Zhan, Wei Jiang, Jiayu Yu:
Energy optimization of branch-aware data variable allocation on hybrid SRAM+NVM SPM for CPS. 236-241 - Qi Li, Aosong Deng, Congming Gao, Yu Liang, Liang Shi, Edwin Hsing-Mean Sha:
Optimizing fragmentation and segment cleaning for CPS based storage devices. 242-249 - Yajuan Du, Wei Liu, Yu Zhu, Meng Zhang:
United SSD block cleaning via constrained victim block selection. 250-257
Theme: System software and security: CPS - Cyber-physical systems track: Poster papers
- James Coleman, Sara Almalih, Alexander Slota, Yann-Hang Lee:
Emerging COTS architecture support for real-time TSN ethernet. 258-265
Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track
- Paola Martins Pereira, Fernando Luís Dotti, Cristina Meinhardt, Odorico Machado Mendizabal:
A library for services transparent replication. 268-275 - João Marçal, Luís E. T. Rodrigues, Miguel Matos:
Adaptive information dissemination in the Bitcoin network. 276-283 - Subir Halder, Mauro Conti:
Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem. 284-291 - Mohammad Rafiuzzaman, Julien Gascon-Samson, Karthik Pattabiraman, Sathish Gopalakrishnan:
Failure prediction in the internet of things due to memory exhaustion. 292-301 - Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci Piergiovanni:
Scalable lightning factories for Bitcoin. 302-309 - Richard Gil Martinez, Antónia Lopes, Luís E. T. Rodrigues:
Planning workflow executions when using spot instances in the cloud. 310-317 - Filipe Falcão, Tommaso Zoppi, Caio Barbosa Viera Silva, Anderson Santos, Baldoino Fonseca, Andrea Ceccarelli, Andrea Bondavalli:
Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection. 318-327 - Kobe Vrancken, Frank Piessens, Raoul Strackx:
Securely deploying distributed computation systems on peer-to-peer networks. 328-337
Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track: Poster papers
- Racin Nygaard, Hein Meling, Leander Jehl:
Distributed storage system based on permissioned blockchain. 338-340 - Martin Grambow, Jonathan Hasenburg, Tobias Pfandzelter, David Bermbach:
Is it safe to dockerize my database benchmark? 341-344
Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track
- Vincent Reniers, Dimitri Van Landuyt, Paolo Viviani, Bert Lagaisse, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. 346-354 - Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. 355-363 - Mourad el Maouchi, Oguzhan Ersoy, Zekeriya Erkin:
DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain. 364-373 - Krishnendu Chatterjee, Amir Kafshdar Goharshady, Arash Pourdamghani:
Hybrid mining: exploiting blockchain's computational power for distributed problem solving. 374-381 - Bjorn van der Laan, Oguzhan Ersoy, Zekeriya Erkin:
MUSCLE: authenticated external data retrieval from multiple sources for smart contracts. 382-391 - Monika Di Angelo, Alfred Soare, Gernot Salzer:
Smart contracts in view of the civil code. 392-399 - Krishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady:
The treewidth of smart contracts. 400-408 - Pietro Corsi, Giovanni Lagorio, Marina Ribaudo:
TickEth, a ticketing system built on ethereum. 409-416
Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track: Poster papers
- Sebastian Geiger, Daniel Schall, Sebastian Meixner, Andreas Egger:
Process traceability in distributed manufacturing using blockchains. 417-420
Theme: Information systems: DBDM - Databases and big data management track
- Tiago Brasileiro Araújo, Carlos Eduardo Santos Pires, Demetrio Gomes Mestre, Thiago Pereira da Nóbrega, Dimas Cassimiro do Nascimento, Kostas Stefanidis:
A noise tolerant and schema-agnostic blocking technique for entity resolution. 422-430 - Ekaterina B. Dimitrova, Panos K. Chrysanthis, Adam J. Lee:
Authorization-aware optimization for multi-provider queries. 431-438 - Akrivi Vlachou, Christos Doulkeridis, Apostolos Glenis, Georgios M. Santipantakis, George A. Vouros:
Efficient spatio-temporal RDF query processing in large dynamic knowledge bases. 439-447 - Panagiotis Moutafis, Francisco García-García, George Mavrommatis, Michael Vassilakopoulos, Antonio Corral, Luis Iribarne:
MapReduce algorithms for the K group nearest-neighbor query. 448-455 - Evandro Miguel Kuszera, Letícia Mara Peres, Marcos Didonet Del Fabro:
Toward RDB to NoSQL: transforming data with metamorfose framework. 456-463
Theme: Information systems: DBDM - Databases and big data management track: Poster papers
- Doyoung Kim, Won Gi Choi, Hanseung Sung, Sanghyun Park:
A scalable and persistent key-value store using non-volatile memory. 464-467 - Caetano Traina Jr., Andre Moriyama, Guilherme Muzzi da Rocha, Robson L. F. Cordeiro, Cristina Dutra de Aguiar Ciferri, Agma J. M. Traina:
The SimilarQL framework: similarity queries in plain SQL. 468-471
Theme: Information systems: DLHWB - Digital life for human well-being track
- Márcia Valéria Rodrigues Ferreira, Laura Sánchez García, André Luiz Pires Guedes, Djanira Aparecida da Luz Veronez, Celia Regina Alves de Araújo Sandrini, Carlos Eduardo de Araujo:
Anatome: anatomy teaching and learning designed for all. 474-483 - Bruna C. R. Cunha, Kamila R. H. Rodrigues, Isabela Zaine, Leonardo F. Scalco, Caio César Viel, Maria da Graça Campos Pimentel:
Web-based authoring of multimedia intervention programs for mobile devices: a case study on elderly digital literacy. 484-491
Theme: Information systems: DM - Data mining track
- Stephen Pauwels, Toon Calders:
An anomaly detection technique for business processes based on extended dynamic bayesian networks. 494-501 - Khadidja Meguelati, Benedicte Fontez, Nadine Hilgert, Florent Masseglia:
Dirichlet process mixture models made scalable and effective by means of massive distribution. 502-509 - Eliana Pastor, Elena Baralis:
Explaining black box models by means of local rules. 510-517 - Hamed Sarvari, Carlotta Domeniconi, Giovanni Stilo:
Graph-based selective outlier ensembles. 518-525 - Ari Rasch, Richard Schulze, Waldemar Gorus, Jan Hiller, Sebastian Bartholomäus, Sergei Gorlatch:
High-performance probabilistic record linkage via multi-dimensional homomorphisms. 526-533 - Masoud Reyhani Hamedani, Sang-Wook Kim:
Pairwise normalization in SimRank variants: problem, solution, and evaluation. 534-541
Theme: Information systems: DM - Data mining track: Poster papers
- Rahmah Brnawy, Nematollaah Shiri:
K-mixed prototypes: a clustering algorithm for relational data with mixed attribute types. 542-545 - Chukwuma Ejieh, Christie I. Ezeife, Ritu Chaturvedi:
Mining product opinions with most frequent clusters of aspect terms. 546-549
Theme: Information systems: DM - Data mining track: Student research abstract
- Shaista Bibi:
Cryptocurrency world identification and public concerns detection via social media: student research abstract. 550-552 - Bushra Zaheer Abbasi:
Fuzzy-rule based approach for feature selection in text classification: student research abstract. 553-555
Theme: Information systems: DS - Data streams track
- Hela Sfar, Amel Bouzeghoub:
DataSeg: dynamic streaming sensor data segmentation for activity recognition. 557-563 - Christian Beyer, Vishnu Unnikrishnan, Uli Niemann, Pawel Matuszyk, Eirini Ntoutsi, Myra Spiliopoulou:
Exploiting entity information for stream classification over a stream of reviews. 564-573 - Jean Paul Barddal, Fabrício Enembreck:
Learning regularized hoeffding trees from data streams. 574-581 - Rémi Géraud, Marius Lombard-Platet, David Naccache:
Quotient hash tables: efficiently detecting duplicates in streaming data. 582-589
Theme: Information systems: DS - Data streams track: Poster papers
- Jean Antonio Pereira Karax, Andreia Malucelli, Jean Paul Barddal:
Decision tree-based feature ranking in concept drifting data streams. 590-592 - Romaric Duvignau, Vincenzo Gulisano, Marina Papatriantafilou, Vladimir Savic:
Streaming piecewise linear approximation for efficient data management in edge computing. 593-596
Theme: System software and security: EMBS - Embedded systems track
- Shuo-Han Chen, Yong-Ching Lin, Yuan-Hao Chang, Ming-Chang Yang, Tseng-Yi Chen, Hsin-Wen Wei, Wei-Kuan Shih:
A new sequential-write-constrained cache management to mitigate write amplification for SMR drives. 599-606 - Martin Schoeberl, Benjamin Rouxel, Isabelle Puaut:
A time-predictable branch predictor. 607-616 - Timo Hönig, Benedict Herzog, Wolfgang Schröder-Preikschat:
Energy-demand estimation of embedded devices using deep artificial neural networks. 617-624 - Jaume Abella, Enrico Mezzetti, Francisco J. Cazorla:
On assessing the viability of probabilistic scheduling with dependent tasks. 625-634 - Sheel Sindhu Manohar, Hemangee K. Kapoor:
Refresh optimised embedded-dram caches based on zero data detection. 635-642
Theme: System software and security: EMBS - Embedded systems track: Poster papers
- Oana Hotescu, Katia Jaffrès-Runser, Jean-Luc Scharbarg, Christian Fraboul:
Impact of source scheduling on end-to-end latencies in a QoS-aware avionics network. 643-646 - Robert J. Stewart, Bernard Berthomieu, Paulo Garcia, Idris Ibrahim, Greg Michaelson, Andrew M. Wallace:
Graphical program transformations for embedded systems. 647-649
Theme: Information systems: GIA - GeoInformation analytics track
- Noudéhouénou Lionel Jaderne Houssou, Jean-Loup Guillaume, Armelle Prigent:
A graph based approach for functional urban areas delineation. 652-658 - Chidubem Iddianozie, Gavin McArdle:
A transfer learning paradigm for spatial networks. 659-666 - Rocio Nahime Torres, Federico Milani, Piero Fraternali:
Algorithms for mountain peaks discovery: a comparison. 667-674 - Didier Augusto Vega-Oliveros, Moshé Cotacallapa, Leonardo Nascimento Ferreira, Marcos G. Quiles, Liang Zhao, Elbert E. N. Macau, Manoel F. Cardoso:
From spatio-temporal data to chronological networks: an application to wildfire analysis. 675-682
Theme: Information systems: GIA - GeoInformation analytics track: Poster papers
- Roger Peralta-Aranibar, Cicero Augusto de Lara Pahins, João Luiz Dihl Comba, Erick Gomez Nieto:
Similarity-based visual exploration of very large georeferenced multidimensional datasets. 683-686 - Laura Di Rocco, Davide Buscaldi, Michela Bertolotto, Barbara Catania, Giovanna Guerrini:
The role of geographic knowledge in sub-city level geolocation. 687-689
Theme: AI and agents: HCI - Smart human computer interaction track
- Jun Wang, Eugene Yujun Fu, Grace Ngai, Hong Va Leong, Michael Xuelin Huang:
Detecting stress from mouse-gaze attraction. 692-700 - Changyeol Choi, Joohee Jun, Jiwoong Heo, Kwanguk (Kenny) Kim:
Effects of virtual-avatar motion-synchrony levels on full-body interaction. 701-708 - (Withdrawn) Smart contract's interface for user centric business model in blockchain. 709-714
- Takafumi Higashi, Hideaki Kanai:
Stylus knife: improving cutting skill in paper-cutting by implementing pressure control. 714-721
Theme: AI and agents: HCI - Smart human computer interaction track: Student research abstract
- Waqas Khawaja:
Towards textualising analytic provenance for visual analytics using natural language generation. 722-725 - Sadia Din:
Human-enabled sustainable management of mobile cloud on 5G network: student research abstract. 726-727
Theme: Information systems: HI - Health informatics track
- Wan D. Bae, Matthew Horak, Shayma Alkobaisi, Sehjeong Kim, Sada Narayanappa, Choon-Sik Park, Da Jeong Bae:
A two-step approach to predictive modeling of individual-based environmental health risks. 729-738 - Maria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran, Márcia Keske Soares, Cristiano Cortez da Rocha:
Applying situation-awareness for recommending phonological processes in the children's speech. 739-746 - Jeethu V. Devasia, Priya Chandran, Anjana Soman, Aiswarya Elezabeth Mathew, Jaya Jharwal:
Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathways. 747-753 - Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith, Nesrine Ouled Abdallah:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. 754-761 - Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, Sungyoung Lee:
Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing. 762-770
Theme: Information systems: HI - Health informatics track: Poster papers
- Francisco Marques, Hugo Duarte, João A. M. Santos, Inês Domingues, José Pereira Amorim, Pedro H. Abreu:
An iterative oversampling approach for ordinal classification. 771-774 - Fabrício Neitzke Ferreira, Adenauer C. Yamin, Ana Marilza Pernas, Luciano Agostini, Alexandre de Souza, Jorge L. V. Barbosa:
IPBN: alerts management in intravenous electromedical devices using bayesian networks. 775-777
Theme: Information systems: HI - Health informatics track: Student research abstract
- Mahnaz Koupaee:
Mortality prediction using medical notes: student research abstract. 778-781 - Asaf Fux:
Video-based decision support for behavioral veterinarians: a case study of canine ADHD. 782-785
Theme: Information systems: IAR - Information access and retrieval track
- Thiziri Belkacem, Taoufiq Dkaki, José G. Moreno, Mohand Boughanem:
aMV-LSTM: an attention-based model with multiple positional text matching. 788-795 - Arman Bahraini, Eli Tilevich:
Ask toscanini!: architecting a search engine for music scores beyond metadata. 796-803 - Elias Bassani, Marco Viviani:
Automatically assessing the quality of Wikipedia contents. 804-807 - Nathalie Charbel, Christian Sallaberry, Sébastien Laborie, Richard Chbeir:
Hybrid molecule-based information retrieval. 808-815 - Vito Walter Anelli, Tommaso Di Noia, Eugenio Di Sciascio, Azzurra Ragone, Joseph Trotta:
The importance of being dissimilar in recommendation. 816-821
Theme: System software and security: IoT - Internet of things track
- Jordano Ribeiro Celestrini, Renato N. Rocha, Estêvão B. Saleme, Celso A. S. Santos, José Gonçalves Pereira Filho, Rodrigo Varejão Andreão:
An architecture and its tools for integrating IoT and BPMN in agriculture scenarios. 824-831 - Imad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi:
CyprIoT: framework for modelling and controlling network-based IoT applications. 832-841 - Sourajit Behera, Anurag Choubey, Chandresh S. Kanani, Yashwant Singh Patel, Rajiv Misra, Alberto Sillitti:
Ensemble trees learning based improved predictive maintenance using IIoT for turbofan engines. 842-850 - Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. 851-860 - Clémentine Gritti, Melek Önen, Refik Molva:
Privacy-preserving delegable authentication in the internet of things. 861-869 - Suman Bala, Dominique Barthel, Saïd Gharout:
Separate session key generation approach for network and application flows in LoRaWAN. 870-879 - Mayke Ferreira Arruda, Renato de Freitas Bulcão-Neto:
Toward a lightweight ontology for privacy protection in IoT. 880-888
Theme: System software and security: IoT - Internet of things track: Poster papers
- Gabriel Rodrigues Caldas de Aquino, Claudio M. de Farias, Luci Pirmez:
Hygieia: data quality assessment for smart sensor network. 889-891 - Bardia Safaei, Ali Asghar Mohammad Salehi, Maryam Shirbeigi, Amir Mahdi Hosseini Monazzah, Alireza Ejlali:
PEDAL: power-delay product objective function for internet of things applications. 892-895
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track
- Jacopo Talamini, Eric Medvet, Alberto Bartoli:
Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning. 898-905 - Ayan Dutta, Vladimir Ufimtsev, Asai Asaithambi:
Correlation clustering based coalition formation for multi-robot task allocation. 906-913 - Anna Lukina, Ashish Tiwari, Scott A. Smolka, Radu Grosu:
Distributed adaptive-neighborhood control for stochastic reachability in multi-agent systems. 914-921 - Marie Ossenkopf, Mackenzie Jorgensen, Kurt Geihs:
Hierarchical multi-agent deep reinforcement learning to develop long-term coordination. 922-929 - Alberto Castellini, Francesco Masillo, Manuele Bicego, Domenico Bloisi, Jason Blum, Alessandro Farinelli, Sergio Peignier:
Subspace clustering for situation assessment in aquatic drones. 930-937 - Rolif Lima, Kaushik Das, Debasish Ghose:
Support vector regression based sensor localization using UAV. 938-945 - Pere Molins, Sabine Hauert:
Trail formation using large swarms of minimal robots. 946-952
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track: Poster papers
- Ajay Kattepur, Balamuralidhar P:
RoboPlanner: autonomous robotic action planning via knowledge graph queries. 953-956 - Juan Pablo Vásconez, Leonardo Guevara, Fernando Alfredo Auat Cheeín:
Social robot navigation based on HRI non-verbal communication: a case study on avocado harvesting. 957-960
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track: Student research abstract
- Siobhan Duncan:
Taking stigmergy out of the lab and into the field: student research abstract. 961-964
Theme: AI and agents: KLP - Knowledge and language processing track
- Maria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran, Márcia Keske Soares, Cristiano Cortez da Rocha:
A case-based approach using phonological knowledge for identifying error patterns in children's speech. 968-975 - Abhik Jana, Animesh Mukherjee, Pawan Goyal:
Detecting reliable novel word senses: a network-centric approach. 976-983 - Frederique Baas, Olivier Bus, Alexander Osinga, Nikki van de Ven, Steffie van Loenhout, Lisanne Vrolijk, Kim Schouten, Flavius Frasincar:
Exploring lexico-semantic patterns for aspect-based sentiment analysis. 984-992 - Alexander Fritzler, Varvara Logacheva, Maksim Kretov:
Few-shot classification in named entity recognition task. 993-1000 - Guillaume Jacquet, Jakub Piskorski, Sophie Chesney:
Out-of-context fine-grained multi-word entity classification: exploring token, character n-gram and NN-based models for multilingual entity classification. 1001-1010 - Hugo Rodrigues, Luísa Coheur, Eric Nyberg:
Populating the knowledge base of a conversational agent: human vs. machine. 1011-1018 - Renato Stoffalette João, Pavlos Fafalios, Stefan Dietze:
Same but different: distant supervision for predicting and understanding entity linking difficulty. 1019-1026 - Haifa Alharthi, Diana Inkpen:
Study of linguistic features incorporated in a literary book recommender system. 1027-1034 - Luigi Di Caro, Alice Ruggeri:
Unveiling middle-level concepts through frequency trajectories and peaks analysis. 1035-1042 - Giorgia Ramponi, Marco Brambilla, Stefano Ceri, Florian Daniel, Marco Di Giovanni:
Vocabulary-based community detection and characterization. 1043-1050
Theme: AI and agents: KLP - Knowledge and language processing track: Poster papers
- Pantelis Agathangelou, Ioannis Katakis:
A hybrid deep learning network for modelling opinionated content. 1051-1053 - Simon Mille, Stamatia Dasiopoulou, Leo Wanner:
A portable grammar-based NLG system for verbalization of structured data. 1054-1056 - Siwen Guo, Sviatlana Höhn, Christoph Schommer:
Looking into the past: evaluating the effect of time gaps in a personalized sentiment model. 1057-1060 - Pinar Arslan, Michele Corazza, Elena Cabrio, Serena Villata:
Overwhelmed by negative emotions?: maybe you are being cyber-bullied! 1061-1063
Theme: AI and agents: KomIS - Knowledge discovery meets information systems track
- Ricardo Baeza-Yates, Alfredo Cuzzocrea, Domenico Crea, Giovanni Lo Bianco:
An effective and efficient algorithm for ranking web documents via genetic programming. 1065-1072 - Michele Ianni, Elio Masciari, Giuseppe M. Mazzeo, Carlo Zaniolo:
How to implement a big data clustering algorithm: a brief report on lesson learned. 1073-1080 - Maurizio Toccu, Giuseppe Psaila, Davide Altomare:
On-line aggregation of POIs from Google and Facebook. 1081-1089 - Ciro Sorrentino, Ester Giallonardo, Eugenio Zimeo:
Topic-based indexing of federated datasets. 1090-1098 - Ahsan Morshed, Abdur Rahim Mohammad Forkan, Pei-Wei Tsai, Prem Prakash Jayaraman, Timos Sellis, Dimitrios Georgakopoulos, Irene Moser, Rajiv Ranjan:
VisCrimePredict: a system for crime trajectory prediction and visualisation from heterogeneous data sources. 1099-1106
Theme: AI and agents: KomIS - Knowledge discovery meets information systems track: Poster papers
- Giancarlo Sperlì:
A deep learning based community detection approach. 1107-1110 - Donatello Conte, Pierre Gaucher, Carlo Sansone:
Catfish density estimation by aerial images analysis and deep learning. 1111-1114
Theme: AI and agents: KRR - Knowledge representation and reasoning track
- Djamal Habet, Cyril Terrioux:
Conflict history based search for constraint satisfaction problem. 1117-1122 - Franz Baader:
Expressive cardinality constraints on ALCSCC concepts. 1123-1130 - Christoph Beierle:
Inferential equivalence, normal forms, and isomorphisms of knowledge bases in institutions of conditional logics. 1131-1138 - Samy Sá, João F. L. Alcântara:
Interpretations and models for assumption-based argumentation. 1139-1146 - Gianvincenzo Alfano, Sergio Greco, Francesco Parisi:
On scaling the enumeration of the preferred extensions of abstract argumentation frameworks. 1147-1153 - Odinaldo Rodrigues:
Representing and comparing large sets of extensions of abstract argumentation frameworks. 1154-1161
Theme: AI and agents: KRR - Knowledge representation and reasoning track: Poster papers
- Vitaliy Batusov, Giuseppe De Giacomo, Mikhail Soutchanski:
Hybrid temporal situation calculus. 1162-1164
Theme: AI and agents: KRR - Knowledge representation and reasoning track: Student research abstract
- MinCong Luo China:
Automatic derivation of formulas by graph embedding and pattern matching network. 1165-1167 - Kai Sauerwald:
Modelling the dynamics of forgetting and remembering by a system of belief changes: student research abstract. 1168-1171
Theme: Distributed systems: MCA - Mobile computing and applications track
- Andreas Konstantinidis, Aphrodite Demetriades, Savvas Pericleous:
A multi-objective indoor localization service for smartphones. 1174-1181 - Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue:
A scalable and accurate feature representation method for identifying malicious mobile applications. 1182-1189 - Takahiro Miura, Mari Ueda, Masaaki Hiroe, Ken-ichiro Yabu:
Acousess: smartphone-based logger to assess acoustical conditions: subjective noise conditions on some circumference and intraindividual variation. 1190-1199 - Ismat Chaib Draa, Fabien Bouquillon, Smaïl Niar, Emmanuelle Grislin-Le Strugeon:
Machine learning for improving mobile user satisfaction. 1200-1207 - Jung-Hyun Lee, Woo-Jong Ryu, Kang-Min Kim, SangKeun Lee:
MoCA: a novel privacy-preserving contextual advertising platform on mobile devices. 1208-1215
Theme: Distributed systems: MCA - Mobile computing and applications track: Poster papers
- Muhammad Ahmad, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Amjad Ali, Ali Tufail:
Extended sammon projection and wavelet kernel extreme learning machine for gait-based legitimate user identification. 1216-1219
Theme: Distributed systems: MCA - Mobile computing and applications track: Student research abstract
- Muntazir Mehdi:
Smart mobile crowdsensing for tinnitus research: student research abstract. 1220-1223
Theme: Distributed systems: MiDOS - Microservices, DevOps, and service-oriented architecture track
- Mario Cardarelli, Ludovico Iovino, Paolo Di Francesco, Amleto Di Salle, Ivano Malavolta, Patricia Lago:
An extensible data-driven approach for evaluating the quality of microservice architectures. 1225-1234 - Amjad Ibrahim, Stevica Bozhinoski, Alexander Pretschner:
Attack graph generation for microservice architecture. 1235-1242 - Cleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio Vinicius Serafim Prazeres:
Reactive microservices for the internet of things: a case study in fog computing. 1243-1251 - Matheus Santana, Adalberto R. Sampaio Jr., Marcos Andrade, Nelson S. Rosa:
Transparent tracing of microservice-based applications. 1252-1259
Theme: Distributed systems: MiDOS - Microservices, DevOps, and service-oriented architecture track: Poster papers
- Florian Rademacher, Jonas Sorgalla, Sabine Sachweh, Albert Zündorf:
A model-driven workflow for distributed microservice development. 1260-1262
Theme: AI and agents: MLA - Machine learning and its applications track
- Sachin Bhardwaj, Keon-Myung Lee, Jee-Hyong Lee:
An adaptive framework for applying machine learning in smart spaces. 1263-1270 - Walisson Ferreira de Carvalho, Luis Enrique Zárate:
Causality relationship among attributes applied in an educational data set. 1271-1277 - Qadeer Ahmad, Atif Rafiq, Muhammad Adil Raja, Noman Javed:
Evolving MIMO multi-layered artificial neural networks using grammatical evolution. 1278-1285 - Duc-Trung Nguyen, Maurizio Filippone, Pietro Michiardi:
Exact gaussian process regression with distributed computations. 1286-1295 - Shahroz Tariq, Sangyup Lee, Hoyoung Kim, Youjin Shin, Simon S. Woo:
GAN is a friend or foe?: a framework to detect various fake face images. 1296-1303 - Maurizio Leotta, Dario Olianas, Filippo Ricca, Nicoletta Noceti:
How do implementation bugs affect the results of machine learning algorithms? 1304-1313 - Suk-Jin Hong, Yun-Yong Ko, Moon Jeung Joe, Sang-Wook Kim:
Influence maximization for effective advertisement in social networks: problem, solution, and evaluation. 1314-1321 - Tim Molderez, Bjarno Oeyen, Coen De Roover, Wolfgang De Meuter:
Marlon: a domain-specific language for multi-agent reinforcement learning on networks. 1322-1329 - David Tolpin:
Population anomaly detection through deep gaussianization. 1330-1336 - Hideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Noboru Murata:
Real-time botnet detection using nonnegative tucker decomposition. 1337-1344 - Mustansar Fiaz, Arif Mahmood, Soon Ki Jung:
Convolutional neural network with structural input for visual object tracking. 1345-1352
Theme: AI and agents: MLA - Machine learning and its applications track: Poster papers
- Hansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong:
An efficient deep learning platform for detecting objects. 1353-1354 - Pamul Yadav, Sangsu Jung, Dhananjay Singh:
Machine learning based real-time vehicle data analysis for safe driving modeling. 1355-1358 - Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Sylvie Calabretto, Olivier Caelen, Liyun He-Guelton, Michael Granitzer:
Multiple perspectives HMM-based feature engineering for credit card fraud detection. 1359-1361 - Obada Al Zoubi, Mariette Awad:
Toward a continuous authentication system using a biologically inspired machine learning approach: a case study. 1362-1364
Theme: Distributed systems: NET - Networking track
- Ricardo Borges Almeida, Victor Renan Covalski Junes, Roger da Silva Machado, Diórgenes Yuri Leal da Rosa, Adenauer Corrêa Yamin, Lucas Medeiros Donato, Ana Marilza Pernas:
A hierarchical architectural model for network security exploring situational awareness. 1365-1372 - Marcelo Ricardo Leitner, Mauro Sérgio Pereira Fonseca, Anelise Munaretto:
On simplifying congestion window handling for CMT-SCTP. 1373-1377 - Andreas Fischer, Alexandru Paler:
On the analogy between quantum circuit design automation and virtual network embedding. 1378-1383 - Marcelo Da Silva Conterato, Tiago Coelho Ferreto, Fábio D. Rossi, Wagner dos Santos Marques, Paulo Silas Severo de Souza:
Reducing energy consumption in SDN-based data center networks through flow consolidation strategies. 1384-1391
Theme: Distributed systems: NET - Networking track: Poster papers
- Helge Parzyjegla, Christian Wernecke, Gero Mühl, Eike Bjoern Schweissguth, Dirk Timmermann:
Implementing content-based publish/subscribe with OpenFlow. 1392-1395
Theme: Distributed systems: NET - Networking track: Student research abstract
- Roger Pueyo Centelles:
Extending LoRa networks: dynamic routing protocols and sub-GHz radio technology for very long range mesh networks: student research abstract. 1396-1397
Theme: System software and security: NGPS - Next generation programming paradigms and systems track
- Arvid Jakobsson, Frédéric Dabrowski, Wadoud Bousdira:
Safe usage of registers in BSPlib. 1400-1407
Theme: System software and security: OS - Operating systems track
- Meriem Ben Messaoud, Khaled Ghédira:
A solution for a detailed mathematical model for the aircraft landing problem on a single and multiple runway system. 1408-1414 - Rasha Almajed, Ramesh K. Karne, Alexander L. Wijesinha:
Binary transformation of applications to run on bare PCs. 1416-1423 - Jaeheong Ahn, Choulseung Hyun, Donghee Lee, Sam H. Noh:
Cache-aware block allocation for memory-technology storage targeted file systems. 1424-1431 - Myungjoon Shon, Heejin Kim, Kicheol Park, Juw Won Park, Kwanghee Won, Jiman Hong:
A robust and secure backup system for protecting malware. 1432-1437 - Gunhee Choi, Juhyung Son, Jongmoo Choi, Seong-je Cho, Youjip Won:
HPanal: a framework for analyzing tradeoffs of huge pages. 1438-1443 - Sanghun Cho, Jaewan Hong, Jungsik Choi, Hwansoo Han:
Multithreaded double queuing for balanced CPU-GPU memory copying. 1444-1450 - Darius-Florentin Neatu, Radu-Dumitru Stochitoiu, Andrei Vlad Postoaca, Ion-Dorinel Filip, Florin Pop:
My cloudy time machine: a scalable microservice-based platform for data processing in cloud-edge systems: a proof of concept for the ROBIN-cloud project. 1451-1458
Theme: System software and security: OS - Operating systems track: Poster papers
- Hong Min, Kwangsoo Jo, Jinman Jung, Bongjae Kim, Junyoung Heo:
A rendezvous node selection protocol for drone-based data collection. 1459-1461 - Jaehyun Kim, Taehyoung Kim, Jieun Lee, Kyung Sun Ham:
Predicting 24-hours ahead photovoltaic power output using forecast information. 1462-1464
Theme: System software and security: PDP - Privacy by design in practice track
- Mina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González:
Dynamic attribute-based privacy-preserving genomic susceptibility testing. 1467-1474 - Fatbardh Veseli, Jetzabel Serna-Olvera, Tobias Pulls, Kai Rannenberg:
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform. 1475-1483 - Fabio Aiolli, Mauro Conti, Ankit Gangwal, Mirko Polato:
Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis. 1484-1491 - Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. 1492-1499 - Christoph Stach, Frank Steimle:
Recommender-based privacy requirements elicitation - EPICUREAN: an approach to simplify privacy settings in IoT applications with respect to the GDPR. 1500-1507
Theme: System software and security: PDP - Privacy by design in practice track: Poster papers
- Jihye Kim, Hankyung Ko, Hyunok Oh:
AILocker: authenticated image locker for video. 1508-1511 - Pierre Dewitte, Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
A comparison of system description models for data protection by design. 1512-1515
Theme: System software and security: PL - Programming languages track
- Elton M. Cardoso, Rodrigo Geraldo Ribeiro, Leonardo Vieira dos Santos Reis, Mariza A. S. Bigonha, Roberto S. Bigonha, Vladimir Oliveira Di Iorio:
An attribute language definition for adaptable parsing expression grammars. 1518-1525 - Daisuke Yamaguchi, Kimio Kuramitsu:
CPEG: a typed tree construction from parsing expression grammars with regex-like captures. 1526-1533 - Christoph Rieger, Fabian Wrede, Herbert Kuchen:
Musket: a domain-specific language for high-level parallel programming with algorithmic skeletons. 1534-1543 - Caglar Durmaz, Kasim Sinan Yildirim, Geylani Kardas:
PureMEM: a structured programming model for transiently powered computers. 1544-1551 - Jan C. Dageförde, Herbert Kuchen:
Retrieval of individual solutions from encapsulated search with a potentially infinite search space. 1552-1561 - Christiano Braga:
π: towards a simple formal semantic framework for compiler construction. 1562-1569
Theme: System software and security: PL - Programming languages track: Poster papers
- Luiz Carlos Camargo, Marcos Didonet Del Fabro:
Applying a data-centric framework for developing model transformations. 1570-1573 - Torben Weis, Marian Waltereit, Maximilian Uphoff:
Fyr: a memory-safe and thread-safe systems programming language. 1574-1577 - Jolan Philippe, Frédéric Loulergue:
Parallel programming with Coq: map and reduce skeletons on trees. 1578-1581
Theme: Software design and development: RE - Requirements engineering track
- Luis Hernán García Paucar, Nelly Bencomo, Kevin Kam Fung Yuen:
ARRoW: automatic runtime reappraisal of weights for self-adaptation. 1584-1591 - Feng Chen, Norah Power, J. J. Collins, Fuyuki Ishikawa:
Contemporary requirements challenges and issues: an empirical study in 11 organizations. 1592-1599 - Marian Daun, Viktoria Stenkova, Lisa Krajinski, Jennifer Brings, Torsten Bandyszak, Thorsten Weyer:
Goal modeling for collaborative groups of cyber-physical systems with GRL: reflections on applicability and limitations based on two studies conducted in industry. 1600-1609 - Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
Logic-based methodology to help security architects in eliciting high-level network security requirements. 1610-1619 - Youssou Ndiaye, Olivier Barais, Arnaud Blouin, Ahmed Bouabdallah, Nicolas Aillery:
Requirements for preventing logic flaws in the authentication procedure of web applications. 1620-1628
Theme: Software design and development: RE - Requirements engineering track: Poster papers
- Michael Masin, Francesca Palumbo, Joost Adriaanse, Hans Myrhaug, Francesco Regazzoni, Manuel Sanchez, Katiuscia Zedda:
Elicitation of technical requirements in large research projects: the CERBERO approach. 1629-1632
Theme: Software design and development: RE - Requirements engineering track: Student research abstract
- Muhammad Azeem Akbar:
SRCMIMM: managing requirements change activities in global software development: student research abstract. 1633-1636
Theme: System software and security: RS - Recommender systems: Theory and applications track
- Mesut Kaya, Derek G. Bridge:
Community-aware diversification of recommendations. 1639-1646 - Nicolas Gutowski, Tassadit Amghar, Olivier Camp, Fabien Chhel:
Global versus individual accuracy in contextual multi-armed bandit. 1647-1654 - Seda Polat Erdeniz, Alexander Felfernig, Ralph Samer, Muesluem Atas:
Matrix factorization based heuristics for constraint-based recommenders. 1655-1662 - Dimitris Sacharidis:
Top-N group recommendations with fairness. 1663-1670 - Caio Nóbrega, Leandro Balby Marinho:
Towards explaining recommendations through local surrogate models. 1671-1678
Theme: System software and security: RS - Recommender systems: Theory and applications track: Poster papers
- Mostafa Bayomi, Annalina Caputo, Matthew Nicholson, Anirban Chakraborty, Séamus Lawless:
CoRE: a cold-start resistant and extensible recommender system. 1679-1682 - Steffen Schnitzer, Dominik Reis, Wael Alkhatib, Christoph Rensing, Ralf Steinmetz:
Preselection of documents for personalized recommendations of job postings based on word embeddings. 1683-1686 - Catalin-Mihai Barbu, Guillermo Carbonell, Jürgen Ziegler:
The influence of trust cues on the trustworthiness of online reviews for recommendations. 1687-1689
Theme: Software design and development: SATTA - Software architecture: Theory, technology, and applications track
- Yun Zhang, Xiwei Xu, Suhrid Satyal, Shiping Chen, Liming Zhu:
A RESTful architecture for data exploration as a service. 1692-1700 - Marco Autili, Amleto Di Salle, Francesco Gallo, Claudio Pompilio, Massimo Tivoli:
Aiding the realization of service-oriented distributed systems. 1701-1710 - Aymen Daoudi, Ghizlane El-Boussaidi, Naouel Moha, Segla Kpodjedo:
An exploratory study of MVC-based architectural patterns in Android apps. 1711-1720 - Panagiotis Kouros, Theodore Chaikalis, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Theodoros Amanatidis:
JCaliper: search-based technical debt management. 1721-1730 - Benjamin Mayer, Rainer Weinreich:
The effect of gamification on software architecture knowledge management: a student experiment and focus group study. 1731-1740
Theme: Software design and development: SE - Software engineering track
- Hendrik Bünder, Herbert Kuchen:
A model-driven approach for behavior-driven GUI testing. 1742-1751 - Misoo Kim, Eunseok Lee:
A novel approach to automatic query reformulation for IR-based bug localization. 1752-1759 - Sirine Gharbi, Mohamed Wiem Mkaouer, Ilyes Jenhani, Montassar Ben Messaoud:
On the classification of software change messages using multi-label active learning. 1760-1767 - Omar Javed, Alex Villazón, Walter Binder:
JUniVerse: large-scale JUnit-test analysis in the wild. 1768-1775 - Michael Alexander Tröls, Atif Mashkoor, Alexander Egyed:
Live and global consistency checking in a collaborative engineering environment. 1776-1785 - Md. Rakibul Islam, Md Kauser Ahmmed, Minhaz F. Zibran:
MarValous: machine learning based detection of emotions in the valence-arousal space in software engineering text. 1786-1793 - Filippo Schiavio, Haiyang Sun, Daniele Bonetta, Andrea Rosà, Walter Binder:
NodeMOP: runtime verification for Node.js applications. 1794-1801 - Junye Wen, Guowei Yang:
Parallel property checking with staged symbolic execution. 1802-1809 - Simo Mäkinen, Timo Lehtonen, Terhi Kilamo, Mikko Puonti, Tommi Mikkonen, Tomi Männistö:
Revisiting continuous deployment maturity: a two-year perspective. 1810-1817 - Miren Illarramendi Rezabal, Leire Etxeberria, Xabier Elkorobarrutia, Goiuria Sagardui:
Runtime observable and adaptable UML state machines: models@run.time approach. 1818-1827 - Christoph Luckeneder, Hermann Kaindl:
A case study of systematic top-down design of cyber-physical models with integrated validation and formal verification. 1828-1836 - Théo Le Calvar, Fabien Chhel, Frédéric Jouault, Frédéric Saubion:
Toward a declarative language to generate explorable sets of models. 1837-1844 - Sai Anirudh Karre, Neeraj Mathur, Y. Raghu Reddy:
Usability evaluation of VR products in industry: a systematic literature review. 1845-1851 - Vinícius Gomes Ferreira, Edna Dias Canedo:
Using design sprint as a facilitator in active learning for students in the requirements engineering course: an experience report. 1852-1859
Theme: Software design and development: SE - Software engineering track: Poster papers
- Mohd Syafiq Zolkeply, Jianhua Shao:
Classifying software issue reports through association mining. 1860-1863 - Thomas Krismayer, Rick Rabiser, Paul Grünbacher:
Mining constraints for monitoring systems of systems. 1864-1866 - Sara Ramezanian, Tommi Meskanen, Valtteri Niemi:
Privacy preserving 2-party queries on bipartite graphs with private set intersection. 1867-1870 - Hao Wu:
Synthesising call sequences from OCL operational contracts. 1871-1873 - Marcel Heimlich, Akbar Siami Namin:
TestLocal: just-in-time parametrized testing of local variables. 1874-1877 - Gonçalo Miguéis, João Araújo, Ana Moreira:
Towards a requirements language for modeling emotion in videogames. 1878-1880 - Danielle Gaither, Kaushik Madala, Hyunsook Do, Barrett R. Bryant:
VeriCCM: improving the syntax and semantics of requirements models. 1881-1884
Theme: Software design and development: SE - Software engineering track: Student research abstract
- Hina Gul Afridi:
Empirical study on developer's perception regarding reward practices: student research abstract. 1885-1887
Theme: System software and security: SEC - Computer security track
- Rui Xu, Xiaojun Chen, Jinqiao Shi:
A coarse-grained password model with memorable unit-based recurrent neural networks. 1890-1897 - Valentin Zieglmeier, Severin Kacianka, Thomas Hutzelmann, Alexander Pretschner:
A real-time remote IDS testbed for connected vehicles. 1898-1905 - Jay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry B. Goldgof:
Coauthentication. 1906-1915 - Jan Spooren, Davy Preuveneers, Lieven Desmet, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. 1916-1923 - Michael Brunner, Andrea Mussmann, Ruth Breu:
Enabling change-driven workflows in continuous information security management. 1924-1933 - Dhiman Chakraborty, Christian Hammer, Sven Bugiel:
Secure multi-execution in Android. 1934-1943 - Ben Amos, Niv Gilboa, Arbel Levy:
Spectre without shared memory. 1944-1951 - Gebrehiwet B. Welearegai, Max Schlüter, Christian Hammer:
Static security evaluation of an industrial web application. 1952-1961 - Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
The ROP needle: hiding trigger-based injection vectors via code reuse. 1962-1970 - Patrick Speicher, Marcel Steinmetz, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. 1971-1978
Theme: System software and security: SEC - Computer security track: Student research abstract
- Majid Hatamian:
"Hard to understand, easy to ignore: " an automated approach to predict mobile app permission requests: student research abstract. 1979-1982 - Monina Schwarz:
Digital forensics in the internet of things: student research abstract. 1983-1985
Theme: Information systems: SFECS - Sustainability of fog/edge computing systems track
- María Teresa González-Aparicio, Muhammad Younas, Javier Tuya, Rubén Casado:
Evaluation of ACE properties of traditional SQL and NoSQL big data systems. 1988-1995 - Maria Rita Palattella, Ridha Soua, Abdelmajid Khelil, Thomas Engel:
Fog computing as the key for seamless connectivity handover in future vehicular networks. 1996-2000 - Devarani Devi Ningombam, Seokjoo Shin:
Resource-sharing optimization for multicast D2D communications underlaying LTE-A uplink cellular networks. 2001-2007 - Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Mohammed Al-Khafajiy, Vanilson Arruda Burégio:
Towards a seamless coordination of cloud and fog: illustration through the internet-of-things. 2008-2015 - Jeongin Kim, Taekeun Hong, Pankoo Kim:
Word2Vec based spelling correction method of Twitter message. 2016-2019
Theme: System software and security: SiSoS - Software-intensive systems-of-systems track
- Damir Nesic, Mattias Nyberg, Barbara Gallina:
Constructing product-line safety cases from contract-based specifications. 2022-2031 - Samir Ouchani:
Towards a fractionation-based verification: application on SysML activity diagrams. 2032-2039
Theme: System software and security: SiSoS - Software-intensive systems-of-systems track: Poster papers
- Phu Hong Nguyen, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
The preliminary results of a mapping study of deployment and orchestration for IoT. 2040-2043 - Yong-Jun Shin, Young Min Baek, Eunkyoung Jee, Doo-Hwan Bae:
Data-driven environment modeling for adaptive system-of-systems. 2044-2047
Theme: Information systems: SONAMA - Social network and media analysis track
- Yara Rizk, Hadi Samer Jomaa, Mariette Awad, Carlos Castillo:
A computationally efficient multi-modal classification approach of disaster-related Twitter images. 2050-2059 - Marco Brambilla, Mattia Gasparini:
Brand community analysis on social networks using graph representation learning. 2060-2069 - Mariana O. Silva, Laís Mota de Alencar Rocha, Mirella M. Moro:
Collaboration profiles and their impact on musical success. 2070-2077 - Narimene Dakiche, Fatima Benbouzid-Si Tayeb, Yahya Slimani, Karima Benatchba:
Community evolution prediction in dynamic social networks using community features' change rates. 2078-2085 - PinHua Wu, Jia-Ling Koh, Arbee L. P. Chen:
Event detection for exploring emotional upheavals of depressive people. 2086-2095 - Alessandro Balestrucci, Rocco De Nicola, Omar Inverso, Catia Trubiani:
Identification of credulous users on Twitter. 2096-2103 - Shubham Singh, Rishabh Kaushal, Arun Balaji Buduru, Ponnurangam Kumaraguru:
KidsGUARD: fine grained approach for child unsafe video representation and detection. 2104-2111 - Abir Troudi, Salma Jamoussi, Corinne Amel Zayani, Ikram Amous:
Multidimensional analysis of hot events from social media sources. 2112-2119
Theme: Information systems: SONAMA - Social network and media analysis track: Poster papers
- Joohong Lee, Dongyoung Sohn, Yong Suk Choi:
A tool for spatio-temporal analysis of social anxiety with Twitter data. 2120-2123 - Danilo Dessì, Mauro Dragoni, Gianni Fenu, Mirko Marras, Diego Reforgiato Recupero:
Evaluating neural word embeddings created from online course reviews for sentiment analysis. 2124-2127 - Ashis Talukder, Choong Seon Hong:
Knapsack-based reverse influence maximization for target marketing in social networks. 2128-2130 - Fatemeh Salehi Rizi, Michael Granitzer:
Predicting event attendance exploring social influence. 2131-2134 - Eunji Lee, Htet Myet Lynn, Hyoungju Kim, Soonja Yeom, Pankoo Kim:
Semantic analysis for paraphrase identification using semantic role labeling. 2135-2138
Theme: System software and security: SP - Software platforms track
- Jinwoo Lee, Yena Lee, Ming Jin, John Kim, Jiman Hong:
Analysis of application installation logs on Android systems. 2140-2145 - Gibeom Song, Manhee Lee:
Design and implementation of emulab-based malware analysis service through EmuLiB. 2146-2151 - Junghoon Kim, Sundoo Kim, Juseong Yun, Youjip Won:
Energy efficient IO stack design for wearable device. 2152-2159
Theme: System software and security: SP - Software platforms track: Poster papers
- Taehyoung Kim, Jaehyun Kim, Jieun Lee, Kyung Sun Ham:
A design and implementation wind farm real-time simulator with various types of wind turbine considering wake effect. 2160-2163 - Ilya Khomyakov, Alberto Sillitti:
A novel approach for collecting and sharing software metrics data. 2164-2167
Theme: Software design and development: SVT - Software verification and testing track
- Predrag Filipovikj, Guillermo Rodríguez-Navas, Cristina Seceleanu:
Bounded invariance checking of simulink models. 2168-2177 - Daniel Balasubramanian, Zhenkai Zhang, Dan McDermet, Gabor Karsai:
Dynamic symbolic execution for the analysis of web server applications in Java. 2178-2185 - Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue:
Logic against ghosts: comparison of two proof approaches for a list module. 2186-2195 - Ramon Janssen, Jan Tretmans:
Matching implementations to specifications: the corner cases of ioco. 2196-2205 - Joshua Heneage Dawes, Giles Reger:
Specification of temporal properties of functions for runtime verification. 2206-2214 - Isabella Mastroeni, Michele Pasqua:
Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interference. 2215-2223 - Pedro Delgado-Pérez, Sergio Segura:
Study of trivial compiler equivalence on C++ object-oriented mutation operators. 2224-2230 - Mihai Herda, Shmuel S. Tyszberowicz, Joachim Müssig, Bernhard Beckert:
Verification-based test case generation for information-flow properties. 2231-2238
Theme: Information systems: SWA - Semantic web and applications track
- Mirko Cesarini, Fabio Mercorio, Mario Mezzanzanica, Vincenzo Moscato, Antonio Picariello:
A tool for exploring networks of computer scientists as a graph. 2240-2242 - Emir Muñoz, Pasquale Minervini, Matthias Nickles:
Embedding cardinality constraints in neural link predictors. 2243-2250 - Barbara Catania, Giovanna Guerrini, Beyza Yaman:
Exploiting context and quality for linked data source selection. 2251-2258 - Nikiforos Pittaras, George Papadakis, George Stamoulis, Giorgos Argyriou, Efi Karra Taniskidou, Emmanouil Thanos, George Giannakopoulos, Leonidas Tsekouras, Manolis Koubarakis:
GeoSensor: semantifying change and event detection over big data. 2259-2266 - Pavlos Fafalios, Yannis Tzitzikas:
How many and what types of SPARQL queries can be answered through zero-knowledge link traversal? 2267-2274 - Franck Ravat, Jiefu Song, Olivier Teste, Cássia Trojahn:
Improving the performance of querying multidimensional RDF data using aggregates. 2275-2284 - Amir Laadhar, Faiza Ghozzi, Imen Megdiche, Franck Ravat, Olivier Teste, Faïez Gargouri:
Partitioning and local matching learning of large biomedical ontologies. 2285-2292 - Yevgen Pikus, Norbert Weißenberg, Bernhard Holtkamp, Boris Otto:
Semi-automatic ontology-driven development documentation: generating documents from RDF data and DITA templates. 2293-2302 - David Abián, Jorge Bernad, Raquel Trillo Lado:
Using contemporary constraints to ensure data consistency. 2303-2310
Theme: Information systems: SWA - Semantic web and applications track: Poster papers
- Said Fathalla, Sahar Vahdati, Sören Auer, Christoph Lange:
The scientific events ontology of the OpenResearch.org curation platform. 2311-2313
Theme: Information systems: SWA - Semantic web and applications track: Student research abstract
- Ronald Ochieng Ojino:
User's profile ontology-based semantic model for personalized hotel room recommendation in the web of things: student research abstract. 2314-2316
Theme: Software design and development: UE - Usability engineering track
- Takahiro Miura, Ken-ichiro Yabu, Youji Shimizu, Kenichi Tanaka, Masamitsu Furukawa, Seiko Michiyoshi, Tetsuya Yamamoto, Kazutaka Ueda, Tohru Ifukube:
Cognitive workload of in-car auditory-vocal interfaces on visuospatial sketchpad based on a dual task of visual pattern test. 2319-2327 - Rafael Fontinele Ribeiro, Matheus de Meneses Campanhã Souza, Pedro Almir Martins de Oliveira, Pedro de Alcântara dos Santos Neto:
Usability problems discovery based on the automatic detection of usability smells. 2328-2335
Theme: Software design and development: UE - Usability engineering track: Poster papers
- Isaiah Liljestrand, Marcelo Gonzales, Dongwan Shin:
Developing a mental model for use in the context of computer security. 2336-2339 - Cristina Scheibler, Maria Andréia Formico Rodrigues:
User experience evaluation focused on viewpoints and embodiment. 2340-2343
Theme: Software design and development: VSPLE - Variability and software product line engineering track
- Philipp Heisig, Jan-Philipp Steghöfer, Christopher Brink, Sabine Sachweh:
A generic traceability metamodel for enabling unified end-to-end traceability in software product lines. 2344-2353 - Ana Paula Allian, Bruno Sena, Elisa Yumi Nakagawa:
Evaluating variability at the software architecture level: an overview. 2354-2361 - Urtzi Markiegi, Aitor Arrieta, Leire Etxeberria, Goiuria Sagardui:
Test case selection using structural coverage in software product lines for time-budget constrained scenarios. 2362-2371
Theme: Software design and development: VSPLE - Variability and software product line engineering track: Poster papers
- Muhammad Atif Javed, Barbara Gallina, Anna Carlsson:
Towards variant management and change impact analysis in safety-oriented process-product lines. 2372-2375
Theme: Distributed systems: WCN - Selected areas of wireless communications and networking track
- Anupam Kumar Bairagi, Md. Shirajum Munir, Madyan Alsenwi, Nguyen Hoang Tran, Choong Seon Hong:
A matching based coexistence mechanism between eMBB and uRLLC in 5G wireless networks. 2377-2384 - Minseok Kim, Sungwon Lee, Muhammad Toaha Raza Khan, Junho Seo, Yeongjoon Bae, Yonghwan Jeong, Dongkyun Kim:
A new CoAP congestion control scheme using message loss feedback for IoUT. 2385-2390 - Bilal Jan, Haleem Farman, Murad Khan, Syed Hassan Ahmed:
An adaptive energy efficient scheme for energy constrained wireless sensor networks. 2391-2398 - Do-hyung Kim, Young-Bae Ko:
Energy-aware medium access control for energy-harvesting machine-to-machine networks. 2399-2405 - Hossein Ajorloo, Cormac J. Sreenan, Adrian Loch, Joerg Widmer:
On the feasibility of using IEEE 802.11ad mmWave for accurate object detection. 2406-2413 - Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro:
Reliability of ADS-B communications: novel insights based on an experimental assessment. 2414-2421 - Guilherme R. M. de Oliveira, Carlos Renato Storck, Fátima de L. P. Duarte-Figueiredo:
SoftH: soft handover multicriteria mechanism. 2422-2429
Theme: Distributed systems: WCN - Selected areas of wireless communications and networking track: Poster papers
- Adda Boualem, Youcef Dahmani, Marwane Ayaida, Cyril de Runz:
A new fuzzy/evidential approach to address the area coverage problem in mobile wireless sensor networks. 2430-2433
Theme: Information systems: WICE - Web-based technologies for interactive computing education track
- Tobias Reischmann, Herbert Kuchen:
A web-based e-assessment tool for design patterns in UML class diagrams. 2435-2444 - Maria da Graça Campos Pimentel, Cristiane A. Yaguinuma, Diogo Santana Martins, Isabela Zaine:
Anchoring interactive points of interest on web-based instructional video: effects on students' interaction behavior and perceived experience. 2445-2452 - Yong Zheng, Shephalika Shekhar, Alisha Anna Jose, Sunil Kumar Rai:
Integrating context-awareness and multi-criteria decision making in educational learning. 2453-2460 - Josue Espinosa Godinez, Hasan M. Jamil:
Meet cyrus: the query by voice mobile assistant for the tutoring and formative assessment of SQL learners. 2461-2468
Theme: Information systems: WICE - Web-based technologies for interactive computing education track: Poster papers
- Hossain Shahriar, Chi Zhang, Md Arabin Islam Talukder, Sheikh Iqbal Ahamed:
Resources for healthcare workflow modeling and analysis. 2469-2472 - Niels Heller, Sebastian Mader, François Bry:
More than the sum of its parts: designing learning formats from core components. 2473-2476
Theme: Distributed systems: WT - Web technologies track
- Luiz Soares dos Santos Baglie, Diego Roberto Colombo Dias, Marcelo de Paiva Guimarães, José Remo Ferreira Brega:
A literature review of studies on interactive 3D information visualization for the web. 2479-2488 - Donatas Meskele, Flavius Frasincar:
ALDONA: a hybrid solution for sentence-level aspect-based sentiment analysis using a lexicalised domain ontology and a neural attention model. 2489-2496 - Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Mind the cache: large-scale explorative study of web caching. 2497-2506 - Martin Garriga, Andres Flores:
Standards-driven metamodel to increase retrievability of heterogeneous services. 2507-2514 - Ena Tominaga, Yoshitaka Arahori, Katsuhiko Gondow:
AwaitViz: a visualizer of JavaScript's async/await execution order. 2515-2524
Theme: Distributed systems: WT - Web technologies track: Poster papers
- Yong Zheng, Alisha Anna Jose:
Context-aware recommendations via sequential predictions. 2525-2528 - Yong Zheng:
Utility-based multi-criteria recommender systems. 2529-2531 - Patrick Vanvorce, Hasan M. Jamil:
Computational thinking with the web crowd using CodeMapper. 2532-2534
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.