default search action
44th COMPSAC 2020: Madrid, Spain
- 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020, Madrid, Spain, July 13-17, 2020. IEEE 2020, ISBN 978-1-7281-7303-0
- Marco Moletta, Matteo Tadiello:
Comparison of Collision Avoidance Algorithms for Autonomous Multi-agent Systems. 1-9 - Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. 10-17 - Manuel Boldrer, Luigi Palopoli, Daniele Fontanelli:
Socially-Aware Multi-agent Velocity Obstacle Based Navigation for Nonholonomic Vehicles. 18-25 - Bharathwaj Krishnaswami Sreedhar, Nagarajan Shunmugam:
Deep Learning for Hardware-Constrained Driverless Cars. 26-29 - Ambikeya Pradhan, Marta Boavida, Daniele Fontanelli:
A Comparative Analysis of Foraging Strategies for Swarm Robotics using ARGoS Simulator. 30-35 - Thayanne França da Silva, Matheus Santos Araújo, Raimundo Juracy Campos Ferro Junior, Leonardo Ferreira da Costa, João Pedro Bernardino Andrade, Gustavo Augusto Lima de Campos, Joaquim Celestino Jr.:
Improving the Behavior of Evasive Targets in Cooperative Target Observation. 36-41 - Aditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu:
A Real-Time Feature Indexing System on Live Video Streams. 42-50 - Tokiko Takayama, Kenichi Kourai:
Optimization of Parallel Applications Under CPU Overcommitment. 51-60 - Tomohisa Aoshima, Kenichi Yoshida:
Pre-Design Stage Cost Estimation for Cloud Services. 61-66 - Mahmoud Hussein, Réda Nouacer:
Towards an Architecture for Customizable Drones. 67-72 - Chunhua Xiao, Fangzhu Lin, Xiaoxiang Fu, Ting Wu, Yuanjun Zhu, Weichen Liu:
Mobi-PMFS: An Efficient and Durable In-Memory File System for Mobile Devices. 73-78 - Matteo Andreozzi, Frances Conboy, Giovanni Stea, Raffaele Zippo:
Heterogeneous Systems Modelling with Adaptive Traffic Profiles and Its Application to Worst-Case Analysis of a DRAM Controller. 79-86 - Jakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin:
Resource Depedency Analysis in Multi-Core Systems. 87-94 - Luca Cagliero, Lorenzo Canale, Laura Farinetti:
UNIFORM: Automatic Alignment of Open Learning Datasets. 95-102 - Alisson Renan Svaigen, Lailla Milainny Siqueira Bine, Wuigor Ivens Siqueira Bine, Linnyer Beatrys Ruiz:
MannAccess: A Novel Low Cost Assistive Educational Tool of Digital Image for Visually Impaired. 103-112 - Henry C. B. Chan, Yik Him Ho, Edmundo Tovar, Sorel Reisman:
Enhancing the Learning of Computing/IT Students with Open Educational Resources. 113-122 - William Simão de Deus, Ellen Francine Barbosa:
The Use of Metadata in Open Educational Resources Repositories: An Exploratory Study. 123-132 - Giuseppe Attanasio, Flavio Giobergia, Andrea Pasini, Francesco Ventura, Elena Baralis, Luca Cagliero, Paolo Garza, Daniele Apiletti, Tania Cerquitelli, Silvia Chiusano:
DSLE: A Smart Platform for Designing Data Science Competitions. 133-142 - Tyler Morrow, Ali R. Hurson, Sahra Sedigh Sarvestani:
Algorithmic Support for Personalized Course Selection and Scheduling. 143-152 - Koki Ota, Tsuyoshi Nakajima, Hiroki Suda:
A Short-Term Course of STEAM Education through IoT Exercises for High School Students. 153-157 - Manuel Blázquez-Merino, Clara María Pérez Molina, Manuel Castro, Félix García Loro, Elio San Cristóbal, Edmundo Tovar, Sergio Martín Gutierrez:
Experimental Didactic Proposal using VISIR Remote Laboratory to Learn Diode-Based Circuits. 158-164 - Ismail Bile Hassan, Jigang Liu:
A Comparative Study of the Academic Programs between Informatics/BioInformatics and Data Science in the U.S. 165-171 - Javier Hernandez-Ortega, Roberto Daza, Aythami Morales, Julian Fiérrez, Ruben Tolosana:
Heart Rate Estimation from Face Videos for Student Assessment: Experiments on edBB. 172-177 - Zheng Li, Deli Yu, Yonghao Wu, Yong Liu:
Using Fine-Grained Test Cases for Improving Novice Program Fault Localization. 178-183 - Caroline D. Hardin, Jen Dalsen:
Digital Privacy Detectives: An Interactive Game for Classrooms. 184-189 - Marina Marchisio, Sara Remogna, Fabio Roman, Matteo Sacchet:
Teaching Mathematics in Scientific Bachelor Degrees Using a Blended Approach. 190-195 - Joseph C. H. So, Ho Wai Tung, Ada P. L. Chan, Simon C. W. Wong, Adam Ka-Lok Wong, Henry C. B. Chan:
Developing Predictors for Student Involvement in Generic Competency Development Activities in Smart Learning Environment. 196-200 - Marina Marchisio, Tiziana Margaria, Matteo Sacchet:
Automatic Formative Assessment in Computer Science: Guidance to Model-Driven Design. 201-206 - Fa Zhang, Bin Shi, Bo Dong, Qinghua Zheng, Xiangting Ji:
TTED-PU: A Transferable Tax Evasion Detection Method Based on Positive and Unlabeled Learning. 207-216 - Takafumi Takeda, Kenichi Yoshida:
Transfer Learning from Planar to Spherical Images. 217-224 - You Liang, Aerambamoorthy Thavaneswaran, Alexander Paseka, Zimo Zhu, Ruppa K. Thulasiram:
A Novel Dynamic Data-Driven Algorithmic Trading Strategy Using Joint Forecasts of Volatility and Stock Price. 225-234 - Yingchao Wu, Bo Dong, Qinghua Zheng, Rongzhe Wei, Zhiwen Wang, Xuanya Li:
A Novel Tax Evasion Detection Framework via Fused Transaction Network Representation. 235-244 - Johannes Nau, Johannes Richter, Detlef Streitferdt, Michael Kirchhoff:
Simulating the Printed Circuit Board Assembly Process for Image Generation. 245-254 - Xiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou:
Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion. 255-261 - Ivan Luiz Salvadori, Alexis Huf, Frank Siqueira:
Data Linking as a Service: An Infrastructure for Generating and Publishing Linked Data on the Web. 262-271 - Xibo Zhou, Tianxin Liang, Bingqian Wang:
Unified Target-based Sentiment Analysis by Dual-pointer Tagging Scheme. 272-276 - Jingyi An, Qinghua Zheng, Rongzhe Wei, Bo Dong, Xuanya Li:
NEUD-TRI: Network Embedding Based on Upstream and Downstream for Transaction Risk Identification. 277-286 - Hang Wu, May D. Wang:
An Information Theoretic Learning for Causal Direction Identification. 287-294 - Hang Wu, May D. Wang:
Training Confidence-Calibrated Classifier via Distributionally Robust Learning. 295-304 - Xingang Wang, Xin Wang, Chengwen Zhuang, Tongyu Zhao:
Fault Diagnosis of Rolling Bearing Based on Grey Correlation VIKOR with Triangular Ordered Fuzzy Numbers. 305-310 - Ming Zhu, Pengyu Wan, Xiangyang Feng, Zhengyu Wang, Wenpei Shao:
Research on Network Awareness of Enterprise Evaluation System Indicators. 311-315 - Chan Naseeb:
AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital Transformation. 316-321 - Ming-Chang Lee, Jia-Chun Lin, Ernst Gunner Gan:
ReRe: A Lightweight Real-Time Ready-to-Go Anomaly Detection Approach for Time Series. 322-327 - Wonjin Kim, Yanggon Kim, Ki Yong Lee:
Human Gait Recognition Based on Integrated Gait Features using Kinect Depth Cameras. 328-333 - Yuda Gao, Bin Shi, Bo Dong, Yan Chen, Lingyun Mi, Zhiping Huang, Yuanyuan Shi:
RVAE-ABFA : Robust Anomaly Detection for HighDimensional Data Using Variational Autoencoder. 334-339 - Weidong Liu, Wenbo Qiao, Xin Liu:
Bayesian Neural Network Based Path Prediction Model Toward the Realization of Patent Valuation. 340-344 - Bartolomeo Vacchetti, Tania Cerquitelli, Riccardo Antonino:
Cinematographic Shot Classification through Deep Learning. 345-350 - Elie Neghawi, Yan Liu:
Evaluation of Parameter Update Effects in Deep Semi-Supervised Learning Algorithms. 351-360 - Sarthak Dabas, Piyush Saxena, Natalie Nordlund, Sheikh Iqbal Ahamed:
A Step Closer to Becoming Symbiotic with AI through EEG: A Review of Recent BCI Technology. 361-368 - Vinay Kumar Calastry Ramesh, Yoohwan Kim, Ju-Yeon Jo:
Secure IoT Data Management in a Private Ethereum Blockchain. 369-375 - Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr.:
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. 376-385 - Rize Jin, Joon-Young Paik, Jianming Wang, Yenewondim Biadgie, Yunbo Rao, Tae-Sun Chung:
Managing Massive Amounts of Small Files in All-Flash Storage. 386-393 - Jingyi An, Rongzhe Wei, Zhichao Zha, Bo Dong:
Dual Adversarial Networks for Land-Cover Classification. 394-399 - Vilson Soares de Siqueira, Diego de Castro Rodrigues, Colandy Nunes Dourado, Moisés Marcos Borges, Rogério Gomes Furtado, Higor Pereira Delfino, Diego Stelle, Rommel Melgaço Barbosa, Ronaldo Martins da Costa:
Machine Learning Applied to Support Medical Decision in Transthoracic Echocardiogram Exams: A Systematic Review. 400-407 - Nazia Hossain, Mahmuda Naznin:
Finding Emotion from Multi-lingual Voice Data. 408-417 - Enka Blanchard, Ted Selker, Levi Gabasova, Eli Sennesh:
Cue-Pin-Select, a Secure Mental Password Manager. 418-428 - Theodore Weber, Matthew Ferrin, Forest Sweeney, Shameem Ahmed, Moushumi Sharmin:
Towards Identifying the Optimal Timing for Near Real-Time Smoking Interventions Using Commercial Wearable Devices. 429-438 - Shameem Ahmed, Wesley Deneke, Victor Mai, Alexander Veneruso, Matthew Stepita, Anais Dawson, Bradley Hoefel, Garrett Claeys, Nicholas Lam, Moushumi Sharmin:
InterViewR: A Mixed-Reality Based Interview Training Simulation Platform for Individuals with Autism. 439-448 - Na Li, Rajkumar Murugesan, Lin Li, Hao Zheng:
IDEAL: An Interactive De-Anonymization Learning System. 449-454 - Nouf Almujally, Mike Joy:
Applying a Gamification Approach to Knowledge Management in Higher Education Institutions. 455-459 - Kumi Jinzenji, Akio Jin, Tatsuya Muramoto:
Productivity Evaluation Indicators Based on LEAN and their Application to Compare Agile and Waterfall Projects. 460-466 - Anju Thomas, Harikrishnan P. M., Palanisamy Ponnusamy, Varun P. Gopi:
Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2. 467-472 - Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers. 473-482 - Russell Harkanson, Carter Chiu, Yoohwan Kim, Ju-Yeon Jo:
A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain. 483-488 - Jonas Roessel, Moritz Knoell, Jannic Hofmann, Ricardo Buettner:
A Systematic Literature Review of Practical Virtual and Augmented Reality Solutions in Surgery. 489-498 - Peter Danielis, Moritz Beckmann, Jan Skodzik:
An ISO-Compliant Test Procedure for Technical Risk Analyses of IoT Systems Based on STRIDE. 499-504 - Johannes Vater, Pascal Schlaak, Alois C. Knoll:
A Modular Edge-/Cloud-Solution for Automated Error Detection of Industrial Hairpin Weldings using Convolutional Neural Networks. 505-510 - Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. 511-516 - Ricardo Buettner, Alena Renner, Anna Boos:
A Systematic Literature Review of Research in the Surgical Field of Medical Robotics. 517-522 - Azzam Raslan, Georgios Kapogiannis, Ali Cheshmehzangi, Walid Tizani, Dave Towey:
Blockchain: Future Facilitator of Asset Information Modelling and Management? 523-528 - Azzam Raslan, Georgios Kapogiannis, Ali Cheshmehzangi, Walid Tizani, Dave Towey:
A Framework for Assembling Asset Information Models (AIMs) through Permissioned Blockchain. 529-534 - Yankan Yang, Baoqi Huang, Zhendong Xu, Runze Yang:
A WiFi Assisted Pedestrian Heading Estimation Method Using Gyroscope. 535-544 - Chih-You Chen, Sudip Vhaduri, Christian Poellabauer:
Estimating Sleep Duration from Temporal Factors, Daily Activities, and Smartphone Use. 545-554 - Nirmala Soundararajan, Ramesh K. Karne, Alexander L. Wijesinha, Navid Ordouie, Hojin Chang:
Design Issues in Running a Web Server on Bare PC Multi-Core Architecture. 555-564 - Ryosuke Matsumoto, Uchio Kondo:
Rapid Container Scheduling for Reactive Relocation of Individual HTTP Requests. 565-574 - Ryohei Banno, Kazuyuki Shudo:
Adaptive Topology for Scalability and Immediacy in Distributed Publish/Subscribe Messaging. 575-583 - Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki:
Proposal of an Efficient Blind Search Utilizing the Rendezvous of Random Walk Agents. 584-591 - Yuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai:
Spatio-Temporal Volume Data Aggregation for Crowdsensing in VDTN. 592-600 - Bruno Cattelan, Steffen Bondorf, Alberto E. Schaeffer-Filho:
An Empirical Study of Tightest Network Calculus Analyses for Networks with Multicast Flows. 601-606 - Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:
A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT. 607-612 - Yuki Wakisaka, Kazuyuki Yamashita, Sho Tsugawa, Hiroyuki Ohsaki:
On the Effectiveness of Random Node Sampling in Influence Maximization on Unknown Graph. 613-618 - Keita Kitaura, Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
On Estimating Network Topology from Observed Flow Sets at Measurement Nodes. 619-624 - Luigi Borzì, Gabriella Olmo, Carlo Alberto Artusi, Leonardo Lopiano:
Detection of Freezing of Gait in People with Parkinson's Disease using Smartphones. 625-635 - M. Eren Akbiyik, Cagan S. Coban, Elif Aygun, Huseyin Ziya Imamoglu, Doga Gürgünoglu, Duygu Ider:
ThermoCam: Smart Baby Monitoring Assistant. 636-643 - Mahsa Honary, Jaejoon Lee, Christopher Bull, Jiangtao Wang, Sumi Helal:
What Happens in Peer-Support, Stays in Peer-Support: Software Architecture for Peer-Sourcing in Mental Health. 644-653 - Leonardo Ferreira da Costa, Rodrigo Teixeira de Melo, Lucas Vieira Alves, Cleilton Lima Rocha, Eriko Werbet de Oliveira Araujo, Gustavo Augusto Lima de Campos, Jerffeson Teixeira de Souza, Andreas Triantafyllidis, Anastasios Alexiadis, Konstantinos Votis, Dimitrios Tzovaras:
Smart Algorithm for Unhealthy Behavior Detection in Health Parameters. 654-663 - Mohammed Saqib, Yuanda Zhu, May D. Wang, Brett K. Beaulieu-Jones:
Regularization of Deep Neural Networks for EEG Seizure Detection to Mitigate Overfitting. 664-673 - Lucas Vieira Alves, Rodrigo Teixeira de Melo, Leonardo Ferreira da Costa, Cleilton Lima Rocha, Eriko Werbet de Oliveira Araujo, Gustavo A. L. de Campos, Jerffeson Teixeira de Souza:
An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood Obesity. 674-683 - Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset. 684-692 - Md. Saiful Islam, Hossain Shahriar, Sweta Sneha, Chi Zhang, Sheikh Iqbal Ahamed:
Mobile Sensor-Based Fall Detection Framework. 693-698 - Guillaume Gingras, Mehdi Adda, Abdenour Bouzouane:
Toward a Non-Intrusive, Affordable Platform for Elderly Assistance and Health Monitoring. 699-704 - Paulo A. de S. Duarte, Emanuel Ferreira Coutinho, Jérôme Boudy, Mossaab Hariz, Windson Viana:
Using IoT in AAL Platforms for Older Adults: A Systematic Mapping. 705-710 - Syed Azizur Rahman, Amina Al-Marzouqi, Swetha Variyath, Shristee Rahman, Masud Rabbani, Sheikh Iqbal Ahamed:
Effects of Social Media Use on Health and Academic Performance Among Students at the University of Sharjah. 711-716 - Mariam M. Fouad, Yousef Metwally, Georg Schmitz, Michael Hübner, Mohamed A. Abd El Ghany:
Deep Learning Utilization in Beamforming Enhancement for Medical Ultrasound. 717-722 - Shreyas Malakarjun Patil, Li Tong, May D. Wang:
Generating Region of Interests for Invasive Breast Cancer in Histopathological Whole-Slide-Image. 723-728 - Ricardo Buettner, Kai Wannenwetsch, Daniel Loskan:
A Systematic Literature Review of Computer Support for Surgical Interventions. 729-734 - Tobias Gentner, Timon Neitzel, Jacob Schulze, Ricardo Buettner:
A Systematic Literature Review of Medical Chatbot Research from a Behavior Change Perspective. 735-740 - Syed Azizur Rahman, Nabeel Al-Yateem, Amina Al-Marzouqi, Sheikh Iqbal Ahamed, Mohammad AlShabi:
Mobile for Health: A Digital Intervention to Reduce Smoking in the United Arab Emirates. 741-745 - Munirul M. Haque, Dipranjan Das Dipal, Masud Rabbani, Md Ishrak Islam Zarif, Anik Iqbal, Shaheen Akhter, Shahana Parveen, Mohammad Rasel, Basana Rani Muhuri, Tanjir Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal Ahamed:
Towards Developing A Mobile-Based Care for Children with Autism Spectrum Disorder (mCARE) in low and Middle-Income Countries (LMICs) Like Bangladesh. 746-753 - Roshan Konda, Hang Wu, May D. Wang:
Graph Convolutional Neural Networks to Classify Whole Slide Images. 754-758 - Chihhsiong Shih, Lai Youchen, Cheng-hsu Chen, William Cheng-Chung Chu:
An Early Warning System for Hemodialysis Complications Utilizing Transfer Learning from HD IoT Dataset. 759-767 - Lian Yu, Lihao Chen, Jingtao Dong, Mengyuan Li, Lijun Liu, Bai Zhao, Chen Zhang:
Detecting Malicious Web Requests Using an Enhanced TextCNN. 768-777 - Sarah Marie Peck, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Emil N. Coman, Theodore Jensen, Yusuf Albayram:
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA. 778-789 - Saber Zerhoudi, Michael Granitzer, Mathieu Garchery:
Improving Intrusion Detection Systems using Zero-Shot Recognition via Graph Embeddings. 790-797 - Yepeng Ding, Hiroyuki Sato:
Dagbase: A Decentralized Database Platform Using DAG-Based Consensus. 798-807 - Mordechai Guri:
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives. 808-816 - Dongyang Li, Daisuke Kotani, Yasuo Okabe:
Improving Attack Detection Performance in NIDS Using GAN. 817-825 - Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Cardinality Analysis to Classify Malicious Domain Names. 826-832 - Kouki Yamato, Kenichi Kourai, Tarek N. Saadawi:
Transparent IDS Offloading for Split-Memory Virtual Machines. 833-838 - Hiroshi Matsushita, Ryuya Uda:
Detection of Change of Users in SNS by Two Dimensional CNN. 839-844 - Takumi Makino, Yoko Kamidoi, Shin'ichi Wakabayashi:
A Verifiable Secret Sharing Scheme without Using Multi-Party Computations. 845-850 - Samer Khamaiseh, Edoardo Serra, Dianxiang Xu:
vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks. 851-860 - Bo Jiang, Xiaoyan Wang, Wing Kwong Chan, T. H. Tse, Na Li, Yongfeng Yin, Zhenyu Zhang:
CUDAsmith: A Fuzzer for CUDA Compilers. 861-871 - Jiaxin Liu, Binbin Liu, Wei Dong, Yating Zhang, Daiyan Wang:
How Much Support Can API Recommendation Methods Provide for Component-Based Synthesis? 872-881 - Md. Alamgir Kabir, Jacky W. Keung, Kwabena Ebo Bennin, Miao Zhang:
A Drift Propensity Detection Technique to Improve the Performance for Cross-Version Software Defect Prediction. 882-891 - Zhen Yang, Jacky Keung, Miao Zhang, Yan Xiao, Yangyang Huang, Tik Hui:
Smart Contracts Vulnerability Auditing with Multi-semantics. 892-901 - Xiaoyun Cheng, Naming Liu, Lin Guo, Zhou Xu, Tao Zhang:
Blocking Bug Prediction Based on XGBoost with Enhanced Features. 902-911 - Layan Etaiwi, Sylvie Hamel, Yann-Gaël Guéhéneuc, William Flageol, Rodrigo Morales:
Order in Chaos: Prioritizing Mobile App Reviews using Consensus Algorithms. 912-920 - Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li:
An Empirical Investigation into the Effects of Code Comments on Issue Resolution. 921-930 - Krishna Teja Ayinala, Kwok Sun Cheng, Kwangsung Oh, Teukseob Song, Myoungkyu Song:
Code Inspection Support for Recurring Changes with Deep Learning in Evolving Software. 931-942 - Zijie Li, Long Zhang, Zhenyu Zhang, Bo Jiang:
MCFL: Improving Fault Localization by Differentiating Missing Code and Other Faults. 943-952 - Yue Cao, Liang Wang, Zhiwen Zheng, Xianping Tao:
A Tool for Non-Intrusive and Privacy-Preserving Developers' Programming Activity Data Collection. 953-962 - Yating Zhang, Wei Dong, Daiyan Wang, Binbin Liu, Jiaxin Liu:
Accuracy Improvement for Neural Program Synthesis via Attention Mechanism and Program Slicing. 963-972 - Chi Guo, Peilin Yu, Wenfei Guo, Xiaxian Wang:
CNN-Based Model for Chinese Information Processing and Its Application in Large-Scale Book Purchasing. 973-978 - Thais S. Nepomuceno, Edson OliveiraJr, Ricardo T. Geraldi, Andreia Malucelli, Sheila S. Reinehr, Marco Aurélio Graciotto Silva:
Software Product Line Configuration and Traceability: An Empirical Study on SMarty Class and Component Diagrams. 979-984 - Jihyun Lee, Taeyoung Kim, Sungwon Kang:
Recovering Software Product Line Architecture of Product Variants Developed with the Clone-and-Own Approach. 985-990 - Zheng Li, Xue Bai, Haifeng Wang, Yong Liu:
IRBFL: An Information Retrieval Based Fault Localization Approach. 991-996 - Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen:
A Dynamic Resource Allocation Framework for Apache Spark Applications. 997-1004 - Johan Garcia, Tobias Vehkajarvi:
Boot Log Anomaly Detection with K-Seen-Before. 1005-1010 - Zhenyu Zhang, Chunhui Guo, Shangping Ren:
Mining Timing Constraints from Event Logs for Process Model. 1011-1016 - Marjan Sirjani, Edward A. Lee, Ehsan Khamespanah:
Model Checking Software in Cyberphysical Systems. 1017-1026 - Sajjad Rezaei, Ehsan Khamespanah, Marjan Sirjani, Ali Sedaghatbaf, Siamak Mohammadi:
Developing Safe Smart Contracts. 1027-1035 - Stephen S. Yau, Jinal S. Patel:
Application of Blockchain for Trusted Coordination in Collaborative Software Development. 1036-1040 - A. K. M. Jahangir Majumder, Jared D. Miller, Charles B. Veilleux, Amir A. Asif:
Smart-Power: A Smart Cyber-Physical System to Detect IoT Security Threat through Behavioral Power Profiling. 1041-1049 - A. K. M. Jahangir Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif:
A Smart Cyber-Human System to Support Mental Well-Being through Social Engagement. 1050-1058 - Manel Mena, Javier Criado, Luis Iribarne, Antonio Leopoldo Corral Liria:
WoTnectivity: A Communication Pattern for Different Web of Things Connection Protocols. 1059-1064 - A. K. M. Jahangir Majumder, Joshua Aaron Izaguirre:
A Smart IoT Security System for Smart-Home Using Motion Detection and Facial Recognition. 1065-1071 - Oscar Delgado-Mohatar, Ruben Tolosana, Julian Fiérrez, Aythami Morales:
Blockchain in the Internet of Things: Architectures and Implementation. 1072-1077 - Zhenhu Chen, Xingang Wang, Heng Li, Hu Wang:
On Semantic Organization and Fusion of Trajectory Data. 1078-1081 - Enka Blanchard, Siargey Kachanovich:
Usable Everlasting Encryption using the Pornography Infrastructure (Fast Abstract). 1082-1083 - Nektarios Moumoutzis, Desislava Paneva-Marinova, Chara Xanthaki, Polyxeni Arapi, Nikos Pappas, Stavros Christodoulakis:
Using the PerFECt Framework to Establish an Onlife Community for Theatre in Mathematics to Teach Principles of Computing. 1084-1085 - Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman, Sheikh Iqbal Ahamed, Mohammad AlShabi:
Mobile Technology to Improve Physical Activity Among School-Aged Children in the United Arab Emirates. 1086-1088 - Inna Vistbakka, Elena Troubitsyna:
Analysing Privacy-Preserving Constraints in Microservices Architecture. 1089-1090 - Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Abuse of the Cloud as an Attack Platform. 1091-1092 - Sara Sartoli, Sepideh Ghanavati, Akbar Siami Namin:
Compliance Requirements Checking in Variable Environments. 1093-1094 - Hossain Shahriar, Kai Qian, Atef Shalan, Fan Wu:
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. 1095-1096 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
Google Scholar vs. Dblp vs. Microsoft Academic Search: An Indexing Comparison for Software Engineering Literature. 1097-1098 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
The Use of Grey Literature and Google Scholar in Software Engineering Systematic Literature Reviews. 1099-1100 - Laeticia Etienne, Hossain Shahriar:
Attacks and Mitigation Techniques for Iris-Based Authentication Systems. 1101-1102 - Aoi Maejima, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
Does This Code Change Affect Program Behavior? Identifying Nonbehavioral Changes with Bytecode. 1103-1104 - Hideaki Azuma, Shinsuke Matsumoto, Hidetake Uwano, Shinji Kusumoto:
The Effect of Cognitive Load in Code Reading on Non-Programming Specific Environment. 1105-1106 - Kanon Sasaki, Saneyasu Yamaguchi:
A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBR. 1107-1108 - Gustavo Villavicencio:
Toward Ordering the Set of Modifications to Solve a Maintenance Request. 1109-1110 - Haroon Malik, Wael Zatar:
A Real-Time and Low-Cost Flash Flood Monitoring System to Support Transportation Infrastructure. 1111-1112 - Hironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira:
Smart SE: Smart Systems and Services Innovative Professional Education Program. 1113-1114 - Victor Parque, Tomoyuki Miyashita:
Towards Fast Data-Driven Smooth Path Planning with Fair Curves. 1115-1116 - Hironori Washizaki:
Towards Software Value Co-Creation with AI. 1117-1118 - Hironori Washizaki, Junzo Hagimoto, Kazuo Hamai, Mitsunori Seki, Takeshi Inoue, Shinya Taniguchi, Hiroshi Kobayashi, Kenji Hiranabe, Eiichi Hanyuda:
Value Driven Process Towards Software Engineering for Business and Society (SE4BS). 1119-1120 - Zeming Tai, Hironori Washizaki, Yoshiaki Fukazawa, Yurie Fujimatsu, Jun Kanai:
Binary Similarity Analysis for Vulnerability Detection. 1121-1122 - HyeongCheol Moon, Kyeong-Deok Baek, In-Young Ko:
Cache-Sharing Distributed Service Registry for Highly Dynamic V2X Environments. 1123-1124 - Juntao Zhang, Ziyue Zhang, Ying Weng, Simon Gosling, Hui Yang, Chenggang Yang, Wenjie Li, Qun Ma:
Using Recurrent Neural Network for Intelligent Prediction of Water Level in Reservoirs. 1125-1126 - Matheus Ladeira, Yassine Ouhammou, Emmanuel Grolleau:
Towards a Modular and Customisable Model-Based Architecture for Autonomous Drones. 1127-1128 - Sandeep Reddivari, Jason Smith:
VRvisu++: A Tool for Virtual Reality-Based Visualization of MRI Images. 1129-1130 - Hossain Shahriar, Kai Qian, Hao Zhang:
Learning Environment Containerization of Machine Leaning for Cybersecurity. 1131-1132 - Bruno Cattelan, Steffen Bondorf:
On Delay Bounds and Measurements: A COTS Testbed for Network Performance Experimentation. 1133-1138 - Kouto Miyazawa, Saneyasu Yamaguchi, Aki Kobayashi:
Mechanism of Cyclic Performance Fluctuation of TCP BBR and CUBIC TCP Communications. 1139-1144 - Naomichi Fukuda, Taisei Miura, Kenichi Kourai, Saneyasu Yamaguchi:
Cache Management with Fadvise Based on LFU. 1145-1150 - Jo Hagikura, Ryo Nakamura, Hiroyuki Ohsaki:
On the Optimal Cache Allocation in Information-Centric Networking. 1151-1156 - Michika Ohnishi, Chuta Minamiguchi, Hiroyuki Ohsaki:
On the Performance of End-to-End Routing in Complex Networks with Intermittent Links. 1157-1162 - Chiara Caiazza, Leonardo Bernardi, Marco Bevilacqua, Alessandro Cabras, Claudio Cicconetti, Valerio Luconi, Gabriele Sciurti, Elisabetta Senore, Emilio Vallati, Alessio Vecchio:
MECPerf: An Application-Level Tool for Estimating the Network Performance in Edge Computing Environments. 1163-1168 - Takumi Uchida, Keisuke Ishibashi, Kensuke Fukuda:
Routing and Capacity Optimization Based on Estimated Latent OD Traffic Demand. 1169-1175 - Katsuya Matsubara, Yuhei Takagawa:
Adaptive OS Switching for Improving Availability During Web Traffic Surges: A Feasibility Study. 1176-1182 - Andrew Ronald Short, Helen C. Leligou, Michael Papoutsidakis, Efstathios Theocharis:
Using Blockchain Technologies to Improve Security in Federated Learning Systems. 1183-1188 - Sajib Sen, Dipankar Dasgupta, Kishor Datta Gupta:
An Empirical Study on Algorithmic Bias. 1189-1194 - Akemi Gálvez, Andrés Iglesias, Eneko Osaba, Javier Del Ser:
Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital Images. 1195-1200 - Jayesh Patel:
Unification of Machine Learning Features. 1201-1205 - Yuuki Tsubouchi, Masahiro Furukawa, Ryosuke Matsumoto:
Transtracer: Socket-Based Tracing of Network Dependencies Among Processes in Distributed Applications. 1206-1211 - Priscila M. Kai, Ronaldo Martins da Costa, Bruna M. de Oliveira, Deborah S. A. Fernandes, Juliana Paula Felix, Fabrízzio Alphonsus A. M. N. Soares:
Discrimination of Sugarcane Varieties by Remote Sensing: A Review of Literature. 1212-1217 - Jingyu Sun, Susumu Takeuchi, Ikuo Yamasaki:
Few-Shot Ontology Alignment Model with Attribute Attentions. 1218-1222 - Kazuki Miyagoshi, Yuuichi Teranishi, Tomoya Kawakami, Tomoki Yoshihisa, Shinji Shimojo:
Proposal of a Logical Sensor Architecture using WoT-Based Edge Microservices. 1223-1228 - Jie Wu, Yingbo Wu, Min Zhou, Xiaoling Jiang:
SLA+: Narrowing the Difference between Data Sets in Heterogenous Cross-Project Defection Prediction. 1229-1234 - Zakwan Jaroucheh, Mohamad Alissa, William J. Buchanan, Xiaodong Liu:
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. 1235-1240 - Piyush Saxena, Sarthak Dabas, Devansh Saxena, Nithin Ramachandran, Sheikh Iqbal Ahamed:
Reconstructing Compound Affective States using Physiological Sensor Data. 1241-1249 - Jack Stratton, Michael Albert, Quentin Jensen, Max Ismailov, Filip Jagodzinski, Tanzima Z. Islam:
Towards Aggregation Based I/O Optimization for Scaling Bioinformatics Applications. 1250-1255 - Jiaxing Sun, Yujie Li, Huimin Lu, Tohru Kamiya, Seiichi Serikawa:
Deep Learning for Visual Segmentation: A Review. 1256-1260 - Ranran Wang, Gang Hu, Chi Jiang, Huimin Lu, Yin Zhang:
Data Analytics for the COVID-19 Epidemic. 1261-1266 - Bin Liu, Zefeng Ding, Yun Zhang, Dongjian He, Jinrong He:
Kiwifruit Leaf Disease Identification Using Improved Deep Convolutional Neural Networks. 1267-1272 - Alejandro Acien, Aythami Morales, Rubén Vera-Rodríguez, Julian Fiérrez:
Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User Authentication. 1273-1278 - Jaline Mombach, Fábio Diniz Rossi, Juliana Paula Félix, Fabrízzio Alphonsus A. M. N. Soares:
Remote Assessing Children's Handwriting Spelling on Mobile Devices. 1279-1284 - Victor Parque, Tomoyuki Miyashita:
Estimation of Grasp States in Prosthetic Hands using Deep Learning. 1285-1289 - Seunghui Jang, Ki Yong Lee, Yanggon Kim:
An Approach to Improving the Effectiveness of Data Augmentation for Deep Neural Networks. 1290-1295 - You Liang, Aerambamoorthy Thavaneswaran, Zimo Zhu, Ruppa K. Thulasiram, Md. Erfanul Hoque:
Data-Driven Adaptive Regularized Risk Forecasting. 1296-1301 - Behrouz Banitalebi, Srimantoorao Semischetty Appadoo, Aerambamoorthy Thavaneswaran, Md. Erfanul Hoque:
Modeling of Short-Term Electricity Demand and Comparison of Machine Learning Approaches for Load Forecasting. 1302-1307 - Zimo Zhu, Aerambamoorthy Thavaneswaran, Alexander Paseka, Julieta Frank, Ruppa K. Thulasiram:
Portfolio Optimization Using a Novel Data-Driven EWMA Covariance Model with Big Data. 1308-1313 - You Liang, Aerambamoorthy Thavaneswaran, Na Yu, Md. Erfanul Hoque, Ruppa K. Thulasiram:
Dynamic Data Science Applications in Optimal Profit Algorithmic Trading. 1314-1319 - Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears:
Ensemble Learning for Detecting Fake Reviews. 1320-1325 - Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin:
Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test Cases. 1326-1331 - Neda Tavakoli:
Seq2Image: Sequence Analysis using Visualization and Deep Convolutional Neural Network. 1332-1337 - Tomoaki Kanaya, Akihiro Nakao, Shu Yamamoto, Masato Oguchi, Saneyasu Yamaguchi:
Intelligent Application Switch and Key-Value Store Accelerated by Dynamic Caching. 1338-1343 - Alfredo Cuzzocrea, Vincenzo De Maio, Edoardo Fadda:
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences. 1344-1350 - Stelvio Cimato, Stefano Nicolò:
Towards Efficient and Secure Analysis of Large Datasets. 1351-1356 - Shun Kawamoto, Yoko Kamidoi, Shin'ichi Wakabayashi:
A Framework for Fast MapReduce Processing Considering Sensitive Data on Hybrid Clouds. 1357-1362 - Sreeninvasan M, Anu Mary Chacko:
A Case for Semantic Annotation Of EHR. 1363-1367 - Yiltan Bitirim, Selin Bitirim, Duygu Çelik Ertugrul, Önsen Toygar:
An Evaluation of Reverse Image Search Performance of Google. 1368-1372 - Hengyi Hu, Larry Kerschberg:
Capturing Causal Knowledge from Authoritative Medical Ontologies. 1373-1378 - Saad Alqithami:
Modeling an AR Serious Game to Increase Attention of ADHD Patients. 1379-1384 - Kazi Shafiul Alam, Lin He, Jiachen Ma, Dipranjan Das, Mike Yap, Boris Kerjner, Siam Rezwan, Anik Iqbal, Sheikh Iqbal Ahamed:
Remote Heart Rate and Heart Rate Variability Detection and Monitoring from Face Video with Minimum Resources. 1385-1390 - Mickaël Tits, Benjamin Bernaud, Amel Achour, Maher Badri, Lotfi Guedria:
Impacts of Size and History Length on Energetic Community Load Forecasting: A Case Study. 1391-1397 - Teng Long, Qing-Shan Jia:
Optimization of Large-Scale Commercial Electric Vehicles Fleet Charging Location Schedule Under the Distributed wind Power Supply. 1398-1404 - Luca Barbierato, Daniele Salvatore Schiera, Edoardo Patti, Enrico Macii, Enrico Pons, Ettore Francesco Bompard, Andrea Lanzini, Romano Borchiellini, Lorenzo Bottaccioli:
GAMES: A General-Purpose Architectural Model for Multi-energy System Engineering Applications. 1405-1410 - Matteo Orlando, Lorenzo Bottaccioli, Edoardo Patti, Enrico Macii, Sara Vinco, Massimo Poncino:
Optimal Configuration and Placement of PV Systems in Building Roofs with Cost Analysis. 1411-1416 - Andriy Osadchuk, Bernd Däne, Wolfgang Fengler:
A Resource-Saving Approach for Adding Redundancy to a Network-on-Chip System. 1417-1422 - Marcel Rumez, Jinghua Lin, Thomas Fuchß, Reiner Kriesten, Eric Sax:
Anomaly Detection for Automotive Diagnostic Applications Based on N-Grams. 1423-1429 - Higor Pereira Delfino, Ronaldo Martins da Costa, Juliana Paula Felix, João Gabriel Junqueira da Silva, Hedenir Monteiro Pinheiro, Vilson Soares de Siqueira, Eduardo Nery Rossi Camilo, Deborah Silva Alves Fernandes, Fabrízzio Alphonsus A. M. N. Soares:
Techniques and Equipment for Automated Pupillometry and its Application to Aid in the Diagnosis of Diseases: A Literature Review. 1430-1433 - Nabeel Al-Yateem, Syed Azizur Rahman, Amina Al-Marzouqi, Sheikh Iqbal Ahamed, Mohammad AlShabi:
EmCARE Applications in Managing the Emotional Skills of Children and Adolescents in the United Arab Emirates. 1434-1437 - Javier Hernandez-Ortega, Julian Fiérrez, Aythami Morales, David Diaz:
A Comparative Evaluation of Heart Rate Estimation Methods using Face Videos. 1438-1443 - Jamesa Hogges, Hossain Shahriar, Sweta Sneha, Sheikh Iqbal Ahamed:
A Two-Step Password Authentication System for Alzheimer Patients. 1444-1448 - Afonso Ueslei Da Fonseca, Gabriel da Silva Vieira, Juliana Paula Felix, Paulo Freire Sobrinho, Áurea Valéria Pereira Silva, Fabrízzio Alphonsus A. M. N. Soares:
Automatic Orientation Identification of Pediatric Chest X-Rays. 1449-1454 - Faheem Akhtar, Jianqiang Li, Yan Pei, Azhar Imran, Gul Muhammad Shaikh, Chun Xu:
Exploiting Ensemble Classification Schemes to Improve Prognosis Process for Large for Gestational Age Fetus Classification. 1455-1459 - Dave Towey, Lixian Jin, Hua Zhu, Jiaye Zhu, Kangming Feng, Huili Geng, Jing Lu, Tianyi Yu, Yu Wang:
CHOCSLAT: Chinese Healthcare-Oriented Computerised Speech & Language Assessment Tools. 1460-1465 - Shuaipeng Cai, Qinyan Zhang, Qing Wang, Yi Lei, Ji-Jiang Yang:
Multi-frame Dimensionality-Reduction Difference Method for Extracting Key Frames of Video. 1466-1470 - Yutaka Takita, Masatake Miyabe, Hiroshi Tomonaga, Naoki Oguchi:
Scalable Impact Range Detection against Newly Added Rules for Smart Network Verification. 1471-1476 - Shih-Ying Song, Fuchun Joseph Lin:
Dynamic Fault Management in Service Function Chaining. 1477-1482 - Nayef H. Alshammari:
Message-Passing Based Communication via Synchronous Execution (Channels). 1483-1489 - Shuji Ohira, Araya Kibrom Desta, Tomoya Kitagawa, Ismail Arai, Kazutoshi Fujikawa:
Divider: Delay-Time Based Sender Identification in Automotive Networks. 1490-1497 - Sheng Gong, Hideya Ochiai, Hiroshi Esaki:
Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi. 1498-1503 - Satoru Koda, Yusuke Kambara, Takanori Oikawa, Kazuyoshi Furukawa, Yuki Unno, Masahiko Murakami:
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding. 1504-1509 - Kotomi Kuroki, Yo Kanemoto, Kazufumi Aoki, Yasuhiro Noguchi, Masakatsu Nishigaki:
Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection. 1510-1515 - Cheuk Hang (Allen) Au, Richard Wing Cheung Lui:
The Development of Emerging Technological Applications for Not-for-Profit Organizations in Capstone Projects: A Case in Scout Association of Hong Kong. 1516-1521 - Salim Saay, Tiziana Margaria:
Model-Driven-Design of NREn Bridging Application: Case Study AfgREN. 1522-1527 - Denis Stepanov, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou:
A Virtual Reality OER Platform to Deliver Phobia-Motivated Experiences. 1528-1533 - Hugo Sica de Andrade, Ivica Crnkovic, Jan Bosch:
Refactoring Software in the Automotive Domain for Execution on Heterogeneous Platforms. 1534-1541 - Olufemi Fasunlade, Shikun Zhou, David A. Sanders:
Comprehensive Review of Collaborative Network Attacks in MANET. 1542-1545 - Fengbao Ma, Hongji Yang, William C. Chu, Qinyun Liu:
An Intelligent Health Analysis Approach to Detecting Potential Threats with Health Data Reuse. 1546-1551 - Md. Mazharul Islam, Razib Iqbal:
SoCeR: A New Source Code Recommendation Technique for Code Reuse. 1552-1557 - Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones:
Cloud: A Platform to Launch Stealth Attacks. 1558-1563 - Alfredo Cuzzocrea:
Advanced, Privacy-Preserving and Approximate Big Data Management and Analytics in Distributed Environments: What is Now and What is Next. 1564-1568 - Siyuan Wang, Xuehan Zhang, Wei Yu, Kai Hu, Jian Zhu:
Smart Contract Microservitization. 1569-1574 - Yik Him Ho, Yerkezhan Sartayeva, Chak Pang Chiu, Henry C. B. Chan:
Smart Computing Applications Using BLE and Mobile Intercloud Technologies. 1575-1580 - Enka Blanchard:
Making More Extensive and Efficient Typo-Tolerant Password Checkers. 1581-1588 - Gen Li, Hiroyuki Sato:
Handwritten Signature Authentication Using Smartwatch Motion Sensors. 1589-1596 - Satsuki Nishioka, Yasuo Okabe:
Centralized Control of Account Migration at Single Sign-On in Shibboleth. 1597-1603 - Aythami Morales, Alejandro Acien, Julian Fiérrez, John V. Monaco, Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia:
Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic. 1604-1609 - Muhammad Ali Fauzi, Bian Yang, Edlira Martiri:
Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness. 1610-1615 - José Manteigueiro, Paul Crocker, Carlos Barrico:
Identity Management and Access Control for the GNSS Community within a European Research Infrastructure. 1616-1621 - Masaki Sakai, Tsuyoshi Nakajima, Kazuya Takahashi:
A Proposal for Edge Application Framework for Smart Factory. 1622-1627 - Aleksandar Antonic, Martina Antonic:
Performance Modeling of Publish/Subscribe Middleware Components. 1628-1633 - Simon Colreavy-Donnelly, Stefan Kuhn, Fabio Caraffini, Stuart O'Connor, Zacharias A. Anastassi, Simon Coupland:
A Neural Network for Interpolating Light-Sources. 1634-1640 - George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke:
A NIS Directive Compliant Cybersecurity Maturity Assessment Framework. 1641-1646 - François Siewe, Vasileios Germanos, Wen Zeng:
Analysing Petri Nets in a Calculus of Context-Aware Ambients. 1647-1652 - Hamed Hamzeh, Sofia Meacham, Kashaf Khan, Keith Phalp, Angelos Stefanidis:
MRFS: A Multi-resource Fair Scheduling Algorithm in Heterogeneous Cloud Computing. 1653-1660 - Thamer Horbylon Nascimento, Cristiane Bastos Rocha Ferreira, Wellington Galvão Rodrigues, Fabrízzio Alphonsus A. M. N. Soares:
Interaction with Smartwatches Using Gesture Recognition: A Systematic Literature Review. 1661-1666 - Atsushi Tagami, Zhishu Shen:
LESAR: Localization System for Environmental Sensors using Augmented Reality. 1667-1672 - Ricardo Buettner, Florian Klenk, Marc Ebert:
A Systematic Literature Review of Machine Learning-Based Disease Profiling and Personalized Treatment. 1673-1678 - Anwar Ahmed Khan, Shama Siddiqui, Sayeed Ghani:
Optimizing MAC Layer Performance for Wireless Sensor Networks in eHealth. 1679-1682 - Mehmet Ali Ertürk, Luca Vollero:
GSP for Virtual Sensors in eHealth Applications. 1683-1688 - Nadiyah Johnson, Joseph Coelho, Md Fitrat Hossain, Thomas Kissane, Wylie Frydrychowicz, Praveen Madiraju, Zeno Franco, Katinka Hooyer, Priyanka Annapureddy, Sheikh Iqbal Ahamed:
Understanding Veterans Expression of Anger Using Social Media Analysis. 1689-1694 - Fang Liu, Evercita C. Eugenio, Ick-Hoon Jin, Claire Bowen:
Differentially Private Generation of Social Networks via Exponential Random Graph Models. 1695-1700 - Yosuke Seki:
Visualization for Analyzing Usage Status from Dialogue Systems. 1701-1706 - Michelle Voong, Keerthana Gunda, Swapna S. Gokhale:
Predicting the Political Polarity of Tweets Using Supervised Machine Learning. 1707-1712 - Guido Perboli, Vittorio Capocasale, Danilo Gotta:
Blockchain-Based Transaction Management in Smart Logistics: A Sawtooth Framework. 1713-1718 - Bahman Askari, Tai Le Quy, Eirini Ntoutsi:
Taxi Demand Prediction using an LSTM-Based Deep Sequence Model and Points of Interest. 1719-1724 - Guido Perboli, Stanislav Fedorov, Mariangela Rosano:
The European Concept of Smart City: A Taxonomic Analysis. 1725-1730 - Ionut Alexandru Mitrea, Giovanni Zenezini, Alberto De Marco, Filippo Maria Ottaviani, Tiziana Delmastro, Cristiana Botta:
Estimating e-Consumers' Attitude Towards Parcel Locker Usage. 1731-1736 - Vladislav Aistov, Benedikt Kirpes, Micha Roon:
A Blockchain Token Economy Model for Financing a Decentralized Electric Vehicle Charging Platform. 1737-1742 - Bo-Ching Lin, Hwai-Jung Hsu, Shih-Kun Huang:
Testing Convolutional Neural Network using Adversarial Attacks on Potential Critical Pixels. 1743-1748 - Zheng Li, Yanzhao Xi, Ruilian Zhao:
A Hybrid Algorithms Construction of Hyper-Heuristic for Test Case Prioritization. 1749-1754 - Yu Adachi, Haruto Tanno, Yu Yoshimura:
A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression Testing. 1755-1760 - Hirofumi Tsuruta, Ryosuke Matsumoto:
sshr: An SSH Proxy Server Responsive to System Changes without Forcing Clients to Change. 1761-1766 - Chi Zhang, Hossain Shahriar, A. B. M. Kamrul Riad:
Security and Privacy Analysis of Wearable Health Device. 1767-1772 - Affan Yasin, Rubia Fatima, Lin Liu, Jianmin Wang, Raian Ali:
Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy. 1773-1776 - Andrew Gomez, Hossain Shahriar, Victor Clincy, Atef Shalan:
Hands-on Lab on Smart City Vulnerability Exploitation. 1777-1782 - Takafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka:
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department. 1783-1788 - Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita:
An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital Watermarking. 1789-1794 - Shuvalaxmi Dass, Akbar Siami Namin:
Evolutionary Algorithms for Vulnerability Coverage. 1795-1801 - Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A Formal Analysis of Moving Target Defense. 1802-1807 - Daniel Pérez Asensio, Antonio Pérez Yuste:
A Novel Gesture Detection Technique to Increase Security in NFC Contactless Smartcards. 1808-1813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.