


default search action
ASSE 2024: Tokyo, Japan
- Proceeding of the 5th Asia Service Sciences and Software Engineering Conference, ASSE 2024, Tokyo, Japan, September 11-13, 2024. ACM 2024, ISBN 979-8-4007-1754-3

- Rattasan Aekaukkharachawakit

, Taratip Suwannasart
:
Generating a Robot Framework Test Script for Web Application Based on Database Constraints. 1-12 - Na Zhao

, Dong Wang
, Sijia Chen
, Hua Wang
:
Time-Locked Free Trial Strategy Choice of Duopoly Software Vendors Considering Consumers' Personal Internal Preferences and Network Externalities. 13-26 - William P. Rey

, Kieth Wilhelm Jan Dugang Rey
:
Assessing Usability and User Experience in e-Pondo: A Path to Improved Interaction Design. 27-34 - Mohammad Taha Khan

, Mohamed Elhussiny
, William Tobin
, Muhammad Ali Gulzar
:
An Empirical Evaluation of Method Signature Similarity in Java Codebases. 35-42 - Zhidan Yuan

, Zhuangzhuang Wang
, Enze Wu
, Tao Huang
, Yingying Chen
:
Empirical Studies on Failure Prediction for Distributed Systems Based on Feature Selection. 43-52 - Fan Meng

, Bing Chen
, Xiu Zhang
, Shaohong Zhu
:
SelfALARM: An Active and Online Iterative Business Anomaly Discovery Method based on Self-growth Mechanism. 53-60 - Jerome B. Tamargo

, Justine Amiel T. Jonson
, Roseville Jeanne L. Evangelista
, Elcid A. Serrano
:
Kulayaan: An E-Commerce Platform Showcasing PDLs' Artworks with an Immersive Virtual Tour Feature. 61-65 - Chia-Chen Lin

, Enting Chu
, Yen-Heng Lin
:
Adaptive and Effective Data Hiding Scheme for AMBTC Compression Codes. 66-72 - Ya-Fen Chang

, Yi-Chun Liao
, Pei-Shih Chang
, Wei-Liang Tai
:
Comments on a lightweight authentication and key agreement framework for smart grids. 73-77 - Ziqing Li

, Sheng Lin
, Tianle Li
, Pengfei Zhao
:
A Privacy-Preserving Aggregation Method via Grouped Secure Multi-Party Computation. 78-84 - Fatin Nur Afiqah Ibrahim

, Nasreen Badruddin
, Kalavathy Ramasamy
:
Enhancing Cognitive Frailty Prediction Accuracy Using Conditional Generative Adversarial Networks (CGAN). 85-91 - William P. Rey

:
TechRay: Advanced IoT Ecosystem for Freshwater Stingray Management. 92-101 - Chia-Chen Lin

, Rong-Ze Chen
, Aristophane Nshimiyimana
, Chun-Jung Lin
:
Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation and Substitution. 102-109 - Dasong Yu

, Aekyeung Moon
:
Image-Based Predictive Model to Optimize Drying Endpoints in the Chili Pepper Drying Process. 110-117 - Jericho John O. Almoro

, Francis Dale P. Caon
, Bianca H. Goldman
, Micah Sophia Q. Tan
, John Angelo B. Yap
, Abraham Tan Magpantay
:
Composite Restoration using Image Recognition for Teeth Shade Matching using Deep Learning. 118-125 - Shih-Hsin Chen

, Ting-Yi Kao
, Yi-Hui Chen
:
Detecting Heart Valve Regurgitation in Medical Images - Using YOLOv7. 126-129 - Carmen L. DiMario

, Rio C. Bacha
, Brian K. Butka
:
Combatting Senior Scams Using a Large Language Model-Created Rubric: This paper explains a novel approach to reinforcement learning designed for the detection and prevention of scams aimed at senior citizens. 130-136 - Eric Busia Blancaflor

, Raphael M. Abaleta
, Luke Martin Achacoso
, Alden Christian Amper
, Pfrancis Isaiah R. Ampiloquio
:
Emerging Threat: The Use of AI Voice Cloning Software and Services to Deceive Victims Through Phone Conversations and its Potential Effects on the Filipino Population. 137-146 - Joel C. de Goma

, Jamie Beatrice L. Olivar
, Hobie L. Perez
, Sadie Catherine E. Velasco
, Alberto C. Villaluz
:
Art Authentication: A Comparative Analysis of Convolutional Neural Network (CNN) Architectures for Detecting AI-Generated and Human-made Digital Artworks. 147-152 - Ravipat Lapcharoensuk

, Chawisa Fhaykamta
, Watcharaporn Anurak
, Wasita Chadwut
:
Monitoring Pesticide Residue on Bok Choi using Convolution Neural Network with NIR spectral Data. 153-157 - Timur Jaganov

, Chukwualuka Leonard Nnadi
, Yutaka Watanobe
:
The Learning Labyrinth: Integrating Learning Theories in VR. 158-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














