


default search action
14th CCWC 2024: Las Vegas, NV, USA
- Rajashree Paul, Arpita Kundu:

14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024. IEEE 2024, ISBN 979-8-3503-6013-4 - Haotian Zhai, Bernd-Peter Paris

:
Accurate and Efficient Implementations of Recursive Filtering based on SIMD and Cascaded Form. 1-7 - Yuan Xing

, Dongfang Hou, Jason Liu, Holly Yuan, Abhishek Verma
, Wei Shi:
Deep Learning and Game Theory for AI-Enabled Human-Robot Collaboration System Design in Industry 4.0. 8-13 - Andre Slonopas, Harry Cooper, Elliott Lynn:

Next-Generation Reservoir Computing (NG-RC) Machine Learning Model for Advanced Cybersecurity. 14-21 - Vivek Nautiyal:

Efficient Repair Configuration Algorithm, for Improving Yield of Semiconductor Memories. 22-27 - Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. 28-35 - Arya Agrawal, Teena Sharma, Nishchal K. Verma, Shantaram Vasikarla:

Image based and Point Cloud based Methods for 3D View Reconstruction in Real-time Environment. 36-42 - Nikhil M. Pawar, Shubham Gujar, Hemant B. Dhonde, Damian Valles:

Early Prediction of Characteristic Compressive Strength of Concrete Based on Mix Proportions Using Modified Dimensional Analysis. 43-52 - Arti Taneja, Thomas M. Talavage, Brian M. Grawe, Sean Catlett, Henry Kuechly, Sarah Kurkowski, Jonas Keller:

Exploring the Influence of Preoperative Variables on Patient Satisfaction: A Machine Learning Approach in Rotator Cuff Repair Surgeries. 53-62 - Barathwaja Subash Chandar, Prakash Ranganathan, William Semke:

Imputing ADS-B/GPS Dropouts using Machine Learning Models. 63-72 - Aditi Singh

, Abul Ehtesham
, Saifuddin Mahmud, Jong-Hoon Kim:
Revolutionizing Mental Health Care through LangChain: A Journey with a Large Language Model. 73-78 - Fatemeh Shah-Mohammadi, Joseph Finkelstein:

Large Language Model-Based Architecture for Automatic Outcome Data Extraction to Support Meta-Analysis. 79-85 - Louis B. Rosenberg

, Gregg Willcox
, Hans Schumann, Ganesh Mani:
Conversational Swarm Intelligence amplifies the accuracy of networked groupwise deliberations. 86-91 - Shobhit Srivastava

, Mrinal Kanti Sarkar
, Chinmay Chakraborty:
Machine Learning Approaches for COVID-19 Sentiment Analysis: Unveiling the Power of BERT. 92-97 - Mehdi Roopaei, Collin Bergmann, Asad Azemi, Krista Hardyman, James Hampton:

Advancing Cattle Health: AI-Driven Innovations in Lameness Detection and Management. 98-104 - Jonathan Chua, Xunfei Jiang

:
Building a Cloud Infrastructure for Virtual Machine Scheduling in Datacenters. 105-110 - Saeed Ebadollahi, Balbir Bob Gill, Hamid Reza Khosravani, Foad Masih Pour:

Assessing the contamination intensity of Porcelain insulators using deep learning networks by UAV. 111-118 - Yaohui Zou, Xianghong Lin, Yuan Zhao:

Online Supervised Learning Algorithm for Dendritic Spiking Neural Networks with Nonlinear Synaptic Integration. 119-125 - Xiaohe Wu, Ahmed Badi, Juan Calderón:

Distributed and Efficient Storage of High-Dimensional Data Using Artificial Neural Network. 126-132 - William Husen, Hynek Boril

, Mehdi Roopaei:
GlitchOS: An Open Source Virtual Assistant. 133-137 - Luis Rivas, Spencer Stevens, Andrew Zitter

, Vinayak Khandelwal, Amodini Vardhan, Chinmay Lohani, Chris Rouff, Lanier A. Watkins:
Assuring Safe Navigation and Network Operations of Autonomous Ships. 138-143 - Mohammad Javad Rajaei, Qusay H. Mahmoud:

A Prediction Model for Short Price Jump in Cryptocurrency Market. 144-150 - Anton Skurdal, Akshay Ram Ramchandra, Prakash Ranganathan:

Estimating GPS/ADS-B Dropouts in the OpenSky Network Platform. 151-159 - Daniel Myers, Wei Hao:

Improving Performance and Battery Consumption through Edge Computing. 160-166 - Wenlong Ni, Yuhong Zhang, Wei Li:

Optimal Task Admission Control of Private Cloud Data Centers With Limited Resources. 167-172 - Rakeshkumar V. Mahto

, Kanika Sood:
Advancing Occupancy Detection through Deep Learning and Sensor Integration. 173-177 - Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan:

A Survey and Comparative Analysis of Methods for Countering Sybil Attacks in VANETs. 178-183 - Jinsai Cheng, Saifuddin Mahmud, Misbahuddin Mohammed, Aditi Singh

, Jong-Hoon Kim:
Design of a Novice-Friendly Drone Control System. 184-190 - Praise Chinedu-Eneh, Trung T. Nguyen

:
Elephant: LLM System for Accurate Recantations. 191-197 - Jaya Preethi Mohan, Prakash Ranganathan, Hassan Reza:

Hierarchical Software Framework for Safe Unmanned Aerial Systems Integration into National Airspace (NAS). 198-206 - Ayesh Meepaganithage

, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta:
Feature Selection Using the Advanced Shapley Value. 207-213 - Kossi Bissadu, Gahangir Hossain

:
Designing a High School Course on Machine Learning for Cyberthreat Analytics. 214-219 - Davoud Khatermohammadi, Seyed Amir Ghalari, Saeed Ebadollahi, Bob Gill:

Stochastic Optimization on Parking Lots for Smart Parking Using Reinforcement Learning Methods. 220-227 - Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi

, Joshua Qiang Li
:
Enabling Rural IoV Communication through Decentralized Clustering and Federated Learning. 228-234 - Reynaldo Joshua Salaki

, Sanguk Park, Kihyeon Kwon:
Knowledge-Based Modeling Approach: A Schematic Design of Artificial Intelligence of Things (AIoT) for Hydrogen Energy System. 235-241 - Samuel Brownlee, Ayesha Khan, Barnaby Vanderzyl, Mohamad El-Hajj:

Analysis of Hockey Forward Line Corsi: Should the Focus Be on Forward Pairs? 242-248 - Evan R. Smith, Rachel M. Koldenhoven

, John W. Farrell, Semih Aslan, Maria D. Resendiz, Yumeng Li, Ting Liu, Damian Valles:
Development of an Augmented Reality Handwashing Tool for Children with Autism Spectrum Disorder. 249-256 - Johannes Zenkert, Madjid Fathi:

Taxonomy Mining from a Smart City CMS using the Multidimensional Knowledge Representation Approach. 257-261 - Xianrun He, Xianghong Lin, Yuan Zhao:

Hypergraph Transformer for Knowledge Tracing. 262-268 - Petro Mushidi Tshakwanda, Harsh Kumar, Sisay T. Arzo

, Michael Devetsikiotis:
SE-DO: Navigating the 6G Frontier with Scalable and Efficient DevOps for Intelligent Agents Optimization. 269-277 - Rakeshkumar V. Mahto

, Kanika Sood:
HIV Progression and Outcome Prediction to Enhance Patient Matching for Clinical Trials. 278-284 - Arisoa S. Randrianasolo:

Using Convolutional Neural Network to Predict EURO Games. 285-290 - Jiyao Li, Vicki H. Allan:

Agent Guidance in Autonomous Mobility on Demand Systems: An Approach Utilizing Priority Double Deep-Q-Networks. 291-300 - Rudy Milani:

Towards an Automatic Ensemble Methodology for Explainable Reinforcement Learning. 301-307 - Brendan P. Beauchamp, Nabeeh Kandalaft, Karl Brakora:

MicroElectrodes for High Density Surface Electromyography. 308-311 - Aaron M. Mulder, Nabeeh Kandalaft:

Myoelectric Controls with Embedded Machine Learning. 312-315 - Shafi Parvez Mohammed, Gahangir Hossain

:
ChatGPT in Education, Healthcare, and Cybersecurity: Opportunities and Challenges. 316-321 - Tushar Chugh, Kanishka Tyagi, Rolly Seth:

Machine Learning Techniques for Non-Intrusive Load Monitoring for Enhanced Energy Predictions. 322-328 - A. K. M. Rubaiyat Reza Habib, Edidiong Elijah Akpan

, Bhaskar Ghosh, Indira Kalyan Dutta:
Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A Survey. 329-335 - Kaptan Singh, Sai Varun Puligilla, Harshitha Ramesh, Ankur Lnu, Hayssam El-Razouk:

Efficient Designs for the 8-Bit Approximate Fixed Point Multiplication. 336-344 - Tarun Vihar Tumati, Yun Tian, Xunfei Jiang

:
A Soulbound Token Certificate Verification System (SBTCert): Design and Implementation. 345-350 - Behrooz Parhami:

Recursive Implementation of Voting Networks. 351-356 - Alireza Abolhasani Zeraatkar

, Parnian Shabani Kamran, Hussain Al-Asaad:
Advancements in Secure Computing: Exploring Automated Repair Debugging and Verification Techniques for Hardware Design. 357-364 - Tushar Chugh, Kanishka Tyagi, Pranesh Srinivasan, Jeshwanth Challagundla:

State-Based Dynamic Graph with Breadth First Progression For Autonomous Robots. 365-369 - Mark Allison

, Michael Farmer, Zheng Song
:
Towards Distributed Learning to Support Situational Awareness for Robotic Team Augmented Humanitarian Disaster Response. 370-374 - Luis Cardenas, Katherine Parajes, Ming Zhu, Shengjie Zhai:

AutoHealth: Advanced LLM-Empowered Wearable Personalized Medical Butler for Parkinson's Disease Management. 375-379 - Liu Yang, Xianghong Lin, Yuan Zhao, Xiangwen Wang, Xianrun He, Yaohui Zou:

An Online Supervised Learning Algorithm Based on Spike Train Kernel for Spiking Neurons. 380-386 - Farhad Mofidi

, Sena Hounsinou, Gedare Bloom:
L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT. 387-396 - Gisung Han, Ryan Ficocelli, Andrew J. Park, Eunju Hwang:

Fire Egress Simulations Based on Human Behavioural Patterns. 397-402 - Reynaldo Joshua Salaki

, Sanguk Park, Kihyeon Kwon:
H2 EMS: A Simulation Approach of a Solar-Hydrogen Energy Management System. 403-408 - Tariqul Islam, Faisal Haque Bappy

, Tarannum Shaila Zaman, Md Sajidul Islam Sajid
, Mir Mehedi Ahsan Pritom:
MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain. 409-413 - Jeshwanth Challagundla, Kanishka Tyagi, Tushar Chugh, Michael T. Manry:

Multiple Gain Adaptations for Improved Neural Networks Training. 414-420 - Gahangir Hossain

, Dedeepya Yarra:
Learning Blockchain Technology in High School: Towards Cybersecurity Education. 421-427 - Mandeep Singh, Albert H. Carlson:

Exploring Polymorphic Algorithms and Their Use in Cryptography. 428-434 - Shadi Jawhar, Craig E. Kimble, Jeremy R. Miller, Zeina Bitar:

Enhancing Cyber Resilience with AI-Powered Cyber Insurance Risk Assessment. 435-438 - Nour El Madhoun

, Badis Hammi:
Blockchain Technology in the Healthcare Sector: Overview and Security Analysis. 439-446 - James Talbott, Joshua Palicka, Alexander Sheardown, Wan D. Bae, Matthew Horak:

Improving Network Traffic Anomaly Detection through Data Denoising and Unsupervised Learning. 447-453 - Alex Doboli:

Towards Design Synthesis from Verbal Conversations in Teams. 454-459 - Minhajul Alam Rahat

, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang:
Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation. 460-466 - Austen Knapp, Emmanuel Wamuo, Minhajul Alam Rahat

, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang:
Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware. 467-473 - Debashis Gupta, Aditi Golder, Kishor Datta Gupta

, Dipankar Dasgupta, Roy George, Khalil Shujaee:
Security threats on Data-Driven Approaches for Luggage Screening. 474-483 - Christoforos Seas, Glenn Fitzpatrick, John A. Hamilton Jr., Martin C. Carlisle

:
Automated Vulnerability Detection in Source Code Using Deep Representation Learning. 484-490 - Adarsha Bhattarai

, Dongming Peng, Jason Payne, Hamid Sharif:
Enhancing Wearable ECG Sensors: A Secure, Accurate and Efficient System Architecture for Resource-Constrained ECG Monitoring. 491-497 - Laura Bedoyan, Mansoureh Lord, Adam Kaplan:

Reducing the Computational Cost of Urban Flood Prediction in Los Angeles. 498-506 - Vincent Marklynn, Anjali Sebastian, Yong Long Tan, Wan D. Bae, Shayma Alkobaisi

, Sada Narayanappa:
A Framework for Abstractive Summarization of Conversational Meetings. 507-512 - Shree Ram Abayankar Balaji, Prakash Ranganathan:

Geomagnetic Storm Forecasting Using Machine Learning Models. 513-520 - Megha Gupta, Shripal Shah, Mohammad Masum, Sai Chandra Kosaraju:

CMI: Cluster-Centric Missing Value Imputation with Feature Consistency. 521-526 - Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, Sajjan G. Shiva:

Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation. 527-533 - Saikat Das, Bhargavi Krishnamurthy, Raktim Ranjan Das, Sajjan G. Shiva:

State of the art: Security Testing of Machine Learning Development Systems. 534-540 - Ryan Gabrys, Mark Bilinski, Sunny Fugate

, Daniel Silva:
Using Natural Language Processing Tools to Infer Adversary Techniques and Tactics Under the Mitre ATT&CK Framework. 541-547 - Robin Chataut, Prashnna Kumar Gyawali, Yusuf Usman

:
Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection. 548-554 - Trevor Ridley, Julius Andrade, Cristian Luna, Hayssam El-Razouk:

Smart Car Temperature Monitoring System Using SRAM-Based PUF Sensor. 555-563 - Jordan Mazur, Christopher Rouff, Ali Tekeoglu:

ACPPS: Autonomic Computing based Phishing Protection System. 564-569 - Tarek El Salti, Edward R. Sykes, Jordan Scrivo, Brandon Plaza, Vladislav Mun:

A Dyad-Based Mobile System to Support Older Adults and Informal Caregivers. 570-576 - Hasan Md Imran

, Xingya Liu:
Rotational Flying Station for Wireless Access in Large Disaster Area. 577-582 - Pramod Singh Rathore, Mrinal Kanti Sarkar

:
Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis. 583-588 - Richard Wu, Nicole Liu, Grace Peng, Adarsha Bhattarai

, Dongming Peng:
An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management. 589-596 - Tareque Abu Abdullah, Hasan Md Imran

, Suriya Islam Chowdhury, Mohd Ariful Haque:
A Genetic Algorithm Approach for A Broadband Reflector Design. 597-602 - Andrew Baynum, Wei Hao:

Exploring the Impact of Cloud Computing and Edge Computing on Resource Consumption for Mobile Devices with Generative Artificial Intelligence APIs. 603-609 - Meera Gopinath Sujatha, Hassan Reza, Prakash Ranganathan:

A Conceptual Software Framework to Monitor Harmful Algal Blooms (HABs) in Lakes. 610-619 - Friban Almeida:

Introduction to Inline-Services: A Seamless Approach to Microservices Development. 620-625 - Ming Liu, Qingxue Zhang:

Spatial Variability Learning of Biomechanical Dynamics in Daily Lives. 626-629 - Zesen Zhang, Jiting Shen, Ricky K. P. Mok:

Empirical Characterization of Ookla's Speed Test Platform: Analyzing Server Deployment, Policy Impact, and User Coverage. 630-636 - Sota Narikiyo, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:

Characteristic Analysis of Upper Bound Call Blocking Probability of Emergency CAC for Three Types of Calls. 637-639 - Srihari Koripalli, Drake Sheela, Nan Wang:

Optimizing Post Deployment Maintainance at Nodal Level for Macroscale Wireless Sensor Network. 640-645 - Aracely Marilu Pacheco Mercado, Cynthia Janeth Cerron-Mercado, Fernando Reymundo Tapara Giron, Augusto Alberto Herrera-Parraguez:

Use of BIM Technology For Augmented Reality In Buildings. 646-655 - Jaldu Asish

, Megha T. S
, N. Laqueta, Rashmi Seethur:
Efficient Fourth-Order Buck Converter Design for Hybrid Electric Vehicle Power Systems with State Space Average Modeling and Control. 656-661 - Hyuntae Cho:

CNN-based Autoencoder and Post-Training Quantization for On-Device Anomaly Detection of Cartesian Coordinate Robots. 662-666 - Albert Jorddy Valenzuela-Inga

, Juan Gabriel Benito-Zuñiga, Benjamin De La Cruz Taipe, Abel Max Julcarima Espiritu
, Romel Moisés Olivera-Pérez, Deyvid Froilán Matamoros-Paitán
, Heydi Karina Hinostroza-Maravi
:
Rigid pavement: compressive strength, state of preservation and sampling automation. 667-673 - Vignaan Vardhan Nampalli, Charan Gudla

, Md. Shohel Rana
:
Predicting Travel Time in Complex Road Structures using Deep Learning. 674-681 - Manvendra Sharma:

Enhancing Security and Privacy in Cyber-Physical Systems: Challenges and Solutions. 682-686 - Efterpi Paraskevoulakou, Jean-Didier Totow Tom-Ata, Chrysostomos Symvoulidis

, Dimosthenis Kyriazis:
Enhancing Cloud-Based Application Component Placement with AI-Driven Operations. 687-694 - Albert Jorddy Valenzuela-Inga

, Luis Fernando Alania-Borja, Rosali Ramos-Rojas:
SIS-IDAI System in the Performance of Vehicle Counting in Different Road Scenarios in the City of Huancayo. 695-700 - Shivanjali Khare, Nahom H. Demoz, Medha Kanu Baniya:

Data-Driven Approach to Identify Connectivity and Bus stop Importance in Transit Network. 701-707 - Naved Anwar, Moshe Battula, Jaismeen Kaur, Saumya Pailwan:

Learning Cost-Adjusted Predictive Models with Margin-Based Framework. 708-712 - Purav Bhatt, Dharmik Joshi, Shrikant Jadhav:

RTL to GDS Implementation and Verification of UART using UVM and OpenROAD. 713-720 - Md. Shohel Rana

, Md. Solaiman
, Charan Gudla
, Md. Fahimuzzman Sohan:
Deepfakes - Reality Under Threat? 721-727 - Hossein Khosravi, Ricardo Carmona-Galán

, Jorge Fernández-Berni, Nabeeh Kandalaft:
A novel 10T SRAM bit-cell with high static noise margin and low power consumption for binary In-Memory Computing. 728-733 - Victor A. Okpanachi, Ifeoma Adaji:

Analysis of Serious Games for Nutrition Using NLP Techniques. 734-743 - Chuck Easttom:

Utilizing ChatGPT to Improve Quantum Algorithms. 744-749

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














