


default search action
45th COMPSAC 2021: Madrid, Spain
- IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021, Madrid, Spain, July 12-16, 2021. IEEE 2021, ISBN 978-1-6654-2463-9

- Minzhong Luo, Shan Yu:

Implementing Inductive Logic into Embedded Industrial Control System with Polynomial Ring on F2. 1-10 - Fu-Shiung Hsieh:

Comparison of Three Metaheuristic Algorithms for Optimization of Cyber Physical Systems. 11-14 - Sarthak Tiwari, Ajay K. Bansal:

Domain-Agnostic Context-Aware Framework for Natural Language Interface in a Task-Based Environment. 15-20 - Enrico Saccon

, Paolo Bevilacqua, Daniele Fontanelli
, Marco Frego, Luigi Palopoli, Roberto Passerone:
Robot Motion Planning: can GPUs be a Game Changer? 21-30 - Mang Ning, Yao Lu, Wenyuan Hou, Mihhail Matskin:

YOLOv4-object: an Efficient Model and Method for Object Discovery. 31-36 - Lingbing Yao, Hang Zhao

, Jie Tang, Shaoshan Liu, Jean-Luc Gaudiot:
Streaming Data Priority Scheduling Framework for Autonomous Driving by Edge. 37-42 - Omair Rafique, Yu Bai, Klaus Schneider

, Guangxi Yan
:
Synthesis of Heterogeneous Dataflow Models from Synchronous Specifications. 43-48 - Jakob Danielsson, Tiberiu Seceleanu

, Marcus Jägemar, Moris Behnam, Mikael Sjödin:
LLM-shark - A Tool for Automatic Resource-boundness Analysis and Cache Partitioning Setup. 49-58 - Plínio Silveira, César Augusto Fonticielha De Rose, Avelino Francisco Zorzo

, Miguel Gomes Xavier, Dejan S. Milojicic, Sai Rahul Chalamalasetti, Sergey Serebryakov
:
Resource Sharing and Security Implications on Machine Learning Inference Accelerators. 59-67 - Teng Ma

, Dongbiao He, Gordon Ning Liu:
HybridSkipList: A Case Study of Designing Distributed Data Structure with Hybrid RDMA. 68-73 - Zheng Li, Fuxiang Sun, Haifeng Wang, Yifan Ding, Yong Liu, Xiang Chen:

CLACER: A Deep Learning-based Compilation Error Classification Method for Novice Students' Programs. 74-83 - Federica Galluzzi

, Marina Marchisio, Fabio Roman
, Matteo Sacchet:
Mathematics in higher education: a transition from blended to online learning in pandemic times. 84-92 - Zeyu He, Jianzong Kuang, Wang Li, Yonghong Yan:

Using Cognitive Interest Graph and Knowledge-activated Attention for Learning Resource Recommendation. 93-102 - Luca Cagliero

, Moreno La Quatra
:
Automatic slides generation in the absence of training data. 103-108 - Victor Connes, Colin de la Higuera

, Hoël Le Capitaine:
What should I learn next? Ranking Educational Resources. 109-114 - Lorenzo Canale, Laura Farinetti, Luca Cagliero

:
From teaching books to educational videos and vice versa: a cross-media content retrieval experience. 115-120 - Mara Lupano, Laura Farinetti, Domenico Morreale:

OPUS: an Alternate Reality Game to learn SQL at university. 121-126 - Henry C. B. Chan, Isabel M. Kemp, Winnie C. L. Leung, Edmundo Tovar, Sorel Reisman:

Enhancing Student Learning Through an Open Educational Resource Competition. 127-132 - Fabrizio Lamberti, Federico De Lorenzis, Filippo Gabriele Pratticò

, Massimo Migliorini:
An Immersive Virtual Reality Platform for Training CBRN Operators. 133-137 - Daniel Scherer, Fábio Dantas Guimarães:

Study and proposal for Visual Programming Platform - Design for educational robotics for children aged 8 to 14 years. 138-143 - Gregor von Laszewski, Anthony Orlowski, Richard H. Otten, Reilly Markowitz, Sunny Gandhi, Adam Chai, Geoffrey C. Fox, Wo L. Chang:

Using Cloudmesh GAS for Speedy Generation of Hybrid Multi-Cloud Auto Generated AI Services. 144-155 - Rawya Mars, Amal Abid, Saoussen Cheikhrouhou, Slim Kallel:

A Machine Learning Approach for Gas Price Prediction in Ethereum Blockchain. 156-165 - Behrouz Banitalebi

, Srimantoorao Semischetty Appadoo, Yuvraj Gajpal, Aerambamoorthy Thavaneswaran:
Intelligent Probabilistic Forecasts of Day-Ahead Electricity Prices in a Highly Volatile Power Market. 166-175 - Nan Cui, Chunqi Chen, Beijun Shen, Yuting Chen:

Learning to Match Workers and Tasks via a Multi-View Graph Attention Network. 176-185 - Seunghui Jang, Yanggon Kim:

A Fast Training Method using Bounded Continual Learning in Image Classification. 186-191 - Xinbin Yuan, Cong Yu, Bin Liu, Henan Sun, Xianyu Zhu:

CGAN-IRB: A Novel Data Augmentation Method for Apple Leaf Diseases. 192-200 - Teodor Fredriksson, David Issa Mattos, Jan Bosch, Helena Holmström Olsson:

An Empirical Evaluation of Algorithms for Data Labeling. 201-209 - Wesley Fitters, Alfredo Cuzzocrea, Marwan Hassani:

Enhancing LSTM Prediction of Vehicle Traffic Flow Data via Outlier Correlations. 210-217 - Md. Erfanul Hoque

, Aerambamoorthy Thavaneswaran, Srimantoorao Semischetty Appadoo, Ruppa K. Thulasiram, Behrouz Banitalebi
:
A Novel Dynamic Demand Forecasting Model for Resilient Supply Chains using Machine Learning. 218-227 - Shuo Feng

, Jacky Keung
, Jie Liu, Yan Xiao
, Xiao Yu, Miao Zhang
:
ROCT: Radius-based Class Overlap Cleaning Technique to Alleviate the Class Overlap Problem in Software Defect Prediction. 228-237 - Anubha Kabra

, Anu Agarwal:
Personalized and Dynamic top-k Recommendation System using Context Aware Deep Reinforcement Learning. 238-247 - Daniel Sauter, Anna Schmitz, Fulya Dikici, Hermann Baumgartl, Ricardo Buettner:

Defect Detection of Metal Nuts Applying Convolutional Neural Networks. 248-257 - Guang Yang, Jie Liu, Muzi Qu, Shuai Wang, Dan Ye, Hua Zhong:

FaasRS: Remote Sensing Image Processing System on Serverless Platform. 258-267 - Anthony Luo, Dianxiang Xu:

Quantifying Event Impact on the Bitcoin Blockchain. 268-273 - Hengyi Hu, Larry Kerschberg:

Improved Causal Models of Alzheimer's Disease. 274-283 - Jinxin Shi, Qingsheng Zhu, Junnan Li, Ji Liu, Dongdong Cheng:

Hierarchical Clustering Based on Local Cores and Sharing Concept. 284-289 - Peiyao Han, Nan Wang, Kun Li, Xiaokun Li:

CASR: A Collaborative Attention Model for Session-based Recommendation. 290-296 - Yun Shi, Zhiyao Wu, Shaolun Zhang, Hong Xiao, Yijun Zhao:

Assessing Palliative Care Needs Using Machine Learning Approaches. 297-302 - Daniel Sauter, Cem Atik, Christian Schenk, Ricardo Buettner, Hermann Baumgartl:

Visual Defect Detection of Metal Screws using a Deep Convolutional Neural Network. 303-311 - Lian Yu, Ning Zhang, Weiping Wen:

Abnormal Transaction Detection based on Graph Networks. 312-317 - Shanyan Lai

, Junfang Wu
, Zhiwei Ma
, Chunyang Ye, Hui Zhou:
Consumer Fraud Detection via P-feature Conversion. 318-323 - Andrea Lisi

, Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci:
Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning Network. 324-331 - Marshall D. Jackson, Carson K. Leung

, M. Diarra B. Mbacke, Alfredo Cuzzocrea:
A Bayesian Framework for Supporting Predictive Analytics over Big Transportation Data. 332-337 - Syed Rohit Zaman, Dipan Sadekeen, M. Aqib Alfaz, Rifat Shahriyar:

One Source to Detect them All: Gender, Age, and Emotion Detection from Voice. 338-343 - Ming-Chang Lee, Jia-Chun Lin, Ernst Gunnar Gran:

SALAD: Self-Adaptive Lightweight Anomaly Detection for Real-time Recurrent Time Series. 344-349 - Ngan V. T. Nguyen

, Jon R. Hass, Tommy Dang:
TimeRadar: Visualizing the Dynamics of Multivariate Communities via Timeline Views. 350-356 - Wenhan Hou, Bo Cui, Ru Li:

A Survey on Blockchain Data Analysis. 357-365 - Huiqun Yu, Xingjie Sun, Ziyi Zhou, Guisheng Fan:

A novel software defect prediction method based on hierarchical neural network. 366-375 - Vaibhav Kalakota, Ajay Bansal:

Diversifying Relevant Search Results from Social Media using Community Contributed Images. 376-385 - Gen Li

, Lingfeng Zhang, Hiroyuki Sato:
In-air Signature Authentication Using Smartwatch Motion Sensors. 386-395 - Takuya Nagase, Sho Tsugawa:

Effectiveness of a Data-based Influence Maximization Algorithm Using Information Diffusion Cascades. 396-401 - Jacopo Fior, Luca Cagliero

:
Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings. 402-407 - Kenny Huynh, Juvent Benarivo, Chew Da Xuan, Giridhar Gopal Sharma, Jeffrey Kang

, Anuradha Madugalla
, John C. Grundy:
Improving Human-Centric Software Defect Evaluation, Reporting, and Fixing. 408-417 - Pedro Henrique M. Sanvido, Gabriela Birnfeld Kurtz, Carlos Roberto G. Teixeira, Pedro P. Wagner, Lorenzo P. Leuck, Milene Selbach Silveira, Roberto Tietzmann, Isabel Harb Manssour:

PeakVis: a Visual Analysis Tool for Social Network Data and Video Broadcasts. 418-427 - Tanzima Z. Islam, Philip Wu Liang, Forest Sweeney, Cody Pranger, Jayaraman J. Thiagarajan, Moushumi Sharmin, Shameem Ahmed:

College Life is Hard! - Shedding Light on Stress Prediction for Autistic College Students using Data-Driven Analysis. 428-437 - Sean McCulloch, Joseph Gildner, Bradley Hoefel, Gabrielle Cervantes, Shameem Ahmed, Moushumi Sharmin:

Visualization as a Tool to Understand the Experience of College Students with Autism. 438-445 - Jihye Moon

, Hieu Nguyen, Bradshaw Pines, Swapna S. Gokhale:
Detecting Offensive Content on Social Media During Anti-Lockdown Protests in Michigan. 446-451 - Jali Asp

, Toni Taipalus
, Ville Seppänen
:
Challenges in Geographically Distributed Information System Development: A Case Study. 452-458 - Hongyi Zhang, Jan Bosch, Helena Holmström Olsson:

Real-time End-to-End Federated Learning: An Automotive Case Study. 459-468 - Rajasree Punneth Radhakrishnan, Michael Shin, Pushkar Ogale:

Data Integrity Security Spots Detected by Object Reference. 469-474 - Tomohiro Koide, Masato Uchida:

Behind The Mask: Masquerading The Reason for Prediction. 475-481 - Atsuko Takefusa, Jingtao Sun, Ikki Fujiwara, Hiroshi Yoshida, Kento Aida, Calton Pu:

SINETStream: Enabling Research IoT Applications with Portability, Security and Performance Requirements. 482-492 - Ghulam Mudassir

, Antinisca Di Marco:
Social-based City Reconstruction Planning in case of natural disasters: a Reinforcement Learning Approach. 493-503 - Nur Imtiazul Haque, Mohammad Ashiqur Rahman

, Hossain Shahriar
:
Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems. 504-513 - Chenlin Li, Yuting Yu, Jeremy Leckning, Weicheng Xing, Chun Long Fong, John C. Grundy, Devi Karolita

, Jennifer McIntosh
, Humphrey O. Obie
:
A human-centric approach to building a smarter and better parking application. 514-519 - Akshat Bajpai, Sepehr Amir-Mohammadian:

Towards An Indoor Navigation System Using Monocular Visual SLAM. 520-525 - Cosimo Anglano, Massimo Canonico, Marco Guazzone

:
EasyCloud: Multi-clouds made easy. 526-531 - Arthur Bastos, Samira Ribeiro, Alano Martins Pinto

, Francisco Marques, Diogo Baldissin
, Flávio Reis:
Augmented Reality for Training and Maintenance of Reclosers: A Case Study of a Wearable Application. 532-537 - Viktoriya Kutsarova, Mihhail Matskin:

Combining Mobile Crowdsensing and Wearable Devices for Managing Alarming Situations. 538-543 - Zijun Hang, Yongjie Wang, Shuguang Huang:

P4 Transformer: Towards Unified Programming for the Data Plane of Software Defined Network. 544-551 - Daishi Kondo, Thomas Ansquer, Yosuke Tanigawa, Hideki Tode:

Resource Discovery for Edge Computing over Named Data Networking. 552-559 - Fanyuan Zou, Yumei Wang, Yu Liu:

A Multipath Routing Approach for Tile-based Virtual Reality Video Streaming Based on SDN. 560-565 - Satoru Matsumoto, Tomoki Yoshihisa, Shinji Shimojo:

A Data Scheduling Method for Video-on-Demand Systems on Radio Broadcasting Environments. 566-573 - Frédéric Guidec

, Yves Mahéo
, Pascale Launay, Lionel Touseau, Camille Noûs:
Bringing Opportunistic Networking to Smartphones: a Pragmatic Approach. 574-579 - Md. Jobair Hossain Faruk

, Maria Valero, Hossain Shahriar
:
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness. 580-589 - Hermann Baumgartl, Dennis Flathau, Samuel Bayerlein, Daniel Sauter, Ingo J. Timm, Ricardo Buettner:

Pain Level Assessment for Infants Using Facial Expression Scores. 590-598 - Kenichi Arai, Chisato Miura, Shinya Kawashiri, Tetsuo Imai, Toru Kobayashi:

Diagnostic Imaging Support System for Rheumatoid Arthritis Using Ultrasound Images. 599-607 - Kangcheng Li, Jiangtao Wang

, Zhicen Liu, Yunqi Zhang, Zihao Xie:
Does Our Collective Stringency Control the Virus? Investigating Lockdown Effectiveness on Community Mobility Data. 608-617 - Shiyu Tian, Nihel Charfi, Jannatul Ferdause Tumpa, Nivedh Mudiam, Velinka Medic, Judy E. Kim, Sheikh Iqbal Ahamed:

Auto-Grading OCT Images Diagnostic Tool for Retinal Diseases. 618-625 - Hsin-Hsiung Chang, Jung-Hsien Chiang, Cheng-Chung Chu:

Data-Driven Generation of Medical-Research Hypotheses in Cancer Patients. 626-631 - Snigdha Chaudhari, Razib Iqbal:

Towards a Template Matching Approach for Human Fall Detection. 632-637 - Frans Prathama, Bernardo Nugroho Yahya, Seok-Lyong Lee:

A Multi-case Perspective Analytical Framework for Discovering Human Daily Behavior from Sensors using Process Mining. 638-644 - Subhash Nerella, Julie Cupka, Matthew Ruppert

, Patrick James Tighe, Azra Bihorac
, Parisa Rashidi:
Pain Action Unit Detection in Critically Ill Patients. 645-651 - Antonio Coronato, Alfredo Cuzzocrea:

A Markovian Probabilistic Model for Risk Analysis and Forecasting in Big Healthcare Data Settings. 652-662 - Zakariya A. Oraibi, Safaa Albasri

:
Prediction of COVID-19 from Chest X-ray Images Using Multiresolution Texture Classification with Robust Local Features. 663-668 - Shahriar Sobhan, Md. Saiful Islam, Maria Valero, Hossain Shahriar

, Sheikh Iqbal Ahamed:
Data Analysis Methods for Health Monitoring Sensors: A survey. 669-676 - Luca Cerbin, Jason Dejesus, Julia Warnken, Swapna S. Gokhale:

Unmasking the Mask Debate on Social Media. 677-682 - José George Dias de Souza, Daniel Scherer:

Gestation: A Microservice architecture for a prenatal care application. 683-687 - Kazi Zawad Arefin, Kazi Shafiul Alam Shuvo

, Masud Rabbani, Peter Dobbs, Leah Jepson, Amy Leventhal, Amy Vaughan Van Heeke, Sheikh Iqbal Ahamed:
Towards Developing An EMR in Mental Health Care for Children's Mental Health Development among the Underserved Communities in USA. 688-693 - Qing Xia

, Wensheng Dou, Tong Xi, Jing Zeng, Fengjun Zhang, Jun Wei, Geng Liang:
The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining. 694-703 - Hiroki Nakano

, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama:
Detecting Event-synced Navigation Attacks across User-generated Content Platforms. 704-713 - Guodi Wang, Tong Li, Hao Yue, Zhen Yang, Runzi Zhang

:
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. 714-724 - Md Hasan Shahriar, Mohammad Ashiqur Rahman

, Nur Imtiazul Haque, Badrul H. Chowdhury
:
DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems. 725-734 - Kaitlyn Cottrell, Dibyendu Brinto Bose, Hossain Shahriar

, Akond Rahman
:
An Empirical Study of Vulnerabilities in Robotics. 735-744 - Mordechai Guri:

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission. 745-754 - Gencer Erdogan, Enrique Garcia-Ceja, Åsmund Hugo, Phu Hong Nguyen

, Sagar Sen:
A Systematic Mapping Study on Approaches for Al-Supported Security Risk Assessment. 755-760 - Hyo-Cheol Lee, Seok-Won Lee:

Towards Provenance-based Trust-aware Model for Socio-Technically Connected Self-Adaptive System. 761-767 - Dale Auten, Thoshitha T. Gamage:

Impact of Resource-Constrained Networks on the Performance of NIST Round-3 PQC Candidates. 768-773 - Robert Ross, William M. Mongan, Patrick O'Neill, Ilhaan Rasheed, Adam K. Fontecchio, Geneviève Dion

, Kapil R. Dandekar:
An Adaptively Parameterized Algorithm Estimating Respiratory Rate from a Passive Wearable RFID Smart Garment. 774-784 - Yuzhe Qiao, Liang Wang, Xianping Tao:

A Bowel Sound Detection Method Based on a Novel Non-speech Body Sound Sensing Device. 785-793 - Valeria Mokrenko, Haoxiang Yu, Vaskar Raychoudhury

, Janick Edinger, Roger O. Smith, Md. Osman Gani:
A Transfer Learning Approach to Surface Detection for Accessible Routing for Wheelchair Users. 794-803 - Sudip Vhaduri, Sayanton V. Dibbo, Chih-You Chen, Christian Poellabauer

:
Predicting Next Call Duration: A Future Direction to Promote Mental Health in the Age of Lockdown. 804-811 - Rrezarta Krasniqi

:
Recommending Bug-fixing Comments from Issue Tracking Discussions in Support of Bug Repair. 812-823 - Hang Yin, Zhiyu Sun, Yanchun Sun, Gang Huang:

Automatic Learning Path Recommendation for Open Source Projects Using Deep Learning on Knowledge Graphs. 824-833 - Liu Yuan, Yude Bai, Zhenchang Xing, Sen Chen, Xiaohong Li, Zhidong Deng:

Predicting Entity Relations across Different Security Databases by Using Graph Attention Network. 834-843 - Wenxing Liu

, Yunduo Wang, Qixiang Zhou, Tong Li:
Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar Models. 844-853 - Yati Phyo

, Canh Minh Do, Kazuhiro Ogata:
A support tool for the L + 1-layer divide & conquer approach to leads-to model checking. 854-863 - Shaojun Ren, Chongyang Shi, Shuxin Zhao:

Exploiting Multi-aspect Interactions for God Class Detection with Dataset Fine-tuning. 864-873 - Chenchen Yang, Haiying Sun, Jing Liu, Jiexiang Kang, Wei Yin, Hui Wang, Tengfei Li

:
Uncertainty Modeling and Quantitative Evaluation of Cyber-physical Systems. 874-883 - Hao Chen, Kegang Wei, An Li, Tao Wang, Wenbo Zhang:

Trace-based Intelligent Fault Diagnosis for Microservices with Deep Learning. 884-893 - Tarek Mahmud, Mujahid Khan

, Jihan Rouijel
, Meiru Che, Guowei Yang
:
API Change Impact Analysis for Android Apps. 894-903 - Lei Chen, Dandan Wang, Lin Shi

, Qing Wang:
A Self-enhanced Automatic Traceability Link Recovery via Structure Knowledge Mining for Small-scale Labeled Data. 904-913 - Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai

, Haoyu Wang:
A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories. 914-923 - Zhuoli Xie

, Ajay Jayanth, Kapil Yadav, Guanghui Ye, Lingzi Hong
:
Multi-faceted Classification for the Identification of Informative Communications during Crises: Case of COVID-19. 924-933 - Anas Dakkak, David Issa Mattos, Jan Bosch:

Perceived benefits of Continuous Deployment in Software-Intensive Embedded Systems. 934-941 - Xin Yin, Chongyang Shi, Shuxin Zhao:

Local and Global Feature Based Explainable Feature Envy Detection. 942-951 - Mario Concilio Neto, Roberto P. A. Araujo, Marcos Lordello Chaim, Jeff Offutt:

Graph Representation for Data Flow Coverage. 952-961 - Ekincan Ufuktepe

, Deniz Kavzak Ufuktepe, Korhan Karabulut:
MuKEA-TCP: A Mutant Kill-based Local Search Augmented Evolutionary Algorithm Approach for Test Case Prioritization. 962-967 - Chang-Ai Sun, Jing Wang, Zhenxian Liu, Yanbo Han:

A Variability-Enabling and Model-Driven Approach to Adaptive Microservice-based Systems. 968-973 - Jing Liu, Li Song:

Second-Order Mutation Testing Cost Reduction Based on Mutant Clustering using SOM Neural Network Model. 974-979 - Guowei Li, Yang Yang, Zhaolin Wu, Tiange Cao, Yong Liu, Zheng Li:

Weighted Reward for Reinforcement Learning based Test Case Prioritization in Continuous Integration Testing. 980-985 - Hongjie Ye, Jiahong Zhou

, Wei Chen, Jiaxin Zhu, Guoquan Wu, Jun Wei:
DockerGen: A Knowledge Graph based Approach for Software Containerization. 986-991 - Yuchu Liu, Jan Bosch, Helena Holmström Olsson, Jonn Lantz:

An architecture for enabling A/B experiments in automotive embedded software. 992-997 - Sihan Xu, Ya Gao, Xiangrui Cai, Zhiyu Wang, Hua Ji:

Effective Multi-Fault Localization Based on Fault-Relevant Statistics. 998-1003 - Robert Ward, Carl K. Chang:

Scrum, Sampling, and the 90 Percent Syndrome. 1004-1013 - Ekincan Ufuktepe

, Tugkan Tuglular:
Code Change Sniffer: Predicting Future Code Changes with Markov Chain. 1014-1019 - Hao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li, Yude Bai, Hu Zhang:

Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases. 1020-1025 - João Fonseca de Carvalho, Vasco Amaral:

Towards a Modelling Workbench with flexible Interaction Models for Model Editors operating through Voice and Gestures. 1026-1031 - Hui Yuan, Wenjia Zheng, Yun Song, Yijun Zhao:

Parallel Deep Neural Networks for Musical Genre Classification: A Case Study. 1032-1035 - Yasuaki Kobayashi, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo:

How Do Avatar Appearances Affect Communication from Others? 1036-1039 - Gwen Salaün:

Consistent Substitution of Object in Rule-based IoT Applications. 1040-1048 - Holden Gordon, Christopher Batula, Bhagyashri Tushir, Behnam Dezfouli, Yuhong Liu:

Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic Classification. 1049-1057 - Juan Alberto Llopis

, Manel Mena
, Javier Criado, Luis Iribarne
:
MI-FIWARE: A web component development method for FIWARE using microservices. 1058-1065 - Fred Love, Jennifer L. Leopold, Bruce M. McMillin, Fei Su:

Discriminative Pattern Mining for Runtime Security Enforcement of Cyber-Physical Point-of-Care Medical Technology. 1066-1072 - Sayeda Farzana Aktar, Feroz Jahangir Rana, Siam Rezwan

, Iysa Iqbal, Lopa Kabir, Rezwan Islam, Sheikh Iqbal Ahamed:
Reviewing Polypharmacy in Elderly Individuals of Rural Regions. 1073-1078 - Yinlong Xiao, Qing Zhao, Jianqiang Li, Jieqing Chen, Zhenning Cheng:

MLNER: Exploiting Multi-source Lexicon Information Fusion for Named Entity Recognition in Chinese Medical Text. 1079-1084 - Abhishek Phadke

, Stanislav Ustymenko
:
Updating the Taxonomy of Intrusion Detection Systems. 1085-1091 - Taiga Shirakura, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:

Potential Security Risks of Internationalized Domain Name Processing for Hyperlink. 1092-1098 - Atsushi Kanda, Masaki Hashimoto

:
Identification of TLS Communications Using Randomness Testing. 1099-1106 - Shuvo Bardhan, Abdella Battou:

Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs. 1107-1113 - Henry C. B. Chan:

Teaching Entrepreneurship Using C3 Model-Map. 1114-1118 - Thiciany Matsudo Iwano, Dayvson Duarte Pereira, Daniel Scherer:

Use of Augmented and 3D Visualization as a Tool to Support the Teaching of Spatial Geometry. 1119-1124 - Dave Towey

, Kevin Ferdinand, Gabrielle Saputra Hadian, Ivan Christian Halim, Aurelie U-King Im, Joseph Manuel Thenara, Patricia Wong, Li-Kai Wu:
Remote Software Development: A Student-staff Collaboration to Build a Showcase Platform for Non-traditional Digital Artefacts. 1125-1130 - Ciara Breathnach, Rachel Murphy, Tiziana Margaria:

Transcribathons as Practice-Based Learning for Historians and Computer Scientists. 1131-1136 - Chengke Tang, Amarpreet S. Gill

, Matthew Pike
, Dave Towey
:
Creating a Virtual Reality OER Application to Teach Web Accessibility. 1137-1142 - Hanning Zhang

, Bo Dong, Boqin Feng, Bifan Wei
:
A Keyword Query Approach Based on Community Structure of RDF Entity Graph. 1143-1148 - Xintian Yu, Enze Ma, Pengbo Nie, Beijun Shen, Yuting Chen, Ziyi Lin:

ApproxiFuzzer: Fuzzing towards Deep Code Snippets in Java Programs. 1149-1156 - Irena Bojanova, Carlos Eduardo Galhardo:

Classifying Memory Bugs Using Bugs Framework Approach. 1157-1164 - Yuting Hu, Shikun Zhou

, David A. Sanders
, Weicong Zhang, Linda Yang
:
Optimised Fusion Model for Meeting Sulphur Abatement Standards in Shipping Industry. 1165-1169 - Yan Wang, Na Zhou, Haixia Lang, Yunying Li:

An Optimal Composite Service Selection Model based on Edge-Cloud Collaboration. 1170-1175 - Jason Xiaojun Huang, Shikun Zhou

, Nick Savage, Weicong Zhang:
A Distributed Cloud Honeypot Architecture. 1176-1181 - Qiang Li, Wenxia Qiao, Haiyang Tian, Zhi Li, Mingjuan Ma:

Design and Implementation of a Voice Interactive Tool to Facilitate Web Collaboration. 1182-1187 - Shih-Ying Chang, Hsin-Ta Chiao, Ruey-Kai Sheu, Lun-Chi Chen, Welly:

Accelerating Transmission of Streaming Files Based on AL-FEC Protection Blocks. 1188-1193 - Larry Singleton, Rui Zhao, Harvey P. Siy, Myoungkyu Song:

FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications. 1194-1201 - Satsuki Nishioka, Yasuo Okabe:

Mutual Secrecy of Attributes and Authorization Policies in Identity Federation. 1202-1209 - Victoria Lemieux, Artemij Voskobojnikov, Meng Kang:

Addressing Audit and Accountability Issues in Self-Sovereign Identity Blockchain Systems Using Archival Science Principles. 1210-1216 - Sofia Terzi

, Charalampos Savvaidis, Athanasios Sersemis
, Konstantinos Votis, Dimitrios Tzovaras
:
Decentralizing Identity Management and Vehicle Rights Delegation through Self-Sovereign Identities and Blockchain. 1217-1223 - Lutz Schammer, Swantje Plambeck

, Fin Hendrik Bahnsen, Görschwin Fey
:
Learning Models of Cyber-Physical Systems using Automata Learning. 1224-1229 - Manuel Diaz-Zapata, Özgür Erkent, Christian Laugier:

YOLO-based Panoptic Segmentation Network. 1230-1234 - Pei-Shu Huang, Faisal Fahmi

, Feng-Jian Wang:
A Model to Helping the Construction of Creative Service-Based Software. 1235-1242 - Hamed Hamzeh

, Sofia Meacham, Kashaf Khan, Angelos Stefanidis
, Keith Phalp:
H-FFMRA: A Multi Resource Fully Fair Resources Allocation Algorithm in Heterogeneous Cloud Computing. 1243-1249 - Neil Buckley, Lewis Sherrett, Emanuele Lindo Secco

:
A CNN sign language recognition system with single & double-handed gestures. 1250-1253 - Gill Lumer-Klabbers, Jacob Odgaard Hausted, Jakob Levisen Kvistgaard, Hugo Daniel Macedo

, Mirgita Frasheri
, Peter Gorm Larsen
:
Towards a Digital Twin Framework for Autonomous Robots. 1254-1259 - Xi Xu, Jianqiang Li, Yu Guan

, Linna Zhao, Li Zhang, Li Li:
Automatic Cataract Grading with Visual-semantic Interpretability. 1260-1264 - Khalid Halba

, Edward R. Griffor, Ahmed Lbath, Anton Dahbura:
A Framework for the Composition of IoT and CPS Capabilities. 1265-1272 - Andrea Bauchiero, Guido Perboli

, Mariangela Rosano
:
Smart Home applied to historic buildings A real case study. 1273-1278 - Nathalie Frieß, Ulrich Pferschy:

Decision-Support System for the Optimal Technology Split of a Decarbonized Bus Network. 1279-1284 - Vittorio Capocasale

, Danilo Gotta, Stefano Musso, Guido Perboli
:
A Blockchain, 5G and IoT-based transaction management system for Smart Logistics: an Hyperledger framework. 1285-1290 - Edoardo Fadda

, Stanislav Fedorov
, Guido Perboli
, Ivan Dario Cardenas Barbosa:
Mixing machine learning and optimization for the tactical capacity planning in last-mile delivery. 1291-1296 - Koki Murata, Noriyoshi Yamamoto, Tomoya Kawakami:

A Complexity Reduction Method for Road Pricing Based on Demand Distribution. 1297-1302 - Jincheng Xu, Qingfeng Du, Xiaojun Li:

A Requirement-based Regression Test Selection Technique in Behavior-Driven Development. 1303-1308 - Jian Zhu, Kai Hu, Mamoun Filali, Jean-Paul Bodeveix, Jean-Pierre Talpin, Haitao Cao:

Formal Simulation and Verification of Solidity contracts in Event-B. 1309-1314 - Mingjia Zhang, Dave Towey

, Tsong Yueh Chen
, Zhi Quan Zhou
:
Metamorphic Testing for Block Ciphers. 1315-1320 - Junji Wu, Atsushi Kanai:

Utilizing obfuscation information in deep learning-based Android malware detection. 1321-1326 - Haowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen:

Software Safety Verification Framework based on Predicate Abstraction. 1327-1332 - Dehui Du, Jiena Chen, Mingzhuo Zhang, Mingjun Ma:

Towards Verified Safety-critical Autonomous Driving Scenario with ADSML. 1333-1338 - Alexander Boyett, Atef Shalan, Hossain Shahriar

, Muhammad Asadur Rahman:
A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities. 1339-1344 - Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita:

Design Scheme of Perceptual Hashing based on Output of CNN for Digital Watermarking. 1345-1350 - A. B. M. Kamrul Riad, Hossain Shahriar

, Maria Valero, Mokter Hossain:
Cybersecurity Risks and Mitigation Techniques During COVID-19. 1351-1356 - Sepehr Amir-Mohammadian, Afsoon Yousefi Zowj:

Towards Concurrent Audit Logging in Microservices. 1357-1362 - Pablo López-Aguilar

, Agusti Solanas:
Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of Neuroticism. 1363-1368 - Abdullah Al Farooq, Thomas Moyer, Dewan Tanvir Ahmed:

OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack. 1369-1374 - Giovanni George, Jeremiah Kotey, Megan Ripley, Kazi Zakia Sultana, Zadia Codabux:

A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow Vulnerability. 1375-1380 - Pamela Mutombo, Andrei B. B. Torres

, Bill Kapralos, Brenda Gamble, Celeste Adams, Lynda Lawson, Celina Da Silva, Adam Dubrowski:
An Innovative Virtual Learning Environment to Enhance Age-Friendly Cultural Competencies. 1381-1382 - Celina Da Silva, Andrei B. B. Torres

, Bill Kapralos, Eva Peisachovich, Adam Dubrowski, Veronica Baltazar, Bilal Qureshi, Nelson Caraballo:
Person-Centered Virtual Serious Games: Mental Health Education. 1383-1384 - Liang Ye, Weijie Li, Wenhao Zhu:

Research on Periodic Precaching Optimization Strategy Based on Access Mode. 1385-1386 - Nabeel Al-Yateem, Amina Al-Marzouqi, Jacqueline Maria Dias

, Muhammad Arsyad Subu
, Syed Azizur Rahman
, Sheikh Iqbal Ahamed, Mohammad AlShabi:
Artificial intelligence-based school decision support system to enhance care provided for children at schools in the United Arab Emirates. 1387-1388 - Sandeep Reddivari

:
VisLan: A Tool for Visualizing Landmark files in Source Code. 1389-1390 - Muhammad Arsyad Subu

, Nabeel Al-Yateem, Imam Waluyo, Jacqueline Maria Dias
, Syed Azizur Rahman
, Rinto Agustino, Sheikh Iqbal Ahamed, Amina Al-Marzouqi:
Relationship between Internet Gaming Addiction and Body Mass Index Status among Indonesian Junior High School Students. 1391-1393 - Muhammad Arsyad Subu

, Nabeel Al-Yateem, Imam Waluyo, Djadjang Aditaruna, Syed Azizur Rahman, Amina Al-Marzouqi, Jacqueline Maria Dias
, Sheikh Iqbal Ahamed:
Social Media Use and Physical Activity among Junior High School Students in Indonesia. 1394-1396 - Zaid Ameen Abduljabbar

, Ayad Ibrahim, Mustafa A. Al Sibahee, Songfeng Lu, Samir M. Umran
:
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data. 1397-1398 - Jaciel E. Reyes, Atef Shalan, Hossain Shahriar

, Muhammad Asadur Rahman, Sarika Jain
:
A Classification of Web Service Credibility Measures. 1399-1400 - Lei Qiao, Guangjie Li, Daohua Yu, Hui Liu:

Deep Feature Learning to Quantitative Prediction of Software Defects. 1401-1402 - Shyam Rajendren, Sandeep Reddivari

:
Predicting Number of Bugs before Launch: An Investigation based on Machine Learning. 1403-1404 - Koki Miura, Daisuke Saito, Hironori Washizaki, Yoshiaki Fukazawa:

Automated Educational Program Mapping on Learning Standards in Computer Science. 1405-1406 - Yasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka:

Preliminary Literature Review of Machine Learning System Development Practices. 1407-1408 - Sandeep Reddivari

:
T-ReQs: A Tool for Tracking Similarity in Software ReQuirements. 1409-1410 - Kentaro Goto, Akira Shibuya, Masayuki Okada, Masato Uchida:

Analysis of Route Announcements of Unassigned IP Addresses. 1411-1416 - Takuya Urimoto, Daisuke Kotani, Yasuo Okabe:

Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet. 1417-1422 - Koki Makida, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo:

Same World Broadcasting: An Internet Broadcasting System for Real-Time Distributed Video Compositions. 1423-1428 - Chunghan Lee

, Naoyuki Mori, Yasuhiro Ohara, Tetsuya Murakami, Shogo Asaba, Satoru Matsushima:
The Latency Characteristics of GTP-U and SRv6 Stateless Translation on VPP Software Router. 1429-1436 - Richard Jarry, Satoru Kobayashi

, Kensuke Fukuda:
A Quantitative Causal Analysis for Network Log Data. 1437-1442 - Kazuki Otomo, Satoru Kobayashi

, Kensuke Fukuda, Osamu Akashi, Kimihiro Mizutani
, Hiroshi Esaki:
Towards Extracting Semantics of Network Config Blocks. 1443-1448 - Hiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo:

An Evaluation of Stochastic Quantitative Resilience Index Based on SLAs of Communication Lines. 1449-1454 - Hamta Sedghani

, Danilo Ardagna
, Matteo Matteucci, Giulio Angelo Fontana, Giacomo Verticale
, Fabrizio Amarilli
, Rosa M. Badia, Daniele Lezzi
, Ignacio Blanquer, André Martin, Konrad Wawruch:
Advancing Design and Runtime Management of AI Applications with AI-SPRINT (Position Paper). 1455-1462 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Ben Ayed

:
A Reinforcement Learning Based Approach of Context-driven Adaptive User Interfaces. 1463-1468 - Songwen Pei, Xianrong Wang, Wei Qin, Sheng Liang:

STARS: Spatial Temporal Graph Convolution Network for Action Recognition System on FPGAs. 1469-1474 - Garrett Partenza, Trevor Amburgey, Lin Deng

, Josh Dehlinger
, Suranjan Chakraborty
:
Automatic Identification of Vulnerable Code: Investigations with an AST-Based Neural Network. 1475-1482 - Imen Ben Fraj, Yousra Bendaly Hlaoui, Leila Ben Ayed

:
A reactive system for specifying and running flexible cloud service business processes based on machine learning. 1483-1489 - Antonio Costantino Marceddu

, Bartolomeo Montrucchio:
Recognizing the Type of Mask or Respirator Worn Through a CNN Trained with a Novel Database. 1490-1495 - Shigeki Kohda, Kenichi Yoshida:

Characteristics of High-Frequency Trading and Its Forecasts. 1496-1501 - Gabriel da Silva Vieira, Naiane Maria de Sousa, Bruno M. Rocha, Afonso Ueslei Da Fonseca

, Fabrízzio Alphonsus A. M. N. Soares
:
A Method for the Detection and Reconstruction of Foliar Damage caused by Predatory Insects. 1502-1507 - Yingrui Ma, Dave Towey

, Tsong Yueh Chen
, Zhi Quan Zhou
:
Metamorphic Testing of Fake News Detection Software. 1508-1513 - Fabio Garcea, Lia Morra, Fabrizio Lamberti:

On the Use of Causal Models to Build Better Datasets. 1514-1519 - Hüseyin Umutcan Ay

, Alime Aysu Öner, Nihan Yildirim
, Tolga Kaya:
A Machine Learning-Based Decision Support System Design for Restraining Orders in Turkey. 1520-1525 - Priscila M. Kai, Bruna M. de Oliveira, Gabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares

, Ronaldo Martins da Costa:
Effects of resampling image methods in sugarcane classification and the potential use of vegetation indices related to chlorophyll. 1526-1531 - Jian Ni, Yingtao Jiang, Shengjie Zhai, Yihan Chen, Sijia Li, Amei Amei, Dieu-My. T. Tran, Lijie Zhai, Yu Kuang:

Multi-class Cardiovascular Disease Detection and Classification from 12-Lead ECG Signals Using an Inception Residual Network. 1532-1537 - Victor Parque

:
Learning Motion Planning Functions using a Linear Transition in the C-space: Networks and Kernels. 1538-1543 - Alejandro Leo-Ramírez

, Bernardo Tabuenca, Vicente García-Alcántara, Edmundo Tovar, Wolfgang Greller, Carlos Gilarranz Casado:
Solutions to ventilate learning spaces: a review of current CO2 sensors for IoT systems. 1544-1551 - Toshiaki Hirata, Kenichi Yoshida, Kunihiko Koido, Sumiei Takahashi:

Anomaly detection in air conditioners using IoT technologies. 1552-1558 - Tatsuya Kubo, Tomoya Kawakami:

An Enhanced Routing Method for Overlay Networks Based on Multiple Different Time Intervals. 1559-1564 - Kwok Sun Cheng, Myoungkyu Song:

Learning To Rank Relevant Documents for Information Retrieval in Bioengineering Text Corpora. 1565-1572 - Dustin O'Hara:

"Frontline Mediators" an ethnographic study of online welfare applications at the public library. 1573-1578 - Dave Bhardwaj, Olga Ormandjieva:

Toward a Novel Measurement Framework for Big Data (MEGA). 1579-1586 - Quentin Jensen, Filip Jagodzinski, Tanzima Z. Islam:

FILCIO: Application Agnostic I/O Aggregation to Scale Scientific Workflows. 1587-1592 - Subhash Rajapaksha, Shivam Thakrar, Matt Kinzler, Haochen Sun, Justin Smith, Debbie Perouli:

Field Study on Usability and Security Perceptions Surrounding Social Robots. 1593-1598 - Jinyang Du, Yin Zhang, Binglei Yue, Min Chen:

Bidirectional Edge-Enhanced Graph Convolutional Networks for Aspect-based Sentiment Classification. 1599-1604 - Fang Hu, Mingfang Huang, Jia Liu, Xingyu Yan, Xiufeng Cheng:

A Robotic Vision Model via Xception and Light Gradient Boosting Machine. 1605-1610 - Degen Zhang, Xin Li, Linjing Lai:

Shared-latent Variable Network Alignment. 1611-1616 - Yu Shi, Yuhang Guo, Hao Wu, Jingxiu Li, Xin Li:

Multi-relational EHR representation learning with infusing information of Diagnosis and Medication. 1617-1622 - Jie Liu, Yi Sun, Fengkai Xu, Keping Yu

, Ali Kashif Bashir, Zhaoli Liu:
IIS: Intelligent Identification Scheme of Massive IoT Devices. 1623-1626 - Yongfeng Qian, Zhoutong Zuo, Yixue Hao

:
Online Vehicle Selection for Task Replication via Bandit Learning. 1627-1632 - Kazuki Fukae, Tetsuo Imai, Shintaro Yamabe, Kenichi Arai, Toru Kobayashi:

Development of Observation Device with Multi Sensor Platform for Underwater Aquaculture Cages. 1633-1638 - Daisuke Kotani, Taku Tanaka

, Yasuo Okabe:
QoS Network Control for Elderly Support Services. 1639-1644 - Uy Nguyen, Kwok Sun Cheng, Samuel Sungmin Cho, Myoungkyu Song:

Analyzing Bug Reports by Topic Mining in Software Evolution. 1645-1652 - Alhassan Boner Diallo, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:

Adaptation Space Reduction Using an Explainable Framework. 1653-1660 - Hyun Park, Yanggon Kim:

Determinants of Consumer Purchasing Factors through LDA Modeling Using YouTube Data. 1661-1666 - Hermann Baumgartl, Daniel Sauter, Christian Schenk, Cem Atik, Ricardo Buettner:

Vision-based Hand Gesture Recognition for Human-Computer Interaction using MobileNetV2. 1667-1674 - Jiachen Ma, Piyush Saxena, Sheikh Iqbal Ahamed:

A Comprehensive Qualitative and Quantitative Review of Current Research in GANs. 1675-1682 - Wonjin Kim, Yanggon Kim:

Abnormal Gait Recognition based on Integrated Gait Features in Machine Learning. 1683-1688 - Yubo Chen, Carson K. Leung

, Hao Li, Siyuan Shang, Wanmeng Wang, Zhi Zheng:
A Data Science Solution for Supporting Social and Economic Analysis. 1689-1694 - Shuvalaxmi Dass

, Prerit Datta, Akbar Siami Namin:
Attack Prediction using Hidden Markov Model. 1695-1702 - Faranak Abri

, Luis Felipe Gutiérrez
, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones:
Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks. 1703-1710 - Zhenhe Pan, Taige Wang, Yuanlin Zhang:

COVID-19 SIHR Modeling and Dynamic Analysis. 1711-1716 - Sameh Neji, Tarek Chenaina, Abdullah M. Shoeb, Leila Ben Ayed

:
HIR: A Hybrid IR Ranking Model. 1717-1722 - Tianlei Wang, James D. Harvey, Carson K. Leung

, Adam G. M. Pazdor, Animesh Singh Chauhan, Lihe Fan, Alfredo Cuzzocrea:
Distributed Big Data Computing for Supporting Predictive Analytics of Service Requests. 1723-1728 - Nima Salehy, Giray Ökten:

Dempster-Shafer Theory for Stock Selection. 1729-1734 - Steven Y. K. Wong, Jennifer S. K. Chan, Lamiae Azizi, Richard Y. D. Xu

:
Supervised Temporal Autoencoder for Stock Return Time-series Forecasting. 1735-1741 - Aerambamoorthy Thavaneswaran, You Liang, Na Yu

, Alex Paseka, Ruppa K. Thulasiram:
Novel Data-Driven Resilient Portfolio Risk Measures Using Sign and Volatility Correlations. 1742-1747 - You Liang, Aerambamoorthy Thavaneswaran, Alexander Paseka, Ruppa K. Thulasiram, Ethan Johnson-Skinner:

Portfolio Optimization Using Novel Intelligent Probabilistic Forecasts of Risk Measures. 1748-1753 - Cuong V. Nguyen

, Sanjiv R. Das, John He, Shenghua Yue, Vinay Hanumaiah, Xavier Ragot, Li Zhang:
Multimodal Machine Learning for Credit Modeling. 1754-1759 - Md. Erfanul Hoque

, Aerambamoorthy Thavaneswaran, Alex Paseka, Ruppa K. Thulasiram:
An Algorithmic Multiple Trading Strategy Using Data-Driven Random Weights Innovation Volatility. 1760-1765 - Ethan Johnson-Skinner, You Liang, Na Yu

, Alin Morariu:
A Novel Algorithmic Trading Strategy using Hidden Markov Model for Kalman Filtering Innovations. 1766-1771 - Cristian Mateos, Matías Hirsch, Juan Toloza, Alejandro Zunino:

Motrol 2.0: A Dew-oriented hardware/software platform for batch-benchmarking smartphones. 1772-1777 - Jannik Blähser, Tim Göller, Matthias Böhmer:

Thine - Approach for a fault tolerant distributed packet manager based on hypercore protocol. 1778-1782 - Partha Pratim Ray, Karolj Skala:

A Vision of Dew-IoT Ecosystem: Requirements, Architecture, and Challenges. 1783-1788 - Mladen Sverko, Nikola Tankovic, Darko Etinger:

Dew Computing in Industrial Automation: Applying Machine Learning for Process Control. 1789-1794 - Marjan Gusev

:
What makes Dew computing more than Edge computing for Internet of Things. 1795-1800 - Yingwei Wang:

An API for Dew Computing Services. 1801-1804 - Yuan-Chih Yu:

A Dew Computing Architecture for Smart Parking System with Cloud Image Recognition Service. 1805-1809 - Minhajur Rahman

, Yingwei Wang:
Implementation of Dewblock Clients on a Mobile Platform. 1810-1813 - Marjan Gusev

:
Serverless and Deviceless Dew Computing: Founding an Infrastructureless Computing. 1814-1818 - Emanuel Guberovic, Tomislav Lipic

, Igor Cavrak:
Dew Intelligence: Federated learning perspective. 1819-1824 - Tobi Popoola, Ravi Shankar, Anna Rift

, Shivani Singh, Eddie C. Davis, Michelle Mills Strout, Catherine Olschanowsky:
An Object-Oriented Interface to The Sparse Polyhedral Library. 1825-1831 - Darien Sawyer, Jinan Fiaidhi, Sabah Mohammed:

Few Shot Learning of COVID-19 Classification Based on Sequential and Pretrained Models: A Thick Data Approach. 1832-1836 - Dilek Yilmazer Demirel

, Özgü Can
:
ProvVacT: A Provenance Based mHealth Application for Tracking Vaccine History. 1837-1842 - Mary Carlota Bernal

, Antoni Martínez-Ballesté, Agusti Solanas:
A Review of Data Sources for the Study of Ageing. 1843-1848 - Montse García-Famoso, Maria Angels Moncusí Mercadé, Agusti Solanas:

Holistic Approach to Intrinsic Capacity Assessment: An Engineering Perspective. 1849-1854 - Julio Hernandez, Lucy McKenna, Rob Brennan

:
TIKD: A Trusted Integrated Knowledge Dataspace For Sensitive Healthcare Data Sharing. 1855-1860 - Francisco Marques, Alano Martins Pinto

, Arthur Bastos, Ana Gonçalves, Gilherbson Pereira, Flávio Reis:
Deep Learning Applied to Automatic Reclosers Detection in Power Grid. 1861-1866 - Alberto Bocca, Alberto Macii

, Enrico Macii:
Forecasting the Grid Power Demand of Charging Stations from EV Drivers' Attitude. 1867-1872 - Matteo Orlando

, Lorenzo Bottaccioli, Sara Vinco, Enrico Macii, Massimo Poncino, Edoardo Patti:
Design of District-level Photovoltaic Installations for Optimal Power Production and Economic Benefit. 1873-1878 - Jakob Danielsson, Janne Suuronen, Marcus Jägemar, Tiberiu Seceleanu

, Moris Behnam, Mikael Sjödin:
Modelling Application Cache Behavior using Regression Models. 1879-1886 - Tiberiu Seceleanu

, Ning Xiong, Cristina Seceleanu
:
Control as a Service - Intelligent Networking. 1887-1892 - Olawunmi George, Roger Smith, Praveen Madiraju, Nasim Yahyasoltani, Sheikh Iqbal Ahamed:

Motor Imagery: A Review of Existing Techniques, Challenges and Potentials. 1893-1899 - Syed Azizur Rahman, Sheikh Iqbal Ahamed, Nabeel Al-Yateem, Amina Al-Marzouqi, Muhammad Arsyad Subu

, Swetha Variyath:
Integration of mHealth into Primary Health Care for Child Cancer Patients - An approach to reduce health inequities in Bangladesh. 1900-1903 - Enoch Menezes de Oliveira, Daniel Scherer:

Usability in m-health applications for application in healthcare environments. 1904-1908 - Pedro Almir Martins de Oliveira, Rossana M. C. Andrade, Pedro de A. Santos Neto:

IoT-Health Platform to Monitor and Improve Quality of Life in Smart Environments. 1909-1912 - Weihao Lin, Qinyan Zhang, Ji-Jiang Yang, Fangfang, Qing Wang, Qi Chen, Yi Lei:

Facial Image Classification for Obstructive Sleep Apnea Pre-Screening. 1913-1917 - Tariq Mahmood

, Jianqiang Li, Yan Pei
, Faheem Akhtar, Yanhe Jia, Zahid Hussain Khand:
Breast Mass Detection and Classification Using Deep Convolutional Neural Networks for Radiologist Diagnosis Assistance. 1918-1923 - Jingnan Wang, Jianqiang Li, Zhichao Zhu, Qing Zhao, Yang Yu, Liyin Yang, Chun Xu:

Joint Extraction of Events in Chinese Electronic Medical Records. 1924-1929 - Zhichao Zhu, Jianqiang Li, Qing Zhao, Yu-Chih Wei, Yanhe Jia:

Medical named entity recognition of Chinese electronic medical records based on stacked Bidirectional Long Short-Term Memory. 1930-1935 - Afonso Ueslei Da Fonseca

, Gabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares
:
Screening of Viral Pneumonia and COVID-19 in Chest X-ray using Classical Machine Learning. 1936-1941 - Juliana Paula Felix, Hugo Alexandre Dantas do Nascimento

, Nilza Nascimento Guimarães, Eduardo Di Oliveira Pires, Afonso Ueslei Da Fonseca
, Gabriel da Silva Vieira:
Automatic Classification of Amyotrophic Lateral Sclerosis through Gait Dynamics. 1942-1947 - Guoxuan Ning, Bill Kapralos, Alvaro Uribe-Quevedo, Kamen Collins, Kamen Kanev, Adam Dubrowski:

Examining the Perception of Drilling Depth Using Auditory Cues. 1948-1949 - Andrea Porelli, Natalia Selini Hadjidimitriou, Mariangela Rosano

, Stefano Musso:
Enhancing port's competitiveness thanks to 5G enabled applications and services. 1950-1955

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














