


default search action
47th COMPSAC 2023: Torino, Italy
- Hossain Shahriar, Yuuichi Teranishi, Alfredo Cuzzocrea, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Hiroki Kashiwazaki, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:

47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023. IEEE 2023, ISBN 979-8-3503-2697-0 - Alfredo Cuzzocrea, Moushumi Sharmin, Yuuichi Teranishi, Dave Towey:

IEEE COMPSAC 2023 - Resilient Computing and Computing for Resilience in a Sustainable Cyber-Physical World: Summary and Future Research Directions. xlix-l - Ahmet Tikna, Marco Roveri

, Daniele Fontanelli
, Luigi Palopoli:
When graphs meet game theory: a scalable approach for robotic car racing. 1-8 - Houari Bettahar

, Vieira Arthur, Quan Zhou:
Robotic Gel Dispensing based on Visual Servoing for Fiber Threading. 9-17 - Martí Caro

, Jordi Fornt, Jaume Abella:
Efficient Diverse Redundant DNNs for Autonomous Driving. 18-27 - Katerina Goseva-Popstojanova

, Denny Hood, Johann Schumann, Noble Nkwocha:
The Anatomy of Software Changes and Bugs in Autonomous Operating System. 28-38 - Masaya Fujiwaka, Kousuke Nogami:

Robust 6D Pose Estimation for Texture-varying Objects in Autonomous System. 39-44 - Kevin Schmidt, Sabolc Jut:

Towards Environment-Dependent Model Switching for Performance and Accuracy Conscious Object Detection in Day- and Nighttime Urban Traffic Environments. 45-50 - Niccolò De Bona, Luca Santoro

, Davide Brunelli, Daniele Fontanelli
:
Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target Uncertainty. 51-56 - Anoop Bhagyanath, Klaus Schneider

:
Program Balancing in Compilation for Buffered Hybrid Dataflow Processors. 57-66 - Ahmad Rezaei

, Johannes Nau, Johannes Richter, Detlef Streitferdt, Jörg Schambach:
FACEE: Framework for Automating CNN Explainability Evaluation. 67-78 - Jonas Peeck, Robin Hapka, Rolf Ernst:

Efficient hard real-time implementation of CNNs on multi-core architectures. 79-90 - Yuji Muraoka, Kenichi Kourai:

Memory-virtualizing and -devirtualizing VM Migration with Private Virtual Memory. 91-96 - Theodora Adufu, Yoonhee Kim:

L2 Cache Access Pattern Analysis using Static Profiling of an Application. 97-102 - Myke Morais de Oliveira

, Ellen Francine Barbosa:
Multilevel modeling for the analysis and prediction of school dropout: a systematic review. 103-112 - Alice Barana, Marina Marchisio, Matteo Sacchet:

Orientative teaching with Open Educational Resources: the role of teachers in students' transition from high school to university. 113-121 - Yuqian Zhuang, Liang Wang, Mingya Zhang, Shan Lin, Hao Hu, Xianping Tao:

OPTES: A Tool for Behavior-based Student Programming Progress Estimation. 122-131 - Han Wan, Mengying Li

, Zihao Zhong, Xiaoyan Luo:
Early Prediction of Student Performance with LSTM-Based Deep Neural Network. 132-141 - Nicolas Dobbins, Ali R. Hurson

, Sahra Sedigh Sarvestani:
Personalizing Student Graduation Paths Using Expressed Student Interests. 142-143 - Yue Jiang, Hoi Yan Lin, Long Fai Cheung, Henry C. B. Chan, Ping Li:

Hybrid/Online Teaching: A Survey and Key Issues. 152-157 - Salim Saay

, Alex Norta:
Requirements for an international educational collaboration system architecture, a case study: Coláiste Nano Nagle School in Limerick, Ireland, and Irshad High School in Kabul, Afghanistan. 158-163 - Xuedong Ou, Jing Liu:

LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center. 164-173 - Bin Liu, Xiaoyu Bai, Xinyue Su, Chenxi Song, Zhuohan Yao, Xing Wei, Haixi Zhang:

DAC-PPYOLOE+: A Lightweight Real-time Detection Model for Early Apple Leaf Pests and Diseases under Complex Background. 174-182 - Ngoc Nhu Trang Nguyen

, Hong Linh Truong
:
Context-aware, Composable Anomaly Detection in Large-scale Mobile Networks. 183-192 - Juhani Kivimäki

, Aleksey Lebedev, Jukka K. Nurminen
:
Failure Prediction in 2D Document Information Extraction with Calibrated Confidence Scores. 193-202 - Rong Liu, Zemao Chen, Jiayi Liu:

A Hybrid Intrusion Detection System Based on Feature Selection and Voting Classifier. 203-212 - Yu-Heng Wu, Torbjörn E. M. Nordling:

Towards course of disease based epidemiological modelling: motivation and computational optimization. 213-222 - Abdulaziz Alajaji, Walter Gerych, Kavin Chandrasekaran, Luke Buquicchio, Emmanuel Agu, Elke A. Rundensteiner:

Adversarial Human Context Recognition: Evasion Attacks and Defenses. 223-232 - Arunavo Dey, Tanzima Z. Islam, Chase Phelps

, Christopher Kelly:
Signal Processing Based Method for Real-Time Anomaly Detection in High-Performance Computing. 233-240 - Amirhossein Layegh, Amir Hossein Payberah, Ahmet Soylu, Dumitru Roman, Mihhail Matskin:

ContrastNER: Contrastive-based Prompt Tuning for Few-shot NER. 241-249 - Jinyi Wang

, Tong Li, Hongyu Gao:
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information. 250-259 - Raoudha Nouisser, Salma Kammoun Jarraya, Mohamed Hammami:

Human Activity Dataset of Top Frequent Elderly Emergencies for Monitoring Applications using Kinect. 260-267 - Patrick Day, Stefano Iannucci, Ioana Banicescu:

Generating Host-Based Data from Network Traces for Intrusion Detection. 268-273 - Juha Mylläri

, Jukka K. Nurminen
:
Discrepancy Scaling for Fast Unsupervised Anomaly Localization. 274-279 - Ying-Feng Hsu:

Historical Redundant Process Data Recovery based on Genetic Algorithm. 280-285 - Jorma Valjakka, Juha Mylläri

, Lalli Myllyaho
, Juhani Kivimäki
, Jukka K. Nurminen
:
Anomaly Localization in Audio via Feature Pyramid Matching. 286-291 - Davide Napolitano, Luca Cagliero

:
GX-HUI: Global Explanations of AI Models based on High-Utility Itemsets. 292-297 - Martin Woo, Farhana H. Zulkernine, Hanady M. Abdulsalam

:
Examining Feasibility and Efficacy of Traditional Stream Clustering Algorithms on Complex Human Activity Recognition Data. 298-303 - Xinrui Liu, Wenzheng Liu, Yuxiang Li, Xiaoyong Tang, Tan Deng, Ronghui Cao:

Improved Deep Embedded K-Means Clustering with Implicit Orthogonal Space Transformation. 304-309 - Gary M. Weiss, Luisa A. L. Rosa

, Hyun Jeong, Daniel D. Leeds:
An Analysis of Grading Patterns in Undergraduate University Courses. 310-315 - Raveen Narendra Babu, Chung-Horng Lung, Marzia Zaman:

Performance Evaluation of Transformer-based NLP Models on Fake News Detection Datasets. 316-321 - Shimin Tao, Yilun Liu, Weibin Meng, Jingyu Wang, Yanqing Zhao, Chang Su, Weinan Tian, Min Zhang, Hao Yang, Xun Chen:

DA-Parser: A Pre-trained Domain-aware Parsing Framework for Heterogeneous Log Analysis. 322-327 - Jesús Huete, Abdulhakim Ali Qahtan

, Marwan Hassani
:
PrefixCDD: Effective Online Concept Drift Detection over Event Streams using Prefix Trees. 328-333 - Ming-Chang Lee, Jia-Chun Lin, Volker Stolz:

NP-Free: A Real-Time Normalization-free and Parameter-tuning-free Representation Approach for Open-ended Time Series. 334-339 - Chi Mai Nguyen, Phat Trien Thai, Duy Khang Lam, Van Tuan Nguyen:

A Real-Time Text Analysis System. 340-345 - Abdul Mutakabbir

, Chung-Horng Lung, Samuel A. Ajila
, Marzia Zaman, Kshirasagar Naik, Richard Purcell
, Srinivas Sampalli:
Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data. 346-351 - Chase Phelps

, Tanzima Z. Islam:
Automatic Parallelization of Cellular Automata for Heterogeneous Platforms. 352-361 - Cui Zhang, Hui Yang, Jun Li, Yunhua He, Jie Zhang, Qiuyan Yao, Chao Li:

An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT. 362-369 - Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:

Reflections Removal Produced by Multiple Transparent and Reflective Glass Objects in TLS Measurements. 370-379 - Chiara Vercellino

, Giacomo Vitali
, Paolo Viviani
, Alberto Scionti, Andrea Scarabosio, Olivier Terzo, Edoardo Giusto
, Bartolomeo Montrucchio:
Neural optimization for quantum architectures: graph embedding problems with Distance Encoder Networks. 380-389 - Xiali Li, Yandong Chen, Yanyin Zhang, Bo Liu, Licheng Wu:

A phased game algorithm combining deep reinforcement learning and UCT for Tibetan Jiu chess. 390-395 - Chenghan Wang

, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. 396-405 - Yumi Fujita, Sho Tsugawa:

Limiting the Spread of Misinformation on Multiplex Social Networks. 406-411 - Yifang Xu, Zhuopeng Li, Huaxiao Liu, Yuzhou Liu:

AGAA: An Android GUI Accessibility Adapter for Low Vision Users. 412-421 - Aditi Dubey, Likhitadevi Athina, Swapna S. Gokhale:

Is Twitter a News Source or a Social Platform: A Case Study of Covid-19 Vaccine Conversations. 422-427 - Pedro Henrique Teixeira, Nádia Félix F. da Silva, Rogerio Salvini:

Machine Learning Based Method for Auditing Personnel Expenses in Public Expenditure. 428-437 - Jiuqi Wei, Ying Li, Yufan Fu

, Youyi Zhang, Xiaodong Li:
Data Interoperating Architecture (DIA): Decoupling Data and Applications to Give Back Your Data Ownership. 438-447 - Hongyi Zhang, Jingya Li, Zhiqiang Tyler Qi, Anders Aronsson, Jan Bosch, Helena Holmström Olsson:

Multi-Agent Reinforcement Learning in Dynamic Industrial Context. 448-457 - Yuxin Zhang, Gaode Chen

, Lei Wang, Xiaobo Guo, Liyue Ren:
MIRec: Neural News Recommendation with Multi-Interest and Popularity-Aware Modeling. 458-465 - Sushmi Thushara Sukumar, Chung-Horng Lung, Marzia Zaman:

Knowledge Graph Generation for Unstructured Data Using Data Processing Pipeline. 466-471 - Samantha Dobesh, Jamey Albert, Shameem Ahmed, Moushumi Sharmin:

Moving Towards an Accessible Approach to Music Therapy for Autistic People: A Systematic Review. 472-480 - Cecilia Fissore, Francesco Floris, Marina Marchisio, Sergio Rabellino:

Learning analytics to monitor and predict student learning processes in problem solving activities during an online training. 481-489 - Xiang-Li Lu, Hwai-Jung Hsu, William Cheng-Chung Chu:

Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural Network. 490-499 - Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi:

Assessing and Improving the Quality of Generated Tests in the Context of Maintenance Tasks. 500-501 - Yongqiang Gao, Zhihan Li:

Deep Reinforcement Learning Based Rendering Service Placement for Cloud Gaming in Mobile Edge Computing Systems. 502-511 - Yerkezhan Sartayeva

, Yunfei Liu
, Yik Him Ho, Henry C. B. Chan:
Positioning Vectors for Mobile Ad-Hoc Positioning. 512-517 - Shuichiro Shimatani, Hiroki Kashiwazaki, Nobukazu Iguchi:

SRv6 Network Debugging Support System Assigning Identifiers to SRH. 518-525 - Kazunori Fujiwara, Shuji Sannomiya, Akira Sato, Kenichi Yoshida:

Latency analysis of JP and Root DNS servers from packet capture data. 526-531 - Ionut Manea

, Dragos-Daniel Taralunga
:
Fetal ECG Signal Processing for Fetal Monitoring Based on BSS and EMD. 532-538 - Md Abdullah Al Hafiz Khan, Manohar Murikipudi, Abm. Adnan Azmee:

Post-stroke Exercise Assessment using Hybrid Quantum Neural Network. 539-548 - Allison Hsu, Ying-Feng Hsu:

Comprehensive Analysis of Dieting Apps: Effectiveness, Design, and Frequency Usage. 549-557 - Jay Ganesh, Ajay Bansal:

Transformer-based Automatic Mapping of Clinical Notes to Specific Clinical Concepts. 558-563 - Mohammad Yousef Alkhawaldeh

, Muhammad Arsyad Subu
, Nabeel Al-Yateem, Syed Azizur Rahman, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain
:
OB-GYN Telehealth Access and Utilization During COVID-19: Racial and Sociodemographic Disparities. 564-568 - Fatma Refaat Ahmed, Ragad Ghassan Zabin, Rawan Saad Abukoush, Abdullah Ahmad Alnahoum, Mohammad Yousef Alkhawaldeh

, Nabeel Al-Yateem, Muhammad Arsyad Subu
, Amina Alboloshi
, Amina Al-Marzouqi, Alkhansa Ahmad Alawad, Syed Azizur Rahman, Ahmed Hossain
:
Usability differences of telehealth technologies by Multi-linguistic and Multi-cultural users in UAE. 569-573 - Honghe Zhou, Phuong Dinh Nguyen, Lin Deng

, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty:
Reconstructing Android User Behavior through Timestamped State Models. 574-585 - Leo Song, Steven H. H. Ding:

Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation. 586-594 - Jianyi Zhang

, Leixin Yang, Yuyang Han
, Zixiao Xiang, Xiali Hei:
A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions. 595-606 - Junhao Li, Yujian Zhang:

SILK: Constraint-guided Hybrid Fuzzing. 607-616 - Samer Y. Khamaiseh

, Derek Bagagem, Abdullah S. Al-Alaj
, Mathew Mancino, Hakem Alomari, Ahmed Aleroud:
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks. 617-626 - Shuxin Zhang, Jinghua Zhu:

Privacy Protection Federated Learning Framework Based on Blockchain and Committee Consensus in IoT Devices. 627-636 - Mordechai Guri:

AirKeyLogger: Hardwareless Air-Gap Keylogging Attack. 637-647 - Jie Yin, Yutaka Ishikawa, Atsuko Takefusa:

A Linux Audit and MQTT-based Security Monitoring Framework. 648-657 - Weihan Ou, Steven H. H. Ding:

MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis. 658-666 - Gebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer:

Detecting and Preventing ROP Attacks using Machine Learning on ARM. 667-677 - Adebayo Omotosho

, Yaman Qendah, Christian Hammer:
IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning. 678-688 - Anup Das:

Preserving Privacy of Neuromorphic Hardware From PCIe Congestion Side-Channel Attack. 689-698 - Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao:

CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. 699-704 - Min Li, Bo Cui, Wenhan Hou, Ru Li:

Research on Malicious Account Detection Mechanism of Ethereum Based on Community Discovery. 705-710 - Konstantinos Tsiounis, Kostas Kontogiannis:

Reputation-Based Trust Assessment of Transacting Service Components. 711-716 - Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe:

Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents. 717-722 - Mahdi Ghafourian, Julian Fiérrez, Luis Felipe Gomez-Gomez, Rubén Vera-Rodríguez, Aythami Morales

, Zohra Rezgui
, Raymond N. J. Veldhuis:
Toward Face Biometric De-identification using Adversarial Examples. 723-728 - Xuebin Ma, Nan Xiang, Yulan Gao:

RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning. 729-734 - Geming Xia, Jian Chen, Xinyi Huang, Chaodong Yu, Zhong Zhang:

FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated Learning. 735-740 - Richard Cardone, Smruti Padhy, Steve Black, Joe Stubbs

, Sean B. Cleveland
:
A Decentralized Authorization and Security Framework for Distributed Research Workflows. 741-746 - Ning Qin, Hongyan Mao, Yiwen Liu, Kai Chen:

Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSP. 747-752 - Long Chen, Qiaojuan Wang, Yanqing Song, Jianguo Chen:

Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic. 753-758 - Xuebin Ma, Xuejian Qi, Yulei Meng, Tao Yang:

Improved Bayesian network differential privacy data-releasing method based on junction tree. 759-764 - Mst. Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea:

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks. 765-776 - Yixuan Wang

, Bo Zhao, Weidong Li, Lingzi Zhu:
An Ontology-Centric Approach for Network Security Situation Awareness. 777-787 - David Faragó, Michael Färber

, Christian Petrov:
A Full-fledged Commit Message Quality Checker Based on Machine Learning. 788-799 - Yonghao Wu, Shuaihua Tian, Zezhong Yang, Zheng Li, Yong Liu, Xiang Chen:

Identifying Coincidental Correct Test Cases with Multiple Features Extraction for Fault Localization. 800-809 - Yuqi Guo, Zheheng Liang, Shihao Zhu, Jinqiu Wang, Zijiang Yang, Wuqiang Shen, Jinbo Zhang, Yan Cai

:
Sound Predictive Fuzzing for Multi-threaded Programs. 810-819 - Keyuan Zong, Baojian Hua, Yang Wang, Shuang Hu, Zhizhong Pan:

MePof: A Modular and End-to-End Profile-Guided Optimization Framework for Android Kernels. 820-829 - Parul Parul, Kostas Kontogiannis, Chris Brealey:

Prediction of Bug Inducing Commits Using Metrics Trend Analysis. 830-839 - Wenhua Hu, Lei Liu

, Peixin Yang, Kuan Zou, Jiajun Li, Guancheng Lin, Jianwen Xiang:
Revisiting "code smell severity classification using machine learning techniques". 840-849 - Hao Shen

, Xiaolin Ju, Xiang Chen, Guang Yang:
EDP-BGCNN: Effective Defect Prediction via BERT-based Graph Convolutional Neural Network. 850-859 - Vladislav Dubrovenski, Erzhuo Chen, Dianxiang Xu:

SMT-Based Verification of NGAC Policies. 860-869 - Luxi Fan, Zheng Li, Hengyuan Liu

, Paul Doyle
, Haifeng Wang, Xiang Chen, Yong Liu:
SGS: Mutant Reduction for Higher-order Mutation-based Fault Localization. 870-875 - Yunhe Feng, Sreecharan Vanam, Manasa Cherukupally, Weijian Zheng, Meikang Qiu, Haihua Chen

:
Investigating Code Generation Performance of ChatGPT with Crowdsourcing Social Data. 876-885 - Bangfu Liu, Zheng Li, Ruilian Zhao, Ying Shang:

A Self-attention Agent of Reinforcement Learning in Continuous Integration Testing. 886-891 - Shifan Liu, Zhanqi Cui, Xiang Chen, Jun Yang, Li Li, Liwei Zheng:

TBCUP: A Transformer-based Code Comments Updating Approach. 892-897 - Tanjila Kanij, Xiaojiao Du, John C. Grundy, Anuradha Madugalla, Devi Karolita

:
An Approach to Generating Diverse Personas for Children and the Elderly for Software Development. 898-903 - Yuandou Wang, Nikita Janse, Riccardo Bianchi, Spiros Koulouzis

, Zhiming Zhao:
Towards a Service-based Adaptable Data Layer for Cloud Workflows. 904-911 - Lin Miao, Dave Towey

, Yingrui Ma, Tsong Yueh Chen
, Zhi Quan Zhou:
Exploring Metamorphic Testing for Fake-News Detection Software: A Case Study. 912-923 - Stian Hagbø Olsen, T. J. OConnor:

Toward a Labeled Dataset of IoT Malware Features. 924-933 - Saki Takano, Akihiro Nakao, Saneyasu Yamaguchi, Masato Oguchi:

Secure Feedback to Edge Servers in Distributed Machine Learning Using Rich Clients. 934-939 - Hayato Sato, Hiroshi Inamura

, Shigemi Ishida, Yoshitaka Nakamura:
Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification. 940-945 - Elanor Jackson, Sahra Sedigh Sarvestani

:
Securing the Transportation of Tomorrow: Enabling Self-Healing Intelligent Transportation. 946-949 - Han Nay Aung, Keita Goto, Hiroyuki Ohsaki:

Modeling MultiPath TCP for Control Parameter Tuning. 950-953 - Shuvo Bardhan:

Survivability Model of Networks using Attack Graphs and Markov Chains. 954-957 - Jacob McCalip, Mandil Pradhan, Kecheng Yang:

Reinforcement Learning Approaches for Racing and Object Avoidance on AWS DeepRacer. 958-961 - Nobuki Aoki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:

A Metaverse Object Management Method Based on Visible Areas Using Geographical Overlay Networks. 962-965 - Yuxuan Liu, Geming Xia, Jian Chen, Danlei Zhang:

Graph Attention Network Reinforcement Learning Based Computation Offloading in Multi-Access Edge Computing. 966-969 - Ryohei Banno:

Performance Evaluation of MQTT Communication with Heterogeneous Traffic. 970-971 - Essa Imhmed

, Edgar Eduardo Ceh-Varela, Jonathan E. Cook, Caleb Parten:
Evaluation of the Performance Impact of SPM Allocation on a Novel Scratchpad Memory. 972-973 - Sandeep Reddivari

, James Orr, Reyansh Reddy:
Blockchain-Oriented Software Testing: A Preliminary Literature Review. 974-975 - Etienne Gael Tajeuna, Ahmed F. M. Fahmy, Mohamed Bouguessa:

Modeling Time-Varying User Attitudes in Social Media. 976-977 - Ahmad Rajeh Saifan, Mohannad Eid AbuRuz, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu

, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh
, Mohamad Qasim Alshabi, Ahmed Hossain
:
Telehealth in Cardiovascular Diseases: Reflections on Its Usability in the Jordanian Context. 978-980 - Ryo Nakamura:

A Preliminary Study on Random Walk based Similar Contents Discovery. 981-982 - Edgar Eduardo Ceh-Varela, Essa Imhmed

:
Uncovering Water Research with Natural Language Processing. 983-984 - Yong Jin, Masahiko Tomoishi:

A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. 985-986 - Sze Chit Au, Jacky Wai Keung

:
New Technique for Stock Trend Analysis - Volume-weighted Squared Moving Average Convergence & Divergence. 987-988 - Hika Workneh, Sandeep Reddivari

:
A Machine Learning based Traceability Links Classification: A Preliminary Investigation. 989-990 - Yong Shi, Nazmus Sakib, Hossain Shahriar, Dan Lo, Hongmei Chi, Kai Qian:

AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future. 991-992 - Heba Hesham Hijazi, Reem Mohd Alotaibi, Zenah Maher Alzaben, Amina Al-Marzouqi, Nabeel Al-Yateem, Muhammad Arsyad Subu

, Fatma Refaat Ahmed, Mohammad Al-Shabi, Mohammad Yousef Alkhawaldeh
, Syed Azizur Rahman, Ahmed Hossain
:
Virtual Learning and Pervasiveness of Depression Among University Students in the UAE. 993-995 - Seonghan Ryu:

Deep Learning based Security Enhancement of Wireless Connectivity. 996-997 - Jumpei Sakamoto, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Goshi Sato, Kenichi Takizawa:

Improvement of TCP Performance based on Characteristics of Private LoRa Interface. 998-999 - Nariyoshi Yamai, Yong Jin, Toshio Murakami, Rei Nakagawa:

Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers. 1000-1001 - Sandeep Reddivari

, Kaihua Liu, Reyansh Reddy:
VA4SM: A Visual Analytics Tool for Software Maintenance. 1002-1003 - Taeyoung Kim, Jihyun Lee, Sungwon Kang:

Extracting Common and Variable Code using the LCS Algorithm for Migration to SPLE. 1004-1005 - Renju Akashi, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Myung J. Lee:

Experimental Evaluation of Transmission Control Method based on Received Signal Strength for Spatio-Temporal Data Retention ∗. 1006-1007 - Kumi Jinzenji, Akio Jin:

Simple measurement of customer-oriented QCD for improving business agility. 1008-1009 - Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. 1010-1012 - Abdullah Al Farooq, Zac Taylor, Kyle Ruona, Thomas Moyer:

Defeasible-PROV: Conflict Resolution in Smart Building Devices. 1013-1014 - Zhaoran Wang, Xiangyu Bai, Yu Han:

Deep Learning for Regional Subsidence Crisis Prediction in Smart Grid Infrastructure. 1015-1016 - Norihiro Okui

, Yusuke Akimoto, Ayumu Kubota, Takuya Yoshida:
A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data. 1017-1018 - Yongju Lee, Hongzhou Duan, Yuxiang Sun:

Semantically Enabled Content Convergence System for Large Scale RDF Big Data. 1019-1020 - Samaneh Mohammadi, Sima Sinaei, Ali Balador, Francesco Flammini

:
Optimized Paillier Homomorphic Encryption in Federated Learning for Speech Emotion Recognition. 1021-1022 - Alessandro Aliberti

, Yao Xin, Alessio Viticchié, Enrico Macii, Edoardo Patti:
Comparative analysis of neural networks techniques to forecast Airfare Prices. 1023-1029 - Alfredo Cuzzocrea, Qudrat E. Alahy Ratul, Islam Belmerabet, Edoardo Serra:

An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning Interpretability. 1030-1036 - Mst. Shapna Akter, Nova Ahmed, Hossain Shahriar:

Understanding Rural women's Experience in STEM and Non-STEM field in Bangladesh. 1037-1046 - Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad:

Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. 1047-1056 - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman

, Akond Rahman
, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. 1057-1063 - Min Sook Park

, Paramita Basak Upama, Adib Ahmed Anik, Sheikh Iqbal Ahamed, Jake Luo
, Shiyu Tian, Masud Rabbani, Hyungkyoung Oh
:
A Survey of Conversational Agents and Their Applications for Self-Management of Chronic Conditions. 1064-1075 - Paramita Basak Upama, Masud Rabbani, Kazi Shafiul Alam

, Lin He, Shiyu Tian, Mohammad Syam, Iysa Iqbal, Anushka Kolli, Hansika Kolli, Syeda Shefa, Bipasha Sobhani, Sheikh Iqbal Ahamed:
Predicting and Classifying Heart Rates Using Instantaneous Video Data. 1076-1083 - Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea:

Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks. 1084-1092 - Zulfiqar Ali Khan, Akbar Siami Namin:

Dynamic Analysis for Detection of Self-Destructive Smart Contracts. 1093-1100 - Tatsuya Sato, Taku Shimosawa, Nariyoshi Yamai:

BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems. 1101-1106 - Han Nay Aung, Hiroyuki Ohsaki:

On the Potential of Modern TCP Congestion Control Algorithms in Information-Centric Networking. 1107-1112 - Naoki Okuda, Kaori Maeda, Chisa Takano, Hideyuki Ichihara:

A Resource Estimation Method in Multi-Cloud Environment with a Model Based on a Repairable-Item Inventory System. 1113-1120 - Toshio Murakami, Kenta Shimabukuro, Nao Sato, Rei Nakagawa, Yong Jin, Nariyoshi Yamai:

Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers. 1121-1126 - Shohei Hiruta, Itaru Hosomi, Hirokazu Hasegawa, Hiroki Takakura:

Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption. 1127-1132 - Daisuke Sasaki, Hiroki Kashiwazaki, Mitsuhiro Osaki, Kazuma Nishiuchi, Ikuo Nakagawa, Shunsuke Kikuchi, Yutaka Kikuchi, Shintaro Hosoai, Hideki Takase:

Resource Allocation Methods among Server Clusters in a Resource Permeating Distributed Computing Platform for 5G Networks. 1133-1140 - Christophe Cérin, Denis Trystram, Tarek Menouer:

The EcoIndex metric, reviewed from the perspective of Data Science techniques. 1141-1146 - Yusuke Kanamori, Yusuke Yamasaki, Shintaro Hosoai, Hiroshi Nakamura

, Hideki Takase:
An asynchronous federated learning focusing on updated models for decentralized systems with a practical framework. 1147-1154 - Xiuxian Guan, Junming Wang, Zekai Sun, Zongyuan Zhang, Tianyang Duan, Shengliang Deng, Fangming Liu, Heming Cui:

New Problems in Active Sampling for Mobile Robotic Online Learning. 1155-1160 - Yuet-Yu Chan, Ka Chun Tang, Ka Kiu Mok, Henry C. B. Chan, Kenny Sing Hing Tang:

Hybrid Intelligence for Stock Market Analysis and Prediction. 1161-1166 - Daniel DeAlcala, Ignacio Serna, Aythami Morales

, Julian Fiérrez, Javier Ortega-Garcia:
Measuring Bias in AI Models: An Statistical Approach Introducing N-Sigma. 1167-1172 - Masayoshi Matsumoto, Sho Tsugawa:

On the Effectiveness of Features for Predicting User Churn in Reddit Communities. 1173-1178 - Entesar B. Talal, Zakariya A. Oraibi, Ali Wali:

Gait Recognition using Deep Residual Networks and Conditional Generative Adversarial Networks. 1179-1185 - Murat Pasa Uysal:

Toward a Method Engineering Framework for Project Management and Machine Learning. 1186-1190 - Fernando Martinez

, Yijun Zhao:
Integrating Multiple Visual Attention Mechanisms in Deep Neural Networks. 1191-1196 - Yijun Zhao, Zefan Du, Shengjian Xu, Yu Cheng, Jiachen Mu, Michael Ning:

Social Media, Market Sentiment and Meme Stocks. 1197-1202 - Tong Li, Lu Han:

Dealing with Explainability Requirements for Machine Learning Systems. 1203-1208 - Subhash Rajapaksha, Debbie Perouli:

Has the Social Robot Been Hacked? An Emotion Detection System with Distance-Range Parameters for Feature Selection. 1209-1214 - Ahmed A. Harby, Farhana H. Zulkernine:

A Comparative Analysis of Graph Neural Networks for Fake News Detection. 1215-1222 - Elie Neghawi, Zerui Wang, Jun Huang

, Yan Liu:
Linking Team-level and Organization-level Governance in Machine Learning Operations through Explainable AI and Responsible AI Connector. 1223-1230 - Sugawara Yusei, Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Kaito Hosono, Hirotsugu Kinoshita:

CNN-based perceptual hashing scheme for image groups suitable for security systems. 1231-1236 - Jay Dave, Nikumani Choudhury, Utkarsh Tiwari, Samyu Kamtam, Kudapa Sai Rohith:

Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things. 1237-1242 - Sultan Almansoori, Mohamed Alzaabi, Mohammed Alrayssi, Deepak Puthal, Joy Dutta

, Aamna Al Shehhi:
Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain Storage. 1243-1248 - Yasuaki Kobayashi, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:

A Process Reduction Method for Spatial Information in Real-Time AR Snow Visualization Systems. 1249-1254 - Masahiro Kozuka, Yasuo Okabe:

A Policy-Based Path Selection Mechanism in QUIC Multipath Extension. 1255-1259 - Takuya Watanabe, Yoshiaki Terashima, Ryozo Kiyohara:

Standing Human Detection Method Using 2D-LiDARs. 1260-1265 - Sora Okamoto, Tomoya Kawakami:

A Message Reduction Method Based on Geographical Information in Initiative-Evacuation Induction Using Social Graphs. 1266-1271 - Chandranil Chakraborttii

, Jonas Boettner
:
Leveraging Temporality of Data to Improve Failure Predictions for Solid State Drives in Data Centers. 1272-1278 - Hayato Fukatsu, Tomoya Kawakami, Yoshimi Kawamoto:

A GA-Based Safe Route Recommendation Method Based on Driver Characteristics. 1279-1284 - Nobuhiro Kobayashi:

Zero Trust Security Framework for IoT Actuators. 1285-1292 - T. J. OConnor, Dylan Jessee, Daniel Campos:

Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices. 1293-1298 - Toru Kobayashi, Atsushi Isozaki, Kazuki Fukae, Kenichi Arai, Daiki Togawa, Masahide Nakamura:

LINE Metaverse for elderly people. 1299-1302 - Denish Omondi Otieno, Akbar Siami Namin, Keith S. Jones:

The Application of the BERT Transformer Model for Phishing Email Classification. 1303-1310 - Bipin Chhetri, Saroj Gopali

, Rukayat Olapojoye, Samin Dehbashi, Akbar Siami Namin:
A Survey on Blockchain-Based Federated Learning and Data Privacy. 1311-1318 - Karima Boutalbi, Faiza Loukil, Hervé Verjus, David Telisson, Kavé Salamatian:

Machine Learning for Text Anomaly Detection: A Systematic Review. 1319-1324 - Anifat M. Olawoyin

, Carson K. Leung, Alfredo Cuzzocrea:
Evolution of Big Data Models from Hierarchical Models to Knowledge Graphs. 1325-1330 - Anifat M. Olawoyin

, Carson K. Leung, Alfredo Cuzzocrea:
Privacy Preservation of Big Spatio-Temporal Co-occurrence Data. 1331-1336 - Akif Quddus Khan

, Nikolay Nikolov
, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu:
Towards Graph-based Cloud Cost Modelling and Optimisation. 1337-1342 - Joy Dip Das

, Sulalitha Bowala, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran:
Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and Stocks. 1343-1348 - Md. Erfanul Hoque

, Sulalitha Bowala, Alex Paseka, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram:
Fuzzy Option Pricing for Jump Diffusion Model using Neuro Volatility Models. 1349-1354 - You Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Sulalitha Bowala, Juan Liyau:

A Novel Fading-Memory Filter Multiple Trading Strategy with Data-Driven Innovation Volatility. 1355-1362 - Japjeet Singh, Ruppa K. Thulasiram, Aerambamoorthy Thavaneswaran, Alex Paseka:

Comparison of Trading Strategies: Dual Momentum vs Pairs Trading. 1363-1369 - Jiacheng Wang, Wenzheng Liu, Yifei Kou, Dicheng Xiao, Xiaofeng Wang, Xiaoyong Tang:

Approx-SMOTE Federated Learning Credit Card Fraud Detection System. 1370-1375 - Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani, Peter Nimbe:

Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and Indonesia. 1376-1382 - Nida Nasir

, Mohammad Al-Shabi, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu
, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh
, Ahmad Rajeh Saifan, Mohannad Eid AbuRuz:
Review of Machine Learning Advancements for Single-Cell Analysis. 1383-1387 - Abm. Adnan Azmee, Manohar Murikipudi, Md Abdullah Al Hafiz Khan, Yong Pei:

Sentence Level Analysis for Detecting Mental Health Causes Using Social Media Posts. 1388-1393 - Suhartini Ismail

, Muhammad Arsyad Subu
, Nabeel Al-Yateem, Mohammad Yousef Alkhawaldeh
, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Syed Azizur Rahman:
Using robotic technology in intensive care units: A qualitative exploration of nurses' perspective in Indonesia. 1394-1397 - Martin Brown

, Md Abdullah Al Hafiz Khan, Dominic Thomas
, Yong Pei, Monica Nandan
:
Detection of Behavioral Health Cases from Sensitive Police Officer Narratives. 1398-1403 - Ahmed Hossain

, Md. Aminul Islam, Anika Tasneem Chowdhury, Syed Azizur Rahman, Alounoud Salman, Jacqueline Maria Dias, Muhammad Arsyad Subu
, Mohammad Yousef Alkhawaldeh
, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Nabeel Al-Yateem:
Positive Perception of Self-Medication Practice and Cyberchondria Behavior Among Adults in Bangladesh. 1404-1407 - Muhammad Arsyad Subu

, Mohammad Yousef Alkhawaldeh
, Fatma Refaat Ahmed, Nabeel Al-Yateem, Jacqueline Maria Dias, Syed Azizur Rahman, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain
:
Smartphone Addiction and Mental Health Wellbeing Among Indonesian Adolescents. 1408-1411 - Bilash Saha, Md Saiful Islam, A. B. M. Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha:

BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care. 1412-1417 - Mohammad Yousef Alkhawaldeh

, Muhammad Arsyad Subu
, Nabeel Al-Yateem, Syed Azizur Rahman, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain
:
Telehealth for obstetrics and gynecology outpatinets: Improving patients' experiences during the COVID-19 pandemic. 1418-1422 - Masrura Tasnim, Arleen Joy Patinga, Hossain Shahriar, Sweta Sneha:

Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability Act. 1423-1428 - Nida Nasir

, Mohammad Al-Shabi, Nabeel Al-Yateem, Syed Azizur Rahman, Muhammad Arsyad Subu
, Heba Hesham Hijazi, Fatma Refaat Ahmed, Jacqueline Maria Dias, Amina Al-Marzouqi, Mohammad Yousef Alkhawaldeh
, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan:
Challenges of Artificial Intelligence in Medicine. 1429-1433 - Gabriele Gatti

, Cataldo Basile, Guido Perboli
:
An expert system for automatic cyber risk assessment and its AI-based improvements. 1434-1440 - Yuri Lucas Direbieski, Hiroki Tanioka, Kenji Matsuura, Hironori Takeuchi, Masahiko Sano, Tetsushi Ueta:

Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem. 1441-1446 - Dhiraj Ganji, Chandranil Chakraborttii

:
Towards data generation to alleviate privacy concerns for cybersecurity applications. 1447-1452 - Valeria Lukaj, Alessio Catalfamo, Maria Fazio, Antonio Celesti, Massimo Villari:

Optimized NLP Models for Digital Twins in Metaverse. 1453-1458 - Martin Molan

, Junaid Ahmed Khan
, Andrea Bartolini, Roberta Turra
, Giorgio Pedrazzi
, Michael Cochez, Alexandru Iosup, Dumitru Roman, Joze M. Rozanec, Ana Lucia Varbanescu, Radu Prodan:
The Graph-Massivizer Approach Toward a European Sustainable Data Center Digital Twin. 1459-1464 - Yukun Fu, Yue Li

:
Hanfu AR: Digital Twins of Traditional Chinese Costumes for Augmented Reality Try-On Systems. 1465-1470 - Aytug Turkmen, Özgü Can

:
An Improved Data Management Approach for IoT-Enabled Smart Healthcare: Integrating Semantic Web and Reinforcement Learning. 1471-1475 - Samuel S. Silva, Cátia Azevedo, Ana Rita Valente

, Ana Patrícia Rocha, Marisa Lousada, Luciana Albuquerque, António J. S. Teixeira
:
Aphluentia: Supporting Communication for People with Fluent Aphasia. 1476-1481 - Erika Sugita, Ryosuke Abe

, Shigeya Suzuki, Keisuke Uehara, Osamu Nakamura:
A System for Selective Disclosure of Information about a Patient with Intractable Disease. 1482-1487 - Silvio Meneguzzo

, Alfredo Favenza, Valentina Gatteschi, Claudio Schifanella:
Exploring the Potential of Energy Data Marketplaces: an Approach based on the Ocean Protocol. 1488-1494 - Rafael Natalio Fontana Crespo

, Alessandro Aliberti
, Lorenzo Bottaccioli, Enrico Macii, Giorgio Fighera, Edoardo Patti:
LSTM for Grid Power Forecasting in Short-Term from Wave Energy Converters. 1495-1500 - Raimondo Gallo, Alessandro Aliberti

, Edoardo Patti, Gianluca Bussolo, Marco Zampolli, Rémi Jacques Philibert Jaboeuf, Paolo Tosco:
An Electric Vehicle Simulator for Realistic Battery Signals Generation from Data-sheet and Real-world Data. 1501-1506 - Wen-Bo Cui, Wenai Song, Zi-Tong Pei, Yi Lei, Qing Wang, Yan-Jie Chen, Ji-Jiang Yang:

Study on Assessment Methods of Developmental Coordination Disorder in Children. 1507-1512 - Yi Lei, Han Qin, Xiaodan Li, Qing Wang, Lin Zang, Jun Tai, Ji-Jiang Yang:

A Strategy for Aided Diagnosis of Obstructive Sleep Apnea in Children Based on Graph Neural Network. 1513-1518 - Manohar Murikipudi, Abm. Adnan Azmee, Md Abdullah Al Hafiz Khan, Yong Pei:

CMTN: A Convolutional Multi-Level Transformer to Identify Suicidal Behaviors Using Clinical Notes. 1519-1524 - Hongliang Liu, Zhiyu Chen, Miao Yu, Wenbo Cui, Lin Zang, Wei Ren, Yongfang Hou:

Evaluation of the Relevance of Adverse Drug Reactions Based on ERNIE-DPCNN. 1525-1529 - Paramita Basak Upama, Maria Valero, Hossain Shahriar, Mohammad Syam, Sheikh Iqbal Ahamed:

Mental Health Analysis During Pandemic: A Survey of Detection and Treatment. 1530-1538 - Giulia Varriano

, Valeria Sorgente, Francesco Mercaldo, Antonella Santone, Luca Brunese:
Computational cost of CT Radiomics workflow: a case study on COVID-19. 1539-1544 - Paramita Basak Upama, Anushka Kolli, Hansika Kolli, Subarna Alam, Mohammad Syam, Hossain Shahriar, Sheikh Iqbal Ahamed:

Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilities. 1545-1551 - Kei Oshio, Satoshi Takada, Tianxiang He, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi:

Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering. 1552-1557 - Haruka Nakajima Suzuki

, Midori Inaba:
Psychological Study on Judgment and Sharing of Online Disinformation. 1558-1563 - Álvaro Becerra

, Roberto Daza, Ruth Cobos
, Aythami Morales
, Mutlu Cukurova
, Julian Fiérrez:
M2LADS: A System for Generating MultiModal Learning Analytics Dashboards. 1564-1569 - Ciara Breathnach, Rachel Murphy, Alexander Schieweck, Enda O'Shea, Stuart Clancy, Tiziana Margaria:

Curating History Datasets and Training Materials as OER: An Experience. 1570-1575 - Florenc Demrozi

, Marina Marchisio, Tiziana Margaria, Matteo Sacchet:
Experiences from the first delivery of a new immersive software engineering course: mathematical foundations and data analytics. 1576-1581 - Hüseyin Yapici, Hasan Sözer:

Coevolution Index: A Metric for Tracking Evolutionary Coupling. 1582-1587 - Yu Yang, Lu Wang, Na Cha, Hua Li:

A Test Case Prioritization Based on Genetic Algorithm With Ant Colony and Reinforcement Learning Improvement. 1588-1593 - Thomas McGill, Oluwaseun Bamgboye, Xiaodong Liu, Chathuranga Sampath Kalutharage

:
Towards Improving Accessibility of Web Auditing with Google Lighthouse. 1594-1599 - Virginia Niculescu, Cristina-Claudia Osman

, Camelia Chisalita-Cretu, Adrian Sterca:
Business Process Representation Analysis in the RPA Context. 1600-1606 - Shinpei Hayashi, Teppei Kato, Motoshi Saeki:

Locating Procedural Steps in Source Code. 1607-1612 - Qi Jing, Lian Yu, Lei Zhang, Jie Meng, Zheng Liu, Haolin Xue:

Classifying Packages for Building Linux Distributions. 1613-1618 - Masanari Kondo, Shinobu Saito

, Yukako Iimura, Eunjong Choi, Osamu Mizuno, Yasutaka Kamei, Naoyasu Ubayashi:
Towards Better Online Communication for Future Software Development in Industry. 1619-1624 - João Araújo

, Armanda Rodrigues
, Inês Menezes:
A Catalog for Historical Soundscapes Requirements. 1625-1632 - Daniel Knight, Stephen Torri

, Tanmay Bhowmik:
A Preliminary Critical Review of the Impact of Three Popular Development Practices on Source Code Maintainability. 1633-1637 - Mike Mannion

, Hermann Kaindl
:
Determining the Relative Importance of Features for Influencing Software Product Similarity Matching. 1638-1645 - Tjasa Hericko

, Bostjan Sumak:
Commit Classification Into Software Maintenance Activities: A Systematic Literature Review. 1646-1651 - Alessio Rugo, Claudio Agostino Ardagna

:
Transparency-based reconnaissance for APT attacks. 1652-1657 - Yassine Belkhouche:

API-based features representation fusion for malware classification. 1658-1662 - Maximilian Richter, Magdalena Bertram, Jasper Seidensticker, Marian Margraf:

Cryptographic Requirements of Verifiable Credentials for Digital Identification Documents. 1663-1668 - Luis Felipe Gomez-Gomez, Julian Fiérrez, Aythami Morales

, Mahdi Ghafourian, Ruben Tolosana
, Imanol Solano, Alejandro Garcia, Francisco Zamora-Martínez:
PAD-Phys: Exploiting Physiology for Presentation Attack Detection in Face Biometrics. 1669-1674 - An Cao, Jie Xiang Fan

, Akash Saggar, Kunj Dave, Sharan Sharabinth, Jiten Verma, Dulaji Hidellaarachchi, John C. Grundy:
Motive Metrics: A Jira Plug-In for Personality, Motivation and Performance Tracking. 1675-1682 - Sayeda Farzana Aktar, Mason Dennis Drake, Kazi Shafiul Alam

, Laryn Michele O'Donnell, Shiyu Tian, Roger O. Smith, Sheikh Iqbal Ahamed:
Mobile Application-Based Solution for Building Accessibility Assessment for Comprehensive and Personalized Assessment. 1683-1690 - François Siewe:

Towards the Formal Analysis of UML Activity Diagrams in a Calculus of Context-aware Ambients. 1691-1696 - Fahad Alotaibi, Thai Son Hoang

, Michael J. Butler
:
A Rigorous Iterative Analysis Approach for Capturing the Safety Requirements of Self-Driving Vehicle Systems. 1697-1702 - Mehul Warade, Kevin Lee

, Chathurika Ranaweera, Jean-Guy Schneider:
Monitoring the Energy Consumption of Docker Containers. 1703-1710 - Danning Shen, Wenhao Zhu, Yujie Ding, Chenyun Liu:

A User Behaviour-Based Video Segmentation Strategy for High-Concurrency Environment. 1711-1716 - Nicholas Chong, Emmanuel Chu, Adrian Nadonza, Sienna Marie Rodriguez, Sothearith Tith, Jin Shan, John C. Grundy, Yi Wang, Ben Cheng, Thuong Hoang:

An Empathetic Approach to Human-Centric Requirements Engineering Using Virtual Reality. 1717-1724 - Federico D'Antoni

, Martina Bertazzoni, Luca Vollero, Mario Merone
:
Identification of the Optimal Meal Detection Strategy for Adults, Adolescents, and Children with Type 1 Diabetes: an in Silico Validation. 1725-1730 - Panagiotis Kasnesis, Lazaros Toumanidis

, Alessio Burrello, Christos Chatzigeorgiou
, Charalampos Z. Patrikakis:
Feature-Level Cross-Attentional PPG and Motion Signal Fusion for Heart Rate Estimation. 1731-1736 - Reina Sasaki, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:

Development and Evaluation of IoT System Consisting of ROS-based Robot, Edge and Cloud. 1737-1744 - Maria Elena Bruni, Giacomo Masali, Guido Perboli

:
The effect of COVID-19 on the economic systems: evidence from the Italian case. 1745-1749 - Itsuki Matsunaga, Yuto Kosugi, Hangli Ge

, Takashi Michikata, Noboru Koshizuka:
Improving Long-Term Traffic Prediction with Online Search Log Data. 1750-1755 - Maria Elena Bruni, Vittorio Capocasale, Marco Costantino, Stefano Musso, Guido Perboli

:
Decentralizing Electric Vehicle Supply Chains: Value Proposition and System Design. 1756-1761 - Maria Elena Bruni, Valeria Lazzaroli, Guido Perboli

, Chiara Vandoni
:
Machine Learning to Forecast Rainfall Intensity. 1762-1767 - Matthew Siu-Hin Tang, T. H. Tse

, Zhi Quan Zhou:
Detecting Hidden Failures of DBMS: A Comprehensive Metamorphic Relation Output Patterns Approach. 1768-1773 - Dave Towey

, Zepei Luo, Ziqi Zheng, Peijian Zhou, Junbo Yang, Puttipatt Ingkasit, Changyang Lao, Matthew Pike
, Yifan Zhang
:
Metamorphic Testing of an Automated Parking System: An Experience Report. 1774-1779 - Yifan Zhang

, Dave Towey
, Matthew Pike
:
Automated Metamorphic-Relation Generation with ChatGPT: An Experience Report. 1780-1785 - Injae Cho, Dave Towey

, Pushpendu Kar:
Using Obfuscators to Test Compilers: A Metamorphic Experience. 1786-1791 - Zexing Chang, Yong Liu, Shumei Wu, Paul Doyle, Haifeng Wang, Xiang Chen:

Improving Fault Localization by Complex-Fault Oriented Higher-Order Mutant Generation. 1792-1797 - Nitin Sai Bommi, Atul Negi:

A Standard Baseline for Software Defect Prediction: Using Machine Learning and Explainable AI. 1798-1803 - Tengfei Li, Junfeng Sun, Xinjun Lv, Xiang Chen, Jing Liu, Haiying Sun:

Enhancing the Formal Verification of Train Control Systems based on Decomposition. 1804-1809 - Md. Abdur Rahman

, Hossain Shahriar, Victor Clincy, Md Faruque Hossain, Muhammad Asadur Rahman:
A Quantum Generative Adversarial Network-based Intrusion Detection System. 1810-1815 - Nafisa Anjum, Nazmus Sakib, Juan Rodriguez Cardenas, Corey Brookins, Ava Norouzinia, Asia Shavers, Miranda Dominguez, Marie Nassif, Hossain Shahriar:

Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks. 1816-1821 - Bilash Saha, Sharaban Tahora, Abdul Barek, Hossain Shahriar:

HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps. 1822-1827 - Emanuele Antonio Napoli

, Valentina Gatteschi:
Evaluating ChatGPT for Smart Contracts Vulnerability Correction. 1828-1833 - Md. Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, Hossain Shahriar, Fan Wu:

Security Risk and Attacks in AI: A Survey of Security and Privacy. 1834-1839 - Md Arabin Islam Talukder

, Sumaiya Farzana Mishu, Hossain Shahriar, ABM Kamrul Islam Riad
, Fan Wu, Akond Rahman
:
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow. 1840-1845 - Shufan Ming, Haohan Wang:

Self-learning for Annotating Website Privacy Policies at Scale. 1846-1851 - Marco Aldinucci, Robert Birke, Antonio Brogi

, Emanuele Carlini, Massimo Coppola, Marco Danelutto, Patrizio Dazzi
, Luca Ferrucci
, Stefano Forti
, Hanna Kavalionak
, Gabriele Mencagli, Matteo Mordacchini
, Marcelo Pasin, Federica Paganelli, Massimo Torquati:
A Proposal for a Continuum-aware Programming Model: From Workflows to Services Autonomously Interacting in the Compute Continuum. 1852-1857 - Alberto Mulone

, Sherine Awad, Davide Chiarugi
, Marco Aldinucci:
Porting the Variant Calling Pipeline for NGS data in cloud-HPC environment. 1858-1863 - Doriana Medic, Marco Aldinucci:

Towards formal model for location aware workflows. 1864-1869 - Henri Casanova

, Kyle Berney, Serge Chastel, Rafael Ferreira da Silva
:
WfCommons: Data Collection and Runtime Experiments using Multiple Workflow Systems. 1870-1875 - Sofia Meacham:

Evaluation of Classification Algorithms Framework Domain-Specific Language: the case of finance-accounting domain. 1876-1877 - Motoyuki Ohmori:

Let's Block Encrypted Malicious Sites. 1878-1883 - Barbara Steffen:

Towards Unlocking Sustainability Potentials - Adoption and Diffusion of Digital Innovation. 1884-1889 - Andy Peruccon, Roisin Lyons

, Amalia de Götzen
, Tiziana Margaria, Luca Simeone
:
BC4ECO - Using Visual Tools for a Shared Understanding and Pedagogical Approach across an Interdisciplinary Consortium. 1890-1895 - Michela Apruzzese, Natalia Selini Hadjidimitriou, Elisa Pautasso, Matteo Falbo:

Connecting Data Providers with Data Consumers: the 5GMETA Data Monetisation Framework. 1896-1901 - Natalia Selini Hadjidimitriou, Giulia Renzi, Michela Apruzzese, Guido Perboli, Stefano Musso:

Identifying 5G technology enablers in the maritime sector using survey and Twitter data. 1897-1902 - Shota Inoue, Han Nay Aung, Keita Goto, Soma Yamamoto, Hiroyuki Ohsaki:

Study on Performance Bottleneck of Flow-Level Information-Centric Network Simulator. 1908-1911

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














