


default search action
34th SAC 2019: Limassol, Cyprus
- Chih-Cheng Hung, George A. Papadopoulos:

Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019. ACM 2019, ISBN 978-1-4503-5933-7
Theme: AI and agents: BIO - Bioinformatics track
- Souad Bouasker, Sadok Ben Yahia

, Gayo Diallo
:
An insight into biological datamining based on rarity and correlation as constraints. 3-10 - Sameh K. Mohamed, Aayah Nounu, Vít Novácek:

Drug target discovery using knowledge graph embeddings. 11-18 - Aliasghar Shahrjooihaghighi, Hichem Frigui, Xiang Zhang, Xiaoli Wei, Biyun Shi, Craig J. McClain:

Ensemble feature selection for biomarker discovery in mass spectrometry-based metabolomics. 19-24 - Ameni Trabelsi, Biyun Shi, Xiaoli Wei, Hichem Frigui, Xiang Zhang, Craig McClain, Aliasghar Shahrjooihaghighi:

Molecule specific normalization for protein and metabolite biomarker discovery. 25-31
Theme: Software design and development: BPMEA - Business process management & enterprise architecture track
- Marco Comuzzi, Alfonso E. Márquez Chamorro, Manuel Resinas:

A hybrid reliability metric for SLA predictive monitoring. 32-39 - Johann Eder

, Marco Franceschetti
, Julius Köpke:
Controllability of business processes with temporal variables. 40-47 - Guangming Li, Renata Medeiros de Carvalho, Wil M. P. van der Aalst

:
Object-centric behavioral constraint models: a hybrid model for behavioral and data perspectives. 48-56 - Alessandro Terragni, Marwan Hassani

:
Optimizing customer journey using process mining and sequence-aware recommendation. 57-65 - Konrad Schneid

, Claus A. Usener, Sebastian Thöne, Herbert Kuchen, Christian Tophinke:
Static analysis of BPMN-based process-driven applications. 66-74 - Sheila Katherine Venero

, Júlio Cesar dos Reis, Leonardo Montecchi
, Cecília Mary Fischer Rubira
:
Towards a metamodel for supporting decisions in knowledge-intensive processes. 75-84 - Mohammad Javad Amiri

, Divyakant Agrawal:
VIEW: an incremental approach to verify evolving workflows. 85-93
Theme: Software design and development: BPMEA - Business process management & enterprise architecture track: Poster papers
- Stefan Schönig

, Claudio Di Ciccio
, Jan Mendling:
Configuring SQL-based process mining for performance and storage optimisation. 94-97 - Elena Gómez-Martínez, Francisco J. Pérez-Blanco

, Juan de Lara, Juan Manuel Vara, Esperanza Marcos
:
Formal support of process chain networks using model-driven engineering and Petri nets. 98-100 - Diana Jlailaty, Daniela Grigori, Khalid Belhajjame:

On the elicitation and annotation of business activities based on emails. 101-103
Theme: Distributed systems: CC - Cloud computing track
- Alfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava

:
A programming model and middleware for high throughput serverless computing applications. 106-113 - Tianyu Gao, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Ruxia Li, Mingrui Xu:

Minimizing financial cost of scientific workflows under deadline constraints in multi-cloud environments. 114-121 - Ojus Thomas Lee, Vijay Sharma, S. D. Madhu Kumar

, Priya Chandran
:
Modelling multi level consistency in erasure code based storage systems. 122-129 - Sergio Mendes, José Simão, Luís Veiga

:
Oversubscribing micro-clouds with energy-aware containers scheduling. 130-137 - Gabriel P. Fernandez, Andrey Brito:

Secure container orchestration in the cloud: policies and implementation. 138-145 - Antonis Michalas

:
The lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharing. 146-155
Theme: Distributed systems: CC - Cloud computing track: Poster papers
- Eddy Truyen, Dimitri Van Landuyt

, Bert Lagaisse
, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. 156-159 - Merlin George

, Anu Mary Chacko, Sudeep Koshy Kurien, Naseer Ali:
Diabetes care in cloud - research challenges. 160-162
Theme: Distributed systems: CCNIV - communication, computing and networking in internet of vehicles track
- Philip Wendland, Guenter Schaefer, Reiner S. Thomä:

An application-oriented evaluation of LTE-V's mode 4 for V2V communication. 165-173 - Dimitrios Mbakoyiannis, Othon Tomoutzoglou

, George Kornaros
:
Secure over-the-air firmware updating for automotive electronic control units. 174-181 - Salman Memon, Muthucumaru Maheswaran:

Using machine learning for handover optimization in vehicular fog computing. 182-190
Theme: Distributed systems: CCNIV - communication, computing and networking in internet of vehicles track: Poster papers
- Lukás Chrpa, Mauro Vallati

, Simon Parkinson
:
Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks. 191-194
Theme: AI and agents: CIVIA - Computational intelligence and video & image analysis track
- Zackary P. T. Sin

, Peter H. F. Ng, Simon C. K. Shiu, Fu-Lai Chung, Hong Va Leong:
2D character animating networks: bringing static characters to move via motion transfer. 196-203 - Willian Tessaro Lunardi

, Holger Voos
, Luiz Henrique Cherri
:
An effective hybrid imperialist competitive algorithm and tabu search for an extended flexible job shop scheduling problem. 204-211 - Ravi Bansal, Sandip Chakraborty:

Visual content based video retrieval on natural language queries. 212-219
Theme: AI and agents: COMBI - Advances in COMputational biomedical imaging track
- Jonathan S. Ramos, Carolina Yukari Veludo Watanabe

, Marcello H. Nogueira-Barbosa
, Agma J. M. Traina:
BGrowth: an efficient approach for the segmentation of vertebral compression fractures in magnetic resonance imaging. 220-227
Theme: System software and security: CPS - Cyber-physical systems track
- Shashank Gaur

, Luís Almeida
, Eduardo Tovar
:
AdaptC: programming adaptation policies for WSN applications. 229-235 - Yixin Li, Jinyu Zhan

, Wei Jiang, Jiayu Yu:
Energy optimization of branch-aware data variable allocation on hybrid SRAM+NVM SPM for CPS. 236-241 - Qi Li

, Aosong Deng, Congming Gao, Yu Liang
, Liang Shi, Edwin Hsing-Mean Sha:
Optimizing fragmentation and segment cleaning for CPS based storage devices. 242-249 - Yajuan Du, Wei Liu, Yu Zhu, Meng Zhang:

United SSD block cleaning via constrained victim block selection. 250-257
Theme: System software and security: CPS - Cyber-physical systems track: Poster papers
- James Coleman, Sara Almalih, Alexander Slota, Yann-Hang Lee:

Emerging COTS architecture support for real-time TSN ethernet. 258-265
Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track
- Paola Martins Pereira, Fernando Luís Dotti

, Cristina Meinhardt
, Odorico Machado Mendizabal
:
A library for services transparent replication. 268-275 - João Marçal, Luís E. T. Rodrigues, Miguel Matos:

Adaptive information dissemination in the Bitcoin network. 276-283 - Subir Halder, Mauro Conti

:
Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem. 284-291 - Mohammad Rafiuzzaman, Julien Gascon-Samson, Karthik Pattabiraman, Sathish Gopalakrishnan:

Failure prediction in the internet of things due to memory exhaustion. 292-301 - Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci Piergiovanni:

Scalable lightning factories for Bitcoin. 302-309 - Richard Gil Martinez, Antónia Lopes

, Luís E. T. Rodrigues:
Planning workflow executions when using spot instances in the cloud. 310-317 - Filipe Falcão, Tommaso Zoppi

, Caio Barbosa Viera Silva, Anderson Santos, Baldoino Fonseca, Andrea Ceccarelli
, Andrea Bondavalli
:
Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection. 318-327 - Kobe Vrancken, Frank Piessens, Raoul Strackx:

Securely deploying distributed computation systems on peer-to-peer networks. 328-337
Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track: Poster papers
- Racin Nygaard, Hein Meling, Leander Jehl

:
Distributed storage system based on permissioned blockchain. 338-340 - Martin Grambow, Jonathan Hasenburg

, Tobias Pfandzelter
, David Bermbach:
Is it safe to dockerize my database benchmark? 341-344
Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track
- Vincent Reniers, Dimitri Van Landuyt

, Paolo Viviani
, Bert Lagaisse
, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. 346-354 - Dijiang Huang

, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. 355-363 - Mourad el Maouchi, Oguzhan Ersoy, Zekeriya Erkin

:
DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain. 364-373 - Krishnendu Chatterjee, Amir Kafshdar Goharshady

, Arash Pourdamghani:
Hybrid mining: exploiting blockchain's computational power for distributed problem solving. 374-381 - Bjorn van der Laan, Oguzhan Ersoy, Zekeriya Erkin

:
MUSCLE: authenticated external data retrieval from multiple sources for smart contracts. 382-391 - Monika Di Angelo

, Alfred Soare, Gernot Salzer
:
Smart contracts in view of the civil code. 392-399 - Krishnendu Chatterjee, Amir Kafshdar Goharshady

, Ehsan Kafshdar Goharshady:
The treewidth of smart contracts. 400-408 - Pietro Corsi, Giovanni Lagorio, Marina Ribaudo:

TickEth, a ticketing system built on ethereum. 409-416
Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track: Poster papers
- Sebastian Geiger, Daniel Schall, Sebastian Meixner, Andreas Egger:

Process traceability in distributed manufacturing using blockchains. 417-420
Theme: Information systems: DBDM - Databases and big data management track
- Tiago Brasileiro Araújo

, Carlos Eduardo Santos Pires
, Demetrio Gomes Mestre, Thiago Pereira da Nóbrega, Dimas Cassimiro do Nascimento
, Kostas Stefanidis
:
A noise tolerant and schema-agnostic blocking technique for entity resolution. 422-430 - Ekaterina B. Dimitrova, Panos K. Chrysanthis

, Adam J. Lee
:
Authorization-aware optimization for multi-provider queries. 431-438 - Akrivi Vlachou, Christos Doulkeridis, Apostolos Glenis, Georgios M. Santipantakis, George A. Vouros

:
Efficient spatio-temporal RDF query processing in large dynamic knowledge bases. 439-447 - Panagiotis Moutafis

, Francisco García-García
, George Mavrommatis
, Michael Vassilakopoulos
, Antonio Corral
, Luis Iribarne
:
MapReduce algorithms for the K group nearest-neighbor query. 448-455 - Evandro Miguel Kuszera

, Letícia Mara Peres
, Marcos Didonet Del Fabro:
Toward RDB to NoSQL: transforming data with metamorfose framework. 456-463
Theme: Information systems: DBDM - Databases and big data management track: Poster papers
- Doyoung Kim, Won Gi Choi, Hanseung Sung, Sanghyun Park:

A scalable and persistent key-value store using non-volatile memory. 464-467 - Caetano Traina Jr.

, Andre Moriyama, Guilherme Muzzi da Rocha, Robson L. F. Cordeiro, Cristina Dutra de Aguiar Ciferri, Agma J. M. Traina:
The SimilarQL framework: similarity queries in plain SQL. 468-471
Theme: Information systems: DLHWB - Digital life for human well-being track
- Márcia Valéria Rodrigues Ferreira, Laura Sánchez García, André Luiz Pires Guedes

, Djanira Aparecida da Luz Veronez, Celia Regina Alves de Araújo Sandrini, Carlos Eduardo de Araujo:
Anatome: anatomy teaching and learning designed for all. 474-483 - Bruna C. R. Cunha

, Kamila R. H. Rodrigues
, Isabela Zaine, Leonardo F. Scalco, Caio César Viel, Maria da Graça Campos Pimentel:
Web-based authoring of multimedia intervention programs for mobile devices: a case study on elderly digital literacy. 484-491
Theme: Information systems: DM - Data mining track
- Stephen Pauwels, Toon Calders:

An anomaly detection technique for business processes based on extended dynamic bayesian networks. 494-501 - Khadidja Meguelati

, Benedicte Fontez, Nadine Hilgert, Florent Masseglia:
Dirichlet process mixture models made scalable and effective by means of massive distribution. 502-509 - Eliana Pastor

, Elena Baralis:
Explaining black box models by means of local rules. 510-517 - Hamed Sarvari, Carlotta Domeniconi, Giovanni Stilo

:
Graph-based selective outlier ensembles. 518-525 - Ari Rasch, Richard Schulze, Waldemar Gorus, Jan Hiller, Sebastian Bartholomäus, Sergei Gorlatch:

High-performance probabilistic record linkage via multi-dimensional homomorphisms. 526-533 - Masoud Reyhani Hamedani

, Sang-Wook Kim:
Pairwise normalization in SimRank variants: problem, solution, and evaluation. 534-541
Theme: Information systems: DM - Data mining track: Poster papers
- Rahmah Brnawy, Nematollaah Shiri:

K-mixed prototypes: a clustering algorithm for relational data with mixed attribute types. 542-545 - Chukwuma Ejieh, Christie I. Ezeife, Ritu Chaturvedi:

Mining product opinions with most frequent clusters of aspect terms. 546-549
Theme: Information systems: DM - Data mining track: Student research abstract
- Shaista Bibi:

Cryptocurrency world identification and public concerns detection via social media: student research abstract. 550-552 - Bushra Zaheer Abbasi:

Fuzzy-rule based approach for feature selection in text classification: student research abstract. 553-555
Theme: Information systems: DS - Data streams track
- Hela Sfar, Amel Bouzeghoub:

DataSeg: dynamic streaming sensor data segmentation for activity recognition. 557-563 - Christian Beyer

, Vishnu Unnikrishnan, Uli Niemann, Pawel Matuszyk, Eirini Ntoutsi, Myra Spiliopoulou:
Exploiting entity information for stream classification over a stream of reviews. 564-573 - Jean Paul Barddal

, Fabrício Enembreck
:
Learning regularized hoeffding trees from data streams. 574-581 - Rémi Géraud

, Marius Lombard-Platet, David Naccache:
Quotient hash tables: efficiently detecting duplicates in streaming data. 582-589
Theme: Information systems: DS - Data streams track: Poster papers
- Jean Antonio Pereira Karax, Andreia Malucelli, Jean Paul Barddal

:
Decision tree-based feature ranking in concept drifting data streams. 590-592 - Romaric Duvignau

, Vincenzo Gulisano
, Marina Papatriantafilou, Vladimir Savic:
Streaming piecewise linear approximation for efficient data management in edge computing. 593-596
Theme: System software and security: EMBS - Embedded systems track
- Shuo-Han Chen

, Yong-Ching Lin, Yuan-Hao Chang
, Ming-Chang Yang, Tseng-Yi Chen
, Hsin-Wen Wei, Wei-Kuan Shih:
A new sequential-write-constrained cache management to mitigate write amplification for SMR drives. 599-606 - Martin Schoeberl

, Benjamin Rouxel, Isabelle Puaut:
A time-predictable branch predictor. 607-616 - Timo Hönig, Benedict Herzog

, Wolfgang Schröder-Preikschat:
Energy-demand estimation of embedded devices using deep artificial neural networks. 617-624 - Jaume Abella

, Enrico Mezzetti
, Francisco J. Cazorla:
On assessing the viability of probabilistic scheduling with dependent tasks. 625-634 - Sheel Sindhu Manohar

, Hemangee K. Kapoor:
Refresh optimised embedded-dram caches based on zero data detection. 635-642
Theme: System software and security: EMBS - Embedded systems track: Poster papers
- Oana Hotescu, Katia Jaffrès-Runser

, Jean-Luc Scharbarg, Christian Fraboul:
Impact of source scheduling on end-to-end latencies in a QoS-aware avionics network. 643-646 - Robert J. Stewart

, Bernard Berthomieu, Paulo Garcia, Idris Ibrahim, Greg Michaelson, Andrew M. Wallace:
Graphical program transformations for embedded systems. 647-649
Theme: Information systems: GIA - GeoInformation analytics track
- Noudéhouénou Lionel Jaderne Houssou, Jean-Loup Guillaume, Armelle Prigent:

A graph based approach for functional urban areas delineation. 652-658 - Chidubem Iddianozie, Gavin McArdle

:
A transfer learning paradigm for spatial networks. 659-666 - Rocio Nahime Torres, Federico Milani

, Piero Fraternali:
Algorithms for mountain peaks discovery: a comparison. 667-674 - Didier Augusto Vega-Oliveros

, Moshé Cotacallapa, Leonardo Nascimento Ferreira, Marcos G. Quiles
, Liang Zhao, Elbert E. N. Macau
, Manoel F. Cardoso
:
From spatio-temporal data to chronological networks: an application to wildfire analysis. 675-682
Theme: Information systems: GIA - GeoInformation analytics track: Poster papers
- Roger Peralta-Aranibar, Cicero Augusto de Lara Pahins, João Luiz Dihl Comba, Erick Gomez Nieto

:
Similarity-based visual exploration of very large georeferenced multidimensional datasets. 683-686 - Laura Di Rocco, Davide Buscaldi, Michela Bertolotto

, Barbara Catania, Giovanna Guerrini:
The role of geographic knowledge in sub-city level geolocation. 687-689
Theme: AI and agents: HCI - Smart human computer interaction track
- Jun Wang, Eugene Yujun Fu

, Grace Ngai
, Hong Va Leong, Michael Xuelin Huang:
Detecting stress from mouse-gaze attraction. 692-700 - Changyeol Choi, Joohee Jun, Jiwoong Heo

, Kwanguk (Kenny) Kim:
Effects of virtual-avatar motion-synchrony levels on full-body interaction. 701-708 - (Withdrawn) Smart contract's interface for user centric business model in blockchain. 709-714

- Takafumi Higashi, Hideaki Kanai

:
Stylus knife: improving cutting skill in paper-cutting by implementing pressure control. 714-721
Theme: AI and agents: HCI - Smart human computer interaction track: Student research abstract
- Waqas Khawaja:

Towards textualising analytic provenance for visual analytics using natural language generation. 722-725 - Sadia Din

:
Human-enabled sustainable management of mobile cloud on 5G network: student research abstract. 726-727
Theme: Information systems: HI - Health informatics track
- Wan D. Bae, Matthew Horak, Shayma Alkobaisi

, Sehjeong Kim, Sada Narayanappa, Choon-Sik Park, Da Jeong Bae:
A two-step approach to predictive modeling of individual-based environmental health risks. 729-738 - Maria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran

, Márcia Keske Soares
, Cristiano Cortez da Rocha:
Applying situation-awareness for recommending phonological processes in the children's speech. 739-746 - Jeethu V. Devasia

, Priya Chandran
, Anjana Soman, Aiswarya Elezabeth Mathew, Jaya Jharwal:
Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathways. 747-753 - Rim Negra, Imen Jemili

, Akka Zemmari
, Mohamed Mosbah
, Abdelfettah Belghith
, Nesrine Ouled Abdallah
:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. 754-761 - Fahad Ahmed Satti, Wajahat Ali Khan

, Ganghun Lee, Asad Masood Khattak, Sungyoung Lee:
Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing. 762-770
Theme: Information systems: HI - Health informatics track: Poster papers
- Francisco Marques, Hugo Duarte, João A. M. Santos

, Inês Domingues
, José Pereira Amorim
, Pedro H. Abreu
:
An iterative oversampling approach for ordinal classification. 771-774 - Fabrício Neitzke Ferreira

, Adenauer C. Yamin, Ana Marilza Pernas, Luciano Agostini, Alexandre de Souza, Jorge L. V. Barbosa
:
IPBN: alerts management in intravenous electromedical devices using bayesian networks. 775-777
Theme: Information systems: HI - Health informatics track: Student research abstract
- Mahnaz Koupaee:

Mortality prediction using medical notes: student research abstract. 778-781 - Asaf Fux:

Video-based decision support for behavioral veterinarians: a case study of canine ADHD. 782-785
Theme: Information systems: IAR - Information access and retrieval track
- Thiziri Belkacem, Taoufiq Dkaki, José G. Moreno, Mohand Boughanem:

aMV-LSTM: an attention-based model with multiple positional text matching. 788-795 - Arman Bahraini, Eli Tilevich

:
Ask toscanini!: architecting a search engine for music scores beyond metadata. 796-803 - Elias Bassani

, Marco Viviani:
Automatically assessing the quality of Wikipedia contents. 804-807 - Nathalie Charbel, Christian Sallaberry, Sébastien Laborie

, Richard Chbeir:
Hybrid molecule-based information retrieval. 808-815 - Vito Walter Anelli

, Tommaso Di Noia, Eugenio Di Sciascio, Azzurra Ragone
, Joseph Trotta:
The importance of being dissimilar in recommendation. 816-821
Theme: System software and security: IoT - Internet of things track
- Jordano Ribeiro Celestrini, Renato N. Rocha, Estêvão B. Saleme

, Celso A. S. Santos
, José Gonçalves Pereira Filho, Rodrigo Varejão Andreão
:
An architecture and its tools for integrating IoT and BPMN in agriculture scenarios. 824-831 - Imad Berrouyne

, Mehdi Adda
, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi:
CyprIoT: framework for modelling and controlling network-based IoT applications. 832-841 - Sourajit Behera

, Anurag Choubey, Chandresh S. Kanani, Yashwant Singh Patel
, Rajiv Misra
, Alberto Sillitti:
Ensemble trees learning based improved predictive maintenance using IIoT for turbofan engines. 842-850 - Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn

:
iCore: continuous and proactive extrospection on multi-core IoT devices. 851-860 - Clémentine Gritti, Melek Önen

, Refik Molva:
Privacy-preserving delegable authentication in the internet of things. 861-869 - Suman Bala, Dominique Barthel, Saïd Gharout:

Separate session key generation approach for network and application flows in LoRaWAN. 870-879 - Mayke Ferreira Arruda, Renato de Freitas Bulcão-Neto

:
Toward a lightweight ontology for privacy protection in IoT. 880-888
Theme: System software and security: IoT - Internet of things track: Poster papers
- Gabriel Rodrigues Caldas de Aquino, Claudio M. de Farias, Luci Pirmez:

Hygieia: data quality assessment for smart sensor network. 889-891 - Bardia Safaei, Ali Asghar Mohammad Salehi, Maryam Shirbeigi, Amir Mahdi Hosseini Monazzah

, Alireza Ejlali:
PEDAL: power-delay product objective function for internet of things applications. 892-895
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track
- Jacopo Talamini, Eric Medvet, Alberto Bartoli:

Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning. 898-905 - Ayan Dutta, Vladimir Ufimtsev, Asai Asaithambi

:
Correlation clustering based coalition formation for multi-robot task allocation. 906-913 - Anna Lukina

, Ashish Tiwari, Scott A. Smolka, Radu Grosu:
Distributed adaptive-neighborhood control for stochastic reachability in multi-agent systems. 914-921 - Marie Ossenkopf, Mackenzie Jorgensen

, Kurt Geihs
:
Hierarchical multi-agent deep reinforcement learning to develop long-term coordination. 922-929 - Alberto Castellini, Francesco Masillo

, Manuele Bicego, Domenico Bloisi, Jason Blum, Alessandro Farinelli
, Sergio Peignier:
Subspace clustering for situation assessment in aquatic drones. 930-937 - Rolif Lima, Kaushik Das, Debasish Ghose:

Support vector regression based sensor localization using UAV. 938-945 - Pere Molins, Sabine Hauert:

Trail formation using large swarms of minimal robots. 946-952
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track: Poster papers
- Ajay Kattepur, Balamuralidhar P:

RoboPlanner: autonomous robotic action planning via knowledge graph queries. 953-956 - Juan Pablo Vásconez

, Leonardo Guevara
, Fernando Alfredo Auat Cheeín
:
Social robot navigation based on HRI non-verbal communication: a case study on avocado harvesting. 957-960
Theme: AI and agents: IRMAS - Intelligent robotics and multi-agent systems track: Student research abstract
- Siobhan Duncan:

Taking stigmergy out of the lab and into the field: student research abstract. 961-964
Theme: AI and agents: KLP - Knowledge and language processing track
- Maria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran

, Márcia Keske Soares
, Cristiano Cortez da Rocha:
A case-based approach using phonological knowledge for identifying error patterns in children's speech. 968-975 - Abhik Jana

, Animesh Mukherjee, Pawan Goyal:
Detecting reliable novel word senses: a network-centric approach. 976-983 - Frederique Baas, Olivier Bus, Alexander Osinga, Nikki van de Ven, Steffie van Loenhout, Lisanne Vrolijk, Kim Schouten, Flavius Frasincar:

Exploring lexico-semantic patterns for aspect-based sentiment analysis. 984-992 - Alexander Fritzler, Varvara Logacheva, Maksim Kretov:

Few-shot classification in named entity recognition task. 993-1000 - Guillaume Jacquet

, Jakub Piskorski, Sophie Chesney:
Out-of-context fine-grained multi-word entity classification: exploring token, character n-gram and NN-based models for multilingual entity classification. 1001-1010 - Hugo Rodrigues, Luísa Coheur

, Eric Nyberg:
Populating the knowledge base of a conversational agent: human vs. machine. 1011-1018 - Renato Stoffalette João, Pavlos Fafalios

, Stefan Dietze:
Same but different: distant supervision for predicting and understanding entity linking difficulty. 1019-1026 - Haifa Alharthi, Diana Inkpen:

Study of linguistic features incorporated in a literary book recommender system. 1027-1034 - Luigi Di Caro

, Alice Ruggeri:
Unveiling middle-level concepts through frequency trajectories and peaks analysis. 1035-1042 - Giorgia Ramponi

, Marco Brambilla
, Stefano Ceri, Florian Daniel
, Marco Di Giovanni:
Vocabulary-based community detection and characterization. 1043-1050
Theme: AI and agents: KLP - Knowledge and language processing track: Poster papers
- Pantelis Agathangelou

, Ioannis Katakis:
A hybrid deep learning network for modelling opinionated content. 1051-1053 - Simon Mille, Stamatia Dasiopoulou

, Leo Wanner:
A portable grammar-based NLG system for verbalization of structured data. 1054-1056 - Siwen Guo, Sviatlana Höhn, Christoph Schommer:

Looking into the past: evaluating the effect of time gaps in a personalized sentiment model. 1057-1060 - Pinar Arslan, Michele Corazza

, Elena Cabrio, Serena Villata:
Overwhelmed by negative emotions?: maybe you are being cyber-bullied! 1061-1063
Theme: AI and agents: KomIS - Knowledge discovery meets information systems track
- Ricardo Baeza-Yates

, Alfredo Cuzzocrea, Domenico Crea, Giovanni Lo Bianco:
An effective and efficient algorithm for ranking web documents via genetic programming. 1065-1072 - Michele Ianni, Elio Masciari

, Giuseppe M. Mazzeo, Carlo Zaniolo:
How to implement a big data clustering algorithm: a brief report on lesson learned. 1073-1080 - Maurizio Toccu, Giuseppe Psaila

, Davide Altomare:
On-line aggregation of POIs from Google and Facebook. 1081-1089 - Ciro Sorrentino, Ester Giallonardo, Eugenio Zimeo:

Topic-based indexing of federated datasets. 1090-1098 - Ahsan Morshed, Abdur Rahim Mohammad Forkan

, Pei-Wei Tsai, Prem Prakash Jayaraman
, Timos Sellis
, Dimitrios Georgakopoulos
, Irene Moser, Rajiv Ranjan:
VisCrimePredict: a system for crime trajectory prediction and visualisation from heterogeneous data sources. 1099-1106
Theme: AI and agents: KomIS - Knowledge discovery meets information systems track: Poster papers
- Giancarlo Sperlì:

A deep learning based community detection approach. 1107-1110 - Donatello Conte

, Pierre Gaucher, Carlo Sansone
:
Catfish density estimation by aerial images analysis and deep learning. 1111-1114
Theme: AI and agents: KRR - Knowledge representation and reasoning track
- Djamal Habet, Cyril Terrioux:

Conflict history based search for constraint satisfaction problem. 1117-1122 - Franz Baader

:
Expressive cardinality constraints on ALCSCC concepts. 1123-1130 - Christoph Beierle:

Inferential equivalence, normal forms, and isomorphisms of knowledge bases in institutions of conditional logics. 1131-1138 - Samy Sá, João F. L. Alcântara:

Interpretations and models for assumption-based argumentation. 1139-1146 - Gianvincenzo Alfano

, Sergio Greco
, Francesco Parisi:
On scaling the enumeration of the preferred extensions of abstract argumentation frameworks. 1147-1153 - Odinaldo Rodrigues

:
Representing and comparing large sets of extensions of abstract argumentation frameworks. 1154-1161
Theme: AI and agents: KRR - Knowledge representation and reasoning track: Poster papers
- Vitaliy Batusov, Giuseppe De Giacomo, Mikhail Soutchanski

:
Hybrid temporal situation calculus. 1162-1164
Theme: AI and agents: KRR - Knowledge representation and reasoning track: Student research abstract
- MinCong Luo China:

Automatic derivation of formulas by graph embedding and pattern matching network. 1165-1167 - Kai Sauerwald

:
Modelling the dynamics of forgetting and remembering by a system of belief changes: student research abstract. 1168-1171
Theme: Distributed systems: MCA - Mobile computing and applications track
- Andreas Konstantinidis, Aphrodite Demetriades, Savvas Pericleous:

A multi-objective indoor localization service for smartphones. 1174-1181 - Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue:

A scalable and accurate feature representation method for identifying malicious mobile applications. 1182-1189 - Takahiro Miura, Mari Ueda, Masaaki Hiroe, Ken-ichiro Yabu:

Acousess: smartphone-based logger to assess acoustical conditions: subjective noise conditions on some circumference and intraindividual variation. 1190-1199 - Ismat Chaib Draa, Fabien Bouquillon, Smaïl Niar, Emmanuelle Grislin-Le Strugeon

:
Machine learning for improving mobile user satisfaction. 1200-1207 - Jung-Hyun Lee, Woo-Jong Ryu, Kang-Min Kim

, SangKeun Lee:
MoCA: a novel privacy-preserving contextual advertising platform on mobile devices. 1208-1215
Theme: Distributed systems: MCA - Mobile computing and applications track: Poster papers
- Muhammad Ahmad

, Adil Mehmood Khan, Manuel Mazzara
, Salvatore Distefano, Amjad Ali, Ali Tufail
:
Extended sammon projection and wavelet kernel extreme learning machine for gait-based legitimate user identification. 1216-1219
Theme: Distributed systems: MCA - Mobile computing and applications track: Student research abstract
- Muntazir Mehdi:

Smart mobile crowdsensing for tinnitus research: student research abstract. 1220-1223
Theme: Distributed systems: MiDOS - Microservices, DevOps, and service-oriented architecture track
- Mario Cardarelli, Ludovico Iovino

, Paolo Di Francesco, Amleto Di Salle
, Ivano Malavolta
, Patricia Lago:
An extensible data-driven approach for evaluating the quality of microservice architectures. 1225-1234 - Amjad Ibrahim, Stevica Bozhinoski, Alexander Pretschner:

Attack graph generation for microservice architecture. 1235-1242 - Cleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio Vinicius Serafim Prazeres:

Reactive microservices for the internet of things: a case study in fog computing. 1243-1251 - Matheus Santana, Adalberto R. Sampaio Jr., Marcos Andrade, Nelson S. Rosa:

Transparent tracing of microservice-based applications. 1252-1259
Theme: Distributed systems: MiDOS - Microservices, DevOps, and service-oriented architecture track: Poster papers
- Florian Rademacher

, Jonas Sorgalla
, Sabine Sachweh, Albert Zündorf:
A model-driven workflow for distributed microservice development. 1260-1262
Theme: AI and agents: MLA - Machine learning and its applications track
- Sachin Bhardwaj

, Keon-Myung Lee, Jee-Hyong Lee:
An adaptive framework for applying machine learning in smart spaces. 1263-1270 - Walisson Ferreira de Carvalho, Luis Enrique Zárate

:
Causality relationship among attributes applied in an educational data set. 1271-1277 - Qadeer Ahmad, Atif Rafiq, Muhammad Adil Raja, Noman Javed:

Evolving MIMO multi-layered artificial neural networks using grammatical evolution. 1278-1285 - Duc-Trung Nguyen, Maurizio Filippone

, Pietro Michiardi:
Exact gaussian process regression with distributed computations. 1286-1295 - Shahroz Tariq

, Sangyup Lee, Hoyoung Kim, Youjin Shin, Simon S. Woo:
GAN is a friend or foe?: a framework to detect various fake face images. 1296-1303 - Maurizio Leotta

, Dario Olianas, Filippo Ricca, Nicoletta Noceti:
How do implementation bugs affect the results of machine learning algorithms? 1304-1313 - Suk-Jin Hong, Yun-Yong Ko

, Moon Jeung Joe, Sang-Wook Kim:
Influence maximization for effective advertisement in social networks: problem, solution, and evaluation. 1314-1321 - Tim Molderez

, Bjarno Oeyen
, Coen De Roover
, Wolfgang De Meuter
:
Marlon: a domain-specific language for multi-agent reinforcement learning on networks. 1322-1329 - David Tolpin:

Population anomaly detection through deep gaussianization. 1330-1336 - Hideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Noboru Murata

:
Real-time botnet detection using nonnegative tucker decomposition. 1337-1344 - Mustansar Fiaz

, Arif Mahmood
, Soon Ki Jung
:
Convolutional neural network with structural input for visual object tracking. 1345-1352
Theme: AI and agents: MLA - Machine learning and its applications track: Poster papers
- Hansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong:

An efficient deep learning platform for detecting objects. 1353-1354 - Pamul Yadav, Sangsu Jung, Dhananjay Singh

:
Machine learning based real-time vehicle data analysis for safe driving modeling. 1355-1358 - Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Sylvie Calabretto, Olivier Caelen, Liyun He-Guelton, Michael Granitzer

:
Multiple perspectives HMM-based feature engineering for credit card fraud detection. 1359-1361 - Obada Al Zoubi, Mariette Awad

:
Toward a continuous authentication system using a biologically inspired machine learning approach: a case study. 1362-1364
Theme: Distributed systems: NET - Networking track
- Ricardo Borges Almeida, Victor Renan Covalski Junes, Roger da Silva Machado, Diórgenes Yuri Leal da Rosa, Adenauer Corrêa Yamin, Lucas Medeiros Donato, Ana Marilza Pernas:

A hierarchical architectural model for network security exploring situational awareness. 1365-1372 - Marcelo Ricardo Leitner

, Mauro Sérgio Pereira Fonseca, Anelise Munaretto
:
On simplifying congestion window handling for CMT-SCTP. 1373-1377 - Andreas Fischer, Alexandru Paler:

On the analogy between quantum circuit design automation and virtual network embedding. 1378-1383 - Marcelo Da Silva Conterato, Tiago Coelho Ferreto, Fábio D. Rossi

, Wagner dos Santos Marques, Paulo Silas Severo de Souza:
Reducing energy consumption in SDN-based data center networks through flow consolidation strategies. 1384-1391
Theme: Distributed systems: NET - Networking track: Poster papers
- Helge Parzyjegla, Christian Wernecke, Gero Mühl, Eike Bjoern Schweissguth, Dirk Timmermann

:
Implementing content-based publish/subscribe with OpenFlow. 1392-1395
Theme: Distributed systems: NET - Networking track: Student research abstract
- Roger Pueyo Centelles

:
Extending LoRa networks: dynamic routing protocols and sub-GHz radio technology for very long range mesh networks: student research abstract. 1396-1397
Theme: System software and security: NGPS - Next generation programming paradigms and systems track
- Arvid Jakobsson, Frédéric Dabrowski, Wadoud Bousdira:

Safe usage of registers in BSPlib. 1400-1407
Theme: System software and security: OS - Operating systems track
- Meriem Ben Messaoud, Khaled Ghédira:

A solution for a detailed mathematical model for the aircraft landing problem on a single and multiple runway system. 1408-1414 - Rasha Almajed

, Ramesh K. Karne, Alexander L. Wijesinha:
Binary transformation of applications to run on bare PCs. 1416-1423 - Jaeheong Ahn, Choulseung Hyun, Donghee Lee, Sam H. Noh:

Cache-aware block allocation for memory-technology storage targeted file systems. 1424-1431 - Myungjoon Shon, Heejin Kim, Kicheol Park, Juw Won Park, Kwanghee Won, Jiman Hong:

A robust and secure backup system for protecting malware. 1432-1437 - Gunhee Choi

, Juhyung Son, Jongmoo Choi, Seong-je Cho, Youjip Won:
HPanal: a framework for analyzing tradeoffs of huge pages. 1438-1443 - Sanghun Cho

, Jaewan Hong
, Jungsik Choi
, Hwansoo Han:
Multithreaded double queuing for balanced CPU-GPU memory copying. 1444-1450 - Darius-Florentin Neatu, Radu-Dumitru Stochitoiu, Andrei Vlad Postoaca, Ion-Dorinel Filip, Florin Pop:

My cloudy time machine: a scalable microservice-based platform for data processing in cloud-edge systems: a proof of concept for the ROBIN-cloud project. 1451-1458
Theme: System software and security: OS - Operating systems track: Poster papers
- Hong Min, Kwangsoo Jo, Jinman Jung, Bongjae Kim

, Junyoung Heo:
A rendezvous node selection protocol for drone-based data collection. 1459-1461 - Jaehyun Kim, Taehyoung Kim, Jieun Lee, Kyung Sun Ham:

Predicting 24-hours ahead photovoltaic power output using forecast information. 1462-1464
Theme: System software and security: PDP - Privacy by design in practice track
- Mina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González

:
Dynamic attribute-based privacy-preserving genomic susceptibility testing. 1467-1474 - Fatbardh Veseli

, Jetzabel Serna-Olvera, Tobias Pulls, Kai Rannenberg:
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform. 1475-1483 - Fabio Aiolli, Mauro Conti

, Ankit Gangwal
, Mirko Polato:
Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis. 1484-1491 - Amir Shayan Ahmadian

, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. 1492-1499 - Christoph Stach

, Frank Steimle
:
Recommender-based privacy requirements elicitation - EPICUREAN: an approach to simplify privacy settings in IoT applications with respect to the GDPR. 1500-1507
Theme: System software and security: PDP - Privacy by design in practice track: Poster papers
- Jihye Kim

, Hankyung Ko, Hyunok Oh:
AILocker: authenticated image locker for video. 1508-1511 - Pierre Dewitte

, Kim Wuyts
, Laurens Sion
, Dimitri Van Landuyt
, Ivo Emanuilov
, Peggy Valcke
, Wouter Joosen:
A comparison of system description models for data protection by design. 1512-1515
Theme: System software and security: PL - Programming languages track
- Elton M. Cardoso, Rodrigo Geraldo Ribeiro, Leonardo Vieira dos Santos Reis, Mariza A. S. Bigonha

, Roberto S. Bigonha, Vladimir Oliveira Di Iorio:
An attribute language definition for adaptable parsing expression grammars. 1518-1525 - Daisuke Yamaguchi

, Kimio Kuramitsu
:
CPEG: a typed tree construction from parsing expression grammars with regex-like captures. 1526-1533 - Christoph Rieger, Fabian Wrede, Herbert Kuchen:

Musket: a domain-specific language for high-level parallel programming with algorithmic skeletons. 1534-1543 - Caglar Durmaz

, Kasim Sinan Yildirim
, Geylani Kardas
:
PureMEM: a structured programming model for transiently powered computers. 1544-1551 - Jan C. Dageförde

, Herbert Kuchen:
Retrieval of individual solutions from encapsulated search with a potentially infinite search space. 1552-1561 - Christiano Braga:

π: towards a simple formal semantic framework for compiler construction. 1562-1569
Theme: System software and security: PL - Programming languages track: Poster papers
- Luiz Carlos Camargo

, Marcos Didonet Del Fabro:
Applying a data-centric framework for developing model transformations. 1570-1573 - Torben Weis

, Marian Waltereit
, Maximilian Uphoff:
Fyr: a memory-safe and thread-safe systems programming language. 1574-1577 - Jolan Philippe, Frédéric Loulergue

:
Parallel programming with Coq: map and reduce skeletons on trees. 1578-1581
Theme: Software design and development: RE - Requirements engineering track
- Luis Hernán García Paucar

, Nelly Bencomo, Kevin Kam Fung Yuen
:
ARRoW: automatic runtime reappraisal of weights for self-adaptation. 1584-1591 - Feng Chen, Norah Power, J. J. Collins, Fuyuki Ishikawa:

Contemporary requirements challenges and issues: an empirical study in 11 organizations. 1592-1599 - Marian Daun

, Viktoria Stenkova, Lisa Krajinski, Jennifer Brings, Torsten Bandyszak, Thorsten Weyer
:
Goal modeling for collaborative groups of cyber-physical systems with GRL: reflections on applicability and limitations based on two studies conducted in industry. 1600-1609 - Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:

Logic-based methodology to help security architects in eliciting high-level network security requirements. 1610-1619 - Youssou Ndiaye, Olivier Barais

, Arnaud Blouin
, Ahmed Bouabdallah, Nicolas Aillery:
Requirements for preventing logic flaws in the authentication procedure of web applications. 1620-1628
Theme: Software design and development: RE - Requirements engineering track: Poster papers
- Michael Masin, Francesca Palumbo

, Joost Adriaanse, Hans Myrhaug, Francesco Regazzoni
, Manuel Sanchez, Katiuscia Zedda:
Elicitation of technical requirements in large research projects: the CERBERO approach. 1629-1632
Theme: Software design and development: RE - Requirements engineering track: Student research abstract
- Muhammad Azeem Akbar

:
SRCMIMM: managing requirements change activities in global software development: student research abstract. 1633-1636
Theme: System software and security: RS - Recommender systems: Theory and applications track
- Mesut Kaya

, Derek G. Bridge:
Community-aware diversification of recommendations. 1639-1646 - Nicolas Gutowski

, Tassadit Amghar, Olivier Camp
, Fabien Chhel:
Global versus individual accuracy in contextual multi-armed bandit. 1647-1654 - Seda Polat Erdeniz, Alexander Felfernig, Ralph Samer, Muesluem Atas:

Matrix factorization based heuristics for constraint-based recommenders. 1655-1662 - Dimitris Sacharidis

:
Top-N group recommendations with fairness. 1663-1670 - Caio Nóbrega, Leandro Balby Marinho

:
Towards explaining recommendations through local surrogate models. 1671-1678
Theme: System software and security: RS - Recommender systems: Theory and applications track: Poster papers
- Mostafa Bayomi

, Annalina Caputo
, Matthew Nicholson, Anirban Chakraborty
, Séamus Lawless:
CoRE: a cold-start resistant and extensible recommender system. 1679-1682 - Steffen Schnitzer, Dominik Reis, Wael Alkhatib, Christoph Rensing

, Ralf Steinmetz
:
Preselection of documents for personalized recommendations of job postings based on word embeddings. 1683-1686 - Catalin-Mihai Barbu, Guillermo Carbonell, Jürgen Ziegler:

The influence of trust cues on the trustworthiness of online reviews for recommendations. 1687-1689
Theme: Software design and development: SATTA - Software architecture: Theory, technology, and applications track
- Yun Zhang, Xiwei Xu

, Suhrid Satyal, Shiping Chen
, Liming Zhu
:
A RESTful architecture for data exploration as a service. 1692-1700 - Marco Autili

, Amleto Di Salle
, Francesco Gallo, Claudio Pompilio
, Massimo Tivoli
:
Aiding the realization of service-oriented distributed systems. 1701-1710 - Aymen Daoudi, Ghizlane El-Boussaidi, Naouel Moha, Segla Kpodjedo:

An exploratory study of MVC-based architectural patterns in Android apps. 1711-1720 - Panagiotis Kouros, Theodore Chaikalis, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Theodoros Amanatidis:

JCaliper: search-based technical debt management. 1721-1730 - Benjamin Mayer, Rainer Weinreich

:
The effect of gamification on software architecture knowledge management: a student experiment and focus group study. 1731-1740
Theme: Software design and development: SE - Software engineering track
- Hendrik Bünder, Herbert Kuchen:

A model-driven approach for behavior-driven GUI testing. 1742-1751 - Misoo Kim

, Eunseok Lee
:
A novel approach to automatic query reformulation for IR-based bug localization. 1752-1759 - Sirine Gharbi, Mohamed Wiem Mkaouer

, Ilyes Jenhani
, Montassar Ben Messaoud
:
On the classification of software change messages using multi-label active learning. 1760-1767 - Omar Javed, Alex Villazón

, Walter Binder
:
JUniVerse: large-scale JUnit-test analysis in the wild. 1768-1775 - Michael Alexander Tröls, Atif Mashkoor, Alexander Egyed:

Live and global consistency checking in a collaborative engineering environment. 1776-1785 - Md. Rakibul Islam

, Md Kauser Ahmmed, Minhaz F. Zibran:
MarValous: machine learning based detection of emotions in the valence-arousal space in software engineering text. 1786-1793 - Filippo Schiavio

, Haiyang Sun, Daniele Bonetta, Andrea Rosà
, Walter Binder
:
NodeMOP: runtime verification for Node.js applications. 1794-1801 - Junye Wen, Guowei Yang

:
Parallel property checking with staged symbolic execution. 1802-1809 - Simo Mäkinen, Timo Lehtonen, Terhi Kilamo, Mikko Puonti

, Tommi Mikkonen
, Tomi Männistö
:
Revisiting continuous deployment maturity: a two-year perspective. 1810-1817 - Miren Illarramendi Rezabal

, Leire Etxeberria, Xabier Elkorobarrutia, Goiuria Sagardui
:
Runtime observable and adaptable UML state machines: models@run.time approach. 1818-1827 - Christoph Luckeneder, Hermann Kaindl

:
A case study of systematic top-down design of cyber-physical models with integrated validation and formal verification. 1828-1836 - Théo Le Calvar

, Fabien Chhel, Frédéric Jouault, Frédéric Saubion:
Toward a declarative language to generate explorable sets of models. 1837-1844 - Sai Anirudh Karre, Neeraj Mathur, Y. Raghu Reddy

:
Usability evaluation of VR products in industry: a systematic literature review. 1845-1851 - Vinícius Gomes Ferreira, Edna Dias Canedo

:
Using design sprint as a facilitator in active learning for students in the requirements engineering course: an experience report. 1852-1859
Theme: Software design and development: SE - Software engineering track: Poster papers
- Mohd Syafiq Zolkeply, Jianhua Shao:

Classifying software issue reports through association mining. 1860-1863 - Thomas Krismayer, Rick Rabiser

, Paul Grünbacher
:
Mining constraints for monitoring systems of systems. 1864-1866 - Sara Ramezanian

, Tommi Meskanen, Valtteri Niemi:
Privacy preserving 2-party queries on bipartite graphs with private set intersection. 1867-1870 - Hao Wu

:
Synthesising call sequences from OCL operational contracts. 1871-1873 - Marcel Heimlich, Akbar Siami Namin:

TestLocal: just-in-time parametrized testing of local variables. 1874-1877 - Gonçalo Miguéis, João Araújo

, Ana Moreira
:
Towards a requirements language for modeling emotion in videogames. 1878-1880 - Danielle Gaither, Kaushik Madala, Hyunsook Do, Barrett R. Bryant:

VeriCCM: improving the syntax and semantics of requirements models. 1881-1884
Theme: Software design and development: SE - Software engineering track: Student research abstract
- Hina Gul Afridi:

Empirical study on developer's perception regarding reward practices: student research abstract. 1885-1887
Theme: System software and security: SEC - Computer security track
- Rui Xu, Xiaojun Chen, Jinqiao Shi:

A coarse-grained password model with memorable unit-based recurrent neural networks. 1890-1897 - Valentin Zieglmeier

, Severin Kacianka, Thomas Hutzelmann
, Alexander Pretschner:
A real-time remote IDS testbed for connected vehicles. 1898-1905 - Jay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry B. Goldgof:

Coauthentication. 1906-1915 - Jan Spooren, Davy Preuveneers, Lieven Desmet

, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. 1916-1923 - Michael Brunner

, Andrea Mussmann, Ruth Breu:
Enabling change-driven workflows in continuous information security management. 1924-1933 - Dhiman Chakraborty, Christian Hammer

, Sven Bugiel:
Secure multi-execution in Android. 1934-1943 - Ben Amos, Niv Gilboa, Arbel Levy:

Spectre without shared memory. 1944-1951 - Gebrehiwet B. Welearegai, Max Schlüter, Christian Hammer

:
Static security evaluation of an industrial web application. 1952-1961 - Pietro Borrello

, Emilio Coppa
, Daniele Cono D'Elia
, Camil Demetrescu:
The ROP needle: hiding trigger-based injection vectors via code reuse. 1962-1970 - Patrick Speicher, Marcel Steinmetz

, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. 1971-1978
Theme: System software and security: SEC - Computer security track: Student research abstract
- Majid Hatamian:

"Hard to understand, easy to ignore: " an automated approach to predict mobile app permission requests: student research abstract. 1979-1982 - Monina Schwarz:

Digital forensics in the internet of things: student research abstract. 1983-1985
Theme: Information systems: SFECS - Sustainability of fog/edge computing systems track
- María Teresa González-Aparicio

, Muhammad Younas, Javier Tuya, Rubén Casado:
Evaluation of ACE properties of traditional SQL and NoSQL big data systems. 1988-1995 - Maria Rita Palattella

, Ridha Soua, Abdelmajid Khelil
, Thomas Engel
:
Fog computing as the key for seamless connectivity handover in future vehicular networks. 1996-2000 - Devarani Devi Ningombam

, Seokjoo Shin:
Resource-sharing optimization for multicast D2D communications underlaying LTE-A uplink cellular networks. 2001-2007 - Zakaria Maamar

, Thar Baker
, Noura Faci, Emir Ugljanin, Mohammed Al-Khafajiy, Vanilson Arruda Burégio
:
Towards a seamless coordination of cloud and fog: illustration through the internet-of-things. 2008-2015 - Jeongin Kim, Taekeun Hong, Pankoo Kim:

Word2Vec based spelling correction method of Twitter message. 2016-2019
Theme: System software and security: SiSoS - Software-intensive systems-of-systems track
- Damir Nesic, Mattias Nyberg, Barbara Gallina:

Constructing product-line safety cases from contract-based specifications. 2022-2031 - Samir Ouchani

:
Towards a fractionation-based verification: application on SysML activity diagrams. 2032-2039
Theme: System software and security: SiSoS - Software-intensive systems-of-systems track: Poster papers
- Phu Hong Nguyen

, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg
:
The preliminary results of a mapping study of deployment and orchestration for IoT. 2040-2043 - Yong-Jun Shin, Young Min Baek, Eunkyoung Jee, Doo-Hwan Bae:

Data-driven environment modeling for adaptive system-of-systems. 2044-2047
Theme: Information systems: SONAMA - Social network and media analysis track
- Yara Rizk, Hadi Samer Jomaa, Mariette Awad

, Carlos Castillo
:
A computationally efficient multi-modal classification approach of disaster-related Twitter images. 2050-2059 - Marco Brambilla

, Mattia Gasparini:
Brand community analysis on social networks using graph representation learning. 2060-2069 - Mariana O. Silva

, Laís Mota de Alencar Rocha, Mirella M. Moro
:
Collaboration profiles and their impact on musical success. 2070-2077 - Narimene Dakiche, Fatima Benbouzid-Si Tayeb, Yahya Slimani, Karima Benatchba:

Community evolution prediction in dynamic social networks using community features' change rates. 2078-2085 - PinHua Wu, Jia-Ling Koh

, Arbee L. P. Chen:
Event detection for exploring emotional upheavals of depressive people. 2086-2095 - Alessandro Balestrucci

, Rocco De Nicola
, Omar Inverso
, Catia Trubiani:
Identification of credulous users on Twitter. 2096-2103 - Shubham Singh

, Rishabh Kaushal
, Arun Balaji Buduru
, Ponnurangam Kumaraguru:
KidsGUARD: fine grained approach for child unsafe video representation and detection. 2104-2111 - Abir Troudi, Salma Jamoussi

, Corinne Amel Zayani
, Ikram Amous:
Multidimensional analysis of hot events from social media sources. 2112-2119
Theme: Information systems: SONAMA - Social network and media analysis track: Poster papers
- Joohong Lee, Dongyoung Sohn, Yong Suk Choi:

A tool for spatio-temporal analysis of social anxiety with Twitter data. 2120-2123 - Danilo Dessì

, Mauro Dragoni, Gianni Fenu, Mirko Marras, Diego Reforgiato Recupero
:
Evaluating neural word embeddings created from online course reviews for sentiment analysis. 2124-2127 - Ashis Talukder, Choong Seon Hong

:
Knapsack-based reverse influence maximization for target marketing in social networks. 2128-2130 - Fatemeh Salehi Rizi, Michael Granitzer

:
Predicting event attendance exploring social influence. 2131-2134 - Eunji Lee, Htet Myet Lynn, Hyoungju Kim, Soonja Yeom

, Pankoo Kim:
Semantic analysis for paraphrase identification using semantic role labeling. 2135-2138
Theme: System software and security: SP - Software platforms track
- Jinwoo Lee, Yena Lee, Ming Jin, John Kim, Jiman Hong:

Analysis of application installation logs on Android systems. 2140-2145 - Gibeom Song, Manhee Lee:

Design and implementation of emulab-based malware analysis service through EmuLiB. 2146-2151 - Junghoon Kim, Sundoo Kim, Juseong Yun, Youjip Won:

Energy efficient IO stack design for wearable device. 2152-2159
Theme: System software and security: SP - Software platforms track: Poster papers
- Taehyoung Kim, Jaehyun Kim, Jieun Lee, Kyung Sun Ham:

A design and implementation wind farm real-time simulator with various types of wind turbine considering wake effect. 2160-2163 - Ilya Khomyakov, Alberto Sillitti:

A novel approach for collecting and sharing software metrics data. 2164-2167
Theme: Software design and development: SVT - Software verification and testing track
- Predrag Filipovikj, Guillermo Rodríguez-Navas, Cristina Seceleanu

:
Bounded invariance checking of simulink models. 2168-2177 - Daniel Balasubramanian, Zhenkai Zhang

, Dan McDermet, Gabor Karsai
:
Dynamic symbolic execution for the analysis of web server applications in Java. 2178-2185 - Allan Blanchard, Nikolai Kosmatov

, Frédéric Loulergue
:
Logic against ghosts: comparison of two proof approaches for a list module. 2186-2195 - Ramon Janssen, Jan Tretmans:

Matching implementations to specifications: the corner cases of ioco. 2196-2205 - Joshua Heneage Dawes, Giles Reger

:
Specification of temporal properties of functions for runtime verification. 2206-2214 - Isabella Mastroeni

, Michele Pasqua
:
Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interference. 2215-2223 - Pedro Delgado-Pérez

, Sergio Segura:
Study of trivial compiler equivalence on C++ object-oriented mutation operators. 2224-2230 - Mihai Herda

, Shmuel S. Tyszberowicz, Joachim Müssig, Bernhard Beckert
:
Verification-based test case generation for information-flow properties. 2231-2238
Theme: Information systems: SWA - Semantic web and applications track
- Mirko Cesarini, Fabio Mercorio

, Mario Mezzanzanica
, Vincenzo Moscato, Antonio Picariello:
A tool for exploring networks of computer scientists as a graph. 2240-2242 - Emir Muñoz

, Pasquale Minervini
, Matthias Nickles
:
Embedding cardinality constraints in neural link predictors. 2243-2250 - Barbara Catania, Giovanna Guerrini, Beyza Yaman

:
Exploiting context and quality for linked data source selection. 2251-2258 - Nikiforos Pittaras, George Papadakis, George Stamoulis, Giorgos Argyriou, Efi Karra Taniskidou, Emmanouil Thanos, George Giannakopoulos

, Leonidas Tsekouras, Manolis Koubarakis
:
GeoSensor: semantifying change and event detection over big data. 2259-2266 - Pavlos Fafalios

, Yannis Tzitzikas:
How many and what types of SPARQL queries can be answered through zero-knowledge link traversal? 2267-2274 - Franck Ravat

, Jiefu Song, Olivier Teste
, Cássia Trojahn:
Improving the performance of querying multidimensional RDF data using aggregates. 2275-2284 - Amir Laadhar, Faiza Ghozzi

, Imen Megdiche
, Franck Ravat
, Olivier Teste
, Faïez Gargouri
:
Partitioning and local matching learning of large biomedical ontologies. 2285-2292 - Yevgen Pikus, Norbert Weißenberg, Bernhard Holtkamp, Boris Otto

:
Semi-automatic ontology-driven development documentation: generating documents from RDF data and DITA templates. 2293-2302 - David Abián

, Jorge Bernad, Raquel Trillo Lado:
Using contemporary constraints to ensure data consistency. 2303-2310
Theme: Information systems: SWA - Semantic web and applications track: Poster papers
- Said Fathalla

, Sahar Vahdati, Sören Auer
, Christoph Lange
:
The scientific events ontology of the OpenResearch.org curation platform. 2311-2313
Theme: Information systems: SWA - Semantic web and applications track: Student research abstract
- Ronald Ochieng Ojino:

User's profile ontology-based semantic model for personalized hotel room recommendation in the web of things: student research abstract. 2314-2316
Theme: Software design and development: UE - Usability engineering track
- Takahiro Miura, Ken-ichiro Yabu, Youji Shimizu, Kenichi Tanaka, Masamitsu Furukawa, Seiko Michiyoshi, Tetsuya Yamamoto, Kazutaka Ueda, Tohru Ifukube:

Cognitive workload of in-car auditory-vocal interfaces on visuospatial sketchpad based on a dual task of visual pattern test. 2319-2327 - Rafael Fontinele Ribeiro, Matheus de Meneses Campanhã Souza, Pedro Almir Martins de Oliveira

, Pedro de Alcântara dos Santos Neto:
Usability problems discovery based on the automatic detection of usability smells. 2328-2335
Theme: Software design and development: UE - Usability engineering track: Poster papers
- Isaiah Liljestrand, Marcelo Gonzales, Dongwan Shin

:
Developing a mental model for use in the context of computer security. 2336-2339 - Cristina Scheibler, Maria Andréia Formico Rodrigues:

User experience evaluation focused on viewpoints and embodiment. 2340-2343
Theme: Software design and development: VSPLE - Variability and software product line engineering track
- Philipp Heisig

, Jan-Philipp Steghöfer, Christopher Brink, Sabine Sachweh:
A generic traceability metamodel for enabling unified end-to-end traceability in software product lines. 2344-2353 - Ana Paula Allian, Bruno Sena, Elisa Yumi Nakagawa:

Evaluating variability at the software architecture level: an overview. 2354-2361 - Urtzi Markiegi, Aitor Arrieta, Leire Etxeberria, Goiuria Sagardui

:
Test case selection using structural coverage in software product lines for time-budget constrained scenarios. 2362-2371
Theme: Software design and development: VSPLE - Variability and software product line engineering track: Poster papers
- Muhammad Atif Javed, Barbara Gallina, Anna Carlsson:

Towards variant management and change impact analysis in safety-oriented process-product lines. 2372-2375
Theme: Distributed systems: WCN - Selected areas of wireless communications and networking track
- Anupam Kumar Bairagi, Md. Shirajum Munir

, Madyan Alsenwi, Nguyen Hoang Tran
, Choong Seon Hong
:
A matching based coexistence mechanism between eMBB and uRLLC in 5G wireless networks. 2377-2384 - Minseok Kim, Sungwon Lee, Muhammad Toaha Raza Khan, Junho Seo, Yeongjoon Bae, Yonghwan Jeong, Dongkyun Kim:

A new CoAP congestion control scheme using message loss feedback for IoUT. 2385-2390 - Bilal Jan, Haleem Farman

, Murad Khan, Syed Hassan Ahmed
:
An adaptive energy efficient scheme for energy constrained wireless sensor networks. 2391-2398 - Do-hyung Kim

, Young-Bae Ko:
Energy-aware medium access control for energy-harvesting machine-to-machine networks. 2399-2405 - Hossein Ajorloo

, Cormac J. Sreenan, Adrian Loch, Joerg Widmer
:
On the feasibility of using IEEE 802.11ad mmWave for accurate object detection. 2406-2413 - Savio Sciancalepore

, Saeif Alhazbi
, Roberto Di Pietro
:
Reliability of ADS-B communications: novel insights based on an experimental assessment. 2414-2421 - Guilherme R. M. de Oliveira, Carlos Renato Storck, Fátima de L. P. Duarte-Figueiredo:

SoftH: soft handover multicriteria mechanism. 2422-2429
Theme: Distributed systems: WCN - Selected areas of wireless communications and networking track: Poster papers
- Adda Boualem

, Youcef Dahmani, Marwane Ayaida, Cyril de Runz:
A new fuzzy/evidential approach to address the area coverage problem in mobile wireless sensor networks. 2430-2433
Theme: Information systems: WICE - Web-based technologies for interactive computing education track
- Tobias Reischmann, Herbert Kuchen:

A web-based e-assessment tool for design patterns in UML class diagrams. 2435-2444 - Maria da Graça Campos Pimentel, Cristiane A. Yaguinuma, Diogo Santana Martins, Isabela Zaine:

Anchoring interactive points of interest on web-based instructional video: effects on students' interaction behavior and perceived experience. 2445-2452 - Yong Zheng

, Shephalika Shekhar, Alisha Anna Jose, Sunil Kumar Rai:
Integrating context-awareness and multi-criteria decision making in educational learning. 2453-2460 - Josue Espinosa Godinez, Hasan M. Jamil

:
Meet cyrus: the query by voice mobile assistant for the tutoring and formative assessment of SQL learners. 2461-2468
Theme: Information systems: WICE - Web-based technologies for interactive computing education track: Poster papers
- Hossain Shahriar

, Chi Zhang, Md Arabin Islam Talukder
, Sheikh Iqbal Ahamed:
Resources for healthcare workflow modeling and analysis. 2469-2472 - Niels Heller, Sebastian Mader, François Bry

:
More than the sum of its parts: designing learning formats from core components. 2473-2476
Theme: Distributed systems: WT - Web technologies track
- Luiz Soares dos Santos Baglie, Diego Roberto Colombo Dias

, Marcelo de Paiva Guimarães, José Remo Ferreira Brega:
A literature review of studies on interactive 3D information visualization for the web. 2479-2488 - Donatas Meskele, Flavius Frasincar:

ALDONA: a hybrid solution for sentence-level aspect-based sentiment analysis using a lexicalised domain ontology and a neural attention model. 2489-2496 - Hoai Viet Nguyen

, Luigi Lo Iacono, Hannes Federrath:
Mind the cache: large-scale explorative study of web caching. 2497-2506 - Martin Garriga, Andres Flores:

Standards-driven metamodel to increase retrievability of heterogeneous services. 2507-2514 - Ena Tominaga, Yoshitaka Arahori, Katsuhiko Gondow:

AwaitViz: a visualizer of JavaScript's async/await execution order. 2515-2524
Theme: Distributed systems: WT - Web technologies track: Poster papers
- Yong Zheng

, Alisha Anna Jose:
Context-aware recommendations via sequential predictions. 2525-2528 - Yong Zheng

:
Utility-based multi-criteria recommender systems. 2529-2531 - Patrick Vanvorce, Hasan M. Jamil

:
Computational thinking with the web crowd using CodeMapper. 2532-2534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














