


default search action
36th SAC 2021: Virtual Event [Republic of Korea]
- Chih-Cheng Hung, Jiman Hong, Alessio Bechini, Eunjee Song:

SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021. ACM 2021, ISBN 978-1-4503-8104-8
Theme: Artificial intelligence and agents: BIO - Bioinformatics track
- Mahdi Belcaid, Cédric Arisdakessian, Yuliia Kravchenko:

Efficient DNA sequence partitioning using probabilistic subsets and hypergraphs. 4-9 - Dario Aragona, Luca Podo, Bardh Prenkaj

, Paola Velardi
:
CoRoNNa: a deep sequential framework to predict epidemic spread. 10-17 - Ismat Ara Reshma, Sylvain Cussat-Blanc, Radu Tudor Ionescu, Hervé Luga, Josiane Mothe:

Natural vs balanced distribution in deep learning on whole slide images for cancer detection. 18-25
Poster Session: Theme: Artificial intelligence and agents: BIO - Bioinformatics track: Poster papers
- Gabriel Bianchin de Oliveira, Hélio Pedrini, Zanoni Dias:

Protein secondary structure prediction based on fusion of machine learning classifiers. 26-29
Theme: Distributed systems: CC - Cloud computing track
- Illyoung Choi

, John H. Hartman:
Stargate: remote data access between hadoop clusters. 32-39 - Amir Teshome Wonjiga, Louis Rilling, Christine Morin:

SLA definition for network intrusion detection systems in IaaS clouds. 40-49 - Amina Chikhaoui, Laurent Lemarchand, Kamel Boukhalfa

, Jalil Boukhobza
:
StorNIR, a multi-objective replica placement strategy for cloud federations. 50-59 - Emad Heydari Beni

, Eddy Truyen, Bert Lagaisse
, Wouter Joosen, Jordy Dieltjens:
Reducing cold starts during elastic scaling of containers in kubernetes. 60-68 - Hernán Humberto Álvarez-Valera, Marc Dalmau, Philippe Roose, Jorge Larracoechea, Christina Herzog:

An energy saving approach: understanding microservices as multidimensional entities in p2p networks. 69-78
Poster Session: Theme: Distributed systems: CC - Cloud computing track: Poster papers
- Paras Bhagtya, S. Raghavan, K. Chandrasekaran, Usha D.:

Workload classification in multi-vm cloud environment using deep neural network model. 79-82 - Özgür Sedefoglu, Hasan Sözer:

Cost minimization for deploying serverless functions. 83-85 - Avadh Kishor

, Rajdeep Niyogi:
A bargaining game based energy-aware load balancing in cloud data centers. 86-88
Theme: Artificial intelligence and agents: CIVIA - Computational intelligence and video & image analysis track
- Vicent Sanz Marco, David G. Valcarce

, Marta F. Riesco
, Vanesa Robles
:
Low-cost automatic fish measuring estimation. 90-97 - Danilo Borges da Silva, Creto Augusto Vidal, Joaquim B. Cavalcante Neto, Italo N. S. Pessoa, Rubens Fernandes Nunes:

Topple-free foot strategy applied to real-time motion capture data using kinect sensor. 98-106 - Nora Muscholl, Matthias Klusch, Patrick Gebhard, Tanja Schneeberger:

EMIDAS: explainable social interaction-based pedestrian intention detection across street. 107-115 - Moshe Kravchik, Battista Biggio, Asaf Shabtai:

Poisoning attacks on cyber attack detectors for industrial control systems. 116-125
Theme: System software and security: CPS - Cyber-physical systems track
- Ruihao Li

, Ke Liu, Xiaojun Cai, Mengying Zhao, Lizy K. John, Zhiping Jia:
Improving CNN performance on FPGA clusters through topology exploration. 126-134 - Aitor Gartziandia

, Aitor Arrieta, Aitor Agirre, Goiuria Sagardui, Maite Arratibel:
Using regression learners to predict performance problems on software updates: a case study on elevators dispatching algorithms. 135-144 - Peng Chen, Hui Chen, Jun Zhou, Di Liu, Shiqing Li, Weichen Liu, Wanli Chang, Nan Guan

:
Partial order based non-preemptive communication scheduling towards real-time networks-on-chip. 145-154 - Sangyoung Park

, Alma Pröbstl, Wanli Chang, Anuradha Annaswamy, Samarjit Chakraborty
:
Exploring planning and operations design space for EV charging stations. 155-163 - Sumana Ghosh, Arnab Mondal

, Debayan Roy, Philipp H. Kindt, Soumyajit Dey, Samarjit Chakraborty
:
Proactive feedback for networked CPS. 164-173
Poster Session: Theme: System software and security: CPS - Cyber-physical systems track: Poster papers
- Muhammad Atif, Tommaso Zoppi, Mohamad Gharib

, Andrea Bondavalli
:
Quantitative comparison of supervised algorithms and feature sets for traffic sign recognition. 174-177 - Yongchao Hu, Yajuan Du:

Reducing tail latency of LSM-tree based key-value store via limited compaction. 178-181
Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track
- Matthew Bradbury

, Arshad Jhumka, Tim Watson:
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes. 184-193 - Matheus Torquato

, Paulo Romero Martins Maciel, Marco Vieira
:
Analysis of VM migration scheduling as moving target defense against insider attacks. 194-202 - Filipa Pedrosa, Luís Rodrigues:

Reducing the subscription latency in reliable causal publish-subscribe systems. 203-212 - Johannes Köstler, Hans P. Reiser, Gerhard Habiger, Franz J. Hauck:

SmartStream: towards byzantine resilient data streaming. 213-222 - Arijet Sarker, SangHyun Byun, Wenjun Fan, Sang-Yoon Chang:

Blockchain-based root of trust management in security credential management system for vehicular communications. 223-231
Poster Session: Theme: Distributed systems: DADS - Dependable, adaptive, and secure distributed systems track: Poster papers
- Mohamad Gharib

, Tommaso Zoppi, Andrea Bondavalli
:
Understanding the properness of incorporating machine learning algorithms in safety-critical systems. 232-234 - Rhauani Weber Aita Fazul, Patrícia Pitthan Barcelos

:
Automation and prioritization of replica balancing in HDFS. 235-238
Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track
- Lital Badash, Nachiket Tapas, Asaf Nadler, Francesco Longo

, Asaf Shabtai:
Blockchain-based bug bounty framework. 239-248 - Wei-Yang Chiu

, Weizhi Meng
:
Towards decentralized bicycle insurance system based on blockchain. 249-256 - Sammy de Figueiredo, Akash Madhusudan

, Vincent Reniers, Svetla Nikova
, Bart Preneel:
Exploring the storj network: a security analysis. 257-264 - Stefano Bistarelli, Ivan Mercanti

, Francesco Faloci, Francesco Santini:
Highlighting poor anonymity and security practice in the blockchain of Bitcoin. 265-272 - Jongbeen Han, Mansub Song, Hyeonsang Eom, Yongseok Son:

An efficient multi-signature wallet in blockchain using bloom filter. 273-281 - Mauricio Jacobo-Romero

, André Freitas
:
Microeconomic foundations of decentralised organisations. 282-290 - Liuyang Ren, Wei-Ting Chen, Paul A. S. Ward:

SnapshotSave: fast and low storage demand blockchain bootstrapping. 291-300
Poster Session: Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track: Poster papers
- I. Smagin:

State-witnessed virtual transactions for atomic execution of complexity-unconstrained smart contracts. 301-304 - Jongbeen Han, Heemin Kim, Hyeonsang Eom, Yongseok Son:

A decentralized document management system using blockchain and secret sharing. 305-308
Theme: Information systems: DBDM - Databases and big data management track
- Michael Gowanlock, Zane Fink, Ben Karsin, Jordan Wright:

A study of work distribution and contention in database primitives on heterogeneous CPU/GPU architectures. 311-320 - Ramon Lawrence:

Adaptive flash sorting for memory-constrained embedded devices. 321-326 - Andre Moriyama, Lucas Santiago Rodrigues

, Lucas C. Scabora, Mirela T. Cazzolato, Agma J. M. Traina, Caetano Traina
:
VD-tree: how to build an efficient and fit metric access method using voronoi diagrams. 327-335
Poster Session: Theme: Information systems: DBDM - Databases and big data management track: Poster papers
- Lucas C. Scabora, Gabriel Spadon, Mirela T. Cazzolato, Daniel S. Kaster, Agma J. M. Traina, José F. Rodrigues Jr., Caetano Traina Jr.

:
SHARq: sharing recursive queries in relational databases. 336-339 - Xhino Mullaymeri, Alexandros Karakasidis:

A two-party private string matching fuzzy vault scheme. 340-343
Theme: Information systems: DM - Data mining track
- Sijie He, Hao Huang, Shinjae Yoo

, Weizhong Yan, Feng Xue, Tianyi Wang
, Chenxiao Xu:
Flight data anomaly detection and diagnosis with variable association change. 346-354 - Francesco Bariatti

, Peggy Cellier
, Sébastien Ferré:
GraphMDL+: interleaving the generation and MDL-based selection of graph patterns. 355-363 - Rafael Gaspar de Sousa, Sarajane Marques Peres, Marcelo Fantinato

, Hajo Alexander Reijers:
Concept drift detection and localization in process mining: an integrated and efficient approach enabled by trace clustering. 364-373 - Khanh-Huu-The Dam

, Thomas Given-Wilson, Axel Legay:
Unsupervised behavioural mining and clustering for malware family identification. 374-383 - Clement Moreau, Alexandre Chanson

, Verónika Peralta, Thomas Devogele, Cyril de Runz:
Clustering sequences of multi-dimensional sets of semantic elements. 384-391 - Marco Barsacchi, Alessio Bechini

, Francesco Marcelloni:
Implicitly distributed fuzzy random forests. 392-399 - Jose Castro-Ochante, Guillermo Cámara Chávez

, Erick Gomez Nieto
:
ICE: a visual analytic tool for interactive clustering ensembles generation. 400-408
Poster Session: Theme: Information systems: DM - Data mining track: Poster papers
- Peng Xu, Claudia Eckert, Apostolis Zarras

:
Detecting and categorizing Android malware with graph neural networks. 409-412 - Sergio Bachiller, Lara Quijano Sánchez

, Iván Cantador:
A flexible and lightweight interactive data mining tool to visualize and analyze digital citizen participation content. 413-416
Theme: Information systems: DS - Data streams track
- Ricardo Cerri, Joel David Costa Júnior, Elaine R. Faria

, João Gama:
A new self-organizing map based algorithm for multi-label stream classification. 418-426 - Juan Marcelo Parra Ullauri, Antonio García-Domínguez, Juan Boubeta-Puig

, Nelly Bencomo, Guadalupe Ortiz
:
Towards an architecture integrating complex event processing and temporal graphs for service monitoring. 427-435 - Hyunju Kim, Dongman Lee:

ADELA: attention based deep ensemble learning for activity recognition in smart collaborative environments. 436-444
Poster Session: Theme: Information systems: DS - Data streams track: Poster papers
- Shimon Harush, Yair Meidan, Asaf Shabtai:

DeepStream: autoencoder-based stream temporal clustering. 445-448
Theme: Artificial intelligence and agents: EC - Applications of evolutionary computing track
- Hirad Assimi

, Ben Koch, Chris Garcia, Markus Wagner
, Frank Neumann:
Modelling and optimization of run-of-mine stockpile recovery. 450-458 - Tri-Hai Nguyen

, Jason J. Jung:
Inverse pheromone-based decentralized route guidance for connected vehicles. 459-463 - Noman Javed, Fernand Gobet

:
On-the-fly simplification of genetic programming models. 464-471 - Rolando Miragaia, Francisco Fernández de Vega, Gustavo Reis:

Evolving a multi-classifier system with cartesian genetic programming for multi-pitch estimation of polyphonic piano music. 472-480
Theme: System software and security: EMBS - Embedded systems track
- Biruk B. Seyoum

, Marco Pagani
, Alessandro Biondi
, Giorgio C. Buttazzo:
Automating the design flow under dynamic partial reconfiguration for hardware-software co-design in FPGA SoC. 481-490 - Po-Hsuan Huang

, Chia-Heng Tu, Shen-Ming Chung:
TONIC: towards oblivious neural inference compiler. 491-500 - Julius Roeder, Benjamin Rouxel, Sebastian Altmeyer, Clemens Grelck:

Energy-aware scheduling of multi-version tasks on heterogeneous real-time systems. 501-510 - Sergi Vilardell

, Isabel Serra
, Enrico Mezzetti, Jaume Abella
, Francisco J. Cazorla:
MUCH: exploiting pairwise hardware event monitor correlations for improved timing analysis of complex MPSoCs. 511-520 - Camélia Slimani

, Chun-Feng Wu
, Yuan-Hao Chang, Stéphane Rubini, Jalil Boukhobza
:
RaFIO: a random forest I/O-aware algorithm. 521-528
Poster Session: Theme: System software and security: EMBS - Embedded systems track: Poster papers
- Oliver Keszöcze, Marcel Brand, Michael Witterauf, Christian Heidorn, Jürgen Teich:

Aarith: an arbitrary precision number library. 529-534
Theme: Information systems: GIA - GeoInformation analytics track
- Niyi Ogunbiyi, Artie Basukoski, Thierry J. Chaussalet

:
Incorporating spatial context into remaining-time predictive process monitoring. 535-542 - José Duarte

, Mark McKenney:
An algorithm to interpolate concavities. 543-550 - Iraklis Varlamis, Christos Sardianos, Vania Bogorny, Luis Otávio Alvares, Jônata Tyska Carvalho

, Chiara Renso, Raffaele Perego
, John Violos:
A novel similarity measure for multiple aspect trajectory clustering. 551-558 - Margarita Khokhlova, Nathalie Abadie, Valérie Gouet-Brunet, Liming Chen:

Learning embeddings for cross-time geographic areas represented as graphs. 559-568
Theme: Information systems: HI - Health informatics track
- Matteo Mantovani

, Beatrice Amico, Carlo Combi:
Discovering predictive trend-event patterns in temporal clinical data. 570-579 - Xinzhou Xu, Jun Deng, Zixing Zhang, Chen Wu, Björn W. Schuller:

Identifying surgical-mask speech using deep neural networks on low-level aggregation. 580-585 - Carlo Combi, Francesca Galetto, Hirenkumar Chandrakant Nakawala, Giuseppe Pozzi, Francesca Zerbato:

Enriching surgical process models by BPMN extensions for temporal durations. 586-593 - Anna Markella Antoniadi

, Miriam Galvin, Mark Heverin, Orla Hardiman
, Catherine Mooney
:
Development of an explainable clinical decision support system for the prediction of patient quality of life in amyotrophic lateral sclerosis. 594-602 - Haomin Mao

, Shuhei Tsuchida, Yongbeom Kim, Rintaro Kanada, Takayuki Hori, Tsutomu Terada, Masahiko Tsukamoto:
A thermal comfort estimation method by wearable sensors. 603-610 - Milene Santos Teixeira

, Vinícius Maran, Mauro Dragoni:
The interplay of a conversational ontology and AI planning for health dialogue management. 611-619 - Ankit Pal

, Malaikannan Sankarasubbu
:
Pay attention to the cough: early diagnosis of COVID-19 using interpretable symptoms embeddings with cough sound signal processing. 620-628 - Luis H. S. Vogado, Pablo Vieira, Pedro de A. Santos Neto, Lucas A. Lopes, Gleison de Andrade e Silva Silva, Flávio H. D. Araújo, Rodrigo Veras

:
Detection of COVID-19 in chest X-ray images using transfer learning with deep convolutional neural network. 629-636
Poster Session: Theme: Information systems: HI - Health informatics track: Poster papers
- Jonghoon Shin, Junhyung Moon, Beomsik Kim, Jihwan Eom, Noseong Park, Kyoungwoo Lee:

Attention-based stress detection exploiting non-contact monitoring of movement patterns with IR-UWB radar. 637-640
Theme: Information systems: IAR - Information access and retrieval track
- David E. Losada, Matthias Herrmann, David Elsweiler:

Cost-effective identification of on-topic search queries using multi-armed bandits. 645-654 - Javier Parapar, David E. Losada, Álvaro Barreiro

:
Testing the tests: simulation of rankings to compare statistical significance tests in information retrieval evaluation. 655-664 - Alexis Dusart, Karen Pinel-Sauvagnat

, Gilles Hubert:
ISSumSet: a tweet summarization dataset hidden in a TREC track. 665-671 - David Otero

, Javier Parapar, Álvaro Barreiro
:
The wisdom of the rankers: a cost-effective method for building pooled test collections without participant systems. 672-680
Poster Session: Theme: Information systems: IAR - Information access and retrieval track: Poster papers
- Andreas Henrich

, Markus Wegmann:
Search and evaluation methods for class level information retrieval: extended use and evaluation of methods applied in expertise retrieval. 681-684 - Alejandro Moreo, Andrea Pedrotti

, Fabrizio Sebastiani:
Heterogeneous document embeddings for cross-lingual text classification. 685-688
Theme: Information systems: INTOP - Interoperability track
- Jahoon Koo

, Young-Gab Kim
:
Interoperability requirements for a smart city. 690-698 - Aamir Shahzad, Kaiwen Zhang, Abdelouahed Gherbi:

Privacy-preserving smart grid traceability using blockchain over IoT connectivity. 699-706
Poster Session: Theme: Information systems: INTOP - Interoperability track: Poster papers
- Sune Chung Jepsen

, Torben Worm
, Thomas Ingemann Mørk, Jakob Hviid
:
An analysis of asset interoperability for I4.0 middleware. 707-710
Theme: System software and security: IoT - Internet of things track
- Zakaria Maamar

, Mohammed Al-Khafajiy:
Cloud-edge coupling to mitigate execution failures. 711-718 - Olamilekan Fadahunsi, Yuxiang Ma, Muthucumaru Maheswaran:

Edge scheduling framework for real-time and non real-time tasks. 719-728 - Dapeng Lan, Yu Liu, Amir Taherkordi, Frank Eliassen, Stéphane Delbruel

, Lei Liu:
A federated fog-cloud framework for data processing and orchestration: a case study in smart cities. 729-736 - Daichi Koike, Shigemi Ishida, Yutaka Arakawa:

Called function identification of IoT devices by network traffic analysis. 737-743 - Moonyoung Lee, In-Young Ko:

Service consumption planning for efficient service migration in mobile edge computing environments. 744-751 - Dae Young Park, In-Young Ko:

Auto-labeling of sensor data using social media messages: a case study for a smart city. 752-760 - Jacob Marks

, Brandon Montano, Jiwan Chong, Manjusha Raavi, Raisa Islam
, Tomás Cerný, Dongwan Shin:
Differential privacy applied to smart meters: a mapping study. 761-770
Poster Session: Theme: System software and security: IoT - Internet of things track: Poster papers
- Flavia Schneider, Adriano Branco

, Ariane M. B. Rodrigues, Felipe Oliveira Carvalho, Simone D. J. Barbosa, Markus Endler, Hélio Lopes
:
Yet another BLE technology based tracking system. 771-774
Theme: Artificial intelligence and agents: IRMAS - Intelligent robotics and multi-agent systems track
- Shuo Jiang, Christopher Amato

:
Multi-agent reinforcement learning with directed exploration and selective memory reuse. 777-784 - Sarah Brent, Chengzhi Yuan, Paolo Stegagno

:
Cooperative place recognition in robotic swarms. 785-792 - Albano Borba

, Johann Pires, Rafael Molossi Escher, Rodrigo Andrade de Bem
, Paulo Drews Jr.
:
A spatio-temporal exposure correction neural network for autonomous vehicle. 793-800 - Ajay Kattepur, Swarup Kumar Mohalik:

FlatPack: flexible temporal planning with verification and controller synthesis. 801-810
Poster Session: Theme: Artificial intelligence and agents: IRMAS - Intelligent robotics and multi-agent systems track: Poster papers
- Saber Kazeminasab

, Roozbeh Jafari
, M. Katherine Banks:
An LQR-assisted control algorithm for an under-actuated in-pipe robot in water distribution systems. 811-814 - Liyang Wang, Jinxin Zhao, Liangjun Zhang:

NavDog: robotic navigation guide dog via model predictive control and human-robot modeling. 815-818
Theme: Artificial intelligence and agents: KLP - Knowledge and language processing track
- Lisa Meijer, Flavius Frasincar, Maria Mihaela Trusca:

Explaining a neural attention model for aspect-based sentiment classification using diagnostic classification. 821-827 - Tomas Liesting, Flavius Frasincar, Maria Mihaela Trusca:

Data augmentation in a hybrid approach for aspect-based sentiment analysis. 828-835 - Félix Martel, Amal Zouaq:

Taxonomy extraction using knowledge graph embeddings and hierarchical clustering. 836-844 - Tiago Martinho de Barros, Hélio Pedrini, Zanoni Dias:

Leveraging emoji to improve sentiment classification of tweets. 845-852
Poster Session: Theme: Artificial intelligence and agents: KLP - Knowledge and language processing track: Poster papers
- Ritam Mallick, Seba Susan

, Vaibhaw Agrawal, Rizul Garg, Prateek Rawal:
Context- and sequence-aware convolutional recurrent encoder for neural machine translation. 853-856 - Lee-Hsun Hsieh, Yang-Yin Lee, Ee-Peng Lim

:
Structurally enriched entity mention embedding from semi-structured textual content. 857-860
Theme: Artificial intelligence and agents: KRR - Knowledge representation and reasoning track
- Franz Baader

, Francesco Kriegel
, Adrian Nuradiansyah
, Rafael Peñaloza:
Safety of quantified ABoxes w.r.t. singleton εL policies. 863-872 - Atefeh Keshavarzi Zafarghandi, Rineke Verbrugge, Bart Verheij

:
Strong admissibility for abstract dialectical frameworks. 873-880 - Igor Stéphan:

First-order ASP programs as CHR programs. 881-888
Poster Session: Theme: Artificial intelligence and agents: KRR - Knowledge representation and reasoning track: Poster papers
- Jonas Haldimann, Kai Sauerwald, Martin von Berg, Gabriele Kern-Isberner, Christoph Beierle:

Towards a framework of hansson's descriptor revision for conditionals. 889-891
Theme: Distributed systems: MCA - Mobile computing and applications track
- Assad Maalouf, Lunjin Lu:

Taint analysis of arrays in Android applications. 893-899 - William Janoti, Paulo Ferreira:

detectBiklio: detecting bicycle usage with a smartphone app. 900-907
Poster Session: Theme: Distributed systems: MCA - Mobile computing and applications track: Poster papers
- Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil:

App2SecApp: privacy protection from Android applications. 908-911 - Vincent Lombardi, Sarah Ortiz, Jen Phifer, Tomás Cerný, Dongwan Shin:

Behavior control-based approach to influencing user's cybersecurity actions using mobile news app. 912-915
Theme: Artificial intelligence and agents: MLA - Machine learning and its applications track
- Natalia Khuri, Anish Prasanna:

Using game theory to guide the classification of inhibitors of human iodide transporters. 916-923 - Hao Huang, Chenxiao Xu, Shinjae Yoo

:
Interpretable temporal GANs for industrial imbalanced multivariate time series simulation and classification. 924-933 - Tiago Boechel, Lucas Micol Policarpo, Gabriel de Oliveira Ramos, Rodrigo da Rosa Righi:

Fuzzy time series for predicting phenological stages of apple trees. 934-941 - Sujin Park, Sangwon Lee, Simon S. Woo:

BertLoc: duplicate location record detection in a large-scale location dataset. 942-951 - Alsharif Abuadbba

, Hyoungshick Kim, Surya Nepal
:
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN. 952-959 - Vedang Mandhana, Toshal Agrawal, Ashish Sardana:

NDNet: natural deformation of apparel for better virtual try-on experience. 960-966 - Sean-Kelly Palicki, Shereen Fouad, Mariam Adedoyin-Olowe

, Zahraa S. Abdallah
:
Transfer learning approach for detecting psychological distress in brexit tweets. 967-975 - Yiqi Wang, Jiawen Li, Yabing Zhang, Richard O. Sinnott:

Identifying lameness in horses through deep learning. 976-985 - Young Min Seo, Yong Suk Choi:

Graph convolutional networks for skeleton-based action recognition with LSTM using tool-information. 986-993 - Marzieh Karimi-Haghighi, Carlos Castillo:

Efficiency and fairness in recurring data-driven risk assessments of violent recidivism. 994-1002 - Elton Alves Trindade, Mauro Roisenberg:

Multi-view 3D seismic facies classifier. 1003-1011 - Chunghyeon Cho, Yong Suk Choi:

Dependency tree positional encoding method for relation extraction. 1012-1020 - Hério Sousa, Marcilio C. P. de Souto, Reginaldo Massanobu Kuroshu, Ana Carolina Lorena:

Automatic recovering the number k of clusters in the data by active query selection. 1021-1029 - Khuong Vo

, Emad Kasaeyan Naeini, Amir Naderi, Daniel Jilani
, Amir M. Rahmani
, Nikil D. Dutt, Hung Cao:
P2E-WGAN: ECG waveform synthesis from PPG with conditional wasserstein generative adversarial networks. 1030-1036 - Jong-Hyeok Choi

, Jae-Jun Lee, Aziz Nasridinov
:
Dance self-learning application and its dance pose evaluations. 1037-1045 - Antonio Marsella, Gaurvi Goyal

, Francesca Odone:
Adversarial feature refinement for cross-view action recognition. 1046-1054 - Min-Sub Won, YunSeok Choi, Samuel Kim, CheolWon Na, Jee-Hyong Lee:

An embedding method for unseen words considering contextual information and morphological information. 1055-1062 - Lucas Z. Bissaro, Yaochu Jin, Murillo G. Carneiro

:
Regular echo state networks: simple and accurate reservoir models to real-world applications. 1063-1069 - Hela Haj Mohamed

, Samir Belaid
, Wady Naanaa, Lotfi Ben Romdhane
:
Deep sparse dictionary-based representation for 3D non-rigid shape retrieval. 1070-1077
Poster Session: Theme: Artificial intelligence and agents: MLA - Machine learning and its applications track: Poster papers
- Sagy Tuval, Bracha Shapira

:
The next best question: a lazy, anytime framework for adaptive feature acquisition. 1078-1081 - Wan D. Bae, Shayma Alkobaisi

, Matthew Horak, Sungroul Kim, Choon-Sik Park, Mark Chesney:
A study of the effectiveness of transfer learning in individualized asthma risk prediction. 1082-1085 - Tianen Liu, Natalia Khuri:

Classification of drug prescribing information using long short-term memory networks. 1086-1089 - Ji-Eun Jeong, Yong Suk Choi:

Depth-enhanced gaze following method. 1090-1093 - Jinuk Park, Chanhee Park, Hongchan Roh, Sanghyun Park:

ARMemNet: autoregressive memory networks for multivariate time series forecasting. 1094-1097 - Paolo Zicari

, Gianluigi Folino, Massimo Guarascio
, Luigi Pontieri:
Discovering accurate deep learning based predictive models for automatic customer support ticket classification. 1098-1101 - Amin Aminifar

, Fazle Rabbi
, Ka I Pun
, Yngve Lamo
:
Privacy preserving distributed extremely randomized trees. 1102-1105 - Mateus C. Silva

, Andrea G. C. Bianchi
, Sérvio Pontes Ribeiro
, Ricardo A. R. Oliveira
:
Leaf shape reconstruction and damage estimation using a U-net-based conditional GAN. 1106-1109
Theme: Distributed systems: NET - Networking track
- David Richardson, Arshad Jhumka, Luca Mottola:

Protocol transformation for transiently powered wireless sensor networks. 1112-1121 - Douglas Braz Maciel, Emidio Paiva, Kevin B. Costa, Mathews P. S. Lima, Vitor Lopes, Augusto Neto, Felipe Sampaio Dantas da Silva, Silvio Sampaio:

A wifi-slicing MANO solution to enable elastic wifi-sharing communication service end-to-end provision. 1122-1129 - Sungwoong Yeom, Chulwoong Choi, Kyungbaek Kim

:
Source-side DoS attack detection with LSTM and seasonality embedding. 1130-1137 - Moubarak Zoure, Toufik Ahmed, Laurent Réveillère:

VeriNeS: runtime verification of outsourced network services orchestration. 1138-1146
Theme: System software and security: OS - Operating systems track
- Qichen Chen, Hyerin Chung, Yongseok Son, Yoonhee Kim, Heon Young Yeom:

smCompactor: a workload-aware fine-grained resource management framework for GPGPUs. 1147-1155 - Min-Gyo Jung, Chang-Gyu Lee

, DongGyu Park, Sungyong Park, Jungki Noh, Woosuk Chung, Kyoung Park, Youngjae Kim:
GPUKV: an integrated framework with KVSSD and GPU through P2P communication support. 1156-1164 - Daniel-Ilie Sirbu, Catalin Negru

, Florin Pop, Christian Esposito:
Storage service for edge computing. 1165-1171 - Chang-Gyu Lee

, Sunghyun Noh, Hyeongu Kang, Soon Hwang, Youngjae Kim:
Concurrent file metadata structure using readers-writer lock. 1172-1181 - Kun Suo, Yong Shi, Chih-Cheng Hung, Patrick Bobbie:

Quantifying context switch overhead of artificial intelligence workloads on the cloud and edges. 1182-1189 - Emmanuel Podestá Junior, Pedro Henrique Penna, João Fellipe Uller, Márcio Castro:

A trace-driven methodology to evaluate and optimize memory management services of distributed operating systems for lightweight manycores. 1190-1198
Poster Session: Theme: System software and security: OS - Operating systems track: Poster papers
- Hwajung Kim, Inhwi Hwang, Heon Y. Yeom:

Efficient and robust data integrity verification scheme for high-performance storage devices. 1199-1202 - Yunji Kang, Dongkun Shin:

mStream: stream management for mobile file system using Android file contexts. 1203-1208
Theme: System software and security: PDP - Privacy by design in practice track
- Julio C. Caiza

, José M. del Álamo, Danny S. Guamán
, Angel Jaramillo-Alcázar
:
An exploratory experiment on privacy patterns: limitations and possibilities. 1209-1216 - Ala'a Al-Momani, Kim Wuyts

, Laurens Sion
, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch
:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. 1217-1225 - Echo Meißner

, Felix Engelmann, Frank Kargl, Benjamin Erb:
PeQES: a platform for privacy-enhanced quantitative empirical studies. 1226-1234 - Borce Stojkovski

, Gabriele Lenzini, Vincent Koenig:
"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default. 1235-1246
Theme: System software and security: PL - Programming languages track
- Khady Fall, Eugene Syriani:

Evolving domain-specific languages depending on external libraries. 1247-1255 - Katsumi Okuda

, Shigeru Chiba:
Domain-specific programming assistance in an embedded DSL for generating processor emulators. 1256-1264 - Yoonseok Ko, Tamara Rezk, Manuel Serrano:

SecureJS compiler: portable memory isolation in JavaScript. 1265-1274
Poster Session: Theme: System software and security: PL - Programming languages track: Poster papers
- Jens Gustedt

, Robert C. Seacord
:
C language mechanism for error handling and deferred cleanup. 1275-1277 - Bogdan Aman

, Gabriel Ciobanu
:
Computation with cells enhanced by costs. 1278-1280
Theme: Software design and development: QASM - Quality assurance and software mining track
- Richard Lipka:

A method for the automated generating of the code-coverage ensuring input test data based on the control flow analysis. 1281-1288 - Amanda Santana, Daniel Cruz, Eduardo Figueiredo:

An exploratory study on the identification and evaluation of bad smell agglomerations. 1289-1297 - Mark Fuller, Elizabeth Brighton, Micah Schiewe, Dipta Das, Tomás Cerný, Pavel Tisnovsky:

Automated error log resolution: a case study. 1298-1304
Poster Session: Theme: Software design and development: QASM - Quality assurance and software mining track: Poster papers
- Tomas Potuzak

, Richard Lipka:
Algorithm for generation of complex test data for interface-based regression testing of software components. 1305-1311
Theme: Software design and development: RE - Requirements engineering track
- Kushagra Bhatia, Arpit Sharma:

Sector classification for crowd-based software requirements. 1312-1320 - Adailton Ferreira de Araújo, Ricardo Marcondes Marcacini

:
RE-BERT: automatic extraction of software requirements from app reviews using BERT language model. 1321-1327 - Huma Samin

, Luis Hernán García Paucar
, Nelly Bencomo, Peter Sawyer:
Towards priority-awareness in autonomous intelligent systems. 1328-1337 - Lauriane Pereira, Rafael Parizi, Matheus Prestes, Sabrina Marczak, Tayana Conte:

Towards an understanding of benefits and challenges in the use of design thinking in requirements engineering. 1338-1345 - Tomás Vera, Sergio F. Ochoa, Daniel Perovich:

Requirements engineering in the pre-contract stage: exploring the processes and practices used in small and medium-sized software enterprises. 1346-1353
Poster Session: Theme: Software design and development: RE - Requirements engineering track: Poster papers
- Yinghao Zhi, Tong Li, Zhen Yang:

Extracting features from app descriptions based on POS and dependency. 1354-1358
Theme: System software and security: RS - Recommender systems: Theory and applications track
- Vito Walter Anelli

, Yashar Deldjoo
, Tommaso Di Noia, Antonio Ferrara
, Fedelucio Narducci:
How to put users in control of their data in federated top-N recommendation with learning to rank. 1359-1362 - Giovanni Gabbolini, Edoardo D'Amico, Cesare Bernardis, Paolo Cremonesi:

On the instability of embeddings for recommender systems: the case of matrix factorization. 1363-1370 - Qian Zhang, Masahiro Sato, Sho Takemori, Tomoko Ohkuma:

Incorporating multi-level positive feedback to session-based nearest-neighbor. 1371-1374 - Andrea Iovine, Pasquale Lops, Fedelucio Narducci, Marco de Gemmis, Giovanni Semeraro:

Improving preference elicitation in a conversational recommender system with active learning strategies. 1375-1382
Poster Session: Theme: System software and security: RS - Recommender systems: Theory and applications track: Poster papers
- Rodrigo Borges

, Kostas Stefanidis
:
On mitigating popularity bias in recommendations via variational autoencoders. 1383-1389
Theme: Software design and development: SATTA - Software architecture: Theory, technology, and applications track
- Su Yen Chia, Xiwei Xu, Hye-Young Paik, Liming Zhu:

Analysing and extending privacy patterns with architectural context. 1390-1398 - Pedro Henrique Dias Valle

, Lina Garcés
, Elisa Yumi Nakagawa:
Architectural strategies for interoperability of software-intensive systems: practitioners' perspective. 1399-1408 - Miguel A. Brito

, Jácome Cunha
, João Saraiva
:
Identification of microservices from monolithic applications through topic modelling. 1409-1418 - Antoine El-Hokayem, Marius Bozga, Joseph Sifakis:

A temporal configuration logic for dynamic reconfigurable systems. 1419-1428 - Chaima Chekhaba, Hocine Rebatchi, Ghizlane El-Boussaidi, Naouel Moha, Sègla Kpodjedo:

Coach: classification-based architectural patterns detection in Android apps. 1429-1438
Poster Session: Theme: Software design and development: SATTA - Software architecture: Theory, technology, and applications track: Poster papers
- Zipani Tom Sinkala, Sebastian Herold

:
InMap: automated interactive code-to-architecture mapping. 1439-1442 - Jamal El Hachem, Elena Lisova, Aida Causevic:

Securing system-of-systems through a game theory approach. 1443-1446
Theme: Software design and development: SE - Software engineering track
- Kunsong Zhao, Zhou Xu, Meng Yan

, Yutian Tang
, Ming Fan, Gemma Catolino:
Just-in-time defect prediction for Android apps via imbalanced deep learning model. 1447-1454 - Seyedrebvar Hosseini, Burak Turhan

:
A comparison of similarity based instance selection methods for cross project defect prediction. 1455-1464 - Mouna Hammoudi, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed:

On the effect of incompleteness to check requirement-to-method traces. 1465-1474 - Manuel Silva, Arthur Silva Freire, Mirko Perkusich

, Danyllo Albuquerque, Everton Guimarães, Angelo Hyggo Almeida, Kyller Gorgônio Perkusich
:
Measuring Agile teamwork: a comparative analysis between two models. 1475-1483 - Xiao Chen

, Wanli Chen, Kui Liu
, Chunyang Chen, Li Li
:
A comparative study of smartphone and smartwatch apps. 1484-1493 - Francesco Basciani, Daniele Di Pompeo

, Davide Di Ruscio
, Ludovico Iovino
, Alfonso Pierantonio:
Integrating semantic reasoning in information loss-based transformation chain rankers. 1494-1503 - Konrad Schneid, Herbert Kuchen, Sebastian Thöne, Sascha Di Bernardo:

Uncovering data-flow anomalies in BPMN-based process-driven applications. 1504-1512 - Azeem Ahmad, Ola Leifler, Kristian Sandahl:

Software professionals' information needs in continuous integration and delivery. 1513-1520 - Foivos Tsimpourlas, Ajitha Rajan, Miltiadis Allamanis:

Supervised learning over test executions as a test oracle. 1521-1531 - Shinji Hoshino, Yoshitaka Arahori, Katsuhiko Gondow:

STRAB: state recovery using reverse execution at IR level for concurrent programs. 1532-1541 - Fabio Ferreira

, Luciana Lourdes Silva, Marco Túlio Valente
:
Software engineering meets deep learning: a mapping study. 1542-1549 - Pedro Miranda, João Pascoal Faria

, Filipe Figueiredo Correia
, Ahmed Fares
, Ricardo Graça, João Mendes Moreira:
An analysis of Monte Carlo simulations for forecasting software projects. 1550-1558 - Guillaume Brau, Mohammed Foughali:

Contract-based verification of model transformations: a formally founded approach. 1559-1568
Poster Session: Theme: Software design and development: SE - Software engineering track: Poster papers
- Igor Muzetti Pereira, Tiago G. S. Carneiro, Eduardo Figueiredo:

A systematic review on the use of DevOps in internet of things software systems. 1569-1571 - Michael Alexander Tröls, Atif Mashkoor, Alexander Egyed:

Instant distribution of consistency-relevant change information in a hierarchical multi-developer engineering environment. 1572-1575 - Weifeng Sun, Rubing Huang, Chenhui Cui

, Haibo Chen, Weijie Liu:
Which type of exclusion region is better for restricted random testing?: an empirical study. 1576-1579 - Abderraouf Gattal, Abir Hammache, Nabila Bousbia, Adel Nassim Henniche:

Exploiting the progress of OO refactoring tools with Android code smells: RAndroid, a plugin for Android studio. 1580-1583 - Xiaoqi Li

, Ting Chen, Xiapu Luo, Chenxu Wang:
CLUE: towards discovering locked cryptocurrencies in ethereum. 1584-1587
Theme: System software and security: SEC - Computer security track
- Wissam Aoudi, Nasser Nowdehi, Magnus Almgren

, Tomas Olovsson:
Spectra: detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloads. 1588-1597 - Pierre Graux

, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
Preventing serialization vulnerabilities through transient field detection. 1598-1606 - Valeh Farzaliyev

, Kristjan Krips, Jan Willemson
:
Developing a Personal Voting Machine for the Estonian Internet Voting System. 1607-1616 - Andrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin:

Branchboozle: a side-channel within a hidden pattern history table of modern branch prediction units. 1617-1625 - Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz, Engin Kirda:

Preventing server-side request forgery attacks. 1626-1635 - Maxime Bélair, Sylvie Laniepce, Jean-Marc Menaud:

SNAPPY: programmable kernel-level policies for containers. 1636-1645 - Mohsen Toorani

, Christian Gehrmann:
A decentralized dynamic PKI based on blockchain. 1646-1655 - Beomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong

:
FUMVar: a practical framework for generating fully-working and unseen malware variants. 1656-1663 - Almuthanna Alageel

, Sergio Maffeis
:
Hawk-Eye: holistic detection of APT command and control domains. 1664-1673 - Reo Kawasoe, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, Jun'ichi Takeuchi:

Investigating behavioral differences between IoT malware via function call sequence graphs. 1674-1682
Poster Session: Theme: System software and security: SEC - Computer security track: Poster papers
- Maliheh Shirvanian, Christopher Robert Price

, Mohammed Jubur
, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. 1683-1686 - Rishi Rabheru, Hazim Hanif

, Sergio Maffeis
:
DeepTective: detection of PHP vulnerabilities using hybrid graph neural networks. 1687-1690 - Francesco Buccafurri, Vincenzo De Angelis

, Cecilia Labrini:
Integrity guarantees over highly dynamic outsourced map data. 1691-1696
Theme: Information systems: SONAMA - Social network and media analysis track
- Mingliang Hou, Lei Wang, Jiaying Liu, Xiangjie Kong, Feng Xia:

A3Graph: adversarial attributed autoencoder for graph representation learning. 1697-1704 - Márcio Silva

, Fabrício Benevenuto
:
COVID-19 ads as political weapon. 1705-1710 - Hernan Sarmiento, Barbara Poblete

:
Crisis communication: a comparative study of communication patterns across crisis events in social media. 1711-1720
Poster Session: Theme: Information systems: SONAMA - Social network and media analysis track: Poster papers
- Maura Cerioli, Maurizio Leotta

, Filippo Ricca:
COVID-19 hits the job market: an 88 million job ads analysis. 1721-1726
Theme: System software and security: SP - Software platforms track
- Niko Mäkitalo

, Victor Bankowski, Paulius Daubaris
, Risto Mikkola, Oleg Beletski, Tommi Mikkonen
:
Bringing WebAssembly up to speed with dynamic linking. 1727-1735 - Johan Aronsson, Philip Lu, Daniel Strüber, Thorsten Berger:

A maturity assessment framework for conversational AI development platforms. 1736-1745
Poster Session: Theme: System software and security: SP - Software platforms track: Poster papers
- Mirko Koscina, Marius Lombard-Platet, Claudia Negri-Ribalta

:
A blockchain-based marketplace platform for circular economy. 1746-1749
Theme: Software design and development: SVT - Software verification and testing track
- Md. Rafiqul Islam Rabin

, Mohammad Amin Alipour
:
Configuring test generators using bug reports: a case study of GCC compiler and Csmith. 1750-1758 - Susmoy Das

, Arpit Sharma:
Embeddings between state and action labeled probabilistic systems. 1759-1767 - Ena Tominaga, Yoshitaka Arahori, Katsuhiko Gondow:

DiverJS: path exploration heuristic for difference analysis of event-driven code. 1768-1777 - Hendrik Winkelmann

, Herbert Kuchen:
Symbolic execution of NoSQL applications using versioned schemas. 1778-1787 - Pedro Antonino

, A. W. Roscoe:
Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling. 1788-1797 - Ernst Moritz Hahn, Arnd Hartmanns:

Symblicit exploration and elimination for probabilistic model checking. 1798-1806 - Abhishek Singh, Meenakshi D'Souza, Arshad Ebrahim:

Conformance testing of ARINC 653 compliance for a safety critical RTOS using UPPAAL model checker. 1807-1814 - Erwan Mahe

, Boutheina Bannour
, Christophe Gaston
, Arnault Lapitre
, Pascale Le Gall
:
A small-step approach to multi-trace checking against interactions. 1815-1822 - Nima Dini, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:

Enhancing constraint-based repair of data structure errors that recur using memoization. 1823-1832
Poster Session: Theme: Software design and development: SVT - Software verification and testing track: Poster papers
- Kun Xie, Sylvain Hallé:

Offline monitoring of LTL with bit vectors. 1833-1836 - Abhinandan Panda, Srinivas Pinisetty, Partha S. Roop, K. Ajay Babu, M. Sabarimalai Manikandan

:
Runtime verification of implantable medical devices using multiple physiological signals. 1837-1840 - Nikhila K. N.

, Sujit Kumar Chakrabarti
, Manish Gupta:
Discovering multiple design approaches in programming assignment submissions. 1841-1845
Theme: Software design and development: SWA - Semantic web and applications track
- Lavdim Halilaj, Jürgen Lüttin

, Susanne Rothermel, Santhosh Kumar Arumugam, Ishan Dindorkar:
Towards a knowledge graph-based approach for context-aware points-of-interest recommendations. 1846-1854 - Oleksandra Vsesviatska, Tabea Tietz, Fabian Hoppe

, Mirjam Sprau, Nils Meyer, Danilo Dessì, Harald Sack
:
ArDO: an ontology to describe the dynamics of multimedia archival records. 1855-1863 - Mersedeh Sadeghi

, Luca Sartor, Matteo G. Rossi:
A semantic-based access control mechanism for distributed systems. 1864-1873 - Jaydeep Chakraborty, Srividya K. Bansal, Luca Virgili

, Krishanu Konar, Beyza Yaman
:
OntoConnect: unsupervised ontology alignment with recursive neural network. 1874-1882
Poster Session: Theme: Software design and development: SWA - Semantic web and applications track: Poster papers
- María Granados Buey

, Carlos Bobed
, Jorge Gracia, Eduardo Mena:
A domain independent semantic measure for keyword sense disambiguation. 1883-1886 - Alexander Pinto-De la Gala

, Yudith Cardinale, Irvin Dongo
, Regina P. Ticona-Herrera
:
Towards an ontology for urban tourism. 1887-1890
Theme: Distributed systems: WCN - Selected areas of wireless communications and networking track
- Ghulam Nabi Ahmad Hassan Yar

, Abu-Bakar Noor-ul-Hassan, Hanzla Siddiqui:
Real-time shallow water image retrieval and enhancement for low-cost unmanned underwater vehicle using Raspberry Pi. 1891-1899 - Muhammad Toaha Raza Khan, Malik Muhammad Saad

, Junho Seo, Syed Hassan Ahmed
, Dongkyun Kim:
Reliable interest forwarding strategy for underwater vehicular NDN. 1900-1905 - Junaid Akram

, Arslan Javed, Sikander Khan, Awais Akram, Hafiz Suliman Munawar, Waqas Ahmad:
Swarm intelligence based localization in wireless sensor networks. 1906-1914 - Vially Kazadi Mutombo

, Sung Y. Shin, Jiman Hong:
EBR-RL: energy balancing routing protocol based on reinforcement learning for WSN. 1915-1920 - Talha Ahmed Khan, Muhammad Afaq

, Khizar Abbas
, Wang-Cheol Song:
Intent-based networking platform: an automated approach for policy and configuration of next-generation networks. 1921-1930
Theme: Distributed systems: WT - Web technologies track
- Tatev Karen Aslanyan, Flavius Frasincar:

Utilizing textual reviews in latent factor models for recommender systems. 1931-1940 - Javedul Ferdous

, Sami Uddin, Vikas Ashok
:
Semantic table-of-contents for efficient web screen reading. 1941-1949
Poster Session: Theme: Distributed systems: WT - Web technologies track: Poster papers
- Echo Meißner

, Frank Kargl, Benjamin Erb:
WAIT: protecting the integrity of web applications with binary-equivalent transparency. 1950-1953

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














