


default search action
39th SAC 2024: Avila, Spain
- Jiman Hong, Juw Won Park:
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, SAC 2024, Avila, Spain, April 8-12, 2024. ACM 2024
Theme: Artificial Intelligence and Agents: AIED - Artificial Intelligence for Education Track
- Ville Heilala
, Sami Lehesvuori
, Raija Hämäläinen
, Tommi Kärkkäinen
:
Toward Scalable and Transparent Multimodal Analytics to Study Standard Medical Procedures: Linking Hand Movement, Proximity, and Gaze Data. 3-10 - Marco Kragten
, Bert Bredeweg
:
The effectiveness of lightweight automated support for learning about dynamic systems with qualitative representations. 11-20 - Zheng Fang
, Jaeyoung Han
, Ahmad Ari Aldino
, Zhijie Feng
, Toby Cai
:
Decoding the Naturally Arisen Leadership in Collaborative Learning: A Bayesian Simulation and Human Network Study. 21-28 - Daeyoung Roh
, Donghee Han
, Daehee Kim
, Keejun Han
, Mun Yong Yi
:
SIG-Net: GNN based dropout prediction in MOOCs using Student Interaction Graph. 29-37 - Priti Oli
, Rabin Banjade
, Arun Balajiee Lekshmi Narayanan
, Peter Brusilovsky
, Vasile Rus
:
Exploring The Effectiveness of Reading vs. Tutoring For Enhancing Code Comprehension For Novices. 38-47 - Javier Conde
, Sonsoles López-Pernas
, Enrique Barra
, Mohammed Saqr
:
The Temporal Dynamics of Procrastination and its Impact on Academic Performance: The Case of a Task-oriented Programming Course. 48-55 - Mirka Saarela
:
On the relation of causality- versus correlation-based feature selection on model fairness. 56-64 - Van Long Phuoc Pham
, Duc Anh Vu, Nhat Minh Hoang
, Xuan Long Do
, Anh Tuan Luu
:
ChatGPT as a Math Questioner? Evaluating ChatGPT on Generating Pre-university Math Questions. 65-73 - Mohammed Ahmed Taiye
, Christopher High
, Johanna Velander
, Khaled Matar
, Rihards Okmanis
, Marcelo Milrad
:
Generative AI-Enhanced Academic Writing: A Stakeholder-Centric Approach for the Design and Development of CHAT4ISP-AI. 74-80 - Jean-Charles Layoun
, Amal Zouaq
, Michel C. Desmarais
:
Contextual Embeddings and Graph Convolutional Networks for Concept Prerequisite Learning. 81-90 - Hasan Jamil
:
Equity and Fairness Challenges in Online Learning in the Age of ChatGPT. 91-92 - Manuel J. Gomez
, Álvaro Armada Sánchez
, Mariano Albaladejo-González
, Félix J. García Clemente
, José A. Ruipérez-Valiente
:
Utilizing Explainable AI to Enhance Real-time Student Performance Prediction in Educational Serious Games. 93-94 - Sai Siddartha Maram
, Jennifer Villareale
, Jichen Zhu
, Magy Seif El-Nasr
:
Open Player Modeling - Using AI to help Reflection and Learning in Serious Games. 95-97 - Sai Siddartha Maram
, Anna Amato
, Giovanni Maria Troiano
, Steven C. Sutherland
, Camillia Matuk
, Edward F. Melcer
, Elín Carstensdóttir
, Casper Harteveld
, Magy Seif El-Nasr
:
An Instructor's Lens into the Role of AI in Teaching Experimental Research via Gamification. 98-100 - Mohammad Hassany
, Jiaze Ke
, Peter Brusilovsky
, Arun Balajiee Lekshmi Narayanan
, Kamil Akhuseyinoglu
:
Authoring Worked Examples for JAVA Programming with Human AI Collaboration. 101-103 - Moumena Salah Yassen
, Víctor Sánchez-Anguix, Juan M. Alberola
, Fulgencia Villa
:
An Integer Linear Programming Model Based on Competences for Student-Industry Placement Allocation. 104-105 - Stephen J. Aguilar
, Changzhao Wang
:
Duty vs. Consequence: Exploring Teachers' Assessment of the Ethical Dimensions of Generative AI Technologies. 106-108
Theme: Distributed Systems: CC - Cloud Computing Track
- Marwan Adnan Darwish
, Georgios Smaragdakis
:
Disjunctive Multi-Level Digital Forgetting Scheme. 112-121 - Rabimba Karanjai
, Lei Xu
, Lin Chen
, Nour Diallo
, Weidong Shi
:
Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications. 122-130 - Manish Pandey
, Young-Woo Kwon
:
FuncMem: Reducing Cold Start Latency in Serverless Computing Through Memory Prediction and Adaptive Task Execution. 131-138 - Priyanka Singh
, Jash Rathi
, Priyankaben Babulal Patel
:
SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption. 139-141
Theme: System Software and Security: CPS - Cyber-Physical Systems Track
- Gareth Callanan
, Flavius Gruian
:
Hardware and Software Generation from Large Actor Machines in Streaming Applications. 142-150 - Marina Luísa de Souza Carrasco Vieira
, Marina De Lara
, Marcelo Eduardo Pellenz
, Mauricio Biczkowski
, Marcos Alberto Mochinski
, Fabrício Enembreck
, Edgard Jamhour
, Voldi Costa Zambenedetti
:
Satellite Imagery-Assisted Link-Budget Analysis Algorithm for Smart Grid Wireless Backhaul Network Planning. 151-158 - Donghwa Kang
, Kilho Lee
, Cheol-Ho Hong
, Youngmoon Lee
, Jinkyu Lee
, Hyeongboo Baek
:
MOT-AS: Real-Time Scheduling Framework for Multi-Object Tracking Capturing Accuracy and Stability. 159-168 - Jinheng Li
, Qiao Li
, Hu Wan
, Chun Jason Xue
:
Binary Folding Compression for Efficient Software Distribution. 169-176 - Gabriele Oligeri
, Savio Sciancalepore
, Alireza Sadighian:
SatPrint: Satellite Link Fingerprinting. 177-185 - Jesse Reimann
, Nico Mansion
, James Haydon
, Benjamin Bray
, Agnishom Chattopadhyay
, Sota Sato
, Masaki Waga
, Étienne André
, Ichiro Hasuo
, Naoki Ueda
, Yosuke Yokoyama
:
Temporal Logic Formalisation of ISO 34502 Critical Scenarios: Modular Construction with the RSS Safety Distance. 186-195 - Yi-Syuan Lin
, Yu-Pei Liang
, Yuan-Hao Chang
, Wei-Kuan Shih
, Wen Sheng Lim
:
Bridging DNA Storage and Computation: An Integrated Framework for Efficient Biomolecular Data Management. 196-203 - Kavya Balasubramanian
, Adithya Gowda Baragur
, Denis Donadel
, Dinuka Sahabandu
, Alessandro Brighente
, Bhaskar Ramasubramanian
, Mauro Conti
, Radha Poovendran
:
CANLP: NLP-Based Intrusion Detection System for CAN. 212-214 - Marco De Vincenzi
, Chiara Bodei
, Ilaria Matteucci
:
OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication. 215-217 - Himanshu Choudhary
, Marwan Hassani
:
Autoencoder-based Continual Outlier Correlation Detection for Real-Time Traffic Flow Prediction. 218-220 - Silvio Barra
, Mirko Marras
, Sondos Mohamed
, Alessandro Sebastian Podda
, Roberto Saia
:
Investigating the Effectiveness of 3D Monocular Object Detection Methods for Roadside Scenarios. 221-223
Theme: Distributed Systems: DADS - Dependable, Adaptive, and Secure Distributed Systems Track
- Pedro Camponês
, Henrique Domingos
:
Dynamic Optimization of the Latency Throughput Trade-off in Parallel Chain Distributed Ledgers. 226-234 - Sebastian Schmid
, Andreas Harth
:
Enabling Adaptation in Dynamic Manufacturing Environments with Decentralized Agent-Based Systems and Local Perception. 235-242 - Peterson Yuhala
, Jämes Ménétrey
, Pascal Felber
, Marcelo Pasin
, Valerio Schiavoni
:
Fortress: Securing IoT Peripherals with Trusted Execution Environments. 243-250 - Anshuman Misra
, Ajay D. Kshemkalyani
:
Solvability of Byzantine Fault-Tolerant Causal Ordering: Synchronous Systems Case. 251-256 - Willi Brekenfelder
, Tom Reincke
, Helge Parzyjegla
, Peter Danielis
, Omer Hanif Khan
, Gero Mühl
:
On the Reliability of Time-Sensitive Network Infrastructures. 257-258
Theme: Distributed Systems: DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies Track
- Daiki Ito
, Yuta Takata
, Keika Mori
, Ryoya Furukawa
, Hiroshi Kumagai
, Masaki Kamizono
:
Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization. 259-268 - Elitsa Pankovska
, Ashish Rajendra Sai
, Harald Vranken
, Alan Ransil
:
Electricity Consumption of Ethereum and Filecoin: Advances in Models and Estimates. 269-277 - Iván Abellán Álvarez
, Vincent Gramlich
, Johannes Sedlmeir
:
Unsealing the secrets of blockchain consensus: A systematic comparison of the formal security of proof-of-work and proof-of-stake. 278-287 - Burak Öz
, Filip Rezabek
, Jonas Gebele
, Felix Hoops
, Florian Matthes
:
A Study of MEV Extraction Techniques on a First-Come-First-Served Blockchain. 288-297 - Moritz Rosar
, Kun-Ta Chuang
:
Using Blockchain for Incentive-Driven FHIR-based Health Record Exchange. 298-299 - Bangjie Zhu
, Jiaqi Yin
, Sini Chen
, Huibiao Zhu
:
Formalization and Verification of Delegate Contract Signing Mechanism Based on Smart Contract Using CSP. 300-304
Theme: Information Systems: DBDM - Databases and Big Data Management Track
- Kallol Naha
, Hasan Jamil
:
A Declarative Query Language Enabled Autonomous Deep Web Search Engine. 305-312 - André Luiz Firmino Alves
, Cláudio de Souza Baptista
, Luciano Barbosa
, Clecio B. M. Araujo
:
Cross-Lingual Learning Strategies for Improving Product Matching Quality. 313-320 - Igor A. R. Eleutério, Mirela T. Cazzolato
, Larissa Roberta Teixeira
, Marco Antonio Gutierrez
, Agma Juci Machado Traina
, Caetano Traina
:
MIGUE-Sim: Speeding Up Similarity Queries with Native RDBMS Resources. 321-328 - Dildar Ali
, Suman Banerjee
, Yamuna Prasad
:
Regret Minimization in Billboard Advertisement under Zonal Influence Constraint. 329-336 - Ala Eddine Laouir
, Abdessamad Imine
:
DiApprox: Differential Privacy-based Online Range Queries Approximation for Multidimensional Data. 337-344 - Justin Schoenit
, Seth Akins
, Ramon Lawrence
:
EmbedDB: A High-Performance Database for Resource-Constrained Embedded Systems Too Small for SQLite. 345-346 - Jáchym Bártík
, Pavel Koupil
, Irena Holubová
:
Modelling and Evolution Management of Multi-Model Data. 347-350
Theme: Information Systems: DS - Data Streams Track
- Daniel Nowak Assis
, Jean Paul Barddal
, Fabrício Enembreck
:
Just Change on Change: Adaptive Splitting Time for Decision Trees in Data Stream Classification. 351-357 - Narjes Davari
, Bruno Veloso
, Rita Paula Ribeiro
, João Manuel Portela da Gama
:
Detecting and Explaining Anomalies in the Air Production Unit of a Train. 358-364 - Thiago Andrade
, João Gama:
Where Do We Go From Here? Location Prediction from Time-Evolving Markov Models. 365-367 - Christofer Fellicious
, Sahib Julka
, Lorenz Wendlinger
, Michael Granitzer
:
DriftGAN: Using historical data for Unsupervised Recurring Drift Detection. 368-369
Theme: Artificial Intelligence and Agents: EC - Applications of Evolutionary Computing Track
- Tossapol Pomsuwan
, Alex Alves Freitas
:
A Genetic Algorithm-based Auto-ML System for Survival Analysis. 370-377 - Antônio Augusto Chaves, José Fernando Gonçalves
, Rudinei M. Oliveira
, Luiz Antonio Nogueira Lorena
:
An adaptive biased random-key genetic algorithm for the tactical berth allocation problem. 378-385 - David Gutiérrez-Avilés
, José F. Torres
, Francisco Martínez-Álvarez
, Jairo Cugliari
:
An evolutionary triclustering approach to discover electricity consumption patterns in France. 386-394 - Maria Lourdes Linares-Barrera
, Manuel Jesús Jiménez-Navarro
, Isabel Sofia Brito
, José C. Riquelme
, María Martínez-Ballesteros
:
Evolutionary Feature Selection for Time-Series Forecasting. 395-399
Theme: System Software and Security: EMBS - Embedded Systems Track
- Muhammad Tanveer Ali Ahmad
, Michael Krisper
, Leandro Batista Ribeiro
, Marcel Baunach
:
Avoiding Empty Instances and Offset Drifts of Basic Sequencer Tasks in Automotive Operating System. 400-409 - Chun-Ting Wu
, Yung-Jen Hsu
, Chia-Heng Tu
, Shao-Hua Wang
:
Traffic Signal Preemption and Prioritization for High-Density Road Networks. 410-419 - Kun-Chi Chiang
, Yung-Chun Li
, Wei-Chen Wang
, Wei-Kuan Shih
:
On Enhancing Data Integrity with Low-cost Retention-Refillable Programming Scheme. 420-427 - Meriem Bouzouad
, Yasmine Benhamadi
, Camélia Slimani
, Jalil Boukhobza
:
PIGMMaLIOn: a Partial Incremental Gaussian Mixture Model with a Low I/O Design. 428-435 - Drona Nagarajan
, Tobias Scheipel
, Marcel Baunach
:
Fair and Starvation-Free Spinlock for Real-Time AUTOSAR systems: M-HLP. 436-445 - Lev Denisov
, Gabriele Magnani
, Daniele Cattaneo
, Giovanni Agosta
, Stefano Cherubin
:
Profiling vs Static Analysis: The Impact on Precision Tuning. 446-448 - Michail Boulasikis
, Christoph W. Kessler
, Flavius Gruian
, Jörg Keller
, Sebastian Litzinger
:
Packet-Type Aware Scheduling of Moldable Streaming Tasks on Multicore Systems with DVFS. 449-451 - Javier Barrera
, Leonidas Kosmidis
, Enrico Mezzetti
, Jaume Abella
, Francisco J. Cazorla
:
Increasing Testing Robustness of GPU Software in Embedded Critical Systems. 452-453 - Xin-You Liu
:
Student Research Abstract: Real-Time 3D Registration and Fusion with SRAM-based Analog In-Memory Computing. 454-457
Theme: Artificial Intelligence and Agents: GMLR - Graph Models for Learning and Recognition Track
- Lorenz Wendlinger
, Michael Granitzer
:
Informed Heterogeneous Attention Networks for Metapath Based Learning. 458-465 - Shen-Shyang Ho
, Tarun Teja Kairamkonda
:
Change Point Detection in Evolving Graph using Martingale. 466-473 - Paolo Frazzetto
, Luca Pasa
, Nicolò Navarin
, Alessandro Sperduti
:
Beyond the Additive Nodes' Convolutions: a Study on High-Order Multiplicative Integration. 474-481 - Giorgio Blandano
, Jacopo Burger
, Annalisa Cappella
, Claudia Dolci
, Giuseppe Maurizio Facchi
, Federico Pedersini
, Chiarella Sforza
, Gianluca Martino Tartaglia
:
Gender Classification via Graph Convolutional Networks on 3D Facial Models. 482-489 - Hui-Ju Hung, Wang-Chien Lee
, Tao-Yang Fu
, Chih-Ya Shen
, Zhen Lei
:
Learning to Solve Combinatorial Optimization Problems on Graphs with State-Aware Multi-Relation Aggregation. 490-491 - Daehee Kim
, Donghee Han
, Daeyoung Roh
, Keejun Han
, Mun Yong Yi
:
Less is More: A Streamlined Graph-Based Fashion Outfit Recommendation without Multimodal Dependency. 492-495
Theme: Artificial Intelligence and Agents: HIBIO - Health Informatics and Bioinformatics Track
- D. M. Bappy
, Donghwa Kang
, Jinkyu Lee
, Hyeongboo Baek
:
Prior-Based Enhanced ASD-POCS for Artifact Suppression and Structural Preservation in Sparse-View CBCT. 496-505 - Alejandro Fernández-Fraga
, Jorge González-Domínguez
, María J. Martín
:
Applying dynamic balancing to improve the performance of MPI parallel genomics applications. 506-514 - Cen Wan
, Carl Barton
:
A novel hierarchy-based knowledge discovery framework for elucidating human aging-related phenotypic abnormalities. 515-522 - Hasan Jamil
, Stephen A. Krawetz
, Alexander Gow
:
Knowledge Synthesis using Large Language Models for a Computational Biology Workflow Ecosystem. 523-530 - Beatriz Pérez-Sánchez
, Noelia Sánchez-Maroño
, Miguel A. Díaz-Freire
:
Analysis of voice recordings features for Classification of Parkinson's Disease. 531-532 - Zahraa Khais Shahid
, Saguna Saguna
, Christer Åhlund
, Karan Mitra
:
Federated Learning for Unsupervised Anomaly Detection in ADLs of Elderly in Single-resident Smart Homes. 533-535
Theme: Distributed Systems: IE - IoT and Edge Computing Track
- Fatima Abdullah
, Mian Muaz Razaq
, Youyang Kim
, Limei Peng
, Young-Kyoon Suh
, Byungchul Tak
:
IoT Query Latency Enhancement by Resource-Aware Task Placement in the Fog. 536-544 - Guilherme Augusto Defalque
, Ricardo Ribeiro dos Santos
, Pedro Arfux
, Marcio Carneiro Brito Pache
, Ricardo Aguiar
:
DCS-Oriented IoT Architecture for Enhanced Cattle Feed Precision. 545-552 - Biagio Boi
, Christian Esposito
, Jung-Taek Seo
:
Ethereum Attestation Service as a solution for the revocation of hardware-based password-less mechanisms. 553-559 - Junho Yoon
, Christian Esposito
, Chang Choi
:
Quad-Biometrics for Few-Shot User Identification. 560-564 - Víctor López
, Oscar Fontenla-Romero
, Elena Hernández-Pereira
, Bertha Guijarro-Berdiñas
, Carlos Blanco-Seijo
, Samuel Fernandez-Paz
:
RUL Prediction of Lithium-ion Batteries using a Federated and Homomorphically Encrypted Learning Method. 565-571 - Yuma Kokubo
, Toshiyuki Amagasa
:
Cost-based Load Balancing of RDF Reasoning in Fog-Computing Environments. 572-579 - Lamine Syne
, Pino Caballero-Gil
, Candelaria Hernández-Goya
:
Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks. 580-583
Theme: Distributed Systems: INTOP - Interoperability Track
- Palash Yuvraj Ingle, Young-Gab Kim
:
Integrated Interoperability Based Panoramic Video Synopsis Framework. 584-591 - Hongseok Oh
, Kyungchang Jeong
, Euijong Lee
, Ji-Hoon Jeong
:
LINK: Self-Adaptive System with Human-Machine Teaming-based Loop for Interoperability in IoT Environments. 592-599 - Junhyuk Kwon
, Seokho Ahn
, Young-Duk Seo
:
RecKG: Knowledge Graph for Recommender Systems. 600-607 - Dusan Morhác
, Viktor Valastín
, Kristian Kostal
, Ivan Kotuliak
:
Cross-Chain Payments on Blockchain Networks: An Apartment Booking Use-Case. 608-611
Theme: Artificial Intelligence and Agents: IRMAS - Intelligent Robotics and Multi-Agent Systems Track
- Renan Lima Baima
, Loïck Chovet
, Eduard Hartwich
, Abhishek Bera
, Johannes Sedlmeir
, Gilbert Fridgen
, Miguel Angel Olivares-Méndez
:
Trustful Coopetitive Infrastructures for the New Space Exploration Era. 612-621 - Adrià Fenoy
, Jacopo Zagoli
, Filippo Bistaffa
, Alessandro Farinelli
:
Attention for the Allocation of Tasks in Multi-Agent Pickup and Delivery. 622-629 - Zachary R. Madin
, Jonathan Lawry
, Edmund R. Hunt
:
Collective Anomaly Perception During Multi-Robot Patrol: Constrained Interactions Can Promote Accurate Consensus. 630-637 - Steve Paul
, Jhoel Witter
, Souma Chowdhury
:
Graph Learning-based Fleet Scheduling for Urban Air Mobility under Operational Constraints, Varying Demand & Uncertainties. 638-645 - Qin Yang
, Ramviyas Parasuraman
:
Bayesian Soft Actor-Critic: A Directed Acyclic Strategy Graph Based Deep Reinforcement Learning. 646-648 - Antoni Martorell-Torres
:
Student Research Abstract: Coordination of Marine Multi-Robot Systems with Communication Constraints. 649-651
Theme: Artificial Intelligence and Agents: ISDE - Intelligent Systems for Digital Era Track
- Luiz Fernando Puttow Southier
, Marcelo Teixeira
, Dalcimar Casanova
, Edson Emílio Scalabrin
:
Towards a labeling method for Education Process Mining and a case study on higher education. 654-660 - Mouzhi Ge
, Bruno Rossi
, Stanislav Chren
, José Miguel Blanco
:
Petri Nets for Smart Grids: The Story So Far. 661-670 - John Bianchi
, Manuel Pratelli
, Marinella Petrocchi
, Fabio Pinelli
:
Evaluating Trustworthiness of Online News Publishers via Article Classification. 671-678 - Marcelo Karanik
, Holger Billhardt
, Alberto Fernández
, Sascha Ossowski
:
On the relevance of value system structure for automated value-aligned decision-making. 679-686 - Frederico Schardong
, Ricardo Custódio
:
From Self-Sovereign Identity to Fiduciary Identity: A Journey Towards Greater User Privacy and Usability. 687-694 - Zachary Jeffreys
, Kshama Kumar
, Zhuojing Xie
, Wan D. Bae
, Shayma Alkobaisi
, Sada Narayanappa
:
PotholeVision: An Automated Pothole Detection and Reporting System using Computer Vision. 695-697 - Mustapha Kamal Benramdane
, Elena Kornyshova
, Sebastien Ruelle
, Charles Vidal
:
Employee eXperience Representation for Personalization within Digital Business Ecosystems. 698-700 - Sofiia Drozd
:
Student Research Abstract: Detection of War-Caused Agricultural Field Damages Using Sentinel-2 Satellite Data with Machine Learning and Anomaly Detection. 701-705
Theme: Artificial Intelligence and Agents: KNLP - Knowledge and Natural Language Processing Track
- Kutz Arrieta
, Pablo R. Fillottrani
, C. Maria Keet
:
CoSMo: A multilingual modular language for Content Selection Modelling. 706-713 - Yuni Susanti
, Kanji Uchino
:
Causal-Evidence Graph for Causal Relation Classification. 714-722 - Youngjin Jo
, Jinyeong Bak
:
EmoSum: Conversation Summarization with Emotional Consistency. 723-730 - Amirhossein Layegh
, Amir Hossein Payberah
, Ahmet Soylu
, Dumitru Roman
, Mihhail Matskin
:
Wiki-based Prompts for Enhancing Relation Extraction using Language Models. 731-740 - Mehdi Ben Amor
, Michael Granitzer
, Jelena Mitrovic
:
Impact of Position Bias on Language Models in Token Classification. 741-745
Theme: Information Systems: KRR - Knowledge Representation and Reasoning Track
- Ofer Arieli
, Jesse Heyninck
:
Collective Attacks in Assumption-Based Argumentation. 746-753 - Franz Baader
, Filippo De Bortoli
:
The Abstract Expressive Power of First-Order and Description Logics with Concrete Domains. 754-761 - Wolfgang Dvorák
, Alexander Greßler
, Stefan Woltran
:
Equipping Abstract Argumentation Solvers for Verifying Negative Results. 762-769 - Joaquín Arias
, Mar Moreno-Rebato
, José Antonio Rodríguez-García
, Sascha Ossowski
:
Towards value-awareness in administrative processes: an approach based on constraint answer set programming. 770-778 - Yamil Osvaldo Soto
, Cristhian Ariel David Deagustini
, Maria Vanina Martinez
, Gerardo Ignacio Simari
:
A Mathematical Conceptualization of Bundle Sets in Defeasible Logic Programming. 779-786 - Tomasz Jastrzab
, Frédéric Lardeux
, Éric Monfroy
:
Classifying Words with 3-sort Automata. 787-788 - Djordje Markovic
, Simon Vandevelde
, Linde Vanbesien
, Joost Vennekens
, Marc Denecker
:
An epistemic logic for modeling decisions in the context of incomplete knowledge. 789-793
Theme: Software Design and Development: LASD - Lean and Agile Software Development Track
- Alena Buchalcevová
, Jakub Hermanek
:
Common LeSS Transformation Patterns. 794-801 - Muhammad Ovais Ahmad
, Osama Al-Baik
:
Beyond Technical Debt Unravelling Organisational Debt Concept. 802-809 - Mali Senapathi
, Diane E. Strode
:
Challenges to Sustaining Agility: An Exploratory Case Study. 810-817 - Daniel Welsch
, Luisa Burk
, David Mötefindt
, Michael Neumann
:
Navigating Cultural Diversity: Barriers and Benefits in Multicultural Agile Software Development Teams. 818-825 - Gisela M. Q. M. Archela
, Ana C. V. de Melo
, Vagner Luiz Gava
:
Technical Debt Management in Agile Context: A new framework and case study in a large financial institution. 826-833 - Dilek Caglayan
, Özden Özcan-Top
:
Revisiting Technical Debt Types and Indicators for Software Systems. 834-841 - Vivian Larrea, Milene Selbach Silveira
, Tiago Silva da Silva
:
The use of prototypes as a tool in Agile software development. 842-849 - Sangharatna Godboley
, Bikash Singha
, Monika Rani Golla
, P. Radha Krishna
:
UMask-AFL: Unmasking All Reachable Targets for Comprehensive Agile Fuzzing. 850-852 - Yen Ying Ng
, Ryszard Kuduk
:
Implementing Action Items Over Improving the Format of Retros. 853-855
Theme: Artificial Intelligence and Agents: MLA - Machine Learning and its Applications Track
- Ling Kai Yen
, Jasin Wong
, Arbee L. P. Chen
:
Identifying Chinese Handwriting Characteristics for Detecting Children with Autism. 856-865 - Lucas-Andrei Thil
, Mirela Popa
, Gerasimos Spanakis
:
Navigating WebAI: Training Agents to Complete Web Tasks with Large Language Models and Reinforcement Learning. 866-874 - Giuseppina Andresini
, Annalisa Appice
, Donato Malerba
:
Leveraging Sentinel-2 time series for bark beetle-induced forest dieback inventory. 875-882 - Simon S. Woo
, Daeyoung Yoon
, Yuseung Gim
, Eunseok Park
:
RAAD: Reinforced Adversarial Anomaly Detector. 883-891 - Kanghyeon Seo
, Jihoon Yang
:
Exploring The Efficient Market Hypothesis for Accurate Stock Movement Prediction via Feature-Axis Transformer. 892-901 - Rashida Hasan
, Chee-Hung Henry Chu
:
A Heterogeneous Ensemble Method for Handling Class Noise in Supervised Machine Learning. 902-909 - Subham Raj
, Pawan Agrawal
, Sriparna Saha
, Brijraj Singh
, Niranjan Pedanekar
:
Optimizing Movie Selections: A Multi-Task, Multi-Modal Framework with Strategies for Missing Modality Challenges. 910-918 - Girim Ban
, Simon S. Woo
, David Sung
:
Action Attention GRU: A Data-Driven Approach for Enhancing Purchase Predictions in Digital Marketing. 919-926 - Abdul Basit Hafeez
, Eduardo Alonso
, Atif Riaz
:
DTC-TranGru: Improving the performance of the next-DTC Prediction Model with Transformer and GRU. 927-934 - Véronne Yepmo
, Grégory Smits
, Marie-Jeanne Lesot
, Olivier Pivert
:
CADI: Contextual Anomaly Detection using an Isolation-Forest. 935-944 - Hongyong Han
, Wei Wang
, Gaowei Zhang
, Mingjie Li
, Yi Wang
:
Cross-Domain Coral Image Classification Using Dual-Stream Hierarchical Neural Networks. 945-952 - Eugene Frimpong
, Khoa Nguyen
, Mindaugas Budzys
, Tanveer Khan
, Antonis Michalas
:
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption. 953-962 - Soobin Park
, Yuna Jeong
, Yong Suk Choi
:
Efficient Dual Attention Transformer for Image Super-Resolution. 963-970 - Maria J. P. Peixoto
, Akramul Azim
:
Explainable Artificial Intelligence (XAI) Approach for Reinforcement Learning Systems. 971-978 - Pedro Ilidio
, André Hallwas Ribeiro Alves
, Ricardo Cerri
:
Fast Bipartite Forests for Semi-supervised Interaction Prediction. 979-986 - Muhammad Uzair-Ul-Haq
, Paolo Frazzetto
, Alessandro Sperduti
, Giovanni Da San Martino
:
Improving Soft Skill Extraction via Data Augmentation and Embedding Manipulation. 987-996 - Mohak Chadha
, Pulkit Khera
, Jianfeng Gu
, Osama Abboud
, Michael Gerndt
:
Training Heterogeneous Client Models using Knowledge Distillation in Serverless Federated Learning. 997-1006 - Maram Hasan
, Rajdeep Niyogi
:
Reward Specifications in Collaborative Multi-agent Learning: A Comparative Study. 1007-1013 - Letterio Galletta
, Fabio Pinelli
:
Explainable Ponzi Schemes Detection on Ethereum. 1014-1023 - Saleh Almohaimeed
, Saad Almohaimeed
, Mansour Al Ghanim
, Liqiang Wang
:
Ar-Spider: Text-to-SQL in Arabic. 1024-1030 - Fateme Akbari
, Kamran Sartipi
:
A Model for Detecting Abnormality in Activities of Daily Living Sequences Using Inverse Reinforcement Learning. 1031-1033 - Momotaz Begum
, Mehedi Hasan Shuvo
, Md. Golam Mostofa
, ABM Kamrul Islam Riad
, Md Arabin Islam Talukder
, Mst. Shapna Akter
, Hossain Shahriar
:
M-DBSCAN: Modified DBSCAN Clustering Algorithm for Detecting and Controlling Outliers. 1034-1035 - Emanuele Luzio
, Moacir Ponti
, Christian Ramirez Arevalo
, Luis Argerich
:
Decoupling Decision-Making in Fraud Prevention through Classifier Calibration for Business Logic Action. 1036-1037 - Tzu-Heng Chen
, Sheng-Da Tsai
, Chun-Han Lin
:
Enhancing Video Capture in Mobile Applications for Power Saving Through Machine Learning. 1038-1039 - Sojeong Kim
, Dongjun Lee
, Jaekwang Kim
:
Elevating CTR Prediction: Field Interaction, Global Context Integration, and High-Order Representations. 1040-1042 - Saurabh Anand
, Shubham Malaviya
, Manish Shukla
, Sachin Lodha
:
DroPacter : Compacter-based Tuning with Layer Freezing in Pre-Trained Language Model. 1043-1044 - Matthew Schofield
, Ning Wang
, Shen-Shyang Ho
:
Rebalancing Shared Mobility Systems by User Incentive Schemes: State-Action Representation Design and Analysis. 1045-1047 - Lihu Pan
, Yunting Yang
, Zhengkui Wang
, Wen Shan
, Jiali Yin
:
Open-Vocabulary And Multitask Image Segmentation. 1048-1049 - Oscar Fontenla-Romero
, Bertha Guijarro-Berdiñas
, Elena Hernández-Pereira
, Beatriz Pérez-Sánchez
:
An effective and efficient green federated learning method for one-layer neural networks. 1050-1052 - Andrii Krutsylo
:
Evaluating Knowledge Retention in Continual Learning. 1053-1055 - Youngsun Jang
, Maryam Moshrefizadeh
, Abir Mohammad Hadi
, Kwanghee Won
, John Kim
:
Multimodal Fusion of Heterogeneous Representations for Anomaly Classification in Satellite Imagery. 1056-1058 - Jorge Silvestre
, Paula Mielgo
, Aníbal Bregón
, Miguel A. Martínez-Prieto
, Pedro C. Álvarez-Esteban
:
Towards aircraft trajectory prediction using LSTM networks. 1059-1060 - Mahyar Abbasian
, Taha Rajabzadeh
, Ahmadreza Moradipari
, Seyed Amir Hossein Aqajari
, Hongsheng Lu
, Amir M. Rahmani
:
Controlling the Latent Space of GANs through Reinforcement Learning: A Case Study on Task-based Image-to-Image Translation. 1061-1063 - Saroj Gopali
, Akbar Siami Namin, Faranak Abri
, Keith S. Jones:
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs. 1064-1066 - Camilla Fonseca
, Maria Nicos Alain Pasaylo
, Nour Kawni
, Bethlehem Megabiaw Tassew
:
Identifying Out-of-stock Items at Retail Stores Using Computer Vision. 1067-1071
Theme: Distributed Systems: NET - Networking Track
- Junseok Lee
, Minhyeong Kim
, Wonjun Song
, Younghoon Kim
, Dohyung Kim
:
Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks. 1072-1080 - Jeremias Dötterl
, Zahra Hemmati Fard
:
Classification of Home Network Problems with Transformers. 1081-1087 - Stanislas Pedebearn
, Slim Abdellatif
, Pascal Berthou
, Dariusz Nogalski
, Dallal Belabed
:
Virtual Link Embedding in Collaborative Sliced Multi-Administrative Multi-Domain Networks. 1088-1095 - Otávio Augusto Rocha Da Cruz
, Carlos Eduardo Pereira
, Edison Pignaton de Freitas
, Paulo Mendes
, Denis Lima do Rosário
, Eduardo Coelho Cerqueira
, Antonio Arlis Santos da Silva
, Julio Cesar Santos dos Anjos
:
Micro-Chain: Towards the use of NDN microservices. 1099-1103
Theme: System Software and Security: PL - Programming Languages Track
- Maja Hanne Kirkeby
, Bernardo Santos
, João Paulo Fernandes
, Alberto Pardo
:
Compiling Haskell for Energy Efficiency: Empirical Analysis of Individual Transformations. 1104-1113 - Harpreet Kaur
, Scott Ryan Young
, Marius Pirvu
, Kenneth Blair Kent
:
Lightweight Compilation of Method Invocation Bytecodes in Java. 1114-1121 - Seiji Umatani
:
Lightweight DSL for Describing Extensible Transition Systems. 1122-1131 - Germán Vidal
:
An Asynchronous Scheme for Rollback Recovery in Message-Passing Concurrent Programming Languages. 1132-1139 - Rubén Campos-López
, Esther Guerra
, Juan de Lara
:
A Domain-Specific Language for Augmented Reality Games. 1140-1142
Theme: Software Design and Development: RE - Requirements Engineering Track
- Anzira Rahman
, Luiz Marcio Cysneiros
, Daniel M. Berry
:
An Empirical Study of the Impact of Waterfall and Agile Methods on Numbers of Requirements-Related Defects. 1143-1152 - Michel Perilo
, George Valença
:
How Facial Recognition Technologies Affect the Transgender Community? A Systematic Mapping Study. 1153-1160 - Marcio Veronez
, Ivonei Freitas da Silva
, Victor Francisco Araya Santander
, Elder Elisandro Schemberger
:
A Catalog of Non-Functional Requirements and Patterns for Microservices Migration. 1161-1168 - Quelita A. D. S. Ribeiro, Abimael Santos
, Karolyne Oliveira
, Jaelson Castro
, Maria Lencastre
:
A View of the Technical, Individual, and Social Dimensions of Sustainable Software Systems: A Systematic Literature Review. 1169-1177 - Michel Bourdellès
, Jamal El Hachem
, Salah Sadou
:
Ensuring Requirements Confidentiality during System Design Modelling. 1178-1179 - Renan Lima Baima
, Tiago Miguel Barao Caetano
, Ana Carolina Oliveira Lima
, Emília Oliveira Lima Leal
, Tiago Miguel Pereira Candeias
, Silvia Maria Dias Pedro Rebouças
:
Hybrid Active Teaching Methodology for Learning Development: A Self-assessment Case Study Report in Computer Engineering. 1180-1184
Theme: Software Design and Development: SATTA - Software Architecture: Theory, Technology, and Applications Track
- Metin Altinisik, Hasan Sözer
, Gonca Gürsun
:
Software Architecture Recovery from Multiple Dependency Models. 1185-1192 - Karthik Vaidhyanathan
, Mauro Caporuscio
, Stefano Florio
, Henry Muccini
:
ML-enabled Service Discovery for Microservice Architecture: a QoS Approach. 1193-1200 - Zhongyi Lu
, Declan T. Delaney
, David Lillis
:
Comparing the Similarity of OpenAPI-Based Microservices. 1201-1208 - Luca Traini
, Jessica Léone
, Giovanni Stilo
, Antinisca Di Marco
:
VAMP: Visual Analytics for Microservices Performance. 1209-1218 - Niklas Sänger
, Sebastian Abeck
:
Fine-Grained Authorization in Microservice Architecture: A Decentralized Approach. 1219-1222
Theme: Software Design and Development: SE - Software Engineering Track
- Arina Kudriavtseva
, Olga Gadyatskaya
:
You cannot improve what you do not measure: A triangulation study of software security metrics. 1223-1232 - Md. Fazle Rabbi
, Arifa Islam Champa
, Costain Nachuma
, Minhaz Fahim Zibran
:
SBOM Generation Tools Under Microscope: A Focus on The npm Ecosystem. 1233-1241 - Kwanghoon Choi
, Sooyeon Hwang
, Hyeon-Ah Moon
, Isao Sasano
:
Ranked Syntax Completion With LR Parsing. 1242-1251 - Hiba Awad
, Abdelghani Alidra
, Hugo Bruneliere
, Thomas Ledoux
, Étienne Leclercq
, Jonathan Rivalan
:
VeriFog: A Generic Model-based Approach for Verifying Fog Systems at Design Time. 1252-1261 - Azeem Ahmad
, Kristian Sandahl
, Daniel Hasselqvist
, Pontus Sandberg
:
Information Needs in Continuous Integration and Delivery in Large Scale Organizations: An Observational Study. 1262-1271 - Samuel Idowu
, Yorick Sens
, Thorsten Berger
, Jacob Krüger
, Michael Vierhauser
:
A Large-Scale Study of ML-Related Python Projects. 1272-1281 - Ahmed Aljohani
, Hyunsook Do
:
From Fine-tuning to Output: An Empirical Investigation of Test Smells in Transformer-Based Test Code Generation. 1282-1291 - Mahmoud Abdelgawad
, Indrakshi Ray
:
Methodology for Resiliency Analysis of Mission-critical Systems. 1292-1300 - Feng Dai
, Shigeru Chiba
:
A practical tool for detecting cross-language code pairs with similar control structures. 1301-1303 - James William Pontes Miranda
, Hugo Bruneliere
, Massimo Tisi
, Gerson Sunyé
:
Towards the Integration Support for Machine Learning of Inter-Model Relations in Model Views. 1304-1306 - Melinda Tóth
, István Bozó
:
Supporting Secure Coding for Erlang. 1307-1311
Theme: System Software and Security: SEC - Computer Security Track
- Anton Firc
, Kamil Malinka
, Petr Hanácek
:
Deepfake Speech Detection: A Spectrogram Analysis. 1312-1320 - Vinícius de Miranda Rios, Pedro R. M. Inácio
, Damien Magoni
, Mário M. Freire
:
Detection of Slowloris Attacks using Machine Learning Algorithms. 1321-1330 - Lisa-Marie Geiginger
, Tanja Zseby
:
Evading Botnet Detection. 1331-1340 - Clémentine Gritti
:
OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoT. 1341-1349 - Xi Tan
, Sagar Mohan
, Md. Armanuzzaman
, Zheyuan Ma
, Gaoxiang Liu
, Alex Eastman
, Hongxin Hu
, Ziming Zhao
:
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems. 1350-1357 - Hye Ju Lee
, SeonJin Hwang
, Millati Pratiwi
, Yoon-Ho Choi
:
Obfuscated PHP Webshell Detection Using the Webshell Tailored TextRank Algorithm. 1358-1365 - Seongman Lee
, Seoye Kim
, Chihyun Song
, Byeongsu Woo
, Eunyeong Ahn
, Junsu Lee
, Yeongjin Jang
, Jinsoo Jang
, Hojoon Lee
, Brent ByungHoon Kang
:
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation. 1366-1375 - Milan Salko
, Anton Firc
, Kamil Malinka
:
Security Implications of Deepfakes in Face Authentication. 1376-1384 - Tom-Martijn Roelofs
, Eduardo Barbaro
, Svetlana Pekarskikh
, Katarzyna Orzechowska
, Marta Kwapien
, Jakub Tyrlik
, Dinu Smadu
, Michel van Eeten
, Yury Zhauniarovich
:
Finding Harmony in the Noise: Blending Security Alerts for Attack Detection. 1385-1394 - Joost Oortwijn
, Carlos Gañán
:
Patch Pilgrimage: Exploring the Landscape of TCP Reflective Attacks and User Patching Expedition. 1395-1404 - Shan Jin
, Minghua Xu
, Yiwei Cai
:
Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks. 1405-1414 - Faisal Imran
, Rosa Meo
:
Collection and Analysis of Sensitive Data with Privacy Protection by a Distributed Randomized Response Protocol. 1415-1424 - Chiara Braghin
, Elvinia Riccobene
, Simone Valentini
:
Modeling and verification of smart contracts with Abstract State Machines. 1425-1432 - Guilherme Duarte
, Mariana Cunha
, João P. Vilela
:
A Privacy-Aware Remapping Mechanism for Location Data. 1433-1440 - James Wagner
, Alexander Rasin
:
Forget About It: Batched Database Sanitization. 1441-1452
Theme: Information Systems: SONAMA - Social Network and Media Analysis Track
- Alessio Conte
, Davide Rucci
:
Are k-cores meaningful for temporal graph analysis? 1453-1460 - Aillkeen Bezerra de Oliveira
, Cláudio de Souza Baptista
, Anderson Almeida Firmino
, Anselmo Cardoso de Paiva
:
A Large Language Model Approach to Detect Hate Speech in Political Discourse Using Multiple Language Corpora. 1461-1468 - Célina Treuillier
, Sylvain Castagnos
, Armelle Brun
:
All Polarized but Still Different: a Multi-factorial Metric to Discriminate between Polarization Behaviors on Social Media. 1469-1478 - Akhila VH, Anu Mary Chacko
:
Cooperative Embedding - A Novel Approach to Tackle the Out-Of-Vocabulary Dilemma in Bot Classification. 1479-1486
Theme: Software Design and Development: SP-OS - Software Platform --- Operating System Track
- Yu-Cheng Lin
, Chuan-Chi Wang
, Chia-Heng Tu
, Shih-Hao Hung
:
Towards Optimizations of Quantum Circuit Simulation for Solving Max-Cut Problems with QAOA. 1487-1494 - Sangeun Chae
, Wonbae Kim
, Daegyu Han
, Jeongmin Kim
, Beomseok Nam
:
Optimizing Read Performance of HBase through Dynamic Control of Data Block Sizes and KVCache. 1495-1503 - He-Ru Chen
, Kun-Sheng Liu
, Ya-Shu Chen
, Hsiu-Yi Ou Yang
:
High Energy Efficiency Mobile AR Applications under Adaptive Object Detection Engine and Self-learning Governor. 1504-1510 - Namgyu Jung
, Saebom Lee
, Chang Choi
:
Knowledge Sharing based Lightweight Transformer for Construction Safety Accident Prevention. 1511-1516 - Biagio Boi
, Christian Esposito
, Sokjoon Lee
:
VulnHunt-GPT: a Smart Contract vulnerabilities detector based on OpenAI chatGPT. 1517-1524 - Jake Choi
, Sunchul Jung
, Heon Young Yeom
:
GPU Memory Reallocation Techniques in Fully Homomorphic Encryption Workloads. 1525-1532 - Hao-Jung Wei
, Leng-Kai Lin
, Chun-Yen Lin
, Shih-Wei Li
:
Measuring and Optimizing the Performance of the Android Virtualization Framework. 1533-1535 - Mor Nahum
, Edita Grolman
, Inbar Maimon
, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar
, Yuval Elovici
, Asaf Shabtai
:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. 1536-1538 - Federica Bianchi
, Enrico Bassetti
, Angelo Spognardi
:
Scalable and automated Evaluation of Blue Team cyber posture in Cyber Ranges. 1539-1541 - Seoyeon Kim
, Jinsung Cho
, Bongjae Kim
, Jinman Jung
:
An Efficient SNN Model Generation Method for IoT Edge Computing. 1542-1543 - Chanwoo Lee
, Seongjin Kim
, Kang Choi
, Seongbin Cho
, Junghyeon Yun
, Junyoung Heo
:
Audio capture devices for mobile platforms using SBC. 1544-1548
Theme: Artificial Intelligence and Agents: SSRAI - Safe, Secure, and Robust AI Track
- Denise-Phi Khuu
, Michael Sober
, Dominik Kaaser
, Mathias Fischer
, Stefan Schulte
:
Data Poisoning Detection in Federated Learning. 1549-1558 - Andreas Rønnestad
, Andrea Ceccarelli
, Leonardo Montecchi
:
Validation of Safety Metrics for Object Detectors in Autonomous Driving. 1559-1568 - Tom Haider
, Karsten Roscher
, Benjamin Herd
, Felippe Schmoeller Roza
, Simon Burton
:
Can you trust your Agent? The Effect of Out-of-Distribution Detection on the Safety of Reinforcement Learning Systems. 1569-1578 - Benjamin Herd
, Simon Burton
:
Can you trust your ML metrics? Using Subjective Logic to determine the true contribution of ML metrics for safety. 1579-1586 - Michael Duchesne
, Kaiwen Zhang
, Chamseddine Talhi
:
Multi-Confederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning. 1587-1595 - Tobias Braun
, Irdin Pekaric
, Giovanni Apruzzese
:
Understanding the Process of Data Labeling in Cybersecurity. 1596-1605 - Mehmed Kerem Uludag
, Maryna Veksler
, Yasin Yilmaz
, Kemal Akkaya
:
Deceptive Skies: Leveraging GANs for Drone Sensor Data Falsification. 1606-1613 - Ignacio D. Lopez-Miguel
:
Student Research Abstract: Enhancing Safety in Cyber-Physical Systems Through Runtime Enforcement. 1614-1616
Theme: Software Design and Development: ST - Semantic Technology Track
- Raphaël Sourty
, José G. Moreno, François-Paul Servant
, Lynda Tamine
:
Knowledge Base Grounded Pre-trained Language Models via Distillation. 1617-1625 - Mayra Russo
, Sammy Fabian Sawischa
, Maria-Esther Vidal
:
Tracing the Impact of Bias in Link Prediction. 1626-1633 - Patrizio Bellan
, Mauro Dragoni
, Chiara Ghidini
:
Process Knowledge Extraction and Knowledge Graph Construction Through Prompting: A Quantitative Analysis. 1634-1641 - Thibaut Soulard
, Fatiha Saïs
, Joe Raad
, Gianluca Quercini
:
Efficient Key-based Data Linking Through Key Transfer Between Knowledge Graphs. 1642-1649 - Reham Alharbi
, Valentina Tamma
, Floriana Grasso
, Terry R. Payne
:
An Experiment in Retrofitting Competency Questions for Existing Ontologies. 1650-1658 - Rodrigo Souza
, Marcelo Manzato
:
A Two-Stage Calibration Approach for Mitigating Bias and Fairness in Recommender Systems. 1659-1661 - Javier Conde
, Gonzalo Martínez
, Pedro Reviriego
, Joaquín Salvachúa
, José Alberto Hernández
:
Designing Metadata for the Use of Artificial Intelligence in Academia. 1662-1664 - Lisa Ehrlinger
, Harald Holzner
, Nora Hemelmayr
, Wolfram Wöß
:
A News Article Tag Categorization Ontology. 1665-1667 - Enrique Iglesias
, Maria-Esther Vidal
:
KGSaw: One Size Does Not Fit All- Planning Methods for Data Fragmentation for Efficiently Creating Knowledge Graphs. 1668-1670 - Mahdi Cherif
:
Student Research Abstract: MARS RANK: Specificity of search results. 1671-1674
Theme: Software Design and Development: SVT - Software Verification and Testing Track
- Narges Khakpour
:
Verification of Concurrent Machine Code Running on a Single-Core Machine. 1675-1683 - Nadeem Abdul Hamid
:
(Nearest) Neighbors You Can Rely On: Formally Verified k-d Tree Construction and Search in Coq. 1684-1693 - Eric Felding
, Per Erik Strandberg
, Nils-Hassan Quttineh
, Wasif Afzal
:
Resource Constrained Test Case Prioritization with Simulated Annealing in an Industrial Context. 1694-1701 - Florian Lanzinger
, Christian Martin
, Frederik Reiche
, Samuel Teuber
, Robert Heinrich
, Alexander Weigl
:
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis. 1702-1711 - Susmoy Das
, Arpit Sharma
:
A Formal Framework of Model and Logical Embeddings for Verification of Stochastic Systems. 1712-1721 - Hui Feng
, Marcello M. Bonsangue
:
Concurrent NetKAT with Ports. 1722-1730 - Anders Schlichtkrull
, René Rydhof Hansen
, Flemming Nielson
:
Isabelle-verified correctness of Datalog programs for program analysis. 1731-1734
Theme: Distributed Systems: WCN - Wireless Communications and Networking Track
- Mahnoor Ajmal
, Ayesha Siddiqa
, Muhammad Ashar Tariq
, Malik Muhammad Saad
, Dongkyun Kim
:
Dynamic Backhaul Clustering for Enhanced Scalability in Cell-Free Massive MIMO Networks. 1735-1741 - Hicham Lakhlef
, Khaled Abid
, Ghada Jaber
, Fabio D'Andreagiovanni
:
Efficient Time Slot Recovery Protocol for Wireless Networks. 1742-1748 - Victoria Botelho Martins
, Douglas D. J. de Macedo
, Laércio Pioli Júnior
:
Exploring Architectural Strategies for Mobility Experimentation: A Simulation-Based Study. 1749-1756 - Mohamed Ali Zormati
, Hicham Lakhlef
, Sofiane Ouni
:
Routing Optimization Based on Distributed Intelligent Network Softwarization for the Internet of Things. 1757-1764 - Hsueh-Wen Tseng
, Ting-Ting Yang
, Yi Yang
:
An Adaptive Transmission Strategy for Tiled 360-Degree VR Videos in NOMA Systems. 1765-1773
Theme: Software Design and Development: WE - Web Engineering Track
- Juan Cruz Gardey
, Julián Grigera
, Andrés Rodríguez
, Alejandra Garrido
:
UX-Analyzer: Visualizing the interaction effort for web analytics. 1774-1780 - Marc Oriol
, Abel Gómez
, Jordi Cabot
:
AsyncSLA: Towards a Service Level Agreement for Asynchronous Services. 1781-1788 - Chayapatr Archiwaranguprok
, Kongkeit Khunpanitchot
, Phoomparin Mano
, Manachai Toahchoodee
:
Elysia: Optimizing JavaScript Web Framework. 1789-1796 - Gayatri Priyadarsini Kancherla
:
Student Research Abstract: Least Privilege Persistent-Storage Access in Web Browsers. 1797-1799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.