1353 | -- | 1364 | Yati Phyo, Canh Minh Do, Kazuhiro Ogata 0001. A Divide & Conquer Approach to Leads-to Model Checking |
1365 | -- | 1385 | C. Venkata Narasimhulu. A New Blind Watermark Embedding Model: Spiral Updated Rider Optimization Algorithm |
1386 | -- | 1411 | Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi. Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints |
1412 | -- | 1433 | Tomasz Boinski, Pawel Czarnul. Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming |
1434 | -- | 1460 | Sreenithya Sumesh, Aneesh Krishna. i* Goal Model |
1461 | -- | 1471 | Lei Wang, Qiang Zhang, Qing Qian, Jishuai Wang, Yujun Pan, Renbing Yang, Wenbo Cheng. Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network |
1472 | -- | 1488 | Fernando J. Fiori, Waltteri Pakalén, Jorma Tarhio. Approximate String Matching with SIMD |
1489 | -- | 1511 | Shengyuan Feng, Junqing Gong 0001, Jie Chen. Binary Tree Encryption with Constant-Size Public Key in the Standard Model |
1512 | -- | 1526 | Tonglai Liu, Jigang Wu, Jiaxing Li, Jingyi Li, Zikai Zhang. Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network |
1527 | -- | 1539 | Surbhi Gupta, Manoj K. Gupta. Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm |
1540 | -- | 1559 | Sahil 0001, Sandeep Kumar Sood. Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters |
1560 | -- | 1573 | Xichao Hu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes |
1574 | -- | 1585 | Meijuan Huang, Bo Yang 0003, Yanwei Zhou, Xuewei Hu. Continual Leakage-Resilient Hedged Public-Key Encryption |
1586 | -- | 1597 | G. Gokulkumari. Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features |
1598 | -- | 1610 | Zeyi Liu, Weijuan Zhang, Ji Xiang, Daren Zha, Lei Wang 0135. NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme |
1611 | -- | 1630 | Selvapandian Arumugam, Nagendra Prabhu Selvaraj, P. Sivakumar 0002, Jagannadha Rao D. B.. Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images |
1631 | -- | 1638 | Qiong Sun, Xiankai Huang, Zheng Liu. Tourists' Digital Footprint: Prediction Method of Tourism Consumption Decision Preference |
1639 | -- | 1652 | I Edwin Albert, A. J. Deepa, A. Lenin Fred. Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings |