Abstract is missing.
- A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced dataAmir Namavar Jahromi, Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha. 14-23 [doi]
- A fog computing framework for autonomous driving assist: architecture, experiments, and challengesMuthucumaru Maheswaran, Tianzi Yang, Salman Memon. 24-33 [doi]
- A multi-dimensional quality analysis of Android applicationsSoude Ghari, Mahsa Hadian, Mohammadreza Rasolroveicy, Marios Fokaefs. 34-43 [doi]
- A semi-automated framework for migrating web applications from SQL to document oriented NoSQL databaseRahma S. Al Mahruqi, Manar H. Alalfi, Thomas R. Dean. 44-53 [doi]
- A survey of utilizing user-reviews posted on Google play storeEhsan Noei, Kelly Lyons. 54-63 [doi]
- AndroVul: a repository for Android security vulnerabilitiesZakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi. 64-71 [doi]
- Behind the scenes: developers' perception of multi-language practicesMouna Abidi, Manel Grichi, Foutse Khomh. 72-81 [doi]
- City on the river: visualizing temporal collaborationJessica Perrie, Jing Xie, Maleknaz Nayebi, Marios Fokaefs, Kelly Lyons, Eleni Stroulia. 82-91 [doi]
- Classification of histopathological biopsy images using ensemble of deep learning networksSara Hosseinzadeh Kassani, Peyman Hosseinzadeh Kassani, Michal J. Wesolowski, Kevin A. Schneider, Ralph Deters. 92-99 [doi]
- Comparison of block-based and hybrid-based environments in transferring programming skills to text-based environmentsHussein Alrubaye, Stephanie Ludi, Mohamed Wiem Mkaouer. 100-109 [doi]
- Decentralized and secure delivery network of IoT update files based on ethereum smart contracts and blockchain technologyMohammad Salar Arbabi, Mehdi Shajari. 110-119 [doi]
- Deep learning brain regions in Harvard-Oxford atlas using SegNet modelAbel Ag Rb Guimaraes, Tamer Abdou, Ayse Basar. 120-129 [doi]
- Detection of feature interaction in dynamic scripting languagesOmar A. Al Harthi, Manar H. Alalfi, Thomas R. Dean. 130-137 [doi]
- Framework, model and tool use in higher education enterprise architecture: an international surveyTimothy Lethbridge, Aliaa Alghamdi. 138-147 [doi]
- Generative adversarial networks in designing electromagnetic engineered surfaces for mm-Wave band spectrum environmentsOzan Ozyegen, Emir Kavurmacioglu, Jonathan Ethier, Ayse Basar. 148-155 [doi]
- Hazard analysis of interoperability conformance profiles: an industrial case study in healthcareJens H. Weber, Oscar Costa. 156-165 [doi]
- Interpreting financial time series with SHAP valuesKarim El Mokhtari, Ben Peachey Higdon, Ayse Basar. 166-172 [doi]
- Investigating the relationship between evolutionary coupling and software bug-pronenessManishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 173-182 [doi]
- LL(k) optimization of a network protocol parser generatorKyle Lavorato, Fahim T. Imam, Thomas R. Dean. 183-192 [doi]
- On the distribution of test smells in open source Android applications: an exploratory studyAnthony Peruma, Khalid Almalki, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni 0001, Fabio Palomba. 193-202 [doi]
- Optimizing serverless computing: introducing an adaptive function placement algorithmNima Mahmoudi, Changyuan Lin, Hamzeh Khazaei, Marin Litoiu. 203-213 [doi]
- Pattern-based transformation of SysML models into fault tree modelsBashar Al-Shboul, Dorina C. Petriu. 214-223 [doi]
- Predicting bug report fields using stack traces and categorical attributesKorosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Abdelaziz Trabelsi, Jameleddine Hassine. 224-233 [doi]
- Predicting student performance using data from an auto-grading systemHuanyi Chen, Paul A. S. Ward. 234-243 [doi]
- Ranking co-change candidates of micro-clonesManishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 244-253 [doi]
- Rule-based security management system for data-intensive applicationsYar Rouf, Joydeep Mukherjee, Marios Fokaefs, Mark Shtern, Justin Le, Marin Litoiu. 254-263 [doi]
- SolUnit: a framework for reducing execution time of smart contract unit testsHallan Medeiros, Patricia Vilain, John Mylopoulos, Hans-Arno Jacobsen. 264-273 [doi]
- State of practices of Java native interfaceManel Grichi, Mouna Abidi, Yann-Gaël Guéhéneuc, Foutse Khomh. 274-283 [doi]
- Using z14 fused-multiply-add instructions to accelerate elliptic curve cryptographyJames You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher Kumar Anand. 284-291 [doi]
- A roadmap for extending MicroJIT: a lightweight just-in-time compiler for decreasing startup timeEric Coffin, Scott-Young, Kenneth B. Kent, Marius Pirvu. 293-298 [doi]
- Ahead-of-time compilation in OMR: overview and first stepsGeorgiy Krylov, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier, Irwin D'Souza. 299-304 [doi]
- Analyzing and visualizing the canadian research landscapeVictor N. Silva, Ashley Herman, Maryam Mirzaei, Elisa Du, Bowen Hu, Lianne M. Lefsrud, Jörg Sander 0001, Eleni Stroulia, Monica Sawchyn. 305-310 [doi]
- CDCL(Crypto) SAT solvers for cryptanalysisSaeed Nejati, Vijay Ganesh. 311-316 [doi]
- Research challenges in query processing and data analytics on the edgeBlesson Varghese, Suprio Ray, Bhavesh N. Gohil, Sergio Vega. 317-322 [doi]
- SAT solvers and computer algebra systems: a powerful combination for mathematicsCurtis Bright, Ilias Kotsireas, Vijay Ganesh. 323-328 [doi]
- Towards continuous monitoring in personalized healthcare through digital twinsLuis F. Rivera, Miguel A. Jiménez, Prashanti Angara, Norha M. Villegas, Gabriel Tamura, Hausi A. Müller. 329-335 [doi]
- A proactive system to allocate virtual machines in clouds using autoregressionJasmeet Singh, Marc St-Hilaire, Shikharesh Majumdar, Jordan Kurosky, Sibyl Weng. 336-343 [doi]
- Dogfooding: using IBM cloud services to monitor IBM cloud infrastructureWilliam Pourmajidi, Andriy V. Miranskyy, John Steinbacher, Tony Erwin, David Godwin. 344-353 [doi]
- Validation process for services produced by digital transformationRafael Fazzolino, Auri Marcelo Rizzo Vincenzi, Sara Silva, Letícia de Souza, Rejane M. da C. Figueiredo, Cristiane Soares Ramos, Luiz Carlos Miyadaira Ribeiro. 354-364 [doi]
- Distributed software health and quality metrics with blockchainsOmar Badreddin. 365-366 [doi]
- 3rd workshop on advances in open runtime technology for cloud computingDaryl Maier, Xiaoli Liang, Kenneth B. Kent. 367 [doi]
- Taming services for IBM cloudNazim H. Madhavji, John Steinbacher, Andriy V. Miranskyy, Tony Erwin, Ahmed Ibrahim, Priyanka P. Naikade, William Pourmajidi, Lei Zhang 0078, Yasmen Wahba. 368-369 [doi]
- Compiler-driven performance workshopClark Verbrugge, José Nelson Amaral, Reid Copeland, Whitney T. Tsang. 370-372 [doi]
- Hands-on workshop on fast, efficient & seriously open cloud-native JavaYee-Kang Chang, Patrick Tiu, Eric Lau, Leo Christy Jesuraj, Alvin So, Gilbert Kwan. 373-375 [doi]
- Custom visual recognition model with Watson studioImtihan Ahmed, Rachael House, Neil Deilma, Li Luo. 376-377 [doi]
- Fourth annual workshop on data-driven knowledge mobilizationEhsan Noei, Kelly Lyons, Eleni Stroulia, Periklis Andritsos. 378-379 [doi]
- How can OpenShift accelerate your Kubernetes adoption: a workshop exploring OpenShift featuresBen Linzel, Erica Zhu, Geofrey Flores, John Liu, Serjik G. Dikaleh. 380-381 [doi]
- Extracting meaning from text and creating a custom language model to optimize NLP results: NLP hands-on workshop seriesSarah Packowski, Wendy Switzer. 382-383 [doi]
- Workshop on barriers to data science adoption: why existing frameworks aren't workingRohan Alexander, Kelly Lyons, Michelle Alexopoulos, Lisa Austin. 384-385 [doi]
- A hands-on tutorial on deep learning for object and pattern recognitionFarhana H. Zulkernine, Haruna Isah, Sazia Mahfuz, Mohammed Gasmallah, Jason Lam, Shahzad Khan. 386-387 [doi]
- Optimizing commute time with IBM Watson studioTommy Cao, Derek Roy, Tereza Nedelescu. 388-390 [doi]
- Build, deploy and administer microservices using Kubernetes and IBM cloud API managementEric Charpentier, Neil DeLima, Jason Mah, Darren Pape, Vince Yuen. 391-392 [doi]
- Quantum computing: challenges and opportunitiesMehdi Bozzo-Rey, John Longbottom, Hausi A. Müller. 393-394 [doi]
- Kubernetes security and access management: a workshop exploring security & access features in KubernetesChris Felix, Hitesh Garg, Serjik G. Dikaleh. 395-396 [doi]
- Mining and exploration of attributed graphs: theory and applicationsMehdi Kargar, Morteza ZiHayat, Jaroslaw Szlichta. 397-398 [doi]