Abstract is missing.
- Multiple pedestrian tracking based on modified mask R-CNN and enhanced particle filter using an adaptive information driven motion modelMufleh Al-Shatnawi, Amir Asif, Vida Movahedi, Aijun An, Yonggang Hu, Junfeng Liu. 4-12 [doi]
- Understanding brain dynamics for color perception using wearable EEG headbandMahima Chaudhary, Sumona Mukhopadhyay, Marin Litoiu, Lauren E. Sergio, Meaghan S. Adams. 13-22 [doi]
- Towards interpretable and maintainable supervised learning using shapley values in arrhythmiaSanjena Krishnakumar, Tamer Abdou. 23-32 [doi]
- Efficient location-level risk analyticsNeil Burke, Oliver Baltzer, Norbert Zeh. 33-42 [doi]
- Investigation of encrypted and obfuscated network traffic utilizing machine learningKay Boldt, Kenneth B. Kent, Rainer Herpers. 43-52 [doi]
- An approach to represent and transform application-specific constraints for an intrusion detection systemAyesha Babar, Fahim T. Imam, Thomas R. Dean, Jose Fernandez. 53-62 [doi]
- Blockchain-based security for heterogeneous IoT systemsKale Yuzik, Dwight J. Makaroff. 63-72 [doi]
- A survey of security vulnerabilities in ethereum smart contractsNoama Fatima Samreen, Manar H. Alalfi. 73-82 [doi]
- Towards topology aware pre-emptive job scheduling with deep reinforcement learningBon Ryu, Aijun An, Zana Rashidi, Junfeng Liu, Yonggang Hu. 83-92 [doi]
- Pred-cache: a predictive caching method in database systemsOmar El Zarif, Safwat Hassan, Ying Zou 0001, Calisto Zuzarte, Vincent Corvinelli, Mohammed Alhamid. 93-102 [doi]
- Software evaluation methodology of Node.js parallelism under variabilities in scalable systemsMaria Patrou, Jacob M. Baird, Kenneth B. Kent, Michael Dawson 0001. 103-112 [doi]
- The weakest link: revealing and modeling the architectural patterns of microservice applicationsVladimir Podolskiy, Maria Patrou, Panos Patros, Michael Gerndt, Kenneth B. Kent. 113-122 [doi]
- Report on evaluation experiments using different machine learning techniques for defect predictionMarios-Stavros Grigoriou, Kostas Kontogiannis, Alberto Giammaria, Chris Brealey. 123-132 [doi]
- Moving from cross-project defect prediction to heterogeneous defect prediction: a partial replication studyHadi Jahanshahi, Mucahit Cevik, Ayse Basar. 133-142 [doi]
- Identifying external cross-references using natural language processingElham Rahmani, Nazim H. Madhavji, Ibtehal Noorwali. 143-152 [doi]
- Time series sampling for probabilistic forecastingNicholas Prayogo, Mucahit Cevik, Merve Bodur. 153-162 [doi]
- Insights into WebAssembly: compilation performance and shared code caching in Node.jsTobias Nießen, Michael Dawson 0001, Panos Patros, Kenneth B. Kent. 163-172 [doi]
- An ELF-based storage option for the eclipse OMR ahead-of-time compilerDamian Diago D'monte, Georgiy Krylov, Daryl Maier, Gerhard W. Dueck, Kenneth B. Kent. 173-178 [doi]
- MicroJIT: a case for templated just-in-time compilation in constrained environmentsEric Coffin, Scott-Young, Harpreet Kaur, Julie Brown, Marius Pirvu, Kenneth B. Kent. 179-188 [doi]
- Designing and evaluating new instructions that accelerate sigmoid-based machine learningLucas M. Dutton, Curtis D'Alves, Wolfram Kahl, Robert F. Enenkel, Christopher Kumar Anand. 189-197 [doi]
- Evaluating the effectiveness of static word embeddings on the classification of IT support ticketsYasmen Wahba, Nazim H. Madhavji, John Steinbacher. 198-206 [doi]
- Deep learning approaches to classify the relevance and sentiment of news articles to the economyJingli Wang, Ashok Bhowmick, Mucahit Cevik, Ayse Basar. 207-216 [doi]
- Voting for authorship attribution applied to dark web dataBritta Sennewald, Rainer Herpers, Marco Hülsmann, Kenneth B. Kent. 217-226 [doi]
- Dynamic reconfiguration of consensus protocol for IoT data registry on blockchainMohammadreza Rasolroveicy, Marios Fokaefs. 227-236 [doi]
- Parallel windowed method for scalar multiplication in elliptic curve cryptographyTanya Bouman, Yusra Irfan, James You, Christopher K. Anand. 237-246 [doi]
- Hybrid quantum-classical problem solving in the NISQ eraPrashanti Priya Angara, Ulrike Stege, Hausi A. Müller, Mehdi Bozzo-Rey. 247-252 [doi]
- 1st workshop on AIOps and systems complianceKostas Kontogiannis, Alberto Giammaria, Chris Brealey, Marios Grigoriou. 254-255 [doi]
- Automation, control, and analysis of knowledge-intensive processesEric S. K. Yu, Arik Senderovich, Hajo A. Reijers, Allen Chan, Sebastian Carbajales. 256-258 [doi]
- Deploying a collaborative framework for crowd sourcing the evaluation of AI model effectivenessSarah Packowski, Joshua Allard. 259 [doi]
- How has COVID-19 changed the development and adoption of data science across firms and industries?Michelle Alexopoulos, Kelly A. Lyons, Rohan Alexander, Aije Egwaikhide, R. Blair Frost. 260-261 [doi]
- 4th workshop on advances in open runtimes and cloud performance technologiesDaryl Maier, Vijay Sundaresan, David Bremner. 262 [doi]
- Jumpstart your application into a reactive event-centric world: hands-on workshopYee-Kang Chang, Meswan Bhaugeerutty, Gilbert Kwan, Grace Jansen. 263-265 [doi]
- morPOP: a fast and granular agent-based model of COVID-19 to examine school mitigation strategies in newfoundland & labradorDionne M. Aleman, Benjamin Tham, Sean J. Wagner, Justin Semelhago, Asghar Mohammadi, Paul Price, Jordan Bradfield, Randy Giffen, Proton Rahman, Jenna Lawrence. 266-267 [doi]
- Novel hardware & software design for mathematical and AI accelerationRobert F. Enenkel, Silvia M. Müller, Christopher K. Anand. 268-269 [doi]
- Z modernization open tools showcaseSteve Shao, Nitika Sharma, Stephanie Kuan. 270-271 [doi]
- Smart cities with smart AI to fight back Covid19: how smart cities used smart AI to fight back the pandemicHina Sharma. 272-274 [doi]
- Quantum computing: synergies and opportunitiesMehdi Bozzo-Rey, Robert Loredo, Hausi A. Müller, Ulrike Stege. 275-276 [doi]