Abstract is missing.
- A Machine Learning Approach to Predict System-Level Threats from Hardware-Based Fault Injection Attacks on IoT SoftwareAakash Gangolli, Qusay H. Mahmoud, Akramul Azim. 4-11 [doi]
- Adopting Learning-to-rank Algorithm for Reviewer RecommendationGuoliang Zhao, Jiawen Liu, Daniel Alencar da Costa, Ying Zou 0001. 22-31 [doi]
- A Task-Agnostic Machine Learning Framework for Dynamic Knowledge GraphsNicholas Sendyk, Curtis Davies, Titus Priscu, Miles Sutherland, Atallah Madi, Kevin Dick, Hoda Khalil, Ala Abu Alkheir, Gabriel A. Wainer. 22-31 [doi]
- Multi-Objective Differential Evolution and Unseen Adversarial Sample GenerationWeimin Zhao, Sanaa A. Alwidian, Hancong Ge, Shahryar Rahnamayan, Qusay H. Mahmoud. 32-41 [doi]
- On the Challenges of Migrating to Machine Learning Life Cycle Management PlatformsAquilas Tchanjou Njomou, Marios Fokaefs, Dimitry Fumtim Silatchom Kamga, Bram Adams. 42-51 [doi]
- Time series forecasting-based peak shaving for building energy managementSyed Mahbub Rafayal, Mucahit Cevik. 52-61 [doi]
- Wonder Vision: Augmented Reality and Conversational Interfaces to Facilitate Wayfinding for the Visually ImpairedJessy Zhang, Alexis Morris, Haru Hyunkyung Ji. 62-70 [doi]
- Impact of DDoS Attacks on the Performance of Blockchain Consensus as an loT Data Registry: An Empirical StudyMohammadreza Rasolroveicy, Marios Fokaefs. 71-80 [doi]
- Partially Observable Markov Chain Models for Evaluating Lung Cancer Screening PoliciesNicholas Prayogo, Davood Pirayesh Neghab, Syed Mahbub Rafayal, Mucahit Cevik. 81-90 [doi]
- A Human-in-the-loop Approach to Generate Annotation Usage RulesMansur Gulami, Ajay Kumar Jha, Sarah Nadi, Karim Ali 0001, Yee-Kang Chang, Emily Jiang. 91-100 [doi]
- A Prompt-based Few-shot Learning Approach to Software Conflict DetectionRobert K. Helmeczi, Mucahit Cevik, Savas Y1ldmm. 101-109 [doi]
- Dynamic Extraction of BERT-based Embeddings for the Detection of Malicious JavaScriptMacarious Abadeer, Behrad Moeini, Emma Sewell, Paula Branco, Felipe Ventura, Wei Shi. 110-119 [doi]
- Exploring trends and practices of forks in open-source software repositoriesMahsa Hadian, Scott Brisson, Bram Adams, Soude Ghari, Ehsan Noei, Marios Fokaefs, Kelly A. Lyons, Shurui Zhou. 120-129 [doi]
- Predicting Buggy Code Clones through Machine LearningMd Hasibul Islam, Rumpa Paul, Manishankar Mondal. 130-139 [doi]
- The Garbage Collection Cost For Meta-Tracing JIT-based Dynamic LanguagesJoannah Nanjekye, David Bremner, Aleksandar Micic. 140-149 [doi]
- A Hybrid Machine Learning Model for Efficient Classification of IT Support Tickets in The Presence of Class OverlapYasmen Wahba, Nazim H. Madhavji, John Steinbacher. 151-156 [doi]
- Dynamic Analysis of Neural Network Oscillation Using Routh-Hurwitz MethodLei Zhang. 157-162 [doi]
- Using Dynamic Knowledge Hypergraphs Toward Proactive AlOps through Digital TwinsLuis F. Rivera, Norha M. Villegas, Gabriel Tamura, Hausi A. Müller, Rama Akkiraju, Ian Watts, Eric Erpenbach. 163-168 [doi]
- Green LAC: Resource-Aware Dynamic Load Balancer for Serverless Edge Computing PlatformsJaime Dantas, Hamzeh Khazaei, Marin Litoiu. 169-174 [doi]
- Towards a Differential Privacy Machine Learning Edge-Cloud Architecture - An Experimental StudyPayal Goyal, Mark Shtern, Sumona Mukhopadhyay, Marin Litoiu. 175-180 [doi]
- A Comparative Study of De-identification Tools to Apply to Free-Text Clinical NotesIan Pépin, Farhana H. Zulkernine. 181-186 [doi]
- Evaluating the Impact of NIST 800.53 Security Control ViolationsSyed Waqas Hamdani, Chris Brealey, Kostas Kontogiannis, Alberto Giammaria. 187-192 [doi]
- Failure Prediction using Transfer Learning in Large-scale Continuous Integration EnvironmentsRezwana Mamata, Kevin Smith, Akramul Azim, Yee-Kang Chang, Qasim Tauseef, Ramiro Liscano, Gkerta Seferi. 193-198 [doi]
- Requirements Analysis Using Grounded Theory: A Case Study in the Domain of Textual Negotiation ToolsEmmanuel C. Ayeleso, Timothy C. Lethbridge. 199-206 [doi]
- Safe Cloud-Based Java Code Execution in UmpleOnlineLovepreet Singh, Timothy C. Lethbridge. 207-212 [doi]
- ZS3: Marrying Static Analyzers and Constraint Solvers to Parallelize Loops in Managed RuntimesRishi Sharma, Shreyansh Kulshreshtha, Manas Thakur. 213-220 [doi]
- 6th Workshop on Advances in Open Runtimes and Cloud Performance TechnologiesDaryl Maier, Vijay Sundaresan. 222 [doi]
- Machine Learning based Auto-Scaling in IBM-Db2 on CloudOmar El Zarif, Minji Kang, Kaya Gangesan. 223-224 [doi]
- The 14th CASCON Workshop on Cloud ComputingIan Watts, Marin Litoiu. 225-226 [doi]
- Autonomous Vehicles Technology Stack & Generated DataMohamed El-Darieby, George Daoud, Monil Patel. 227-228 [doi]
- ML4DM: The second workshop on the emerging applications of machine learning in modern data managementAmin Kamali, Jarek Szlichta, Calisto Zuzarte, Yueting Chen, Verena Kantere, Shaikh Quader. 229-231 [doi]
- Using Watson NLP with the online collaboration tool MURALSarah Packowski, Anuj Jain, Josie Buter. 232-233 [doi]
- Learning to SWIM: Technical and Social Lessons Learned During Development of a Water-based Data Collaboration PlatformLeland Jackson, Florencia Said, Jennifer Collins. 234-236 [doi]
- Technology and Inclusive InnovationWendy Cukier, Saifur Rahman, Kevin Jae, Magda Sabat, Kevin Jae. 237-239 [doi]
- What it's like to be a student today - INSPIRE Program ExperienceAli Hamdy, Manish Sihag. 240-242 [doi]
- 2nd Workshop on Software Techniques for Engineering Cyber Physical SystemsKostas Kontogiannis, John Mylopoulos, Daniel Amyot. 243-244 [doi]
- Towards Practical Hybrid Quantum Applications for IndustryMehdi Bozzo-Rey, Sean Wagner, Robert Loredo, Ulrike Stege, Hausi A. Müller, Prashanti Priya Angara. 245-247 [doi]
- 19th Compiler-Driven PerformanceWorkshopJosé Nelson Amaral, Kit Barton. 248 [doi]
- Workshop: Machine Learning in Software QualityAkramul Azim, Kevin Smith. 249-250 [doi]