Abstract is missing.
- Statically-Directed Assertion Recommendation for C ProgramsCong Wang, Le Kang, Renwei Zhang, Weiliang Yin. 1-10 [doi]
- An Empirical Study on API-Misuse Bugs in Open-Source C ProgramsZuxing Gu, Jiecheng Wu, Jiaxiang Liu, Min Zhou 0001, Ming Gu 0001. 11-20 [doi]
- Characterization and Prediction of Popular Projects on GitHubJunxiao Han, ShuiGuang Deng, Xin Xia, Dongjing Wang, Jianwei Yin. 21-26 [doi]
- SENSORY: Leveraging Code Statement Sequence Information for Code Snippets RecommendationLei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu. 27-36 [doi]
- Supporting Consistency in the Heterogeneous Design of Safety-Critical SoftwareAndrés Paz, Ghizlane El-Boussaidi. 37-46 [doi]
- A Heuristic Approach to Break Cycles for the Class Integration Test Order GenerationMiao Zhang, Jacky Keung, Yan Xiao, Md. Alamgir Kabir, Shuo Feng. 47-52 [doi]
- Assessing the Significant Impact of Concept Drift in Software Defect PredictionMd. Alamgir Kabir, Jacky W. Keung, Kwabena E. Benniny, Miao Zhang. 53-58 [doi]
- In Search of Scientific AgileRobert Ward, Carl K. Chang. 59-65 [doi]
- Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service ComponentsYue Yuan, Han Anu, Wenchang Shi, Bin Liang 0002, Bo Qin. 66-71 [doi]
- Using Client-Based Class Cohesion Metrics to Predict Class MaintainabilityMusaad Alzahrani, Saad Alqithami, Austin Melton. 72-80 [doi]
- ParaAim: Testing Android Applications Parallel at Activity GranularityChun Cao, Jing Deng, Ping Yu 0002, Zhiyong Duan, Xiaoxing Ma. 81-90 [doi]
- A Comparative Study of the Effectiveness of Meta-Heuristic Techniques in Pairwise TestingSalim Ali Khan Mohammad, Sathvik Vamshi Valepe, Subhrakanta Panda, S. A. S. Rajita Bommakanti. 91-96 [doi]
- An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode ObfuscatorsYanru Peng, Yuting Chen, Beijun Shen. 97-106 [doi]
- AutoPer: Automatic Recommender for Runtime-Permission in Android ApplicationsHongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu, Jing Xu 0008. 107-116 [doi]
- Metrics Driven Architectural Analysis using Dependency Graphs for C Language ProjectsDevansh Tiwari, Hironori Washizaki, Yoshiaki Fukazawa, Tomoyuki Fukuoka, Junji Tamaki, Nobuhiro Hosotani, Munetaka Kohama. 117-122 [doi]
- Identifying the Challenges of the Blockchain Community from StackExchange Topics and TrendsIrfan Alahi, Mubassher Islam, Anindya Iqbal, Amiangshu Bosu. 123-128 [doi]
- An Empirical Study on the Spreading of Fault Revealing Test Cases in Prioritized SuitesWesley N. M. Torres, Everton L. G. Alves, Patrícia D. L. Machado. 129-138 [doi]
- Supporting Decision Makers in Search-Based Product Line Architecture Design using ClusteringWillian Marques Freire, Carlos Vinícius Bindewald, Aline M. M. Miotto Amaral, Thelma Elita Colanzi. 139-148 [doi]
- Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class LoadingYufei Yang, Wenbo Luo, Yu Pei, Minxue Pan, Tian Zhang 0001. 149-158 [doi]
- Deep-AutoCoder: Learning to Complete Code Precisely with Induced Code TokensXing Hu, Rui Men, Ge Li, Zhi Jin. 159-168 [doi]
- ConRS: A Requests Scheduling Framework for Increasing Concurrency Degree of Server ProgramsBiyun Zhu, Ruijie Meng, Zhenyu Zhang 0004, W. K. Chan 0001. 169-178 [doi]
- LAC: Locating and Applying Consistent and Repetitive ChangesSushma Sakala, Vamshi Krishna Epuri, Samuel Sungmin Cho, Myoungkyu Song. 179-184 [doi]
- Dockerfile TF Smell Detection Based on Dynamic and Static Analysis MethodsJiwei Xu, Yuewen Wu, Zhigang Lu, Tao Wang 0030. 185-190 [doi]
- Empirical Analysis of the Growth and Challenges of New Programming LanguagesPartha Chakraborty, Rifat Shahriyar, Anindya Iqbal. 191-196 [doi]
- Featured Event Sequence Graphs for Model-Based Incremental Testing of Software Product LinesTugkan Tuglular, Mutlu Beyazit, Dilek Öztürk. 197-202 [doi]
- Time-Aware and Location-Based Personalized Collaborative Recommendation for IoT ServicesRumeng Shao, Hongyan Mao, Jinpeng Jiang. 203-208 [doi]
- An Extended Abstract of "Metamorphic Testing: Testing the Untestable"Sergio Segura, Dave Towey, Zhi Quan Zhou, T. Y. Chen. 209-210 [doi]
- Agile, Continuous Integration, and DevOpsCarl K. Chang. 211 [doi]
- A Declarative Approach for an Adaptive Framework for Learning in Online CoursesDjananjay Pandit, Ajay Bansal. 212-215 [doi]
- Empowering Engagement through Automatic Formative AssessmentAlice Barana, Marina Marchisio, Sergio Rabellino. 216-225 [doi]
- VISA: A Supervised Approach to Indexing Video Lectures with Semantic AnnotationsLuca Cagliero, Lorenzo Canale, Laura Farinetti. 226-235 [doi]
- A Mobile System to Increase Efficiency of the Lecturers when Preventing Academic Dishonesty During Written ExamsPedro Maroco, João Cambeiro, Vasco Amaral. 236-241 [doi]
- Study TOUR for Computer Science StudentsHenry C. B. Chan, Hong Va Leong, Grace Ngai. 242-251 [doi]
- C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring ServicesKalika Suksomboon, Zhishu Shen, Kazuaki Ueda, Atsushi Tagami. 252-257 [doi]
- Predicting Network Outages Based on Q-Drop in Optical NetworkYohei Hasegawa, Masato Uchida. 258-263 [doi]
- HeteroTSDB: An Extensible Time Series Database for Automatically Tiering on Heterogeneous Key-Value StoresYuuki Tsubouchi, Asato Wakisaka, Ken Hamada, Masayuki Matsuki, Hiroshi Abe, Ryosuke Matsumoto. 264-269 [doi]
- FastContainer: A Homeostatic System Architecture High-Speed Adapting Execution Environment ChangesRyosuke Matsumoto, Uchio Kondo, Kentaro Kuribayashi. 270-275 [doi]
- Hybrid Cellular-DTN for Vehicle Volume Data Collection in Rural AreasYuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai. 276-284 [doi]
- Modeling Restrained Epidemic Routing on Complex NetworksNatsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 285-290 [doi]
- Sparse Representation of Network Topology with K-SVD AlgorithmRyotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki. 291-298 [doi]
- Message from EATA Symposium ChairsAli R. Hurson, Hiroyuki Sato, Toyokazu Akiyama, Dan Lin 0001. 299 [doi]
- DirectFlow: A Robust Method for Ocular Torsion MeasurementBruno Kozen Stahl, Leonardo Pavanatto Soares, Vicenzo Abichequer Sangalli, Pedro Costa Klein, Rafael Neujahr Copstein, Márcio Sarroglia Pinho. 300-305 [doi]
- Pothole Detection in Asphalt: An Automated Approach to Threshold Computation Based on the Haar Wavelet TransformRicardo Silveira Rodrigues, Marcia Pasin, Alice J. Kozakevicius, Vinicius Monego. 306-315 [doi]
- An Ontology Enhanced User Profiling Algorithm Based on Application FeedbackXin Dong, Tong Li, Zhiming Ding. 316-325 [doi]
- A Dataflow Application Deployment Strategy for Hierarchical NetworksShintaro Ishihara, Satoshi Tanita, Toyokazu Akiyama. 326-335 [doi]
- How the Academics Qualification Influence the Students Learning DevelopmentEdna Dias Canedo, Rhandy Rafhael de Carvalho, Heloise Acco Tives Leão, Pedro Henrique Teixeira Costa, Márcio Vinicius Okimoto. 336-345 [doi]
- Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic ClassificationBo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Soderstrom, Kazuya Okada, Yuji Sekiya, Akihiro Nakao. 346-351 [doi]
- Purchasing Behavior Analysis Based on Customer's Data Portrait ModelJing Sun, Huiqun Zhao, Sanwen Mu, Zimu Li. 352-357 [doi]
- Recommender Systems Based on Autoencoder and Differential PrivacyJiahui Ren, Xian Xu, Zhihuan Yao, Huiqun Yu. 358-363 [doi]
- Matrix Factorization Model with Dual Preferences for Rating PredictionYuan Li 0009, Kedian Mu. 364-372 [doi]
- View-Adaptive Weighted Deep Transfer Learning for Distributed Time-Series ClassificationSreyasee Das Bhattacharjee, William J. Tolone, Ashish Mahabal, Mohammed Elshambakey, Isaac Cho, S. George Djorgovski. 373-381 [doi]
- Multi-Source Heterogeneous Core Data Acquisition Method in Edge Computing NodesHong Xia, Mingdao Zhao, Yanping Chen, Zhongmin Wang, Zhong Yu, Jingwei Yang. 382-385 [doi]
- Chinese Social Media Entity Linking Based on Effective Context with Topic SemanticsChengfang Ma, Ying Sha, Jianlong Tan, Li Guo 0001, Huailiang Peng. 386-395 [doi]
- Identification of Cybersecurity Specific Content Using the Doc2Vec Language ModelOtgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 396-401 [doi]
- Semantic Data-Driven MicroservicesIvan Luiz Salvadori, Alexis Huf, Frank Siqueira. 402-410 [doi]
- Big Data Analytics in Telecommunication using State-of-the-art Big Data Framework in a Distributed Computing Environment: A Case StudyMohit Ved, Rizwanahmed B. 411-416 [doi]
- Keyword-Based Semi-Supervised Text ClassificationKarl Severin, Swapna S. Gokhale, Aldo Dagnino. 417-422 [doi]
- TypoWriter: A Tool to Prevent TyposquattingIshtiyaque Ahmad, Md Anwar Parvez, Anindya Iqbal. 423-432 [doi]
- Vehicle Travel Time Estimation by Sparse TrajectoriesMingyang Jiang, Tianqi Zhao. 433-442 [doi]
- Xu: An Automated Query Expansion and Optimization ToolMorgan Gallant, Haruna Isah, Farhana H. Zulkernine, Shahzad Khan. 443-452 [doi]
- Parallel Discovery of Trajectory Companions from Heterogeneous Streaming DataYongyi Xian, Chuanfei Xu, Sameh Elnikety, Yan Liu. 453-462 [doi]
- Cooperative UAVs Gas Monitoring using Distributed ConsensusDaniele Facinelli, Matteo Larcher, Davide Brunelli, Daniele Fontanelli. 463-468 [doi]
- Increasing Self-Adaptation in a Hybrid Decision-Making and Planning System with Reinforcement LearningChristopher-Eyk Hrabia, Patrick Marvin Lehmann, Sahin Albayrak. 469-478 [doi]
- AILiveSim: An Extensible Virtual Environment for Training Autonomous VehiclesJérôme Leudet, François Christophe, Tommi Mikkonen, Tomi Männistö. 479-488 [doi]
- Learning Distributed Cooperative Policies for Security Games via Deep Reinforcement LearningHassam Ullah Sheikh, Mina Razghandi, Ladislau Bölöni. 489-494 [doi]
- The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services OrchestrationsLucas Leal, Andrea Ceccarelli, Eliane Martins. 495-500 [doi]
- Visual Tracking with Autoencoder-Based Maximum A Posteriori Data FusionYevgeniy Reznichenko, Enrico Prampolini, Abubakar Siddique, Henry Medeiros, Francesca Odone. 501-506 [doi]
- Enhanced Detection of Crisis-Related Microblogs by Spatiotemporal Feedback LoopsChristian Meurisch, Zain Hamza, Bekir Bayrak, Max Mühlhäuser. 507-512 [doi]
- AssistantGraph: An Approach for Reusable and Composable Data-Driven Assistant ComponentsChristian Meurisch, Bekir Bayrak, Max Mühlhäuser. 513-522 [doi]
- Integrating Static Code Analysis ToolchainsMatthias Kern, Ferhat Erata, Markus Iser, Carsten Sinz, Frédéric Loiret, Stefan Otten, Eric Sax. 523-528 [doi]
- Producing Green Computing Images to Optimize Power Consumption in OLED-Based DisplaysSorath Asnani, Maria Giulia Canu, Bartolomeo Montrucchio. 529-534 [doi]
- LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic PlatoonsBrian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei. 535-544 [doi]
- Risk Assessment Methods for Cloud Computing PlatformsTim Weil. 545-547 [doi]
- Employer Branding in the IT Industry: An Employer viewAmir Dabirian. 548 [doi]
- A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G SystemsMgm Mehedi Hasan, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Walid Saad. 549-558 [doi]
- Information Exposure (IEX): A New Class in the Bugs Framework (BF)Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu. 559-564 [doi]
- DroidPatrol: A Static Analysis Plugin For Secure Mobile Software DevelopmentMd Arabin Islam Talukder, Hossain Shahriar, Kai Qian, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu. 565-569 [doi]
- Open Source Fog Architecture for Industrial IoT Automation Based on Industrial ProtocolsMohammad Ghazivakili, Claudio Demartini, Mauro Guerrera, Bartolomeo Montrucchio. 570-578 [doi]
- An Actor-Based Design Platform for System of SystemsMarjan Sirjani, Giorgio Forcina, Ali Jafari, Stephan Baumgart, Ehsan Khamespanah, Ali Sedaghatbaf. 579-587 [doi]
- Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance CountersCongmiao Li, Jean-Luc Gaudiot. 588-597 [doi]
- Research on Index Mechanism of HBase Based on Coprocessor for Sensor DataFeng Ye, Songjie Zhu, Yuansheng Lou, Zihao Liu, Yong Chen 0009, Qian Huang. 598-603 [doi]
- Testing Performance-Isolation in Multi-core SystemsJakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin. 604-609 [doi]
- Optimal Hand Sign Selection Using Information Theory for Custom Sign-Based CommunicationTokio Takahashi, Masato Uchida. 610-615 [doi]
- Touch-Based Ontology Browsing on Tablets and SurfacesFulvio Corno, Luigi De Russis, Luisa Fernanda Barrera-León. 616-621 [doi]
- Investigating Differences in Gaze and Typing Behavior Across Age Groups and Writing GenresJun Wang, Eugene Yujun Fu, Grace Ngai, Hong Va Leong. 622-629 [doi]
- Application of Reconstructed Phase Space in Autism InterventionPiyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Alana McVey, Amy VanHecke, Sheikh Iqbal Ahamed. 630-637 [doi]
- Using Gamification to Motivate Occupants to Energy Efficiency in a Social Setting of a Building Automation SystemJoana Páris, João Cambeiro, Vasco Amaral, Armanda Rodrigues. 638-643 [doi]
- A Tale of the Social-Side of ASDShameem Ahmed, M. Forhad Hossain, Kurt Price, Cody Pranger, Md Monsur Hossain, Moushumi Sharmin. 644-652 [doi]
- Analyzing Happiness: Investigation on Happy Moments using a Bag-of-Words Approach and Related Ethical DiscussionsRiddhiman Adib, Eyad Aldawod, Nathan Lang, Nina Lasswell, Shion Guha. 653-662 [doi]
- Long-Term Monitoring of NIRS Signals for Mental Health AssessmentLabiblais Rahman, Katsunori Oyama. 663-666 [doi]
- Barrier Detection Using Sensor Data from Multiple Modes of Transportation with Data AugmentationYuki Kurauchi, Naoto Abe, Hiroshi Konishi, Hitoshi Seshimo. 667-675 [doi]
- An Energy Efficient Pedestrian Heading Estimation Algorithm using SmartphonesYankan Yang, Baoqi Huang, Runze Yang. 676-684 [doi]
- Towards An Effective and Efficient Machine-Learning-Based Framework for Supporting Event Detection in Complex EnvironmentsAlfredo Cuzzocrea, Enzo Mumolo, Marco Tessarotto. 685-689 [doi]
- Towards Predicting Risky Behavior Among Veterans with PTSD by Analyzing Gesture PatternsTanvir Roushan, Riddhiman Adib, Nadiyah Johnson, Olawunmi George, Md Fitrat Hossain, Zeno Franco, Katinka Hooyer, Sheikh Iqbal Ahamed. 690-695 [doi]
- Improving Classification of Breast Cancer by Utilizing the Image Pyramids of Whole-Slide Imaging and Multi-scale Convolutional Neural NetworksLi Tong, Ying Sha, May D. Wang. 696-703 [doi]
- Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy RequirementsMaryam Farhadi, Hisham Haddad, Hossain Shahriar. 704-713 [doi]
- Computer Vision Based Systems for Human Pupillary Behavior Evaluation: A Systematic Review of the LiteratureCleyton Rafael Gomes Silva, Cristhiane Gonçalves, Joyce Siqueira, Fabrízzio A. A. M. N. Soares, Rodrigo Albernaz Bezerra, Hedenir Monteiro Pinheiro, Ronaldo Martins da Costa, Eduardo Nery Rossi Camillo, Augusto Paranhos Junior. 714-719 [doi]
- The Causes Analysis of Ischemic Stroke Transformation into Hemorrhagic Stroke using PLS (partial Least Square)-GA and Swarm AlgorithmChihhsiong Shih, William Cheng-Chung Chu, You-Wei Chang. 720-729 [doi]
- Fully Automatic Intervertebral Disc Segmentation Using Multimodal 3D U-NetChuanbo Wang, Ye Guo, Wei Chen, Zeyun Yu. 730-739 [doi]
- Comparing Health Outcomes in San Francisco and Boston Metro AreasSwapna S. Gokhale. 740-745 [doi]
- Dynamic Data Publishing with Differential Privacy via Reinforcement LearningRuichao Gao, Xuebin Ma. 746-752 [doi]
- Enforcing Optimal Moving Target Defense PoliciesJianjun Zheng, Akbar Siami Namin. 753-759 [doi]
- Automatic Detection of NoSQL Injection Using Supervised LearningMd. Rafidul Islam, Md. Saiful Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar. 760-769 [doi]
- Exploration into Gray Area: Efficient Labeling for Malicious Domain Name DetectionNaoki Fukushi, Daiki Chiba 0001, Mitsuaki Akiyama, Masato Uchida. 770-775 [doi]
- Precise and Robust Detection of Advertising FraudFumihiro Kanei, Daiki Chiba 0001, Kunio Hato, Mitsuaki Akiyama. 776-785 [doi]
- Raising the Bar Really High: An MTD Approach to Protect Data in Embedded BrowsersFadi Mohsen, Haadi Jafaarian. 786-794 [doi]
- Efficient SVM Based Packer Identification with Binary Diffing MeasuresYeong Cheol Kim, Joon-Young Paik, Seokwoo Choi, Eun-Sun Cho. 795-800 [doi]
- CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDsMordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici. 801-810 [doi]
- The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash FunctionsZeyad Al-Odat, Samee Khan. 811-816 [doi]
- CSKES: A Context-Based Secure Keyless Entry SystemJuan Wang, Karim Lounis, Mohammad Zulkernine. 817-822 [doi]
- Privacy Is The Best Policy: A Framework for BLE Beacon Privacy ManagementEmmanuel Bello-Ogunu, Mohamed Shehab, Md. Nazmus Sakib Miazi. 823-832 [doi]
- Safety and Security Co-Analyses: A Systematic Literature ReviewElena Lisova, Irfan Sljivo, Aida Causevic. 833 [doi]
- Sensor Networks and Data Management in Healthcare: Emerging Technologies and New ChallengesMatthew Pike, Nasser Mustafa, Dave Towey, Vladimir Brusic. 834-839 [doi]
- Multi-Breath: Separate Respiration Monitoring for Multiple Persons with UWB RadarYanni Yang, Jiannong Cao, Xiulong Liu, Xuefeng Liu. 840-849 [doi]
- sEmoD: A Personalized Emotion Detection Using a Smart Holistic Embedded IoT SystemA. K. M. Jahangir Alam Majumder, Tanner M. Mcwhorter, Yezhou Ni, Hanqing Nie, Jacob Iarve, Donald R. Ucci. 850-859 [doi]
- RIVER-MAC: A Receiver-Initiated Asynchronously Duty-Cycled MAC Protocol for the Internet of ThingsMathew L. Wymore, Daji Qiao. 860-869 [doi]
- GeneSIS: Continuous Orchestration and Deployment of Smart IoT SystemsNicolas Ferry 0001, Phu H. Nguyen, Hui Song, Pierre-Emmanuel Novac, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg. 870-875 [doi]
- Degree Distribution of Wireless Networks for Mobile IoT ApplicationsRenato Ferrero, Filippo Gandino. 876-881 [doi]
- Experimental Comparison of Pure Flooding and Its Variants on Raspberry Pi in Small Scale Ad Hoc NetworksSangwoo Jung, Ki-Il Kim. 882-883 [doi]
- Threshold-Driven Class DecompositionMohammed Hamdi, Rashmi Pethe, Annapoorani Sevugan Chetty, Dae-Kyoo Kim. 884-887 [doi]
- Optimized Division of Exploration Areas in Multi-robot Systems Considering Static and Dynamic Charging StationsRobison Cris Brito, Nicollas Saque, Diego Addan Gonçalves, Fábio Favarim, Eduardo Todt. 888-891 [doi]
- Analysis of the Evolution of the Influence of Central Nodes in a Twitter Social NetworkMinami Uehara, Sho Tsugawa. 892-895 [doi]
- Spam Domain Detection Method Using Active DNS Data and E-Mail Reception LogKenya Dan, Naoya Kitagawa, Shuji Sakuraba, Nariyoshi Yamai. 896-899 [doi]
- A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network EnvironmentRyuji Asakura, Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata. 900-903 [doi]
- A Modified Smart Contract Execution Enviroment for Safe Function CallsSooyeon Lee, Eun-Sun Cho. 904-907 [doi]
- Parallelization of Plane Sweep Based Voronoi Construction with Compiler DirectivesAnmol Paudel, Jie Yang, Satish Puri. 908-911 [doi]
- Toward an Optimal Anomaly Detection Pattern in Wireless Sensor NetworksMuhammad Alfian Amrizal, Luis Guillen, Takuo Suganuma. 912-913 [doi]
- Application and Research of Image-Based Modeling and 3D Printing Technology in Intangible Cultural Heritage Quanzhou Marionette ProtectionChao Gao, Junfeng Yao, Kaini Huang, Kai Qian. 914-915 [doi]
- Logistic Regression and Random Forest for Effective Imbalanced ClassificationHanwu Luo, Xiubao Pan, Qingshun Wang, Shasha Ye, Ying Qian. 916-917 [doi]
- Improving Prediction Accuracy for Logistic Regression on Imbalanced DatasetsHao Zhang, Zhuolin Li, Hossain Shahriar, Lixin Tao, Prabir Bhattacharya, Ying Qian. 918-919 [doi]
- IoT Malware AnalysisVictor Clincy, Hossain Shahriar. 920-921 [doi]
- Blockchain Development Platform ComparisonVictor Clincy, Hossain Shahriar. 922-923 [doi]
- Protecting Data in Android External Data StorageHao Zhang, Zhuolin Li, Hossain Shahriar, Dan Lo, Fan Wu, Ying Qian. 924-925 [doi]
- Achievements Visualization in Programming EducationKaisei Hanayama, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto. 926-927 [doi]
- Virtualization for Flexibility and Network-Aware on 5G Mobile DevicesKien Nguyen, Zhetao Li, Hiroo Sekiya. 928-929 [doi]
- CloneTM: A Code Clone Detection Tool Based on Latent Dirichlet AllocationSandeep Reddivari, Muhammad Salman Khan. 930-931 [doi]
- VisioTM: A Tool for Visualizing Source Code Based on Topic ModelingSandeep Reddivari, Muhammad Salman Khan. 932-933 [doi]
- A Protocol for Preventing Transaction Commitment without Recipient's Authorization on BlockchainRyosuke Yamauchi, Yoko Kamidoi, Shin'ichi Wakabayasi. 934-935 [doi]
- Rogue Wireless AP Detection using Delay Fluctuation in Backbone NetworkZiwei Zhang, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 936-937 [doi]
- Trust-Oriented Live Video Distribution ArchitectureTomoki Yoshihisa, Satoru Matsumoto, Tomoya Kawakami, Yuuichi Teranishi. 938-939 [doi]
- Detecting No-Sleep Bugs Using Sequential Reference CountsPriyanka Bharat Sakhare, Dae-Kyoo Kim, Mohammed Hamdi. 940-941 [doi]
- A Linear Regression Approach to Modeling Software Characteristics for Classifying Similar SoftwareHyun-il Lim. 942-943 [doi]
- Load Balancing Algorithm for Multiple UAVs Relayed Tactical Ad Hoc NetworksSangwoo Jung, Ki-Il Kim, Bongsoo Roh, Jae-Hyun Ham. 944-945 [doi]
- Garbage Weight Estimation SystemSai Mullangi, Thulasidhar Reddy Kattamreddy, Shanthan Ramadugu, Wook-Sung Yoo. 946-947 [doi]
- Topic Shift Detection in Online Discussions using Structural ContextYingcheng Sun, Kenneth A. Loparo. 948-949 [doi]
- A Clicked-URL Feature for Transactional Query IdentificationYingcheng Sun, Kenneth A. Loparo. 950-951 [doi]
- Context Aware Image Annotation in Active Learning with Batch ModeYingcheng Sun, Kenneth A. Loparo. 952-953 [doi]
- Information Extraction from Free Text in Clinical Trials with Knowledge-Based Distant SupervisionYingcheng Sun, Kenneth A. Loparo. 954-955 [doi]
- Basic Concept of Emergency Optical Network Planning Using Multiagent-Based Flexible and Autonomous Network ControlSatoru Izumi, Masaki Shiraiwa, Goshi Sato, Sugang Xu, Takuo Suganuma. 956-957 [doi]
- Basic Design of Network Control Method Based on Disaster Risk of OpenFlow C/M-PlaneSatoru Izumi, Hiroyuki Takahira, Kosuke Gotani, Misumi Hata, Luis Guillen, Toru Abe, Takuo Suganuma. 958-959 [doi]
- Predicting Opioid Use Disorder (OUD) Using A Random ForestAdway Wadekar. 960-961 [doi]