Abstract is missing.
- Implementing Inductive Logic into Embedded Industrial Control System with Polynomial Ring on F2Minzhong Luo, Shan Yu. 1-10 [doi]
- Comparison of Three Metaheuristic Algorithms for Optimization of Cyber Physical SystemsFu-Shiung Hsieh. 11-14 [doi]
- Domain-Agnostic Context-Aware Framework for Natural Language Interface in a Task-Based EnvironmentSarthak Tiwari, Ajay K. Bansal. 15-20 [doi]
- Robot Motion Planning: can GPUs be a Game Changer?Enrico Saccon, Paolo Bevilacqua, Daniele Fontanelli, Marco Frego, Luigi Palopoli, Roberto Passerone. 21-30 [doi]
- YOLOv4-object: an Efficient Model and Method for Object DiscoveryMang Ning, Yao Lu, Wenyuan Hou, Mihhail Matskin. 31-36 [doi]
- Streaming Data Priority Scheduling Framework for Autonomous Driving by EdgeLingbing Yao, Hang Zhao, Jie Tang, Shaoshan Liu, Jean-Luc Gaudiot. 37-42 [doi]
- Synthesis of Heterogeneous Dataflow Models from Synchronous SpecificationsOmair Rafique, Yu Bai 0003, Klaus Schneider 0001, Guangxi Yan. 43-48 [doi]
- LLM-shark - A Tool for Automatic Resource-boundness Analysis and Cache Partitioning SetupJakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin. 49-58 [doi]
- Resource Sharing and Security Implications on Machine Learning Inference AcceleratorsPlínio Silveira, César Augusto Fonticielha De Rose, Avelino Francisco Zorzo, Miguel Gomes Xavier, Dejan S. Milojicic, Sai Rahul Chalamalasetti, Sergey Serebryakov. 59-67 [doi]
- HybridSkipList: A Case Study of Designing Distributed Data Structure with Hybrid RDMATeng Ma, Dongbiao He, Gordon Ning Liu. 68-73 [doi]
- CLACER: A Deep Learning-based Compilation Error Classification Method for Novice Students' ProgramsZheng Li 0002, Fuxiang Sun, Haifeng Wang, Yifan Ding, Yong Liu, Xiang Chen 0005. 74-83 [doi]
- Mathematics in higher education: a transition from blended to online learning in pandemic timesFederica Galluzzi, Marina Marchisio, Fabio Roman, Matteo Sacchet. 84-92 [doi]
- Using Cognitive Interest Graph and Knowledge-activated Attention for Learning Resource RecommendationZeyu He, Jianzong Kuang, Wang Li, Yonghong Yan 0002. 93-102 [doi]
- Automatic slides generation in the absence of training dataLuca Cagliero, Moreno La Quatra. 103-108 [doi]
- What should I learn next? Ranking Educational ResourcesVictor Connes, Colin de la Higuera, Hoël Le Capitaine. 109-114 [doi]
- From teaching books to educational videos and vice versa: a cross-media content retrieval experienceLorenzo Canale, Laura Farinetti, Luca Cagliero. 115-120 [doi]
- OPUS: an Alternate Reality Game to learn SQL at universityMara Lupano, Laura Farinetti, Domenico Morreale. 121-126 [doi]
- Enhancing Student Learning Through an Open Educational Resource CompetitionHenry C. B. Chan, Isabel M. Kemp, Winnie C. L. Leung, Edmundo Tovar, Sorel Reisman. 127-132 [doi]
- An Immersive Virtual Reality Platform for Training CBRN OperatorsFabrizio Lamberti, Federico De Lorenzis, Filippo Gabriele Pratticò, Massimo Migliorini. 133-137 [doi]
- Study and proposal for Visual Programming Platform - Design for educational robotics for children aged 8 to 14 yearsDaniel Scherer, Fábio Dantas Guimarães. 138-143 [doi]
- Using Cloudmesh GAS for Speedy Generation of Hybrid Multi-Cloud Auto Generated AI ServicesGregor von Laszewski, Anthony Orlowski, Richard H. Otten, Reilly Markowitz, Sunny Gandhi, Adam Chai, Geoffrey C. Fox, Wo L. Chang. 144-155 [doi]
- A Machine Learning Approach for Gas Price Prediction in Ethereum BlockchainRawya Mars, Amal Abid 0002, Saoussen Cheikhrouhou, Slim Kallel. 156-165 [doi]
- Intelligent Probabilistic Forecasts of Day-Ahead Electricity Prices in a Highly Volatile Power MarketBehrouz Banitalebi, Srimantoorao Semischetty Appadoo, Yuvraj Gajpal, Aerambamoorthy Thavaneswaran. 166-175 [doi]
- Learning to Match Workers and Tasks via a Multi-View Graph Attention NetworkNan Cui, Chunqi Chen, Beijun Shen, Yuting Chen. 176-185 [doi]
- A Fast Training Method using Bounded Continual Learning in Image ClassificationSeunghui Jang, Yanggon Kim. 186-191 [doi]
- CGAN-IRB: A Novel Data Augmentation Method for Apple Leaf DiseasesXinbin Yuan, Cong Yu, Bin Liu, Henan Sun, Xianyu Zhu. 192-200 [doi]
- An Empirical Evaluation of Algorithms for Data LabelingTeodor Fredriksson, David Issa Mattos, Jan Bosch, Helena Holmström Olsson. 201-209 [doi]
- Enhancing LSTM Prediction of Vehicle Traffic Flow Data via Outlier CorrelationsWesley Fitters, Alfredo Cuzzocrea, Marwan Hassani. 210-217 [doi]
- A Novel Dynamic Demand Forecasting Model for Resilient Supply Chains using Machine LearningMd. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Srimantoorao Semischetty Appadoo, Ruppa K. Thulasiram, Behrouz Banitalebi. 218-227 [doi]
- ROCT: Radius-based Class Overlap Cleaning Technique to Alleviate the Class Overlap Problem in Software Defect PredictionShuo Feng, Jacky Keung, Jie Liu, Yan Xiao, Xiao Yu, Miao Zhang. 228-237 [doi]
- Personalized and Dynamic top-k Recommendation System using Context Aware Deep Reinforcement LearningAnubha Kabra, Anu Agarwal. 238-247 [doi]
- Defect Detection of Metal Nuts Applying Convolutional Neural NetworksDaniel Sauter, Anna Schmitz, Fulya Dikici, Hermann Baumgartl, Ricardo Buettner. 248-257 [doi]
- FaasRS: Remote Sensing Image Processing System on Serverless PlatformGuang Yang, Jie Liu, Muzi Qu, Shuai Wang, Dan Ye, Hua Zhong. 258-267 [doi]
- Quantifying Event Impact on the Bitcoin BlockchainAnthony Luo, Dianxiang Xu. 268-273 [doi]
- Improved Causal Models of Alzheimer's DiseaseHengyi Hu, Larry Kerschberg. 274-283 [doi]
- Hierarchical Clustering Based on Local Cores and Sharing ConceptJinxin Shi, Qingsheng Zhu, Junnan Li 0004, Ji Liu, Dongdong Cheng. 284-289 [doi]
- CASR: A Collaborative Attention Model for Session-based RecommendationPeiyao Han, Nan Wang, Kun Li, Xiaokun Li. 290-296 [doi]
- Assessing Palliative Care Needs Using Machine Learning ApproachesYun Shi, Zhiyao Wu, Shaolun Zhang, Hong Xiao, Yijun Zhao. 297-302 [doi]
- Visual Defect Detection of Metal Screws using a Deep Convolutional Neural NetworkDaniel Sauter, Cem Atik, Christian Schenk 0005, Ricardo Buettner, Hermann Baumgartl. 303-311 [doi]
- Abnormal Transaction Detection based on Graph NetworksLian Yu, Ning Zhang, Weiping Wen. 312-317 [doi]
- Consumer Fraud Detection via P-feature ConversionShanyan Lai, Junfang Wu, Zhiwei Ma, Chunyang Ye, Hui Zhou. 318-323 [doi]
- Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning NetworkAndrea Lisi, Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci. 324-331 [doi]
- A Bayesian Framework for Supporting Predictive Analytics over Big Transportation DataMarshall D. Jackson, Carson K. Leung, M. Diarra B. Mbacke, Alfredo Cuzzocrea. 332-337 [doi]
- One Source to Detect them All: Gender, Age, and Emotion Detection from VoiceSyed Rohit Zaman, Dipan Sadekeen, M. Aqib Alfaz, Rifat Shahriyar. 338-343 [doi]
- SALAD: Self-Adaptive Lightweight Anomaly Detection for Real-time Recurrent Time SeriesMing-Chang Lee, Jia-Chun Lin, Ernst Gunnar Gran. 344-349 [doi]
- TimeRadar: Visualizing the Dynamics of Multivariate Communities via Timeline ViewsNgan V. T. Nguyen, Jon Hass, Tommy Dang. 350-356 [doi]
- A Survey on Blockchain Data AnalysisWenhan Hou, Bo Cui, Ru Li. 357-365 [doi]
- A novel software defect prediction method based on hierarchical neural networkHuiqun Yu, Xingjie Sun, Ziyi Zhou, Guisheng Fan. 366-375 [doi]
- Diversifying Relevant Search Results from Social Media using Community Contributed ImagesVaibhav Kalakota, Ajay Bansal. 376-385 [doi]
- In-air Signature Authentication Using Smartwatch Motion SensorsGen Li, LingFeng Zhang, Hiroyuki Sato. 386-395 [doi]
- Effectiveness of a Data-based Influence Maximization Algorithm Using Information Diffusion CascadesTakuya Nagase, Sho Tsuguwa. 396-401 [doi]
- Estimating the incidence of adverse weather effects on road traffic safety using time series embeddingsJacopo Fior, Luca Cagliero. 402-407 [doi]
- Improving Human-Centric Software Defect Evaluation, Reporting, and FixingKenny Huynh, Juvent Benarivo, Chew Da Xuan, Giridhar Gopal Sharma, Jeffrey Kang, Anuradha Madugalla, John C. Grundy. 408-417 [doi]
- PeakVis: a Visual Analysis Tool for Social Network Data and Video BroadcastsPedro Henrique M. Sanvido, Gabriela Birnfeld Kurtz, Carlos Roberto G. Teixeira, Pedro P. Wagner, Lorenzo P. Leuck, Milene Selbach Silveira, Roberto Tietzmann, Isabel Harb Manssour. 418-427 [doi]
- College Life is Hard! - Shedding Light on Stress Prediction for Autistic College Students using Data-Driven AnalysisTanzima Zerin Islam, Philip Wu Liang, Forest Sweeney, Cody Pranger, Jayaraman J. Thiagarajan, Moushumi Sharmin, Shameem Ahmed. 428-437 [doi]
- Visualization as a Tool to Understand the Experience of College Students with AutismSean McCulloch, Joseph Gildner, Bradley Hoefel, Gabrielle Cervantes, Shameem Ahmed, Moushumi Sharmin. 438-445 [doi]
- Detecting Offensive Content on Social Media During Anti-Lockdown Protests in MichiganJihye Moon, Hieu Nguyen, Bradshaw Pines, Swapna S. Gokhale. 446-451 [doi]
- Challenges in Geographically Distributed Information System Development: A Case StudyJali Asp, Toni Taipalus, Ville Seppänen. 452-458 [doi]
- Real-time End-to-End Federated Learning: An Automotive Case StudyHongyi Zhang, Jan Bosch, Helena Holmström Olsson. 459-468 [doi]
- Data Integrity Security Spots Detected by Object ReferenceRajasree Punneth Radhakrishnan, Michael Shin, Pushkar Ogale. 469-474 [doi]
- Behind The Mask: Masquerading The Reason for PredictionTomohiro Koide, Masato Uchida. 475-481 [doi]
- SINETStream: Enabling Research IoT Applications with Portability, Security and Performance RequirementsAtsuko Takefusa, Jingtao Sun, Ikki Fujiwara, Hiroshi Yoshida, Kento Aida, Calton Pu. 482-492 [doi]
- Social-based City Reconstruction Planning in case of natural disasters: a Reinforcement Learning ApproachGhulam Mudassir, Antinisca Di Marco. 493-503 [doi]
- Ensemble-based Efficient Anomaly Detection for Smart Building Control SystemsNur Imtiazul Haque, Mohammad Ashiqur Rahman, Hossain Shahriar. 504-513 [doi]
- A human-centric approach to building a smarter and better parking applicationChenlin Li, Yuting Yu, Jeremy Leckning, Weicheng Xing, Chun Long Fong, John C. Grundy, Devi Karolita, Jennifer Mcintosh, Humphrey O. Obie. 514-519 [doi]
- Towards An Indoor Navigation System Using Monocular Visual SLAMAkshat Bajpai, Sepehr Amir-Mohammadian. 520-525 [doi]
- EasyCloud: Multi-clouds made easyCosimo Anglano, Massimo Canonico, Marco Guazzone. 526-531 [doi]
- Augmented Reality for Training and Maintenance of Reclosers: A Case Study of a Wearable ApplicationArthur Bastes, Samira Ribeiro, Alano Pinto, Francisco Marques, Diogo Baldissin, Flávio Reis. 532-537 [doi]
- Combining Mobile Crowdsensing and Wearable Devices for Managing Alarming SituationsViktoriya Kutsarova, Mihhail Matskin. 538-543 [doi]
- P4 Transformer: Towards Unified Programming for the Data Plane of Software Defined NetworkZijun Hang, YongJie Wang, Shuguang Huang. 544-551 [doi]
- Resource Discovery for Edge Computing over Named Data NetworkingDaishi Kondo, Thomas Ansquer, Yosuke Tanigawa, Hideki Tode. 552-559 [doi]
- A Multipath Routing Approach for Tile-based Virtual Reality Video Streaming Based on SDNFanyuan Zou, Yumei Wang, Yu Liu. 560-565 [doi]
- A Data Scheduling Method for Video-on-Demand Systems on Radio Broadcasting EnvironmentsSatoru Matsumoto, Tomoki Yoshihisa, Shinji Shimojo. 566-573 [doi]
- Bringing Opportunistic Networking to Smartphones: a Pragmatic ApproachFrédéric Guidec, Yves Mahéo, Pascale Launay, Lionel Touseau, Camille Noûs. 574-579 [doi]
- An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its EffectivenessMd Jobair Hossain Faruk, Maria Valero, Hossain Shahriar. 580-589 [doi]
- Pain Level Assessment for Infants Using Facial Expression ScoresHermann Baumgartl, Dennis Flathau, Samuel Bayerlein, Daniel Sauter, Ingo J. Timm, Ricardo Buettner. 590-598 [doi]
- Diagnostic Imaging Support System for Rheumatoid Arthritis Using Ultrasound ImagesKenichi Arai, Chisato Miura, Shin-Ya Kawashiri, Tetsuo Imai, Toru Kobayashi. 599-607 [doi]
- Does Our Collective Stringency Control the Virus? Investigating Lockdown Effectiveness on Community Mobility DataKangcheng Li, Jiangtao Wang, Zhicen Liu, Yunqi Zhang, Zihao Xie. 608-617 [doi]
- Auto-Grading OCT Images Diagnostic Tool for Retinal DiseasesShiyu Tian, Nihel Charfi, Jannatul Ferdause Tumpa, Nivedh Mudiam, Velinka Medic, Judy E. Kim, Sheikh Iqbal Ahamed. 618-625 [doi]
- Data-Driven Generation of Medical-Research Hypotheses in Cancer PatientsHsin-Hsiung Chang, Jung-Hsien Chiang, Cheng-Chung Chu. 626-631 [doi]
- Towards a Template Matching Approach for Human Fall DetectionSnigdha Chaudhari, Razib Iqbal. 632-637 [doi]
- A Multi-case Perspective Analytical Framework for Discovering Human Daily Behavior from Sensors using Process MiningFrans Prathama, Bernardo Nugroho Yahya, Seok-Lyong Lee. 638-644 [doi]
- Pain Action Unit Detection in Critically Ill PatientsSubhash Nerella, Julie Cupka, Matthew Ruppert, Patrick J. Tighe, Azra Bihorac, Parisa Rashidi. 645-651 [doi]
- A Markovian Probabilistic Model for Risk Analysis and Forecasting in Big Healthcare Data SettingsAntonio Coronato, Alfredo Cuzzocrea. 652-662 [doi]
- Prediction of COVID-19 from Chest X-ray Images Using Multiresolution Texture Classification with Robust Local FeaturesZakariya A. Oraibi, Safaa Albasri. 663-668 [doi]
- Data Analysis Methods for Health Monitoring Sensors: A surveyShahriar Sobhan, Md. Saiful Islam, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed. 669-676 [doi]
- Unmasking the Mask Debate on Social MediaLuca Cerbin, Jason DeJesus, Julia Warnken, Swapna S. Gokhale. 677-682 [doi]
- Gestation: A Microservice architecture for a prenatal care applicationJosé George Dias De Souza, Daniel Scherer. 683-687 [doi]
- Towards Developing An EMR in Mental Health Care for Children's Mental Health Development among the Underserved Communities in USAKazi Zawad Arefin, Kazi Shafiul Alam Shuvo, Masud Rabbani, Peter Dobbs, Leah Jepson, Amy Leventhal, Amy Vaughan Van Heeke, Sheikh Iqbal Ahamed. 688-693 [doi]
- The Impact Analysis of Multiple Miners and Propagation Delay on Selfish MiningQing Xia, Wensheng Dou, Tong Xi, Jing Zeng, Fengjun Zhang, Jun Wei 0001, Geng Liang. 694-703 [doi]
- Detecting Event-synced Navigation Attacks across User-generated Content PlatformsHiroki Nakano, Daiki Chiba 0001, Takashi Koide, Mitsuaki Akiyama. 704-713 [doi]
- Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security AnalysisGuodi Wang, Tong Li 0001, Hao Yue, Zhen Yang, Runzi Zhang. 714-724 [doi]
- DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical SystemsMd Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, Badrul Chowdhury. 725-734 [doi]
- An Empirical Study of Vulnerabilities in RoboticsKaitlyn Cottrell, Dibyendu Brinto Bose, Hossain Shahriar, Akond Rahman. 735-744 [doi]
- LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables EmissionMordechai Guri. 745-754 [doi]
- A Systematic Mapping Study on Approaches for Al-Supported Security Risk AssessmentGencer Erdogan, Enrique Garcia-Ceja, Åsmund Hugo, Phu H. Nguyen, Sagar Sen. 755-760 [doi]
- Towards Provenance-based Trust-aware Model for Socio-Technically Connected Self-Adaptive SystemHyo-Cheol Lee, Seok-Won Lee. 761-767 [doi]
- Impact of Resource-Constrained Networks on the Performance of NIST Round-3 PQC CandidatesDale Auten, Thoshitha Gamage. 768-773 [doi]
- An Adaptively Parameterized Algorithm Estimating Respiratory Rate from a Passive Wearable RFID Smart GarmentRobert Ross, William M. Mongan, Patrick O'Neill, Ilhaan Rasheed, Adam K. Fontecchio, Geneviève Dion, Kapil R. Dandekar. 774-784 [doi]
- A Bowel Sound Detection Method Based on a Novel Non-speech Body Sound Sensing DeviceYuzhe Qiao, Liang Wang, XianPing Tao. 785-793 [doi]
- A Transfer Learning Approach to Surface Detection for Accessible Routing for Wheelchair UsersValeria Mokrenko, Haoxiang Yu, Vaskar Raychoudhury, Janick Edinger, Roger O. Smith, Md. Osman Gani. 794-803 [doi]
- Predicting Next Call Duration: A Future Direction to Promote Mental Health in the Age of LockdownSudip Vhaduri, Sayanton V. Dibbo, Chih-You Chen, Christian Poellabauer. 804-811 [doi]
- Recommending Bug-fixing Comments from Issue Tracking Discussions in Support of Bug RepairRrezarta Krasniqi. 812-823 [doi]
- Automatic Learning Path Recommendation for Open Source Projects Using Deep Learning on Knowledge GraphsHang Yin, Zhiyu Sun, Yanchun Sun, Gang Huang 0001. 824-833 [doi]
- Predicting Entity Relations across Different Security Databases by Using Graph Attention NetworkLiu Yuan, Yude Bai, Zhenchang Xing, Sen Chen, Xiaohong Li 0001, Zhidong Deng. 834-843 [doi]
- Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar ModelsWenxing Liu, Yunduo Wang, Qixiang Zhou, Tong Li 0001. 844-853 [doi]
- A support tool for the L + 1-layer divide & conquer approach to leads-to model checkingYati Phyo, Canh Minh Do, Kazuhiro Ogata 0001. 854-863 [doi]
- Exploiting Multi-aspect Interactions for God Class Detection with Dataset Fine-tuningShaojun Ren, Chongyang Shi, Shuxin Zhao. 864-873 [doi]
- Uncertainty Modeling and Quantitative Evaluation of Cyber-physical SystemsChenchen Yang, Haiying Sun, Jing Liu, Jiexiang Kang, Wei Yin, Hui Wang, Tengfei Li. 874-883 [doi]
- Trace-based Intelligent Fault Diagnosis for Microservices with Deep LearningHao Chen, Kegang Wei, An Li, Tao Wang, Wenbo Zhang. 884-893 [doi]
- API Change Impact Analysis for Android AppsTarek Mahmud, Mujahid Khan, Jihan Rouijel, Meiru Che, Guowei Yang. 894-903 [doi]
- A Self-enhanced Automatic Traceability Link Recovery via Structure Knowledge Mining for Small-scale Labeled DataLei Chen, Dandan Wang, Lin Shi, Qing Wang. 904-913 [doi]
- A Large-Scale Empirical Study of COVID-19 Themed GitHub RepositoriesLiu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang. 914-923 [doi]
- Multi-faceted Classification for the Identification of Informative Communications during Crises: Case of COVID-19Zhuoli Xie, Ajay Jayanth, Kapil Yadav, Guanghui Ye, Lingzi Hong. 924-933 [doi]
- Perceived benefits of Continuous Deployment in Software-Intensive Embedded SystemsAnas Dakkak, David Issa Mattos, Jan Bosch. 934-941 [doi]
- Local and Global Feature Based Explainable Feature Envy DetectionXin Yin, Chongyang Shi, Shuxin Zhao. 942-951 [doi]
- Graph Representation for Data Flow CoverageMario Concilio Neto, Roberto P. A. Araujo, Marcos Lordello Chaim, Jeff Offutt. 952-961 [doi]
- MuKEA-TCP: A Mutant Kill-based Local Search Augmented Evolutionary Algorithm Approach for Test Case PrioritizationEkincan Ufuktepe, Deniz Kavzak Ufuktepe, Korhan Karabulut. 962-967 [doi]
- A Variability-Enabling and Model-Driven Approach to Adaptive Microservice-based SystemsChang-ai Sun, Jing Wang, Zhenxian Liu, Yanbo Han. 968-973 [doi]
- Second-Order Mutation Testing Cost Reduction Based on Mutant Clustering using SOM Neural Network ModelJing Liu, Li Song. 974-979 [doi]
- Weighted Reward for Reinforcement Learning based Test Case Prioritization in Continuous Integration TestingGuowei Li, Yang Yang, Zhaolin Wu, Tiange Cao, Yong Liu, Zheng Li. 980-985 [doi]
- DockerGen: A Knowledge Graph based Approach for Software ContainerizationHongjie Ye, Jiahong Zhou, Wei Chen 0018, Jiaxin Zhu, Guoquan Wu, Jun Wei 0001. 986-991 [doi]
- An architecture for enabling A/B experiments in automotive embedded softwareYuchu Liu, Jan Bosch, Helena Holmström Olsson, Jonn Lantz. 992-997 [doi]
- Effective Multi-Fault Localization Based on Fault-Relevant StatisticsSihan Xu, Ya Gao, Xiangrui Cai, Zhiyu Wang, Hua Ji. 998-1003 [doi]
- Scrum, Sampling, and the 90 Percent SyndromeRobert Ward, Carl K. Chang. 1004-1013 [doi]
- Code Change Sniffer: Predicting Future Code Changes with Markov ChainEkincan Ufuktepe, Tugkan Tuglular. 1014-1019 [doi]
- Key Aspects Augmentation of Vulnerability Description based on Multiple Security DatabasesHao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li 0001, Yude Bai, Hu Zhang. 1020-1025 [doi]
- Towards a Modelling Workbench with flexible Interaction Models for Model Editors operating through Voice and GesturesJoão Fonseca de Carvalho, Vasco Amaral. 1026-1031 [doi]
- Parallel Deep Neural Networks for Musical Genre Classification: A Case StudyHui Yuan, Wenjia Zheng, Yun Song, Yijun Zhao. 1032-1035 [doi]
- How Do Avatar Appearances Affect Communication from Others?Yasuaki Kobayashi, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo. 1036-1039 [doi]
- Consistent Substitution of Object in Rule-based IoT ApplicationsGwen Salaün. 1040-1048 [doi]
- Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic ClassificationHolden Gordon, Christopher Batula, Bhagyashri Tushir, Behnam Dezfouli, Yuhong Liu. 1049-1057 [doi]
- MI-FIWARE: A web component development method for FIWARE using microservicesJuan Alberto Llopis, Manel Mena, Javier Criado, Luis Iribarne. 1058-1065 [doi]
- Discriminative Pattern Mining for Runtime Security Enforcement of Cyber-Physical Point-of-Care Medical TechnologyFred Love, Jennifer Leopold, Bruce M. McMillin, Fei Su. 1066-1072 [doi]
- Reviewing Polypharmacy in Elderly Individuals of Rural RegionsSayeda Farzana Aktar, Feroz Jahangir Rana, Siam Rezwan, Iysa Iqbal, Lopa Kabir, Rezwan Islam, Sheikh Iqbal Ahamed. 1073-1078 [doi]
- MLNER: Exploiting Multi-source Lexicon Information Fusion for Named Entity Recognition in Chinese Medical TextYinlong Xiao, Qing Zhao, Jianqiang Li 0002, Jieqing Chen, Zhenning Cheng. 1079-1084 [doi]
- Updating the Taxonomy of Intrusion Detection SystemsAbhishek Phadke, Stanislav Ustymenko. 1085-1091 [doi]
- Potential Security Risks of Internationalized Domain Name Processing for HyperlinkTaiga Shirakura, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 1092-1098 [doi]
- Identification of TLS Communications Using Randomness TestingAtsushi Kanda, Masaki Hashimoto. 1099-1106 [doi]
- Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack GraphsShuvo Bardhan, Abdella Battou. 1107-1113 [doi]
- 3 Model-MapHenry C. B. Chan. 1114-1118 [doi]
- Use of Augmented and 3D Visualization as a Tool to Support the Teaching of Spatial GeometryThiciany Matsudo Iwano, Dayvson Duarte Pereira, Daniel Scherer. 1119-1124 [doi]
- Remote Software Development: A Student-staff Collaboration to Build a Showcase Platform for Non-traditional Digital ArtefactsDave Towey, Kevin Ferdinand, Gabrielle Saputra Hadian, Ivan Christian Halim, Aurelie U.-King Im, Joseph Manuel Thenara, Patricia Wong, Li-Kai Wu. 1125-1130 [doi]
- Transcribathons as Practice-Based Learning for Historians and Computer ScientistsCiara Breathnach, Rachel Murphy, Tiziana Margaria. 1131-1136 [doi]
- Creating a Virtual Reality OER Application to Teach Web AccessibilityChengke Tang, Amarpreet S. Gill, Matthew Pike, Dave Towey. 1137-1142 [doi]
- A Keyword Query Approach Based on Community Structure of RDF Entity GraphHanning Zhang, Bo Dong 0001, Boqin Feng, Bifan Wei. 1143-1148 [doi]
- ApproxiFuzzer: Fuzzing towards Deep Code Snippets in Java ProgramsXintian Yu, Enze Ma, Pengbo Nie, Beijun Shen, Yuting Chen, Ziyi Lin. 1149-1156 [doi]
- Classifying Memory Bugs Using Bugs Framework ApproachIrena Bojanova, Carlos Eduardo Galhardo. 1157-1164 [doi]
- Optimised Fusion Model for Meeting Sulphur Abatement Standards in Shipping IndustryYuting Hu, Shikun Zhou, David A. Sanders, Weicong Zhang, Linda Yang 0002. 1165-1169 [doi]
- An Optimal Composite Service Selection Model based on Edge-Cloud CollaborationYan Wang, Na Zhou, Haixia Lang, Yunying Li. 1170-1175 [doi]
- A Distributed Cloud Honeypot ArchitectureJason Xiaojun Huang, Shikun Zhou, Nick Savage, Weicong Zhang. 1176-1181 [doi]
- Design and Implementation of a Voice Interactive Tool to Facilitate Web CollaborationQiang Li, Wenxia Qiao, Haiyang Tian, Zhi Li, Mingjuan Ma. 1182-1187 [doi]
- Accelerating Transmission of Streaming Files Based on AL-FEC Protection BlocksShih-Ying Chang, Hsin-Ta Chiao, Ruey-Kai Sheu, Lun-Chi Chen, Welly. 1188-1193 [doi]
- FireBugs: Finding and Repairing Cryptography API Misuses in Mobile ApplicationsLarry Singleton, Rui Zhao, Harvey P. Siy, Myoungkyu Song. 1194-1201 [doi]
- Mutual Secrecy of Attributes and Authorization Policies in Identity FederationSatsuki Nishioka, Yasuo Okabe. 1202-1209 [doi]
- Addressing Audit and Accountability Issues in Self-Sovereign Identity Blockchain Systems Using Archival Science PrinciplesVictoria Lemieux, Artemij Voskobojnikov, Meng Kang. 1210-1216 [doi]
- Decentralizing Identity Management and Vehicle Rights Delegation through Self-Sovereign Identities and BlockchainSofia Terzi, Charalampos Savvaidis, Athanasios Sersemis, Konstantinos Votis, Dimitrios Tzovaras. 1217-1223 [doi]
- Learning Models of Cyber-Physical Systems using Automata LearningLutz Schammer, Swantje Plambeck, Fin Hendrik Bahnsen, Görschwin Fey. 1224-1229 [doi]
- YOLO-based Panoptic Segmentation NetworkManuel Diaz-Zapata, Özgür Erkent, Christian Laugier. 1230-1234 [doi]
- A Model to Helping the Construction of Creative Service-Based SoftwarePei Shu Huang, Faisal Fahmi, Feng-Jian Wang. 1235-1242 [doi]
- H-FFMRA: A Multi Resource Fully Fair Resources Allocation Algorithm in Heterogeneous Cloud ComputingHamed Hamzeh, Sofia Meacham, Kashaf Khan, Angelos Stefanidis, Keith Phalp. 1243-1249 [doi]
- A CNN sign language recognition system with single & double-handed gesturesNeil Buckley, Lewis Sherrett, Emanuele Lindo Secco. 1250-1253 [doi]
- Towards a Digital Twin Framework for Autonomous RobotsGill Lumer-Klabbers, Jacob Odgaard Hausted, Jakob Levisen Kvistgaard, Hugo Daniel Macedo, Mirgita Frasheri, Peter Gorm Larsen. 1254-1259 [doi]
- Automatic Cataract Grading with Visual-semantic InterpretabilityXi Xu, JianQiang Li, Yu Guan, Linna Zhao, Li Zhang, Li Li. 1260-1264 [doi]
- A Framework for the Composition of IoT and CPS CapabilitiesKhalid Halba, Edward Griffor, Ahmed Lbath, Anton Dahbura. 1265-1272 [doi]
- Smart Home applied to historic buildings A real case studyAndrea Bauchiero, Guido Perboli, Mariangela Rosano. 1273-1278 [doi]
- Decision-Support System for the Optimal Technology Split of a Decarbonized Bus NetworkNathalie Frieß, Ulrich Pferschy. 1279-1284 [doi]
- A Blockchain, 5G and IoT-based transaction management system for Smart Logistics: an Hyperledger frameworkVittorio Capocasale, Danilo Gotta, Stefano Musso, Guido Perboli. 1285-1290 [doi]
- Mixing machine learning and optimization for the tactical capacity planning in last-mile deliveryEdoardo Fadda, Stanislav Fedorov, Guido Perboli, Ivan Dario Cardenas Barbosa. 1291-1296 [doi]
- A Complexity Reduction Method for Road Pricing Based on Demand DistributionKoki Murata, Noriyoshi Yamamoto, Tomoya Kawakami. 1297-1302 [doi]
- A Requirement-based Regression Test Selection Technique in Behavior-Driven DevelopmentJincheng Xu, Qingfeng Du, Xiaojun Li. 1303-1308 [doi]
- Formal Simulation and Verification of Solidity contracts in Event-BJian Zhu, Kai Hu 0004, Mamoun Filali, Jean-Paul Bodeveix, Jean-Pierre Talpin, Haitao Cao. 1309-1314 [doi]
- Metamorphic Testing for Block CiphersMingjia Zhang, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou. 1315-1320 [doi]
- Utilizing obfuscation information in deep learning-based Android malware detectionJunji Wu, Atsushi Kanai. 1321-1326 [doi]
- Software Safety Verification Framework based on Predicate AbstractionHaowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen. 1327-1332 [doi]
- Towards Verified Safety-critical Autonomous Driving Scenario with ADSMLDehui Du, Jiena Chen, Mingzhuo Zhang, Mingjun Ma. 1333-1338 [doi]
- A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation CapabilitiesAlexander Boyett, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman. 1339-1344 [doi]
- Design Scheme of Perceptual Hashing based on Output of CNN for Digital WatermarkingZhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita. 1345-1350 [doi]
- Cybersecurity Risks and Mitigation Techniques During COVID-19A. B. M. Kamrul Riad, Hossain Shahriar, Maria Valero, Mokter Hossain. 1351-1356 [doi]
- Towards Concurrent Audit Logging in MicroservicesSepehr Amir-Mohammadian, Afsoon Yousefi Zowj. 1357-1362 [doi]
- Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of NeuroticismPablo López-Aguilar, Agusti Solanas. 1363-1368 [doi]
- OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS AttackAbdullah Al Farooq, Thomas Moyer, Dewan Tanvir Ahmed. 1369-1374 [doi]
- A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow VulnerabilityGiovanni George, Jeremiah Kotey, Megan Ripley, Kazi Zakia Sultana, Zadia Codabux. 1375-1380 [doi]
- An Innovative Virtual Learning Environment to Enhance Age-Friendly Cultural CompetenciesPamela Mutombo, Andrei B. Bezerra Torres, Bill Kapralos, Brenda Gamble, Celeste Adams, Lynda Lawson, Celina Da Silva, Adam Dubrowski. 1381-1382 [doi]
- Person-Centered Virtual Serious Games: Mental Health EducationCelina Da Silva, Andrei B. Bezerra Torres, Bill Kapralos, Eva Peisachovich, Adam Dubrowski, Veronica Baltazar, Bilal Qureshi, Nelson Caraballo. 1383-1384 [doi]
- Research on Periodic Precaching Optimization Strategy Based on Access ModeLiang Ye, Weijie Li, Wenhao Zhu. 1385-1386 [doi]
- Artificial intelligence-based school decision support system to enhance care provided for children at schools in the United Arab EmiratesNabeel Al-Yateem, Amina Al Marzooqi, Jacqueline Maria Dias, Muhammad Arsyad Subu, Syed Azizur Rahman, Iqbal Shaikh Ahamed, Mohammad AlShabi. 1387-1388 [doi]
- VisLan: A Tool for Visualizing Landmark files in Source CodeSandeep Reddivari. 1389-1390 [doi]
- Relationship between Internet Gaming Addiction and Body Mass Index Status among Indonesian Junior High School StudentsMuhammad Arsyad Subu, Nabeel Al-Yateem, Imam Waluyo, Jacqueline Maria Dias, Syed Azizur Rahman, Rinto Agustino, Iqbal Shaikh Ahamed, Amina Al Marzooqi. 1391-1393 [doi]
- Social Media Use and Physical Activity among Junior High School Students in IndonesiaMuhammad Arsyad Subu, Nabeel Al-Yateem, Imam Waluyo, Djadjang Aditaruna, Syed Azizur Rahman, Amina Al Marzooqi, Jacqueline Maria Dias, Iqbal Shaikh Ahamed. 1394-1396 [doi]
- Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted DataZaid Ameen Abduljabbar, Ayad Ibrahim, Mustafa A. Al Sibahee, Songfeng Lu, Samir M. Umran. 1397-1398 [doi]
- A Classification of Web Service Credibility MeasuresJaciel E. Reyes, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman, Sarika Jain. 1399-1400 [doi]
- Deep Feature Learning to Quantitative Prediction of Software DefectsLei Qiao, Guangjie Li, Daohua Yu, Hui Liu. 1401-1402 [doi]
- Predicting Number of Bugs before Launch: An Investigation based on Machine LearningShyam Rajendren, Sandeep Reddivari. 1403-1404 [doi]
- Automated Educational Program Mapping on Learning Standards in Computer ScienceKoki Miura, Daisuke Saito, Hironori Washizaki, Yoshiaki Fukazawa. 1405-1406 [doi]
- Preliminary Literature Review of Machine Learning System Development PracticesYasuhiro Watanabe, Hironori Washizaki, Kazunori Sakamoto, Daisuke Saito, Kiyoshi Honda, Naohiko Tsuda, Yoshiaki Fukazawa, Nobukazu Yoshioka. 1407-1408 [doi]
- T-ReQs: A Tool for Tracking Similarity in Software ReQuirementsSandeep Reddivari. 1409-1410 [doi]
- Analysis of Route Announcements of Unassigned IP AddressesKentaro Goto, Akira Shibuya, Masayuki Okada, Masato Uchida. 1411-1416 [doi]
- Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the InternetTakuya Urimoto, Daisuke Kotani, Yasuo Okabe. 1417-1422 [doi]
- Same World Broadcasting: An Internet Broadcasting System for Real-Time Distributed Video CompositionsKoki Makida, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo. 1423-1428 [doi]
- The Latency Characteristics of GTP-U and SRv6 Stateless Translation on VPP Software RouterChunghan Lee, Naoyuki Mori, Yasuhiro Ohara, Tetsuya Murakami, Shogo Asaba, Satoru Matsushima. 1429-1436 [doi]
- A Quantitative Causal Analysis for Network Log DataRichard Jarry, Satoru Kobayashi, Kensuke Fukuda. 1437-1442 [doi]
- Towards Extracting Semantics of Network Config BlocksKazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Osamu Akashi, Kimihiro Mizutani, Hiroshi Esaki. 1443-1448 [doi]
- An Evaluation of Stochastic Quantitative Resilience Index Based on SLAs of Communication LinesHiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo. 1449-1454 [doi]
- Advancing Design and Runtime Management of AI Applications with AI-SPRINT (Position Paper)Hamta Sedghani, Danilo Ardagna, Matteo Matteucci, Giulio Angelo Fontana, Giacomo Verticale, Fabrizio Amarilli, Rosa M. Badia, Daniele Lezzi, Ignacio Blanquer, André Martin, Konrad Wawruch. 1455-1462 [doi]
- A Reinforcement Learning Based Approach of Context-driven Adaptive User InterfacesLamia Zouhaier, Yosra Ben Daly Hlaoui, Leila Ben Ayed. 1463-1468 [doi]
- STARS: Spatial Temporal Graph Convolution Network for Action Recognition System on FPGAsSongwen Pei, Xianrong Wang, Wei Qin, Sheng Liang. 1469-1474 [doi]
- Automatic Identification of Vulnerable Code: Investigations with an AST-Based Neural NetworkGarrett Partenza, Trevor Amburgey, Lin Deng, Josh Dehlinger, Suranjan Chakraborty. 1475-1482 [doi]
- A reactive system for specifying and running flexible cloud service business processes based on machine learningImen Ben Fraj, Yousra Bendaly Hlaoui, Leila Ben Ayed. 1483-1489 [doi]
- Recognizing the Type of Mask or Respirator Worn Through a CNN Trained with a Novel DatabaseAntonio Costantino Marceddu, Bartolomeo Montrucchio. 1490-1495 [doi]
- Characteristics of High-Frequency Trading and Its ForecastsShigeki Kohda, Kenichi Yoshida. 1496-1501 [doi]
- A Method for the Detection and Reconstruction of Foliar Damage caused by Predatory InsectsGabriel da Silva Vieira, Naiane Maria de Sousa, Bruno M. Rocha, Afonso U. Fonseca, Fabrízzio Alphonsus A. M. N. Soares. 1502-1507 [doi]
- Metamorphic Testing of Fake News Detection SoftwareYingrui Ma, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou. 1508-1513 [doi]
- On the Use of Causal Models to Build Better DatasetsFabio Garcea, Lia Morra, Fabrizio Lamberti. 1514-1519 [doi]
- A Machine Learning-Based Decision Support System Design for Restraining Orders in TurkeyHüseyin Umutcan Ay, Alime Aysu Öner, Nihan Yildirim, Tolga Kaya. 1520-1525 [doi]
- Effects of resampling image methods in sugarcane classification and the potential use of vegetation indices related to chlorophyllPriscila M. Kai, Bruna M. de Oliveira, Gabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares, Ronaldo Martins da Costa. 1526-1531 [doi]
- Multi-class Cardiovascular Disease Detection and Classification from 12-Lead ECG Signals Using an Inception Residual NetworkJian Ni, Yingtao Jiang, Shengjie Zhai, Yihan Chen, Sijia Li, Amei Amei, Dieu-My. T. Tran, Lijie Zhai, Yu Kuang. 1532-1537 [doi]
- Learning Motion Planning Functions using a Linear Transition in the C-space: Networks and KernelsVictor Parque. 1538-1543 [doi]
- Solutions to ventilate learning spaces: a review of current CO2 sensors for IoT systemsAlejandro Leo-Ramírez, Bernardo Tabuenca, Vicente García-Alcántara, Edmundo Tovar, Wolfgang Greller, Carlos Gilarranz Casado. 1544-1551 [doi]
- Anomaly detection in air conditioners using IoT technologiesToshiaki Hirata, Kenichi Yoshida, Kunihiko Koido, Sumiei Takahashi. 1552-1558 [doi]
- An Enhanced Routing Method for Overlay Networks Based on Multiple Different Time IntervalsTatsuya Kubo, Tomoya Kawakami. 1559-1564 [doi]
- Learning To Rank Relevant Documents for Information Retrieval in Bioengineering Text CorporaKwok Sun Cheng, Myoungkyu Song. 1565-1572 [doi]
- "Frontline Mediators" an ethnographic study of online welfare applications at the public libraryDustin O'Hara. 1573-1578 [doi]
- Toward a Novel Measurement Framework for Big Data (MEGA)Dave Bhardwaj, Olga Ormandjieva. 1579-1586 [doi]
- FILCIO: Application Agnostic I/O Aggregation to Scale Scientific WorkflowsQuentin Jensen, Filip Jagodzinski, Tanzima Islam. 1587-1592 [doi]
- Field Study on Usability and Security Perceptions Surrounding Social RobotsSubhash Rajapaksha, Shivam Thakrar, Matt Kinzler, Haochen Sun, Justin Smith, Debbie Perouli. 1593-1598 [doi]
- Bidirectional Edge-Enhanced Graph Convolutional Networks for Aspect-based Sentiment ClassificationJinyang Du, Yin Zhang, Binglei Yue, Min Chen. 1599-1604 [doi]
- A Robotic Vision Model via Xception and Light Gradient Boosting MachineFang Hu, Mingfang Huang, Jia Liu, Xingyu Yan, Xiufeng Cheng. 1605-1610 [doi]
- Shared-latent Variable Network AlignmentDegen Zhang, Xin Li, Linjing Lai. 1611-1616 [doi]
- Multi-relational EHR representation learning with infusing information of Diagnosis and MedicationYu Shi, Yuhang Guo, Hao Wu, Jingxiu Li, Xin Li. 1617-1622 [doi]
- IIS: Intelligent Identification Scheme of Massive IoT DevicesJie Liu, Yi Sun, Fengkai Xu, Keping Yu, Ali Kashif Bashir, Zhaoli Liu. 1623-1626 [doi]
- Online Vehicle Selection for Task Replication via Bandit LearningYongfeng Qian, Zhoutong Zuo, Yixue Hao. 1627-1632 [doi]
- Development of Observation Device with Multi Sensor Platform for Underwater Aquaculture CagesKazuki Fukae, Tetsuo Imai, Shintaro Yamabe, Kenichi Arai, Toru Kobayashi. 1633-1638 [doi]
- QoS Network Control for Elderly Support ServicesDaisuke Kotani, Taku Tanaka, Yasuo Okabe. 1639-1644 [doi]
- Analyzing Bug Reports by Topic Mining in Software EvolutionUy Nguyen, Kwok Sun Cheng, Samuel Sungmin Cho, Myoungkyu Song. 1645-1652 [doi]
- Adaptation Space Reduction Using an Explainable FrameworkAlhassan Boner Diallo, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 1653-1660 [doi]
- Determinants of Consumer Purchasing Factors through LDA Modeling Using YouTube DataHyun Park, Yanggon Kim. 1661-1666 [doi]
- Vision-based Hand Gesture Recognition for Human-Computer Interaction using MobileNetV2Hermann Baumgartl, Daniel Sauter, Christian Schenk 0005, Cem Atik, Ricardo Buettner. 1667-1674 [doi]
- A Comprehensive Qualitative and Quantitative Review of Current Research in GANsJiachen Ma, Piyush Saxena, Sheikh Iqbal Ahamed. 1675-1682 [doi]
- Abnormal Gait Recognition based on Integrated Gait Features in Machine LearningWonjin Kim, Yanggon Kim. 1683-1688 [doi]
- A Data Science Solution for Supporting Social and Economic AnalysisYubo Chen 0003, Carson K. Leung, Hao Li, Siyuan Shang, Wanmeng Wang, Zhi Zheng. 1689-1694 [doi]
- Attack Prediction using Hidden Markov ModelShuvalaxmi Dass, Prerit Datta, Akbar Siami Namin. 1695-1702 [doi]
- Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber AttacksFaranak Abri, Luis Felipe Gutiérrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones. 1703-1710 [doi]
- COVID-19 SIHR Modeling and Dynamic AnalysisZhenhe Pan, Taige Wang, Yuanlin Zhang 0002. 1711-1716 [doi]
- HIR: A Hybrid IR Ranking ModelSameh Neji, Tarek Chenaina, Abdullah M. Shoeb, Leila Ben Ayed. 1717-1722 [doi]
- Distributed Big Data Computing for Supporting Predictive Analytics of Service RequestsTianlei Wang, James D. Harvey, Carson K. Leung, Adam G. M. Pazdor, Animesh Singh Chauhan, Lihe Fan, Alfredo Cuzzocrea. 1723-1728 [doi]
- Dempster-Shafer Theory for Stock SelectionNima Salehy, Giray Ökten. 1729-1734 [doi]
- Supervised Temporal Autoencoder for Stock Return Time-series ForecastingSteven Y. K. Wong, Jennifer S. K. Chan, Lamiae Azizi, Richard Y. D. Xu. 1735-1741 [doi]
- Novel Data-Driven Resilient Portfolio Risk Measures Using Sign and Volatility CorrelationsAerambamoorthy Thavaneswaran, You Liang, Na Yu, Alex Paseka, Ruppa K. Thulasiram. 1742-1747 [doi]
- Portfolio Optimization Using Novel Intelligent Probabilistic Forecasts of Risk MeasuresYou Liang, Aerambamoorthy Thavaneswaran, Alexander Paseka, Ruppa K. Thulasiram, Ethan Johnson-Skinner. 1748-1753 [doi]
- Multimodal Machine Learning for Credit ModelingCuong V. Nguyen, Sanjiv R. Das, John He, Shenghua Yue, Vinay Hanumaiah, Xavier Ragot, Li Zhang. 1754-1759 [doi]
- An Algorithmic Multiple Trading Strategy Using Data-Driven Random Weights Innovation VolatilityMd. Erfanul Hoque, Aerambamoorthy Thavaneswaran, Alex Paseka, Ruppa K. Thulasiram. 1760-1765 [doi]
- A Novel Algorithmic Trading Strategy using Hidden Markov Model for Kalman Filtering InnovationsEthan Johnson-Skinner, You Liang, Na Yu, Alin Morariu. 1766-1771 [doi]
- Motrol 2.0: A Dew-oriented hardware/software platform for batch-benchmarking smartphonesCristian Mateos, Matías Hirsch, Juan Toloza, Alejandro Zunino. 1772-1777 [doi]
- Thine - Approach for a fault tolerant distributed packet manager based on hypercore protocolJannik Blähser, Tim Göller, Matthias Böhmer 0001. 1778-1782 [doi]
- A Vision of Dew-IoT Ecosystem: Requirements, Architecture, and ChallengesPartha Pratim Ray, Karolj Skala. 1783-1788 [doi]
- Dew Computing in Industrial Automation: Applying Machine Learning for Process ControlMladen Sverko, Nikola Tankovic, Darko Etinger. 1789-1794 [doi]
- What makes Dew computing more than Edge computing for Internet of ThingsMarjan Gusev. 1795-1800 [doi]
- An API for Dew Computing ServicesYingwei Wang 0002. 1801-1804 [doi]
- A Dew Computing Architecture for Smart Parking System with Cloud Image Recognition ServiceYuan-Chih Yu. 1805-1809 [doi]
- Implementation of Dewblock Clients on a Mobile PlatformMinhajur Rahman, Yingwei Wang 0002. 1810-1813 [doi]
- Serverless and Deviceless Dew Computing: Founding an Infrastructureless ComputingMarjan Gusev. 1814-1818 [doi]
- Dew Intelligence: Federated learning perspectiveEmanuel Guberovic, Tomislav Lipic, Igor Cavrak. 1819-1824 [doi]
- An Object-Oriented Interface to The Sparse Polyhedral LibraryTobi Popoola, Ravi Shankar, Anna Rift, Shivani Singh, Eddie C. Davis, Michelle Mills Strout, Catherine Olschanowsky. 1825-1831 [doi]
- Few Shot Learning of COVID-19 Classification Based on Sequential and Pretrained Models: A Thick Data ApproachDarien Sawyer, Jinan Fiaidhi, Sabah Mohammed. 1832-1836 [doi]
- ProvVacT: A Provenance Based mHealth Application for Tracking Vaccine HistoryDilek Yilmazer Demirel, Özgü Can. 1837-1842 [doi]
- A Review of Data Sources for the Study of AgeingMary Carlota Bernal, Antoni Martínez-Ballesté, Agusti Solanas. 1843-1848 [doi]
- Holistic Approach to Intrinsic Capacity Assessment: An Engineering PerspectiveMontse García-Famoso, M. Angels Moncusi, Agusti Solanas. 1849-1854 [doi]
- TIKD: A Trusted Integrated Knowledge Dataspace For Sensitive Healthcare Data SharingJulio Hernandez, Lucy McKenna, Rob Brennan. 1855-1860 [doi]
- Deep Learning Applied to Automatic Reclosers Detection in Power GridFrancisco Marques, Alano Pinto, Arthur Bastos, Ana Gonçalves, Gilherbson Pereira, Flávio Reis. 1861-1866 [doi]
- Forecasting the Grid Power Demand of Charging Stations from EV Drivers' AttitudeAlberto Bocca, Alberto Macii, Enrico Macii. 1867-1872 [doi]
- Design of District-level Photovoltaic Installations for Optimal Power Production and Economic BenefitMatteo Orlando, Lorenzo Bottaccioli, Sara Vinco, Enrico Macii, Massimo Poncino, Edoardo Patti. 1873-1878 [doi]
- Modelling Application Cache Behavior using Regression ModelsJakob Danielsson, Janne Suuronen, Marcus Jägemar, Tiberiu Seceleanu, Moris Behnam, Mikael Sjödin. 1879-1886 [doi]
- Control as a Service - Intelligent NetworkingTiberiu Seceleanu, Ning Xiong, Cristina Seceleanu. 1887-1892 [doi]
- Motor Imagery: A Review of Existing Techniques, Challenges and PotentialsOlawunmi George, Roger Smith, Praveen Madiraju, Nasim Yahyasoltani, Sheikh Iqbal Ahamed. 1893-1899 [doi]
- Integration of mHealth into Primary Health Care for Child Cancer Patients - An approach to reduce health inequities in BangladeshSyed Azizur Rahman, Sheikh Iqbal Ahamed, Nabeel Al-Yateem, Amina Al Marzooqi, Muhammad Arsyad Subu, Swetha Variyath. 1900-1903 [doi]
- Usability in m-health applications for application in healthcare environmentsEnoch Menezes de Oliveira, Daniel Scherer. 1904-1908 [doi]
- IoT-Health Platform to Monitor and Improve Quality of Life in Smart EnvironmentsPedro Almir Martins de Oliveira, Rossana M. C. Andrade, Pedro de A. Santos Neto. 1909-1912 [doi]
- Facial Image Classification for Obstructive Sleep Apnea Pre-ScreeningWeihao Lin, Qinyan Zhang, Ji-Jiang Yang, Fangfang, Qing Wang 0003, Qi Chen, Yi Lei. 1913-1917 [doi]
- Breast Mass Detection and Classification Using Deep Convolutional Neural Networks for Radiologist Diagnosis AssistanceTariq Mahmood, Jianqiang Li 0002, Yan Pei, Faheem Akhtar, Yanhe Jia, Zahid Hussain Khand. 1918-1923 [doi]
- Joint Extraction of Events in Chinese Electronic Medical RecordsJingnan Wang, JianQiang Li, Zhichao Zhu, Qing Zhao, Yang Yu, Liyin Yang, Chun Xu. 1924-1929 [doi]
- Medical named entity recognition of Chinese electronic medical records based on stacked Bidirectional Long Short-Term MemoryZhichao Zhu, JianQiang Li, Qing Zhao, Yu-Chih Wei, Yanhe Jia. 1930-1935 [doi]
- Screening of Viral Pneumonia and COVID-19 in Chest X-ray using Classical Machine LearningAfonso U. Fonseca, Gabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares. 1936-1941 [doi]
- Automatic Classification of Amyotrophic Lateral Sclerosis through Gait DynamicsJuliana Paula Felix, Hugo Alexandre Dantas do Nascimento, Nilza Nascimento Guimarães, Eduardo Di Oliveira Pires, Afonso Ueslei Da Fonseca, Gabriel da Silva Vieira. 1942-1947 [doi]
- Examining the Perception of Drilling Depth Using Auditory CuesGuoxuan Ning, Bill Kapralos, Alvaro Uribe-Quevedo, Kamen Collins, Kamen Kanev, Adam Dubrowski. 1948-1949 [doi]
- Enhancing port's competitiveness thanks to 5G enabled applications and servicesAndrea Porelli, Natalia Selini Hadjidimitriou, Mariangela Rosano, Stefano Musso. 1950-1955 [doi]