Abstract is missing.
- Welcome - from Sorel Reisman COMPSAC Standing Committee ChairSorel Reisman. [doi]
- Message from the Standing Committee Vice ChairsSheikh Iqbal Ahamed, Mohammad Zulkernine. [doi]
- Message from the 2022 Program Chairs-in-ChiefHong Va Leong, Sahra Sedigh Sarvestani, Yuuichi Teranishi. [doi]
- Algebraic Semantics for C++11 Memory ModelLili Xiao, Huibiao Zhu, Mengda He, Shengchao Qin. 1-6 [doi]
- IEEE COMPSAC 2022 Co-Located Workshops SummaryAlfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey, Ji-Jiang Yang. 1-3 [doi]
- Automatic Monitoring System for Engines Motion Attitude Based on Video Image DetectionYiwei Fang, Guan Wang, Ruilin Zeng, Xiaoyu Wang, Hai-Bao Chen. 1-7 [doi]
- Collaborative Research on Rapid Periodontitis TestWook-Sung Yoo, Hwapyeong Song, Hyunduck Kim. 1-2 [doi]
- Deep Speaker Embedding with Multi-Part Information Aggregation in Frequency-Time Domain for ASVXiao Li, Xiao Chen, Dongfei Wang, Zhijun Guo, Kun Niu. 8-13 [doi]
- Distributed and Asynchronous Planning and Execution for Multi-agent Systems through Short-Sighted Conflict ResolutionYuki Miyashita, Tomoki Yamauchi, Toshiharu Sugawara. 14-23 [doi]
- Development of ROS-based Small Unmanned Platform for Acquiring Autonomous Driving Dataset in Various Places and Weather ConditionsJi-il Park, Minseong Choi, Seungho Han, YeongSeok Lee, Jinwoo Cho, Hyoseo Choi, Minsu Cho, Minyoung Lee, Kyung Soo Kim. 24-31 [doi]
- Human-in-the-loop online multi-agent approach to increase trustworthiness in ML models through trust scores and data augmentationGusseppe Bravo Rocca, Peini Liu, Jordi Guitart, Ajay Dholakia, David Ellison, Miroslav Hodak. 32-37 [doi]
- Efficient Reinforcement Learning from Demonstration Using Local Ensemble and Reparameterization with Split and Merge of Expert PoliciesYu Wang, Fang Liu. 38-47 [doi]
- A Reliability-oriented Faults Taxonomy and a Recovery-oriented Methodological Approach for Systems ResilienceCarlo Vitucci, Daniel Sundmark, Marcus Jägemar, Jakob Danielsson, Alf Larsson, Thomas Nolte. 48-55 [doi]
- Integrated Construction of Service Function Chain and Business System Based on Colored Petri NetYintan Ai, Yajun Cui, Zhenyu Liu, Xiaomin Zhang, Hua Li, Xianrong Wang. 56-61 [doi]
- Failure modes and failure mitigation in GPGPUs: a reference model and its applicationFrancesco Terrosi, Andrea Ceccarelli, Andrea Bondavalli. 62-72 [doi]
- LIBNVCD: An Extendable and User-friendly Multi-GPU Performance Measurement ToolHolland Schutte, Chase Phelps, Aniruddha Marathe, Tanzima Z. Islam. 73-82 [doi]
- Towards Model checking approach for Smart contract validation in the EIP-1559 EthereumRim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Ahmed Ben Ali, Philippe Genestier. 83-88 [doi]
- Reliable Visibility Algorithms for Emergency Stop Systems in Smart IndustriesGabriele Capannini, Jan Carlson, Roger Mellander. 89-94 [doi]
- eShadow+: Mixed Reality Storytelling Inspired by Traditional Shadow TheatreNektarios Moumoutzis, Marios Christoulakis, Chara Xanthaki, Yiannis Maragkoudakis, Stavros Christodoulakis, Desislava Paneva-Marinova, Lilia Pavlova. 95-100 [doi]
- mTOCS: Mobile Teleophthalmology in Community Settings to improve Eye-health in Diabetic PopulationJannatul Ferdause Tumpa, Riddhiman Adib, Dipranjan Das, Nathalie Abenoza, Andrew Zolot, Velinka Medic, Judy Kim, Jay Romant, Sheikh Iqbal Ahamed. 100-109 [doi]
- A Software Architecture for Developing Distributed Games that Teach Coding and Algorithmic ThinkingNearchos Paspallis, Nicos Kasenides, Andriani Piki. 101-110 [doi]
- CCSS: An Effective Object Detection System for Classroom Crowd StatisticsKang Yi, Siyu Yan, Lei Liu, Jingwen Zhu, Weiyun Liang, Jing Xu 0008. 111-116 [doi]
- Towards Designing Shared Digital Forensics Instructional MaterialsWeifeng Xu, Lin Deng, Dianxiang Xu. 117-122 [doi]
- An Intelligent Tutoring System for API Misuse Correction by Instant Quality FeedbackRui Zhao, Harvey P. Siy, Chulwoo Pack, Leen-Kiat Soh, Myoungkyu Song. 123-128 [doi]
- SQL Murder Mystery: a serious game to learn querying databasesLorenzo Canale, Laura Farinetti. 129-138 [doi]
- Teachers' perception of higher education in a transition scenarioMarina Marchisio, Fabio Roman, Matteo Sacchet, Enrico Spinello. 139-144 [doi]
- A 4C Model for Hyflex ClassroomsHenry C. B. Chan, Yi Dou, Yue Jiang, Ping Li. 145-150 [doi]
- Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projectsJoão Almeida, Vasco Amaral 0001. 151-160 [doi]
- A Simulation Framework for UML EducationMiguel Appleton Fernandes, Vasco Amaral 0001. 161-166 [doi]
- Data Driven Learning activities within a Digital Learning Environment to study the specialized language of MathematicsElisa Corino, Cecilia Fissore, Marina Marchisio. 167-176 [doi]
- Evolution of the Historian Data Entry Application: Supporting Transcribathons in the Digital Humanities through MDDAlexander Schieweck, Rachel Murphy, Rafflesia Khan, Ciara Breathnach, Tiziana Margaria. 177-186 [doi]
- Early Detection of At-Risk Students in a Calculus CourseAkshay Kumar Dileep, Ajay Bansal, James Cunningham. 187-194 [doi]
- NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified HawkesXin Xu, Nan Wang, Hu Jin, Yang Liu, Kun Li. 195-200 [doi]
- BitBooster: Effective Approximation of Distance Metrics via Binary OperationsYorick Spenrath, Marwan Hassani, Boudewijn F. van Dongen. 201-210 [doi]
- GPU-accelerated Faster Mean Shift with euclidean distance metricsLe You, Han Jiang, Jinyong Hu, Chorng Hwa Chang, Lingxi Chen, Xintong Cui, Mengyang Zhao. 211-216 [doi]
- Evaluation and Visualization of Trustworthiness in Social Media - EUNOMIA's approachPanagiotis Monachelis, Panagiotis Kasnesis, Lazaros Toumanidis, Charalampos Z. Patrikakis, Pericles Papadopoulos. 217-222 [doi]
- Unsupervised Markdown Feature-Aware Keywords Extraction Towards Technology BlogsYangyang Wang, Liping Hua, Hui Zhao, Lingfeng Yang. 223-228 [doi]
- TBPM-DDIE: Transformer Based Pretrained Method for predicting Drug-Drug Interactions EventsZhenjie Shao, Ying Qian, Liang Dou. 229-234 [doi]
- Canadian Jobs amid a Pandemic: Examining the Relationship between Professional Industry and Salary to Regional Key Performance IndicatorsRahul Anilkumar, Benjamin Melone, Michael Patsula, Christophe Tran, Christopher Wang, Kevin Dick, Hoda Khalil, Gabriel A. Wainer. 235-240 [doi]
- Elucidation of the Relationship Between a Song's Spotify Descriptive Metrics and its Popularity on Various PlatformsLaura Colley, Andrew Dybka, Adam Gauthier, Jacob Laboissonniere, Alexandre Mougeot, Nayeeb Mowla, Kevin Dick, Hoda Khalil, Gabriel A. Wainer. 241-249 [doi]
- Long Term Interval Forecasts of Demand using Data-Driven Dynamic Regression ModelsYou Liang, Aerambamoorthy Thavaneswaran. 250-259 [doi]
- Graph Embedding Based on Feature Propagation for Community DetectionDong Li, Yingying Xiao, Zhuanming Gao, Ningsi Li. 260-265 [doi]
- A Deep Learning-Based Model for Automated Quality Control in the Pharmaceutical IndustryDominik Raab, Eric Fezer, Johannes Breitenbach, Hermann Baumgartl, Daniel Sauter, Ricardo Buettner. 266-271 [doi]
- *Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng. 272-279 [doi]
- Using Domain Knowledge to Assist Process Scenario DiscoveriesZhenyu Zhang 0009, JunJie Zhu, Ryan Hildebrant, Nalini Venkatasubramanian, Shangping Ren. 280-288 [doi]
- A Longitudinal Study of Customer Electricity Load ProfilesEtienne Gael Tajeuna, Mohamed Bouguessa, Shengrui Wang. 289-294 [doi]
- Dynamic Cross-sectional Regime Identification for Financial Market PredictionRongbo Chen, Kunpeng Xu 0002, Jean-Marc Patenaude, Shengrui Wang. 295-300 [doi]
- A Mobility Forecasting Framework with Vertical Federated LearningFatima Zahra Errounda, Yan Liu. 301-310 [doi]
- Adaptive Noisy Data Augmentation for Regularized Estimation and Inference of Generalized Linear ModelsYinan Li, Fang Liu. 311-320 [doi]
- Related Questions Retrieval Model in Stack Overflow based on Semantic MatchingZishan Qin, Yimin Wu, Jiayan Pei, Jinwei Lu, Shizhao Huang, Liqun Liu. 321-326 [doi]
- An Autonomous Data Collection Pipeline for Online Time-Sync CommentsJiachen Ma, Lin He 0008, Sheikh Iqbal Ahamed, Piyush Saxena. 327-336 [doi]
- A Clustering-Aided Approach for Diagnosis Prediction: A Case Study of Elderly FallLing Tong, Jake Luo, Jazzmyne Adams, Kristen Osinski, Xiaoyu Liu, David Friedland. 337-342 [doi]
- A Baseline for Early Classification of Time Series in An Open WorldJunwei Lv, Xuegang Hu. 343-351 [doi]
- Apple-YOLO: A Novel Mobile Terminal Detector Based on YOLOv5 for Early Apple Leaf DiseasesJinjiang Li, Xianyu Zhu, Runchang Jia, Bin Liu 0023, Cong Yu 0016. 352-361 [doi]
- A Dynamic Load Balancing Scheme Based on Network Sharding in Private Ethereum BlockchainZiCheng Wang, Bo Cui, Wenhan Hou. 362-367 [doi]
- External Service Sensing in an Uncertain WorldMingyi Liu, Zhongjie Wang, Tianyu Jiang, Xiaofei Xu, Quan Z. Sheng, Stephan Reiff-Marganiec. 368-373 [doi]
- Multi-weighted Graphs Learning for Passenger Count Prediction on Railway NetworkHangli Ge, Lifeng Lin, Renhe Jiang, Takashi Michikata, Noboru Koshizuka. 374-382 [doi]
- A Fourier Descriptor for Bone Point Segmentation using inner distance in remote sensing imagesZekun Li, Baolong Guo, Chao Wang, Mengyan Guo. 383-387 [doi]
- A scalable approach to detect Contrasting Consecutive Patterns in time series dataStefano Tata, Luca Cagliero. 388-394 [doi]
- A freely available system for human activity recognition based on a low-cost body area networkCristian Turetta, Florenc Demrozi, Graziano Pravadelli. 395-400 [doi]
- Connecting Everyday Objects with the Metaverse: A Unified Recognition FrameworkLiming Xu, Dave Towey, Andrew P. French, Steve Benford. 401-406 [doi]
- Online Identity Theft Index Scorer and Recommendation ServiceNivedha Rajaram. 407-408 [doi]
- Network Traffic Prediction Based on Double-Synchronized Periodic LSTMLiang Ye, Shun Ding, Chenyun Liu, Wenhao Zhu. 409-410 [doi]
- Computer Education of the Primary Years Programme Exhibition at International Baccalaureate Schools During the COVID-19 PandemicAllison Hsu, Ying-Feng Hsu. 411-412 [doi]
- UML Statechart Anti-PatternsMehmet Aktas, Tolga Ovatman. 413-414 [doi]
- Leveraging summarization techniques in educational technology systemsIrene Benedetto, Lorenzo Canale, Laura Farinetti, Luca Cagliero, Moreno La Quatra. 415-416 [doi]
- CacheQueue: Efficient Cache Queue Usage in a NDNDipannoy Das Gupta, Pranta Biswas, Mahmuda Naznin. 417-418 [doi]
- Technology as a Distracter for Providing Humanistic Care in Technology Dependent Care UnitsAhmad Rajeh Saifan, Nabeel Al-Yateem, Jacqueline Maria Dias, Fatma Refaat Ahmed, Muhammad Arsyad Subu, Syed Azizur Rahman, Amina Al-Marzouqi, Sheikh Iqbal Ahamed. 421-423 [doi]
- Improving the Prediction Accuracy with Feature Selection for Ransomware DetectionChulan Gao, Hossain Shahriar, Dan Lo 0001, Yong Shi, Kai Qian. 424-425 [doi]
- Preliminary Study for the Impact of Small Eigenvalues on Laplacian Anomaly Detection of Dynamic NetworksEriko Segawa, Yusuke Sakumoto. 426-427 [doi]
- Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure PlatformDan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng. 428-429 [doi]
- Spectral Formula for the Expected First Meeting Time of Diverse Random Walks on a GraphNanami Tsuji, Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki. 430-431 [doi]
- An Agile Framework for Security Requirements: A Preliminary InvestigationSandeep Reddivari. 432-433 [doi]
- Efficient Parallel Wikipedia Internal Link Extraction for NLP-Assisted Requirements UnderstandingJoseph Allen, Sandeep Reddivari. 434-435 [doi]
- ReNego: A Requirements Negotiation Tool based on Voting of Social Choice TheorySandeep Reddivari, Ahmed Moussa. 436-437 [doi]
- Calculating Requirements Similarity Using Word EmbeddingsSandeep Reddivari, Jeffery Wolbert. 438-439 [doi]
- Finding Your Feet In Cybersecurity: A Reddit Text Mining ApproachPrerit Datta, Moitrayee Chatterjee. 440-441 [doi]
- Authentic Learning of Machine Learning to Ransomware Detection and PreventionMd Jobair Hossain Faruk, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo 0001. 442-443 [doi]
- Leveraging Healthcare API to transform Interoperability: API Security and PrivacyMd Jobair Hossain Faruk, Arleen Joy Patinga, Lorna Migiro, Hossain Shahriar, Sweta Sneha. 444-445 [doi]
- Software Engineering in Digital Transformation and Diversity: Preliminary Literature ReviewHironori Washizaki. 446-447 [doi]
- EHDNet: Enhanced Human Detection Network for Search and RescueSeungoh Han, Ah-Young Nho, Wei Teng Kwan, Benjamin Paglia, Jacob Visniski, Minji Lee, Eric T. Matson, Minsun Lee. 448-449 [doi]
- Comprehensive Feature Extraction for Cross-Project Software Defect PredictionJagan Mohan Reddy, Muthukumaran K, Hossain Shahriar, Victor Clincy, Nazmus Sakib. 450-451 [doi]
- MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercisesMd Abdullah Al Hafiz Khan, Hossain Shahriar. 452-453 [doi]
- Scalable Machine Learning Using PySparkMohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo 0001, Fan Wu 0013, Mohammed Karim, Parth Bhavsar, Jidong Yang. 454-455 [doi]
- Breaking the Barrier with a Multi-Domain SERJamalia Sultana, Mahmuda Naznin. 456-461 [doi]
- An Analysis of the Early Dialogue on Vaccine Passports on TwitterBlake Gaines, Ethan Mann, Swapna S. Gokhale. 462-467 [doi]
- Emotion Detection in Law Enforcement InterviewsJean Marie Tshimula, Sharmistha Gray, Belkacem Chikhaoui, Shengrui Wang. 468-475 [doi]
- Towards Emotion-awareness in Programming Education with Behavior-based Emotion EstimationYuqian Zhuang, Liang Wang 0006, Zhiwen Zheng, Hao Hu 0001, Haijun Wu, XianPing Tao. 476-485 [doi]
- Talk to Your Data: a Chatbot System for Multidimensional DatasetsMaria Helena Franciscatto, Marcos Didonet Del Fabro, Celio Trois, Luis Carlos Erpen De Bona, Jordi Cabot, Leon Augusto Okida Gonçalves. 486-495 [doi]
- Multi-Scale Speaker Vectors for Zero-Shot Speech SynthesisTristin Cory, Razib Iqbal. 496-501 [doi]
- Towards a Survey on Universal Human Vital Signs with prototype for Detection and Record Electronically Acceptable Medical-data (dDream)Masud Rabbani, Kazi Shafiul Alam, Lin He 0008, Shiyu Tian, Mohammad Syam, Iysa Iqbal, Anushka Kolli, Hansika Kolli, Syeda Shefa, Bipasha Sobhani, Paramita Basak Upama, Sheikh Iqbal Ahamed. 502-511 [doi]
- Towards Developing a Voice-activated Self-monitoring Application (VoiS) for Adults with Diabetes and HypertensionMasud Rabbani, Shiyu Tian, Adib Ahmed Anik, Jake Luo, Min Sook Park, Jeff Whittle, Sheikh Iqbal Ahamed, Hyunkyoung Oh. 512-519 [doi]
- Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing ToolsParamita Basak Upama, Md Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin 0001, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman. 520-529 [doi]
- Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?Mohammad Masum, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin 0001, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed. 530-538 [doi]
- Towards a Commercial Pipeline for Field Crop IdentificationDafina Jeaca, Nicu-Cosmin Ursache, Andrei Panu. 539-544 [doi]
- A Systematic Literature Review of Virtual and Augmented Reality Applications for Maintenance in ManufacturingRicardo Buettner, Johannes Breitenbach, Kai Wannenwetsch, Isabel Ostermann, Rene Priel. 545-552 [doi]
- Towards a Multi-Tenant Microservice Architecture: An Industrial ExperienceCésar Batista, Bruno Proença, Everton Cavalcante, Thaís Batista, Felipe de Morais, Henrique Medeiros. 553-562 [doi]
- Hey APR! Integrate Our Fault Localization Skill: Toward Better Automated Program RepairKyosuke Yamate, Masanari Kondo, Yutaro Kashiwa, Yasutaka Kamei, Naoyasu Ubayashi. 563-568 [doi]
- Evaluating Automated Program Repair Techniques using Introductory Programming Course DatasetsTsukasa Nakamura, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi. 569-574 [doi]
- Exploiting Syntactic Information to Boost the Fine-tuning of Pre-trained ModelsChaoming Liu, Wenhao Zhu, Xiaoyu Zhang, Qiuhong Zhai. 575-582 [doi]
- Identification of an IoT Device Model in the Home Domain Using IPFIX RecordsNorihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota. 583-592 [doi]
- A Structure-Focused Deep Learning Approach for Table Recognition from Document ImagesMengxi Zhou, Rajiv Ramnath. 593-601 [doi]
- Web table data integration based on smart campus scenarios to resolve name disambiguation of scientific research personnelJunfan Jin, Junxiang Chen, Jilin Zhang, Tao Li 0022, Ruixiang Qian, Feng Liu, Li Zhou, Yongjian Ren. 602-607 [doi]
- Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in ARNatsumi Matsui, Ayumi Ohnishi, Tsutomu Terada, Masahiko Tsukamoto. 608-613 [doi]
- DSPBooster: Offloading Unmodified Mobile Applications to DSPs for Power-performance Optimal ExecutionElliott Wen, Jiaxing Shen. 614-623 [doi]
- Madelyn: Multi-Domain Multi-Agent Reinforcement Learning for Data-center NetworksAjay Kattepur, Sushanth David. 624-629 [doi]
- Efficient Dual Batch Size Deep Learning for Distributed Parameter Server SystemsKuan-Wei Lu, Pangfeng Liu, Ding-Yong Hong, Jan-Jan Wu. 630-639 [doi]
- A Routing Algorithm based on Social Closeness and Spatio-Temporal Interaction DegreeZhanguo Liu, Gang Xu, Ruijie Hang, Yuan Cheng, Baoqi Huang, Xiangyu Bai. 640-647 [doi]
- A Tree Construction Method for Distributed Video Collection and Composition on the Same World Broadcasting SystemKoki Makida, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo. 648-657 [doi]
- Implementation and Evaluation of Flow-level Network Simulator for Large-scale ICN NetworksSoma Yamamoto, Ryo Nakamura, Hiroyuki Ohsaki. 658-663 [doi]
- GSDNet: An Anti-interference Cochlea Segmentation Model Based on GANZhengxin Li, Sikai Tao, Ruixun Zhang, Hongpeng Wang. 664-669 [doi]
- QSAR for anti-ERα compounds using sparrow search algorithm optimized BP neural networkXiali Li, Yandong Chen, Licheng Wu. 670-675 [doi]
- Automatic Accuracy versus Complexity Characterization for Embedded Emotion-Sensing Platforms in Healthcare ApplicationsGiovanni Mezzina, Daniela De Venuto. 676-683 [doi]
- Cross-Domain Unseen Activity Recognition Using Transfer LearningMd Abdullah Al Hafiz Khan, Nirmalya Roy. 684-693 [doi]
- A virtual coaching platform to support therapy compliance in obesityLuisa Bissoli, Davide Bonacina, Nicolò Dalla Riva, Florenc Demrozi, Marin Jereghi, Nicola Marchiotto, Giovanni Perbellini, Bruno Pernice, Erica Pizzocaro, Graziano Pravadelli, Giuseppe Recchia, Anna Lia Sacerdoti, Cristian Turetta, Mauro Zamboni. 694-699 [doi]
- Quantitative Multidimensional Stress Assessment from Facial Videos using Deep LearningLin He 0008, Jiachen Ma, Sheikh Iqbal Ahamed, Piyush Saxena. 710-715 [doi]
- ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in CrowdsourcingRuilin Lai, Gansen Zhao. 716-725 [doi]
- A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack GraphsShuvo Bardhan. 726-735 [doi]
- Synthesis of Java Deserialisation Filters from ExamplesKostyantyn Vorobyov, François Gauthier, Sora Bae, Padmanabhan Krishnan, Rebecca O'Donoghue. 736-745 [doi]
- EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart ContractsWenyuan Li, Jiahao He, Gansen Zhao, Jinji Yang, Shuangyin Li, Ruilin Lai, Ping Li, Hua Tang, Haoyu Luo, Ziheng Zhou. 746-756 [doi]
- KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript EnginesLili Sun, Chenggang Wu 0002, Zhe Wang 0017, Yan Kang, Bowen Tang. 757-766 [doi]
- Introduction of a New Method for Preventing Recipient Unapproved Transactions to Bitcoin WalletChuki Hayama, Yoko Kamidoi, Shin'ichi Wakabayashi. 767-772 [doi]
- A Node-labeling-based Method for Evaluating the Anonymity of Tor NetworkFeng Jiang, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang. 773-778 [doi]
- Exploring Optimal Deep Learning Models for Image-based Malware Variant ClassificationRikima Mitsuhashi, Takahiro Shinagawa. 779-788 [doi]
- Harnessing Digital Twin Security Simulations for systematic Cyber Threat IntelligenceMarietheres Dietz, Daniel Schlette, Günther Pernul. 789-797 [doi]
- Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based ProjectsFarzana Ahamed Bhuiyan, Stacy J. Prowell, Hossain Shahriar, Fan Wu 0013, Akond Rahman. 798-808 [doi]
- What is a (Digital) Identity Wallet? A Systematic Literature ReviewBlaz Podgorelec, Lukas Alber, Thomas Zefferer. 809-818 [doi]
- Two-stage cost-sensitive local models for heterogeneous cross-project defect predictionYan Huang, Xian Xu. 819-828 [doi]
- Category-Aware App Permission Recommendation based on Sparse Linear ModelXiaocao Hu, Hui Wang. 829-837 [doi]
- Fractus: Orchestration of Distributed Applications in the Drone-Edge-Cloud ContinuumNasos Grigoropoulos, Spyros Lalis. 838-848 [doi]
- STPChain: a Crowdsourced Software Engineering Method for Software Traceability and Fine-grained Privacy Based on BlockchainMenghan Li, Li Yang, Qing Xia, Mingzhe Fang, Geng Liang, Chun Zuo. 849-859 [doi]
- A Framework Model to Support A/B Tests at the Class and Component LevelWagner S. De Souza, Fernando Pereira, Vanessa G. Albuquerque, Jorge Melegati, Eduardo M. Guerra 0001. 860-865 [doi]
- Adaptive Auto-Scaling of Delay-Sensitive Serverless Services with Reinforcement LearningZhiyu Zhang, Tao Wang, An Li, Wenbo Zhang. 866-871 [doi]
- Formal Analysis and Verification of DPSTM v2 Architecture Using CSPPeimu Li, Jiaqi Yin, Huibiao Zhu, Lili Xiao, Miroslav Popovic. 872-877 [doi]
- Are knowledge and usage of microservices patterns aligned? An exploratory study with professionalsJoão Francisco Lino Daniel, Alfredo Goldman, Eduardo Martins Guerra. 878-883 [doi]
- Supporting AI Engineering on the IoT Edge through Model-Driven TinyMLArmin Moin, Moharram Challenger, Atta Badii, Stephan Günnemann. 884-893 [doi]
- MerGen: A Smart Code Merging Approach for Automatically Generated CodeXiao He, Letian Tang, Yi Liu. 894-903 [doi]
- Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection?Guoqing Yan, Sen Chen, Yude Bail, Xiaohong Li. 904-913 [doi]
- Customer Support In The Era of Continuous Deployment: A Software-Intensive Embedded Systems Case StudyAnas Dakkak, Aiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson. 914-923 [doi]
- The Influence of Sponsorship on Open-Source Software Developers' Activities on GitHubYaxin Wang, Liang Wang, Hao Hu 0001, Jing Jiang, Hongyu Kuang, XianPing Tao. 924-933 [doi]
- Towards An Efficient Searching Approach of ROS Message by Knowledge GraphSun Bo, XinJun Mao, Shuo Yang, Long Chen. 934-943 [doi]
- Compatibility Checking of Compound Business Rules Expressed in Natural Language Against Domain SpecificationBogumila Hnatkowska, Adrianna Kozierkiewicz, Marcin Pietranik. 944-949 [doi]
- A Formal Specification Language Based on Positional Relationship Between Objects in Automated Driving SystemsKento Tanaka, Toshiaki Aoki, Tatsuji Kawai, Takashi Tomita, Daisuke Kavvakami, Nobuo Chida. 950-955 [doi]
- Fission: Autonomous, Scalable Sharding for IoT BlockchainChaoran Luo, Yueyang Hu, Su Zhang, Ying Zhang 0012, Yi Liu 0014, Xingchun Diao, Gang Huang 0001. 956-965 [doi]
- Towards a novel wearable solution for citrus inspection using Edge AIJonathan Cristóvão Ferreira da Silva, Mateus Coelho Silva, Ricardo A. R. Oliveira. 966-971 [doi]
- A Correlation-based Real-time Segmentation Scheme for Multi-user Collaborative ActivitiesKisoo Kim, Hyunju Kim, Dongman Lee. 972-981 [doi]
- Structured Pruning for Deep Convolutional Neural Networks via Adaptive Sparsity RegularizationTuanjie Shao, Dongkun Shin. 982-987 [doi]
- MPO: MQTT-Based Privacy Orchestrator for Smart Home UsersAhmed Alhazmi, Khulud Alawaji, T. J. OConnor. 988-993 [doi]
- Assessing Deep Learning Approaches in Detecting Masked Facial ExpressionsYepu Wang, Yiting Wang, Chuyue Zhong, Yijun Zhao. 994-997 [doi]
- A Comparison of Deep Learning and Traditional Machine Learning Approaches in Detecting Cognitive Impairment Using MRI ScansWei Liu, Jiarui Zhang, Yijun Zhao. 998-1001 [doi]
- Interactive Bridge Inspection Research using DroneHwapyeong Song, Wook-Sung Yoo, Wael Zatar. 1002-1005 [doi]
- Study of facial generation methods after orthodontic treatmentJia-Liang Tian, Qin-Yan Zhang, Hai-Zhen Li, Qing Wang, Yi Lei, Lin Zang, Xuemei Gao, Ji-Jiang Yang. 1006-1011 [doi]
- Radiation mapping using a double exponential attenuation model for UAV sensing in forest areaRyo Kikawa, Katsunori Oyama, Kouichi Genda. 1012-1015 [doi]
- Reinforcement Learning Agent for Path Planning with Expert DemonstrationAlan Norkham, Mikalus Chalupa, Noah Gardner, Md Abdullah Al Hafiz Khan, Xinyue Zhang, Chih-Cheng Hung. 1016-1019 [doi]
- Off-the-shelf LoRaWAN: Experimenting on the prospect of a low-cost rapid prototyping solutionFlorian Hofer 0001, Clemens Kuen. 1020-1025 [doi]
- A Novel Passive L1/L2 Edge Loop Detection Observing MAC addresses of L3 Core SwitchesMotoyuki Ohmori. 1026-1031 [doi]
- Benefit of third-party name server operations in DNS configurationAkira Sato, Kazunori Fujiwara, Kenichi Yoshida, Shuji Sannomiya. 1032-1037 [doi]
- Design and evaluation of a dedicated information environment with both portability and confidentialityNorimasa Takana, Hiroki Kashiwazaki. 1038-1043 [doi]
- On the Effect of Communication Link Heterogeneity on Content Delivery Delay in Information-Centric Delay Tolerant NetworksHisashi Sagayama, Ryotaro Matsuo, Hiroyuki Ohsaki. 1044-1049 [doi]
- IPSG: Invariant Proof Score GeneratorDuong Dinh Tran, Kazuhiro Ogata 0001. 1050-1055 [doi]
- Mask and respirator detection: analysis and potential solutions for a frequently ill-conditioned problemAntonio Costantino Marceddu, Renato Ferrero, Bartolomeo Montrucchio. 1056-1061 [doi]
- Debugging Support for Machine Learning Applications in Bioengineering Text CorporaKwok Sun Cheng, Tae-Hyuk Ahn, Myoungkyu Song. 1062-1069 [doi]
- Challenges in developing and deploying AI in the engineering, procurement and construction industryRimma Dzhusupova, Jan Bosch, Helena Holmström Olsson. 1070-1075 [doi]
- Concept drift detection for distributed multi-model machine learning systemsBeverly Abadines Quon, Jean-Luc Gaudiot. 1076-1080 [doi]
- A Systematic Literature Review of Machine Learning Applications for Process Monitoring and Control in Semiconductor ManufacturingTobias Gentner, Johannes Breitenbach, Timon Neitzel, Jacob Schulze, Ricardo Buettner. 1081-1086 [doi]
- Contexts Embedding for Sequential Service RecommendationBenjamin Amankwata, Kenneth K. Fletcher. 1087-1092 [doi]
- Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning LibrariesAkond Rahman, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu 0013. 1093-1097 [doi]
- Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial RobustnessÖmer Faruk Tuna, Ferhat Özgür Çatak, M. Taner Eskil. 1098-1103 [doi]
- Network Intrusion Detection Using Stack-Ensemble ANNLamia Parven Khan, Tasfia Tahsin Anika, Suraka Iban Hanif, Rashedur M. Rahman. 1104-1109 [doi]
- Token Based Energy-efficient Offloading Schemes for IoV NetworksPranshu Srivastava, Kaustubh Ijardar, Anuj Joshi, Nikumani Choudhury, Anakhi Hazarika. 1110-1116 [doi]
- Approximating CNN Computation for Plant Disease DetectionAnakhi Hazarika, Pranav Sistla, Vineet Venkatesh, Nikumani Choudhury. 1117-1122 [doi]
- A Secure and Efficient Fine-Grained Deletion Approach over Encrypted DataKushagra Lavania, Gaurang Gupta, D. V. N. Siva Kumar. 1123-1128 [doi]
- Towards Multi-Perspective Consulting in times of DisruptionStephen Ryan, Barbara Steffen. 1129-1134 [doi]
- Linking Multi-Perspectives to Enable Educated Decision Making in Digital Platform DesignBarbara Steffen, Frederik Möller. 1135-1140 [doi]
- Big data architectures for data lakes: A systematic literature reviewSonam Ramchand, Tariq Mahmood. 1141-1146 [doi]
- A Systematic Literature Review of Machine Learning Approaches for Optimization in Additive ManufacturingJohannes Breitenbach, Friedrich Seidenspinner, Furkan Vural, Philipp Beisswanger, Ricardo Buettner. 1147-1152 [doi]
- Big Data Pipeline Scheduling and Adaptation on the Computing ContinuumDragi Kimovski, Christian Bauer, Narges Mehran, Radu Prodan. 1153-1158 [doi]
- SIM-PIPE DryRunner: An approach for testing container-based big data pipelines and generating simulation dataAleena Thomas, Nikolay Nikolov, Antoine Pultier, Dumitru Roman, Brian Elvesæter, Ahmet Soylu. 1159-1164 [doi]
- Dataclouddsl: Textual and Visual Presentation of Big Data PipelinesShirin Tahmasebi, Amirhossein Layegh, Nikolay Nikolov, Amir H. Payberah, Khoa Dinh, Vlado Mitrovic, Dumitru Roman, Mihhail Matskin. 1165-1171 [doi]
- An Interactive Approach to Support Event Log Generation for Data Pipeline DiscoveryDario Benvenuti, Leonardo Falleroni, Andrea Marrella, Fernando Perales. 1172-1177 [doi]
- TUFA: A TOSCA extension for the specification of accelerator-aware applications in the Cloud ContinuumAdrian F. Spataru, Gabriel Iuhasz, Silviu Panica. 1178-1183 [doi]
- Robotic Grasp Detection for Parallel Grippers: A ReviewZhiyun Yin, Yujie Li 0001, Jintong Cai, Huimin Lu. 1184-1187 [doi]
- Grasp Position Estimation from Depth Image Using Stacked Hourglass Network StructureKeisuke Hamamoto, Huimin Lu, Yujie Li 0001, Tohru Kamiya, Yoshihisa Nakatoh, Seiichi Serikawa. 1188-1192 [doi]
- Localization Method for SLAM using an Autonomous Cart as a Guard RobotYuya Sawano, Takuya Watanabe, Yoshiaki Terashima, Ryozo Kiyohara. 1193-1198 [doi]
- A Safe Route Recommendation Method Based on Driver Characteristics from Telematics DataHayato Fukatsu, Tomoya Kawakami. 1199-1204 [doi]
- A Real-Time Background Replacement Method Based on Estimated Depth for AR ApplicationsYoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 1205-1210 [doi]
- IoT platform using information flow to reduce load on cloudTakafumi Sakai, Kenshin Hata, Takuya Wada, Katsuhiro Naito. 1211-1216 [doi]
- CSDLEEG: Identifying Confused Students Based on EEG Using Multi-View Deep LearningHashim Abu-gellban, Yu Zhuang, Long Hoang Nguyen 0002, Zhenkai Zhang, Essa Imhmed. 1217-1222 [doi]
- Conceptual Mappings of Conventional Software and Machine Learning-based Applications DevelopmentShannon Angel, Akbar Siami Namin. 1223-1230 [doi]
- Build Connections Between Two Groups of Images Using Deep Learning MethodHongfei Du, Emre Barut, Juntao Su. 1231-1236 [doi]
- Temperature Prediction in Microgrids Using LSTMs: A Case StudyAyda Demir, Luis Felipe Gutiérrez, Stephen B. Bayne, Argenis V. Bilbao. 1237-1242 [doi]
- A Comparative Study of Pre-trained Word Embeddings for Arabic Sentiment AnalysisMohamed Zouidine, Mohammed Khalil. 1243-1248 [doi]
- Vulnerability Detection in Smart Contracts Using Deep LearningSaroj Gopali, Zulfiqar Ali Khan, Bipin Chhetri, Bimal Karki, Akbar Siami Namin. 1249-1255 [doi]
- Predictive Analytics for Supporting Environmental Sustainability and Disaster ManagementAdam B. Bouttell, Sijin Lee, Carson K. Leung, Martin J. Levesque, Seunggon Son, Weihong Zhang, Alfredo Cuzzocrea. 1256-1261 [doi]
- Mining Popular Topics from the MediaKyle R. Boch, Freyja C. Kristjanson, Carson K. Leung, Yu Liu, Andrea M. Unrau, Shuai April Zhang, Alfredo Cuzzocrea. 1262-1267 [doi]
- Interpreting Attention of Stock Price PredictionKenichi Yoshida. 1268-1273 [doi]
- A Novel Optimal Profit Resilient Filter Pairs Trading Strategy for CryptocurrenciesYou Liang, Aerambamoorthy Thavaneswaran, Alex Paseka, Wei Qiao, Melody Ghahramani, Sulalitha Bowala. 1274-1279 [doi]
- Deep Learning Predictions for CryptocurrenciesAerambamoorthy Thavaneswaran, You Liang, Sulalitha Bowala, Alex Paseka, Melody Ghahramani. 1280-1285 [doi]
- A New Era of Blockchain-Powered Decentralized Finance (DeFi) - A ReviewSaulo dos Santos, Japjeet Singh, Ruppa K. Thulasiram, Shahin Kamali, Louis Sirico, Lisa Loud. 1286-1292 [doi]
- A Cloud-Native Online Judge SystemGuan-Chen Pan, Pangfeng Liu, Jan-Jan Wu. 1293-1298 [doi]
- Assessing Student Participation and Engagement Using DiscordJustice Banson, Caroline D. Hardin. 1299-1305 [doi]
- Plug & Play Device for Hybrid Smart Classroom: A Prototype DevelopmentArumalla Mohit Krishna, Pranav Sistla, Nikumani Choudhury, Hirak Ranjan Das. 1306-1311 [doi]
- Identifying Key Learning Factors in Service-Leaning Programs Using Machine LearningKangzhong Wang, Eugene Yujun Fu, Grace Ngai, Hong Va Leong. 1312-1317 [doi]
- US County-level Risk Factors Associated with COVID-19 Exacerbation During the Vaccination EraYepu Wang, Yiting Wang, Chuyue Zhong, Yijun Zhao. 1318-1323 [doi]
- Lessons Learned from the Design and Evaluation of InterViewR: A Mixed-Reality Based Interview Training Simulation Platform for Individuals with AutismAnais Dawson, Shameem Ahmed, Moushumi Sharmin, Wesley Deneke. 1324-1330 [doi]
- A Question-Answering System on COVID-19 Scientific LiteratureShaina Raza, Brian Schwartz, Nancy Ondrusek. 1331-1336 [doi]
- A Systematic Literature Review of Deep Learning Approaches in Smart Meter Data AnalyticsJohannes Breitenbach, Jan Gross, Manuel Wengert, James Anurathan, Rico Bitsch, Zafer Kosar, Emre Tuelue, Ricardo Buettner. 1337-1342 [doi]
- COMET: Co-simulation of Multi-Energy Systems for Energy TransitionLuca Barbierato, Daniele Salvatore Schiera, Rossano Scoccia, Alessandro Margara, Lorenzo Bottaccioli, Edoardo Patti. 1343-1348 [doi]
- Modeling of Renewable Energy Communities: the RECoupled approachPaolo Lazzeroni, Gianmarco Lorenti, Francesco Moraglio, Maurizio Repetto. 1349-1354 [doi]
- Comparative Analysis of Neural Networks Techniques for Lithium-ion Battery SOH EstimationAlessandro Aliberti, Filippo Boni, Alessandro Perol, Marco Zampolli, Rémi Jacques Philibert Jaboeuf, Paolo Tosco, Enrico Macii, Edoardo Patti. 1355-1361 [doi]
- A Nonlinear Two-Parameter Model for the Spatial Analysis of Solar IrradiationAlberto Bocca, Alberto Macii, Enrico Macii. 1362-1367 [doi]
- Comparison of Frequency Bands for Wireless Communication in Forests Using LoRa ModulationChristoph Susen, Philipp Nenninger, Christian Fimmers, Simon Storms, Werner Herfs. 1368-1374 [doi]
- A Generic Software Architecture for PoE Power Sourcing EquipmentAndreas Mäkilä, Anna Friebe, Leif Enblom, Per Erik Strandberg, Tiberiu Seceleanu. 1375-1380 [doi]
- An Emotion-fused Medical Knowledge Graph and its Application in Decision SupportZhang Liu, Liang Xiao, Jianxia Chen, He Yu, Yunlong Ye. 1381-1388 [doi]
- Relationship between Internet Addiction and Stress Levels among Adolescents in East Jakarta, Jakarta Province, IndonesiaMuhammad Arsyad Subu, Nabeel Al-Yateem, Imam Waluyo, Jacqueline Maria Dias, Syed Azizur Rahman, Fatma Refaat Ahmed, Siti A. Murono, Sheikh Iqbal Ahamed, Ahmad Rajeh Saifan, Tilawaty Aprina, Amina Al-Marzouqi. 1389-1392 [doi]
- Technology Utilization in Health Science Education during Covid-19: Experience from University of SharjahSyed Azizur Rahman, Swetha Variyath, Nabeel Al-Yateem, Sheikh Iqbal Ahamed, Amina Al-Marzouqi, Muhammad Arsyad Subu, Jacqueline Maria Dias, Ahmad Rajeh Saifan, Fatma Refaat Ahmed. 1393-1395 [doi]
- Application of Improved Mask R-CNN Algorithm Based on Gastroscopic Image in Detection of Early Gastric CancerZhi-Heng Cui, Qin-Yan Zhang, Jing-Wei Zhang, Xue Sun, Qing Wang, Yi Lei, Lin Zang, Li Zhao, Ji-Jiang Yang. 1396-1401 [doi]
- Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit PatientsJagan Moahan Reddy Danda, Kumar Priyansh, Hossain Shahriar, Hisham Haddad, Alfredo Cuzzocrea, Nazmus Sakib. 1402-1407 [doi]
- Tuberculosis Detection in Chest Radiography: A Combined Approach of Local Binary Pattern Features and Monarch Butterfly Optimization AlgorithmAfonso U. Fonseca, Bruno M. Rocha, Emilia Alves Nogueira, Gabriel da Silva Vieira, Deborah S. A. Fernandes, Junio Cesar de Lima, Júlio César Ferreira, Fabrízzio Alphonsus A. M. N. Soares. 1408-1413 [doi]
- Chinese Medical Named Entity Recognition Based on Multi-word Segmentation and Multi-layer BILSTMDawei Li, Jianqiang Li 0002, Zhichao Zhu, Tariq Mahmood. 1414-1419 [doi]
- Chinese Medical Event Extraction Based on Hybrid Neural NetworkLiyin Yang, Jianqiang Li 0002, Zhichao Zhu, Xiangmin Dong, Faheem Akhtar. 1420-1425 [doi]
- A Deep Learning based Method for Microscopic Object Localization and ClassificationBoya Li, Jianqiang Li 0002, Zhichao Zhu, Linna Zhao, Wenxiu Cheng. 1426-1431 [doi]
- High Myopia Detection Method On Fundus Images Based On Curriculum LearningHuifeng Zhao, Zhilong Ma, Yu Guan, JianQiang Li, Yu-Chih Wei. 1432-1437 [doi]
- A speech understanding-based method for recognizing psychological medical speech feelingsShuo Zhang, Jianqiang Li 0002, Muhammad Sufyan, Yinlong Xiao, Xiangmin Dong. 1438-1443 [doi]
- An Ensembled Method For Diabetic Retinopathy Classification using Transfer LearningDinesh Attota, Durga Nagarjuna Tadikonda, Shruthi Pethe, Md Abdullah Al Hafiz Khan. 1444-1449 [doi]
- Mental workload classification from non-invasive fNIRs signals through deep convolutional neural networkVamsi Krishna Dhulipalla, Md Abdullah Al Hafiz Khan. 1450-1455 [doi]
- An Efficient Small for Gestational Age Prognosis System Using Stacked Generalization Scheme (SGS)Faheem Akhtar, Jianqiang Li 0002, Zahid Hussain Khand, Yu-Chih Wei, Khalid Hussain, Sana Fatima. 1456-1461 [doi]
- IoT for Real-time Accessibility Ontology Population to Context-awareness Adapt User InterfacesEmna Souidi, Lamia Zouhaier, Yousra Bendaly Hlaoui. 1462-1467 [doi]
- Faultload time model of the MQTT protocol publish serviceAmina Jandoubi, M. Taha Bennani, Abdelaziz El Fazziki. 1468-1473 [doi]
- Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network TrafficShuvo Bardhan, Mitsuhiro Hatada. 1474-1480 [doi]
- U-CAN: A Convolutional Neural Network Based Intrusion Detection for Controller Area NetworksAraya Kibrom Desta, Shuji Ohira, Ismail Arai, Kazutoshi Fujikawa. 1481-1488 [doi]
- Real Network DDoS Pattern Analysis and DetectionYing-Feng Hsu, Araki Ryusei, Morito Matsuoka. 1489-1494 [doi]
- Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism NetworkYun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 1495-1501 [doi]
- A Feasibility Study of Using Code Clone Detection for Secure Programming EducationMichael Menard, Tommy Nelson, Milan Shahi, Hugh Morton, Adam DeTavernier, Harvey P. Siy, Rui Zhao, Myoungkyu Song. 1502-1507 [doi]
- LeG for Enhancing Student Communication and Learning ExperienceHenry C. B. Chan. 1508-1512 [doi]
- A Framework for Considering Uncertainty in Software SystemsChawanangwa Lupafya, Dharini Balasubramaniam. 1519-1524 [doi]
- RepChaBug: Automatically Repairing Incorrect Change Bugs in Software EvolutionJun Wang, Samuel Sungmin Cho, Myoungkyu Song. 1525-1530 [doi]
- Colored Petri Net Reusing for Service Function Chaining ValidationZhenyu Liu, Xuanyu Lou, Yajun Cui, Yingdong Zhao, Hua Li. 1531-1535 [doi]
- Self-Sovereign Identity as a Service: Architecture in PracticeYepeng Ding, Hiroyuki Sato. 1536-1543 [doi]
- Impacts of Radio Frequency IDentification (RFID) Technology in Business ContinuitySolomon J. Akuma, Eslam G. AbdAllah. 1544-1549 [doi]
- Towards a Distributed Inference Detection System in a Multi-Database ContextSad Rafik, Paul Lachat, Nadia Bennani, Veronika Rehn-Sonigo. 1550-1554 [doi]
- Trade-off between Privacy, Quality and Risk: Anonymization Strategy Evaluation for Data WarehousesSascha Schiegg, Armin Gerl. 1555-1560 [doi]
- PPDS: Privacy Preserving Data Sharing for AI applications Based on Smart ContractsXuesong Hai, Jing Liu. 1561-1566 [doi]
- A Self-adaptive Indicator Selection Approach for Solving Credit Risk AssessmentYongfeng Gu, Yue Ning 0005, Hao Ding, Kecai Gu, Daohong Jian, Zhou Xu, Hua Wu, Jun Zhou 0011. 1567-1572 [doi]
- An Approach to Real-Time Fall Detection based on OpenPose and LSTMPo-Chih Chen, Chih-Hung Chang, Yu-Wei Chan, Yin-Te Tasi, William C. Chu. 1573-1578 [doi]
- An architectural framework for enabling secure decentralized P2P messaging using DIDComm and Bluetooth Low EnergyAlexander Heireth Enge, Abylay Satybaldy, Mariusz Nowostawski. 1579-1586 [doi]
- Disruption-tolerant Local Authentication Method for Continuous and Secure In-Flight Wireless LANHideaki Goto. 1587-1591 [doi]
- Social Impact of Smart Environments: Software Engineering Perspectives and ChallengesStuart McDonald, Dave Towey, Vladimir Brusic. 1592-1597 [doi]
- The development of ethically informed standards for intelligent monitoring systems of electric machinesKun Shang, Stuart McDonald, Giampaolo Buticchi, Vladimir Brusic. 1598-1605 [doi]
- A Curated Personas and Design Guidelines Tool for Better Supporting Diverse End-usersJianing Liu, Jia Shi, Jun Xie, Xinyun Zhang, Zichuan Zhang, John C. Grundy, Tanjila Kanij. 1606-1613 [doi]
- Exploring Author Profiling for Fake News DetectionShloak Rathod. 1614-1619 [doi]
- DESCo: Detecting Emotions from Smart CommandsSunanda Guha, Razib Iqbal. 1620-1625 [doi]
- Autonomic Dominant Resource Fairness (A-DRF) in Cloud ComputingAmin Fakhartousi, Sofia Meacham, Keith Phalp. 1626-1631 [doi]
- Dataset Size and Machine Learning - Open NMR Databases as a Case StudyStefan Kuhn 0001, Ricardo Moreira Borges, Francesco Venturini, Maurizio Sansotera. 1632-1636 [doi]
- Translating SysML Activity Diagrams for nuXmv Verification of an Autonomous PancreasOrion Staskal, Josh Simac, Logan Swayne, Kristin Y. Rozier. 1637-1642 [doi]
- High-Level Rigorous Template for Analysing Safety Properties of Self-driving Vehicle SystemsFahad Alotaibi, Thai Son Hoang, Michael J. Butler. 1643-1648 [doi]
- Measurement of Human Heart Rate: A Cost-Effective Solution to Monitor Cardiovascular HealthRifat Nawaz, Tanjina Afrin Sharna, Md. Noor Hossain Akand, Rashedur M. Rahman. 1649-1653 [doi]
- Data Provenance for healthcare: a blockchain-based approachSalvatore D'Antonio, Federica Uccello. 1655-1660 [doi]
- Graph Signal Processing for IoT Sensor NetworksAnna Sabatini, Luca Vollero. 1661-1666 [doi]
- Detection of floating objects in liquidsAnna Sabatini, Eleonora Nicolai, Luca Vollero. 1667-1671 [doi]
- A Data Science Solution for Mining Weather Data and Transportation Data for Smart CitiesBen Nguyen, Mark J. D. Shinnie, Carson K. Leung, Michael R. Kuzie, Nikola N. Kokilev, Sukhmandeep Kaur. 1672-1677 [doi]
- The role of awareness of mobility offer and nudges in increasing sustainable mobility habits of citizens: a case study from the Munich regionStefania Mauro, Shravan Shinde, Maurizio Arnone, Victor Marques Zamith, Giovanni De Rosa, Davide Pietroni. 1678-1683 [doi]
- Interplanetary File System in Logistic Networks: a ReviewVittorio Capocasale, Stefano Musso, Guido Perboli. 1684-1689 [doi]
- A Systematic Literature Review of Current IoT-Based Approaches for Improving Sustainable Public Transportation in Smart CitiesJohannes Breitenbach, Jan Gross, Daniel Dittrich, Pauline Neumann, Alexander Schilling, Esra Zaman, Ricardo Buettner. 1690-1695 [doi]
- Discrete Choice Experiments to identify user preference for electric mobilityDavide La Gamba, Miriam Pirra, Francesco Deflorio, Luis Montesano, Angela Carboni, Maurizio Arnone. 1696-1701 [doi]
- Innovative Business Models in Ports' LogisticsStefano Musso, Guido Perboli, Michela Apruzzese, Giulia Renzi, Natalia Selini. 1702-1707 [doi]
- Algorithmic Input Generation for More Effective Software TestingLaura Epifanovskaya, Reginald Meeson, Christopher McCormack, Jinseo R. Lee, Robert C. Armstrong, Jackson R. Mayo. 1708-1715 [doi]
- An Empirical Study on the Effects of Entry Function Pairs in Fuzzing Smart ContractsImran Ashraf, W. K. Chan 0001. 1716-1721 [doi]
- Using Metamorphic Relation Violation Regions to Support a Simulation Framework for the Process of Metamorphic TestingZhihao Ying, Anthony Bellotti, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou. 1722-1727 [doi]
- SSG-AFL: Vulnerability detection for Reactive Systems using Static Seed Generator based AFLSangharatna Godboley, Arpita Dutta, Radha Krishna Pisipati, Durga Prasad Mohapatra. 1728-1733 [doi]
- Analysis of Privacy Compliance by Classifying Multiple Policies on the WebKeika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono. 1734-1741 [doi]
- EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning FeaturesQingren Zeng, Jiahao He, Gansen Zhao, Shuangyin Li, Jingji Yang, Hua Tang, Haoyu Luo. 1742-1749 [doi]
- An Extention of Lazy Abstraction and Refinement for Program VerificationHaowei Liang, Chunyan Hou, Jinsong Wang, Chen Chen 0012. 1750-1755 [doi]
- Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel FrameworkJiyoun Randolph, Md Jobair Hossain Faruk, Bilash Saha, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib. 1756-1761 [doi]
- Instrumenting Microservices for Concurrent Audit Logging: Beyond Horn ClausesNicolas D. Ahn, Sepehr Amir-Mohammadian. 1762-1767 [doi]
- Systematic Analysis of Deep Learning Model for Vulnerable Code DetectionMohammad Taneem Bin Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Md Abdullah Khan, Mohammad Masum, Nazmus Sakib, Fan Wu 0013. 1768-1773 [doi]
- A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical SystemsAlvi Ataur Khalil, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman. 1774-1779 [doi]
- A Review of Dark Web: Trends and Future DirectionsShahriar Sobhan, Timothy Williams, Md Jobair Hossain Faruk, Juan Rodriguez, Masrura Tasnim, Edwin Mathew, Jack Wright, Hossain Shahriar. 1780-1785 [doi]
- A Systematic Literature Review of Machine Learning Approaches for Detecting Events and Disturbances in Smart Grid SystemsRicardo Buettner, Johannes Breitenbach, Jan Gross, Isabell Krueger, Hari Gouromichos, Marvin Listl, Louis Leicht, Thorsten Klier. 1786-1791 [doi]
- An access control model considering with transitions of access rights based on the blockchainHirotsugu Kinoshita, Tetsuya Morizumi. 1792-1797 [doi]
- Enabling Cyberanalytics using IoT Clusters and ContainersSoin Abdoul Kassif Traore, Maria Valero, Hossain Shahriar, Liang Zhao, Sheikh Iqbal Ahamed, Ahyoung Lee. 1798-1803 [doi]
- Improving the Derivation of Sound Security MetricsGeorge O. M. Yee. 1804-1809 [doi]
- Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal VerificationShion Maeda, Misato Nakabayashi, Tetsuya Okuda. 1810-1815 [doi]
- Automated Two-Stage Approach for Damage Detection of Surface Defects in Historical BuildingsWanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai. 1816-1821 [doi]
- Cultural Heritage Assets Optimization Workflow for Interactive System DevelopmentKedong Chai, Yue Li. 1822-1827 [doi]