Abstract is missing.
- An Efficient Connected Swarm Deployment via Deep LearningKiril Danilchenko, Michael Segal 0001. 1-7 [doi]
- Using Free-Choice Nets for Process Mining and Business Process ManagementWil M. P. van der Aalst. 9-15 [doi]
- Combinatorial Testing of Context Aware Android ApplicationsShraddha Piparia, David Adamo, Renée C. Bryce, Hyunsook Do, Barrett R. Bryant. 17-26 [doi]
- Machine Learning and High-Performance Computing Hybrid Systems, a New Way of Performance Acceleration in Engineering and Scientific ApplicationsPawel Gepner. 27-36 [doi]
- A Distributed Application Placement and Migration Management Techniques for Edge and Fog Computing EnvironmentsMohammad Goudarzi, Marimuthu Palaniswami, Rajkumar Buyya. 37-56 [doi]
- An efficient approach towards the generation and analysis of interoperable clinical data in a knowledge graphJens Dörpinghaus, Sebastian Schaaf, Vera Weil, Tobias Hübenthal. 59-68 [doi]
- Stereotype-aware collaborative filteringGabriel Frisch, Jean-Benoist Léger, Yves Grandvalet. 69-79 [doi]
- Rotation Invariance in Graph Convolutional NetworksNguyen Anh Mac, Hung Son Nguyen. 81-90 [doi]
- Query Specific Focused Summarization of Biomedical Journal ArticlesAkshara Rai, Suyash Sangwan, Tushar Goel, Ishan Verma, Lipika Dey. 91-100 [doi]
- A Practical Solution to Handling Randomness and Imperfect Information in Monte Carlo Tree SearchMaciej Swiechowski, Tomasz Tajmajer. 101-110 [doi]
- Automated creation of parallel Bible corpora with cross-lingual semantic concordanceJens Dörpinghaus, Carsten Düing. 111-114 [doi]
- Evaluation of Neural Network Transformer Models for Named-Entity Recognition on Low-Resourced LanguagesRidewaan Hanslo. 115-119 [doi]
- In-Bed Person Monitoring Using Thermal Infrared SensorsElias Josse, Amanda Nerborg, Kevin Hernandez-Diaz, Fernando Alonso-Fernandez. 121-125 [doi]
- A Novel Cluster Ensemble based on a Single Clustering AlgorithmTahseen Khan, Wenhong Tian, Mustafa R. Kadhim, Rajkumar Buyya. 127-135 [doi]
- StarCraft strategy classification of a large human versus human game replay datasetStefan Kristofík, Matús Kasás, Peter Malík. 137-140 [doi]
- Pix2Trips - a system supporting small groups of urban touristsHalina Kwasnicka, Tsvetan Ovedenski. 141-145 [doi]
- Analysis of the Effect of News Sentiment on Stock Market Prices through Event EmbeddingSashank Sridhar, Sowmya Sanagavarapu. 147-150 [doi]
- Algorithms for the Safe Management of Autonomous VehiclesMourad Baïou, Alain Quilliot, Lounis Adouane, Aurelien Mombelli, Zhengze Zhu. 153-162 [doi]
- Achieving Good Nash Equilibrium by Temporal Addition of Dummy PlayersOfek Dadush, Tami Tamir. 163-172 [doi]
- InterCriteria Analyzis of Hybrid Ant Colony Optimization Algorithm for Multiple Knapsack ProblemStefka Fidanova, Maria Ganzha, Olympia Roeva. 173-180 [doi]
- On the Representation of Human Motions and Distance-based RetargetingSimon B. Hengeveld, Antonio Mucherino. 181-189 [doi]
- Dynamic communication topologies for distributed heuristics in energy system optimization algorithmsStefanie Holly, Astrid Nieße. 191-200 [doi]
- Minimizing Tardiness in a Scheduling Environment with Jobs' HierarchyMichal Sinai, Tami Tamir. 201-209 [doi]
- A shortened time horizon approach for optimization with differential-algebraic constraintsPawel Drag. 211-215 [doi]
- Solving assignment problems via Quantum Computing: a case-study in train seating arrangementIlaria Gioda, Davide Caputo, Edoardo Fadda, Daniele Manerba, Blanca Silva Fernández, Roberto Tadei. 217-220 [doi]
- Worst-Case Analysis of an Approximation Algorithm for Single Machine Scheduling ProblemNatalia Grigoreva. 221-225 [doi]
- Group Decision Support for e-Mail Service Optimization through Information Technology Infrastructure Library FrameworkYasen Mitev, Leoneed Kirilov. 227-230 [doi]
- Combinatorial etudeMiroslav Stoenchev, Venelin Todorov. 231-234 [doi]
- An Optimized Technique for Wigner Kernel EstimationVenelin Todorov, Stefka Fidanova, Ivan Dimov, Stoyan Poryazov. 235-238 [doi]
- Optimized stochastic approach for integral equationsVenelin Todorov, Ivan Dimov, Stefka Fidanova, Rayna Georgieva. 239-242 [doi]
- Optimized Method based on Lattice Sequences for Multidimensional Integrals in Neural NetworksVenelin Todorov, Ivan Dimov, Stefka Fidanova. 243-246 [doi]
- An Optimized Stochastic Techniques related to Option PricingVenelin Todorov, Ivan Dimov, Stefka Fidanova, Stoyan Apostolov. 247-250 [doi]
- Interval-Valued Intuitionistic Fuzzy Decision-Making Method using Index Matrices and Application in OutsourcingVelichka Traneva, Stoyan Tranev, Deyan Mavrov. 251-254 [doi]
- Optimization and Evaluation of Calibration for Low-cost Air Quality Sensors: Supervised and Unsupervised Machine Learning ModelsPetar Zhivkov. 255-258 [doi]
- Thespis: Causally-consistent OLTPCarl Camilleri, Joseph G. Vella, Vitezslav Nezval. 261-269 [doi]
- Enabling Autonomous Medical Image Data Annotation: A human-in-the-loop Reinforcement Learning ApproachLeonardo Cardia da Cruz, César A. Sierra Franco, Greis F. M. Silva-Calpa, Alberto Raposo 0001. 271-279 [doi]
- The impact of vectorization and parallelization of the slope algorithm on performance and energy efficiency on multi-core architectureBeata Bylina, Joanna Potiopa, Michal Klisowski, Jaroslaw Bylina. 283-290 [doi]
- Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic FailuresMartin Nischwitz, Marko Esche, Florian Tschorsch. 291-300 [doi]
- A random forest-based approach for survival curves comparing: principles, computational aspects and asymptotic time complexity analysisLubomír Stepánek, Filip Habarta, Ivana Malá, Lubos Marek. 301-311 [doi]
- Practical parallelization of Gear-Nordsieck and Brayton-Gustavson-Hatchel stiff ODE solverMarek M. Stabrowski. 313-316 [doi]
- Design and application of facial expression analysis system in empathy ability of children with autism spectrum disorderChen Guo, Kun Zhang, Jingying Chen, Ruyi Xu, Lei Gao. 319-325 [doi]
- Discovering Communities in Networks: A Linear Programming Approach Using Max-Min ModularityArman Ferdowsi, Alireza Khanteymoori. 329-335 [doi]
- Short Performance Analysis of the LTE and 5G Access Technologies in NS-3Maros Baumgartner, Jozef Juhár, Ján Papaj. 337-340 [doi]
- UAV Mission Definition and Implementation for Visual InspectionTomás Adam, Frantisek Babic. 343-346 [doi]
- Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case StudyMartin Macák, Stefan Bojnak, Barbora Buhnova. 349-356 [doi]
- Matrix profile for DDoS attacks detectionFaisal Alotaibi, Alexei Lisitsa. 357-361 [doi]
- Traffic Signal Control: a Double Q-learning ApproachAnton Agafonov, Vladislav V. Myasnikov. 365-369 [doi]
- The Virtual Emotion Loop: Towards Emotion-Driven Product Design via Virtual RealityDavide Andreoletti, Luca Luceri, Achille Peternier, Tiziano Leidi, Silvia Giordano. 371-378 [doi]
- Artificial Intelligence Project Success Factors: Moral Decision-Making with AlgorithmsGloria Miller. 379-390 [doi]
- Mass Vaccine Administration under Uncertain Supply ScenariosSalvatore Foderaro, Maurizio Naldi, Gaia Nicosia, Andrea Pacifici. 393-402 [doi]
- Classification of Alzheimer's disease patients using metrics of oculo-motorsWioletta Nowak, Minoru Nakayama, Elzbieta Trypka, Anna Zarowska. 403-407 [doi]
- Smartphone-Based Color Measurement of Tooth Shade Guide in Clinical Lighting ConditionsAgnieszka Radziun, Rafal Doniec, Szymon Siecinski, Natalia Piaseczna, Katarzyna Mocny-Pachonska, Marta Cieslik-Wegemund, Konrad Duraj, Marta Tanasiewicz, Ewaryst Tkacz. 409-413 [doi]
- Towards Objectification of Multi-Criteria Assessments: a Comparative Study on MCDA MethodsAleksandra Baczkiewicz, Jaroslaw Watróbski, Bartlomiej Kizielewicz, Wojciech Salabun. 417-425 [doi]
- Critical Success Factors for Digitalization ProjectsChristian Leyh, Konstanze Köppel, Sarah Neuschl, Milan Pentrack. 427-436 [doi]
- The Impact of Digital Technologies on How Companies Work: Results from an Interview StudyChristian Leyh, Paul Becke, Milan Pentrack, Bastien Bodenstein. 437-446 [doi]
- Risks of Concurrent Execution in E-Commerce ProcessesAnastasija Nikiforova, Janis Bicevskis, Girts Karnitis, Ivo Oditis, Zane Bicevska. 447-451 [doi]
- Effect of Criteria Range on the Similarity of Results in the COMET MethodAndrii Shekhovtsov, Jakub Wieckowski, Bartlomiej Kizielewicz, Wojciech Salabun. 453-457 [doi]
- Using Word Embeddings for Italian Crime News CategorizationGiovanni Bonisoli, Federica Rollo, Laura Po. 461-470 [doi]
- Business Process Recomposition as a Way to Redesign Workflows EffectivelyPiotr Wisniewski 0003, Krzysztof Kluza, Pawel Jemiolo, Antoni Ligeza, Anna Suchenia. 471-474 [doi]
- An Empirical Study on Application of Word Embedding Techniques for Prediction of Software Defect Severity LevelLov Kumar, Mukesh Kumar 0005, Lalita Bhanu Murthy Neti, Sanjay Misra, Vipul Kocher, Srinivas Padmanabhuni. 477-484 [doi]
- Modeling and Verification using Different Notations for CPSs: The One-Water-Tank Case StudyTatiana Liakh, Andrei Rozov, Vladimir Zyubin, Sergey Staroletov, Thomas Baar, Horst Schulte, Ivan Konyukhov, Nikolay Shilov. 485-488 [doi]
- Fed-agent - a Transparent ACID-Enabled Transactional Layer for Multidatabase Microservice ArchitecturesLazar Nikolic, Vladimir Dimitrieski. 489-492 [doi]
- PRET-ization of uRISC CoreMartin Kostal, Michal Sojka. 495-500 [doi]
- Semi-automated Algorithm for Complex Test Data Generation for Interface-based Regression Testing of Software ComponentsTomas Potuzak, Richard Lipka. 501-510 [doi]
- A Time-Sensitive Model for Data Tampering Detection for the Advanced Metering InfrastructureJosé Miguel Blanco, Bruno Rossi 0001, Tomás Pitner. 511-519 [doi]
- An Agent-based Cyber-Physical Production System using Lego TechnologyMetehan Mustafa Yalcin, Burak Karaduman, Geylani Kardas, Moharram Challenger. 521-531 [doi]
- Agile Architecting of Distributed Systems for Flexible Industry 4.0Henrik Bærbak Christensen, Sune Chung Jepsen, Torben Worm. 533-536 [doi]