Abstract is missing.
- Measuring Trustworthiness in Neuro-Symbolic IntegrationAndrea Agiollo, Andrea Omicini. 1-10 [doi]
- Deciphering Clinical Narratives - Augmented Intelligence for Decision Making in Healthcare SectorLipika Dey, Sudeshna Jana, Tirthankar Dasgupta, Tanay Gupta. 11-24 [doi]
- When to Trust AI: Advances and Challenges for Certification of Neural NetworksMarta Kwiatkowska, Xiyue Zhang. 25-37 [doi]
- Multiple Criteria Decision Aiding by Constructive Preference Learning (Keynote Lecture - Extended Abstract)Roman Slowinski. 39 [doi]
- Online Learning Framework for Radio Link Failure Prediction in FANETsKiril Danilchenko, Nir Lazmi, Michael Segal 0001. 41-48 [doi]
- A Survey on Congestion Control and Scheduling for Multipath TCP: Machine Learning vs Classical ApproachesMaisha Maliha, Golnaz Habibi, Mohammed Atiquzzaman. 49-61 [doi]
- Abstract Approach to Entropy and Co-Entropy in Measurable and Probability Spaces (Invited Lecture - Extended Abstract)Gianpiero Cattaneo. 63-64 [doi]
- Towards reliable rule mining about code smells: The McPython approach (Invited Lecture - Extended Abstract)Maciej Ziobrowski, Miroslaw Ochodek, Jerzy R. Nawrocki, Bartosz Walter. 65-66 [doi]
- Combination of Fuzzy Sets and Rough Sets for Machine Learning Purposes (Tutorial Lecture - Extended Abstract)Chris Cornelis, Henri Bollaert. 67 [doi]
- Rough Sets: Introduction, History and Selected Applications (Tutorial Lecture - Extended Abstract)Soma Dutta, Davide Ciucci. 69-70 [doi]
- Reducts in Rough Sets: Algorithmic Insights, Open Source Libraries and Applications (Tutorial - Extended Abstract)Andrzej Janusz, Sebastian Stawicki. 71 [doi]
- Type 1 Diabetes Mellitus Saudi Patients' Perspective on the Adopting IoT-Enabled CGM: Validation of Critical Factors in the IAI-CGM A FrameworkHamad Almansour, Natalia Beloff, Martin White. 73-81 [doi]
- Defect Backlog Size Prediction for Open-Source Projects with the Autoregressive Moving Average and Exponential Smoothing ModelsPaulina Aniola, Sushant Kumar Pandey, Miroslaw Staron, Miroslaw Ochodek. 83-92 [doi]
- Can Unlabelled Data Improve AI Applications? A Comparative Study on Self-Supervised Learning in Computer VisionMarkus Bauer, Christoph Augenstein. 93-101 [doi]
- CADM: Big Data to Limit Creative Accounting in Saudi-Listed CompaniesMaysoon Bineid, Natalia Beloff, Martin White, Anastasia Khanina. 103-110 [doi]
- Toward an Optimal Solution to the Network Partitioning ProblemArman Ferdowsi, Maryam Dehghan Chenary. 111-117 [doi]
- Diffusion Limits for Shortest Remaining Processing Time Queues with Multiple Customer TypesRobert Gieroba, Lukasz Kruk. 119-130 [doi]
- Genetic Algorithm for Planning and Scheduling Problem - StarCraft II Build Order case studyKonrad Gmyrek, Michal Antkiewicz, Pawel B. Myszkowski. 131-140 [doi]
- Discovering relationships between data in enterprise system using log analysisLukasz Korzeniowski, Krzysztof Goczyla. 141-150 [doi]
- The Use of Digital Technologies in German Business ConsultanciesChristian Leyh, Marcel Lange, Alisa Lorenz. 151-160 [doi]
- A Framework for Assessing the Sustainability of Intelligent Transport Systems in the Smart City ContextAlisa Lorenz, Nils Madeja, Christian Leyh. 161-169 [doi]
- Time-series Anomaly Detection and Classification with Long Short-Term Memory Network on Industrial Manufacturing SystemsTijana Markovic, Alireza Dehlaghi-Ghadim, Miguel Leon 0001, Ali Balador, Sasikumar Punnekkat. 171-181 [doi]
- XOR-based decomposition and its application in memory-based and reversible logic synthesisTomasz Mazurkiewicz. 183-190 [doi]
- Balancing Privacy and Accuracy in Federated Learning for Speech Emotion RecognitionSamaneh Mohammadi, Mohammadreza Mohammadi, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti. 191-199 [doi]
- Back to the Essential: A Literature-Based Review on Agile MindsetNecmettin Ozkan, Karen Eilers, Mehmet Sahin Gök. 201-211 [doi]
- Sign language interpreting - relationships between research in different areas - overviewBarbara Probierz, Jan Kozak, Adam Piasecki, Angelika Podlaszewska. 213-223 [doi]
- Enhancing naive classifier for positive unlabeled data based on logistic regression approachMateusz Platek, Jan Mielniczuk. 225-233 [doi]
- Improving the Efficiency of Meta AutoML via Rule-based Training StrategiesAlexander Zender, Bernhard G. Humm, Tim Pachmann. 235-246 [doi]
- Towards automated detection of adversarial attacks on tabular dataPiotr Biczyk, Lukasz Wawrowski. 247-251 [doi]
- Change of Brand Management in Social Media During the Russia-Ukraine War: Findings from PolandMagdalena Grzanka, Artur Strzelecki. 253-258 [doi]
- Continual learning of a time series model using a mixture of HMMs with application to the IoT fuel sensor verificationPrzemyslaw Glomb, Michal Cholewa, Pawel Foszner, Jakub Bularz. 259-264 [doi]
- Towards an HPC cluster digital twin and scheduling framework for improved energy efficiencyAlexander Kammeyer, Florian Burger, Daniel Lübbert, Katinka Wolter. 265-268 [doi]
- Perception of vector and triangle representations of fuzzy number most possible value changesDorota Kuchta, Jerzy Grobelny, Rafal Michalski, Jan Schneider 0004. 269-274 [doi]
- Emotion-Based Literature Books Recommender SystemsElena-Ruxandra Lutan, Costin Badica. 275-280 [doi]
- BERT-CLSTM model for the classification of Moroccan commercial courts verdictsTaoufiq El Moussaoui, Loqman Chakir. 281-284 [doi]
- Calculating and comparing solar radiation results using GIS in the City Sarajevo areaNedim Mujic, Almir Karabegovic. 285-290 [doi]
- Towards Industry 4.0: Machine malfunction prediction based on IIoT streaming dataDragana Nikolova, Petre Lameski, Ivan Miguel Pires, Eftim Zdravevski. 291-296 [doi]
- Reranking for a Polish Medical Search EngineJakub Pokrywka, Krzysztof Jassem, Piotr Wierzchon, Piotr Badylak, Grzegorz Kurzyp. 297-302 [doi]
- Developing Field Theory in MizarChristoph Schwarzweller. 303-308 [doi]
- Clusterization methods for multi-variant e-commerce interfacesAdam Wasilewski. 309-313 [doi]
- QMAK: Interacting with Machine Learning Models and Visualizing Classification ProcessArkadiusz Wojna, Katarzyna Jachim, Lukasz Kosson, Lukasz Kowalski, Damian Manski, Michal Manski, Krzysztof Mroczek, Krzysztof Niemkiewicz, Robert Piszczatowski, Maciej Próchniak, Tomasz Romanczuk, Piotr Skibinski, Marcin Staszczyk, Michal Szostakiewicz, Leszek Tur, Damian Wójcik, Maciej Zuchniak. 315-318 [doi]
- Psychological Safety, Leadership and Non-Technical Debt in Large Scale Agile Software DevelopmentMuhammad Ovais Ahmad. 327-334 [doi]
- Comparative Analysis of Word Embedding and Machine Learning Techniques for Classification of Software Developer Communications on GitterTumu Akshar, Lov Kumar, Yogita, Lalita Bhanu Murthy Neti. 335-346 [doi]
- Dual-Path Image Reconstruction: Bridging Vision Transformer and Perceptual Compressive Sensing NetworksZakaria Bairi, Kadda Beghdad Bey, Olfa Ben Ahmed, Abdenour Amamra, Abbas Bradai. 347-354 [doi]
- On combining image features and word embeddings for image captioningMateusz Bartosiewicz, Marcin Iwanowski, Martika Wiszniewska, Karolina Fraczak, Pawel Lesnowolski. 355-365 [doi]
- IoT and Edge Computing using virtualized low-resource integer Machine Learning with support for CNN, ANN, and Decision TreesStefan Bosse. 367-376 [doi]
- Impact of processor frequency scaling on performance and energy consumption for WZ factorization on multicore architectureBeata Bylina, Jaroslaw Bylina, Monika Piekarz. 377-383 [doi]
- Simulating Large-Scale Topographic Terrain Features with Reservoirs and Flowing WaterLukasz Blaszczyk, Michalina Mizura, Aleksander Plocharski, Joanna Porter-Sobieraj. 385-392 [doi]
- Applying Knowledge Distillation to Improve Weed Mapping With DronesGiovanna Castellano, Pasquale De Marinis, Gennaro Vessio. 393-400 [doi]
- Mutual Learning Algorithm for Kidney Cyst, Kidney Tumor and Kidney Stone DiagnosisSabrina Chowdhury, Snehasis Mukhopadhyay, Kumpati S. Narendra. 401-410 [doi]
- A Graph Matching Algorithm to extend Wise Systems with SemanticAbdelhafid Dahhani, Ilham Alloui, Sébastien Monnet, Flavien Vernier. 411-420 [doi]
- Modelling and Solving the Precedence-Constrained Minimum-Cost Arborescence Problem with Waiting-TimesMauro Dell'Amico, Jafar Jamal, Roberto Montemanni. 421-430 [doi]
- Optimum Large Sensor Data Filtering, Networking and ComputingMaciej Drozdowski, Joanna Berlinska, Thomas G. Robertazzi. 431-440 [doi]
- Resilient s-ACD for Asynchronous Collaborative Solutions of Systems of Linear EquationsLucas Erlandson, Zachary R. Atkins, Alyson Fox, Christopher J. Vogl, Agnieszka Miedlar, Colin Ponce. 441-450 [doi]
- Risk-Based Continuous Quality Control for Software in Legal MetrologyMarko Esche, Levin Ho, Martin Nischwitz, Reinhard Meyer. 451-461 [doi]
- Classifying Industrial Sectors from German Textual Data with a Domain Adapted TransformerRichard Fechner, Jens Dörpinghaus, Anja Firll. 463-470 [doi]
- Towards Enhancing Open Innovation Efficiency: A Method for Ontological Integration of BPMN and EMMOChristophe Feltus, Damien Nicolas, Carlos Kavka, Djamel Khadraoui, Salim Belouettar, Natalia A. Konchakova, Heinz A. Preisig, Peter Klein 0001. 471-479 [doi]
- Compiler Support for Parallel Evaluation of C++ Constant ExpressionsAndrew Gozillon, Hossein Haeri, James Riordan, Paul Keir. 481-490 [doi]
- Explainability in RIONA Algorithm Combining Rule Induction and Instance-Based LearningGrzegorz Góra, Andrzej Skowron, Arkadiusz Wojna. 491-502 [doi]
- Estimation of absolute distance and height of people based on monocular view and deep neural networks for edge devices operating in the visible and thermal spectraJan Gasienica-Józkowy, Boguslaw Cyganek, Mateusz Knapik, Szymon Glogowski, Lukasz Przebinda. 503-511 [doi]
- The reception of holidays in social networks: A case study on TwitterBettina K. Hakius. 513-522 [doi]
- Is Homomorphic Encryption Feasible for Smart Mobility?Anika Hannemann, Erik Buchmann. 523-532 [doi]
- Efficient exact A* algorithm for the single unit hydro unit commitment problemAlexandre Heintzmann, Christian Artigues, Pascale Bendotti, Sandra Ulrich Ngueveu, Cécile Rottner. 533-543 [doi]
- Clustering Corticosteroids Responsiveness in Sepsis Patients using Game-Theoretic Rough SetsRahma Hellali, Zaineb Chelly Dagdia, Karine Zeitouni. 545-556 [doi]
- Tenure and Background of CIOs in Germany: Influencing Factors and International ComparisonPatrick Hillebrand, Markus Westner. 557-566 [doi]
- A reusability-oriented use-case model specification languageBogumila Hnatkowska, Piotr Zabawa. 567-576 [doi]
- AI-based Maize and Weeds detection on the edge with CornWeed DatasetNaeem Iqbal, Christoph Manss, Christian Scholz, Philipp Daniel König, Matthias Igelbrink, Arno Ruckelshausen. 577-584 [doi]
- BIGOS - Benchmark Intended Grouping of Open Speech Corpora for Polish Automatic Speech RecognitionMichal Junczyk. 585-590 [doi]
- MLP-COMET-based decision model re-identification for continuous decision-making in the complex network environmentBartlomiej Kizielewicz, Jakub Wieckowski, Jaroslaw Jankowski. 591-602 [doi]
- List Of Pareto Optimal Solutions of a Biobjective Shortest Path ProblemLasko Laskov, Marin Marinov. 603-613 [doi]
- Comparative Analysis of Exact, Heuristic and Metaheuristic Algorithms for Flexible Assembly SchedulingOctavian-Florin Maghiar, Teodora Selea, Adrian Copie, Flavia Micota, Mircea Marin. 615-625 [doi]
- Current Trends in Automated Test Case GenerationTomas Potuzak, Richard Lipka. 627-636 [doi]
- Analysis of a GPT-3 chatbot with respect to its input in a sales dialogueJulian Premm, Hagen Peukert, Dennis Rössel, Mareike Silber. 637-647 [doi]
- Standards-based Cyber Threat Intelligence sharing using private BlockchainsKimon-Antonios Provatas, Ioannis Tzannetos, Vassilios Vescoukis. 649-656 [doi]
- Open Vocabulary Keyword Spotting with Small-Footprint ASR-based Architecture and Language ModelsMikolaj Pudo, Mateusz Wosik, Artur Janicki. 657-666 [doi]
- Algorithmic Handling of Time Expanded NetworksAlain Quilliot, José Luis Figueroa, Hélène Toussaint. 667-676 [doi]
- Factors for Effective Communication of IT Costs and IT Business ValueConstanze Riedinger, Melanie Huber, Niculin Prinz. 677-687 [doi]
- An Enhancement of Reinforcement Learning by Scheduling with Learning EffectsRadoslaw Rudek. 689-697 [doi]
- Multi-queue service for task scheduling based on data availabilityKamil Rybinski, Michal Smialek. 699-709 [doi]
- Semi-persistent services for IoT networks using RESTful approachJarogniew Rykowski. 711-720 [doi]
- Exception Handling in Programmable Controllers with Denotational ModelJan Sadolewski, Bartosz Trybus. 721-730 [doi]
- An Innovative Drastic Metric for Ranking Similarity in Decision-Making ProblemsWojciech Salabun, Andrii Shekhovtsov. 731-738 [doi]
- Classifying Speech Acts in Political Communication: A Transformer-based Approach with Weak Supervision and Active LearningKlaus Schmidt, Andreas Niekler, Cathleen Kantner, Manuel Burghardt. 739-748 [doi]
- Investigating the Effect of Partial and Real-Time Feedback in INMAP Code-To-Architecture MappingZipani Tom Sinkala, Sebastian Herold. 749-758 [doi]
- Hashtag Discernability - Competitiveness Study of Graph Spectral and Other Clustering MethodsBartlomiej Starosta, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon, Dariusz Czerski. 759-767 [doi]
- An Experimental Framework for Secure and Reliable Data Streams Distribution in Federated IoT EnvironmentsJakub Sychowiec, Zbigniew Zielinski. 769-780 [doi]
- On the Applicability of the Pareto Principle to Source-Code Growth in Open Source ProjectsKorneliusz Szymanski, Miroslaw Ochodek. 781-789 [doi]
- Scheduling Jobs to Minimize a Convex Function of Resource UsageEvelin Szögi, Tamás Kis. 791-799 [doi]
- Target search with an allocation of search effort to overlapping cones of observationHugo Vaillaud, Claire Hanen, Emmanuel Hyon, Cyrille Enderli. 801-811 [doi]
- Exploring the Prevalence of Anti-patterns in the Application of Scrum in Software Development OrganizationsMichal R. Wróbel, Dorota Przala, Pawel Weichbroth. 813-822 [doi]
- Analysis of the Impact of Data Augmentation on the Performance of Deep Learning Models in Multispectral Food Authenticity IdentificationYaru Zhang, Arif Yilmaz, Mirela Popa, Christopher Brewster. 823-832 [doi]
- Filtering Decision Rules Driven by Sequential Forward and Backward Selection of Attributes: An Illustrative Example in Stylometric DomainBeata Zielosko, Urszula Stanczyk, Kamil Jablonski. 833-842 [doi]
- Automatic Colorization of Digital Movies using Decolorization Models and SSIM IndexAndrzej Sluzek, Marcin Dudzinski, Tomasz Swislocki. 843-853 [doi]
- IoT for the Maritime Industry: Challenges and Emerging ApplicationsSheraz Aslam, Herodotos Herodotou, Eduardo Garro, Alvaro Martinez-Romero, Maria Angeles Burgos Simon, Alessandro Cassera, George Papas, Petros Dias, Michalis P. Michaelides. 855-858 [doi]
- Binary Classification of Agricultural Crops Using Sentinel Satellite Data and Machine Learning TechniquesPaolo Bertellini, Gianluca D'Addese, Giorgia Franchini, Simone Parisi, Carmelo Scribano, Daniele Zanirato, Marko Bertogna. 859-864 [doi]
- Experiments on software error prediction using Decision Tree and Random Forest algorithmsIlona Bluemke, Pawel Borsukiewicz. 865-869 [doi]
- Diagnosing Machine Learning Problems in Federated Learning Systems: A Case StudyKarolina Bogacka, Anastasiya Danilenka, Katarzyna Wasielewska-Michniewska. 871-876 [doi]
- Use of traffic sampling in anomaly detection for high-throughput network linksMarek Bolanowski, Andrzej Paszkiewicz, Hubert Mazur. 877-882 [doi]
- L1-Norm Principal Component Analysis Using Quaternion RotationsAdam Borowicz. 883-888 [doi]
- Efficient Deep Learning Approach for Olive Disease ClassificationAntonio Bruno, Davide Moroni, Massimo Martinelli. 889-894 [doi]
- The scalability in terms of the time and the energy for several matrix factorizations on a multicore machineBeata Bylina, Monika Piekarz. 895-900 [doi]
- Selection of floating photovoltaic system considering strong sustainability paradigm using SSP-COPRAS methodAleksandra Baczkiewicz, Jaroslaw Watróbski. 901-905 [doi]
- Urban scene semantic segmentation using the U-Net modelMarcin Ciecholewski. 907-912 [doi]
- The Effects of Native Language on Requirements QualityFayona Cowperthwaite, Jennifer Horkoff, Sylwia Kopczynska. 913-917 [doi]
- One-shot federated learning with self-adversarial dataAnastasiya Danilenka, Karolina Bogacka, Katarzyna Wasielewska-Michniewska. 919-924 [doi]
- Mitigating the effects of non-IID data in federated learning with a self-adversarial balancing methodAnastasiya Danilenka. 925-930 [doi]
- Real-time Communication Model for IoT SystemsStanislaw Deniziak, Miroslaw Plaza, Lukasz Arcab. 931-936 [doi]
- Review of Automated Code Refactoring of C# ProgramsAnna Derezinska, Dawid Sygocki. 937-941 [doi]
- Employee Technostress in South Africa's Hybrid Workplaces: Causes and Coping MechanismsShelley Dowrie, Jean-Paul Van Belle, Marita Turpin. 943-947 [doi]
- Improving Domain-Specific Retrieval by NLI Fine-TuningRoman Dusek, Aleksander Wawer, Christopher Galias, Lidia Wojciechowska. 949-953 [doi]
- Ant Colony Optimization for Workforce Planning with HybridizationStefka Fidanova, Maria Ganzha. 955-959 [doi]
- Future and Backward Exploration of XR EnvironmentsJakub Flotynski, Pawel Sobocinski 0002, Michal Sliwicki, Mikolaj Maik. 961-965 [doi]
- Improving the Performance of Multiscene Marketing Video Content through its Dynamics AdjustmentsKacper Fornalczyk, Kamil Bortko, Aneta Disterheft, Jaroslaw Jankowski. 967-972 [doi]
- Performance assessment of OpenMP constructs and benchmarks using modern compilers and multi-core CPUsBartlomiej Gawrych, Pawel Czarnul. 973-978 [doi]
- A short note on computing permutationsPawel Gburzynski, Janusz Zalewski. 979-982 [doi]
- Association Rule Mining for Requirement Elicitation Techniques in IT ProjectsDenys Gobov, Nikolai Sokolovskiy. 983-987 [doi]
- Potentials and Challenges of Gamification in RecruitingRalf-Christian Härting, Maren Gerst, Jasmin Zerrer. 989-994 [doi]
- Recognition of Weeds in CornfieldsGábor Hartyányi, László Czúni. 995-999 [doi]
- Price-Shaped Optimal Water Reflow in Prosumer Energy Cascade Hydro PlantsPrzemyslaw Ignaciuk, Michal Morawski. 1001-1005 [doi]
- Semi-Active Control of a Shear Building based on Reinforcement Learning: Robustness to measurement noise and model errorAleksandra Jedlinska, Dominik Pisarski, Grzegorz Mikulowski, Bartlomiej Blachowski, Lukasz Jankowski. 1007-1010 [doi]
- Gender-aware speaker's emotion recognition based on 1-D and 2-D featuresWlodzimierz Kasprzak, Mateusz Hryciów. 1011-1015 [doi]
- Detecting type of hearing loss with different AI classification methods: a performance reviewMichal Kassjanski, Marcin Kulawiak, Tomasz Przewozny, Dmitry Tretiakow, Jagoda Kurylowicz, Andrzej Molisz, Krzysztof Kozminski, Aleksandra Kwasniewska, Paulina Mierzwinska-Dolny, Milosz Grono. 1017-1022 [doi]
- Dynamic SITCOM: an innovative approach to re-identify social network evaluation modelsBartlomiej Kizielewicz, Jaroslaw Jankowski. 1023-1027 [doi]
- IoTrust - a HW/SW framework supporting security core baseline features for IoTMateusz Korona, Bartosz Zabolotny, Fryderyk Koziol, Mateusz Biernacki, Radoslaw Giermakowski, Pawel Rurka, Marta Chmiel, Mariusz Rawski. 1029-1034 [doi]
- On Gower Similarity Coefficient and Missing ValuesMarzena Kryszkiewicz. 1035-1040 [doi]
- Mechanism for detecting cause-and-effect relationships in court judgmentsLukasz Kurant. 1041-1046 [doi]
- Expectation-Maximization Algorithms for Gaussian Mixture Models Using Linear Algebra Libraries on Parallel Shared-Memory SystemsWojciech Kwedlo. 1047-1052 [doi]
- Performance Analysis of a 3D Elliptic Solver on Intel Xeon Computer SystemIvan Lirkov, Marcin Paprzycki, Maria Ganzha. 1053-1058 [doi]
- Controllability for English-Ukrainian Machine Translation by Using Style Transfer TechniquesDaniil Maksymenko, Nataliia Saichyshyna, Marcin Paprzycki, Maria Ganzha, Oleksii Turuta, Mirela Alhasani. 1059-1068 [doi]
- EpiDoc Data Matching for Federated Information Retrieval in the HumanitiesSylvia Melzer, Meike Klettke, Franziska Weise, Kaja Harter-Uibopuu, Ralf Möller 0001. 1069-1074 [doi]
- VICRA: Variance-Invariance-Covariance Regularization for Attack PredictionAditya Srinivas Menon, Gouri Nair. 1075-1080 [doi]
- Segmentation Methods Evaluation on Grapevine Leaf DiseasesSzilárd Molnár, Levente Tamás. 1081-1085 [doi]
- Automatic speaker's age classification in the Common Voice databaseAdam Nowakowski, Wlodzimierz Kasprzak. 1087-1091 [doi]
- Sensitivity Study of a Large-scale Air Pollution Model on the Bulgarian Petascale Supercomputer DiscovererTzvetan Ostromsky, Ivan Dimov 0001, Rayna Georgieva, Venelin Todorov. 1093-1100 [doi]
- Inscrutability versus Privacy and Automation versus Labor in Human-Centered AI: Approaching Ethical Paradoxes and Directions for ResearchHagen Peukert. 1101-1105 [doi]
- New measures of algorithms quality for permutation flow-shop scheduling problemRadoslaw Puka, Iwona Skalna, Tomasz Derlecki. 1107-1111 [doi]
- PSE for Analysis of 3D Tomographic Images in Materials SciencePaulo Quaresma, Pedro D. Medeiros, Adriano Lopes. 1113-1117 [doi]
- Path Length-Driven Hypergraph Partitioning: An Integer Programming ApproachJulien Rodriguez, François Galea, François Pellegrini, Lilia Zaourar. 1119-1123 [doi]
- Laundry Cluster Management Using CloudMateusz Salach, Bartosz Trybus, Bartosz Pawlowicz, Marcin Hubacz. 1125-1129 [doi]
- Text embeddings and clustering for characterizing online communities on RedditJan Sawicki. 1131-1136 [doi]
- Runge-Kutta Method and WSM6 Microphysics for Weather Prediction on Hybrid Parallel PlatformHércules Cardoso da Silva, Marco Aurelio Stefanes, Vinícius Capistrano. 1137-1141 [doi]
- Incident Detection with Pruned Residual Multilayer Perceptron NetworksMohamad Soubra, Marek Kisiel-Dorohinicki, Marcin Kurdziel, Marek Zachara. 1143-1148 [doi]
- Optimizing Machine Translation for Virtual Assistants: Multi-Variant Generation with VerbNet and Conditional Beam SearchMarcin Sowanski, Artur Janicki. 1149-1154 [doi]
- Performance of Portable Sparse Matrix-Vector Product Implemented Using OpenACCKinga Stec, Przemyslaw Stpiczynski. 1155-1160 [doi]
- Using graph solutions to identify "troll farms" and fake news propagation channelsPatryk Sulej, Krzysztof Hryniów. 1161-1166 [doi]
- A Stochastic Optimization Technique for UNI-DEM frameworkVenelin Todorov, Slavi G. Georgiev, Ivan Dimov 0001, Tzvetan Ostromsky. 1167-1172 [doi]
- Extremal algebraic graphs, quadratic multivariate public keys and temporal rulesVasyl Ustimenko, Aneta Wróblewska. 1173-1178 [doi]
- On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public KeysVasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski. 1179-1184 [doi]
- Comparing Performance of Machine Learning Libraries across Computing PlatformsPedro Vicente, Pedro M. Santos 0002, Barikisu Asulba, Nuno Martins, Joana Sousa, Luís Almeida 0001. 1185-1189 [doi]
- Deep Neural Networks application for Cup-to-Disc ratio estimation in eye fundus imagesSandra Virbukaite, Jolita Bernataviciene. 1191-1195 [doi]
- On some concept lattice of social choice functionsPiotr Wasilewski, Janusz Kacprzyk, Slawomir Zadrozny. 1197-1203 [doi]
- Postquantum symmetric cryptography inspired by neural networksWojciech Wegrzynek, Pawel Topa. 1205-1210 [doi]
- Adding Linguistic Information to Transformer Models Improves Biomedical Event Detection?Laura Zanella, Yannick Toussaint. 1211-1216 [doi]
- Sensitivity analysis of the criteria weights used in selected MCDA methods in the multi-criteria assessment of banking services in Poland in 2022Marek Zborowski, Witold Chmielarz. 1217-1222 [doi]
- Let's estimate all parameters as probabilities: Precise estimation using Chebyshev's inequality, Bernoulli distribution, and Monte Carlo simulationsLubomír Stepánek, Filip Habarta, Ivana Malá, Lubos Marek. 1223-1227 [doi]
- A lower bound for proportion of visibility polygon's surface to entire polygon's surface: Estimated by Art Gallery Problem and proven that cannot be greatly improvedLubomír Stepánek, Filip Habarta, Ivana Malá, Lubos Marek. 1229-1233 [doi]
- Social Media, Topic Modeling and Sentiment Analysis in Municipal Decision SupportMilos Svana. 1235-1239 [doi]
- PolEval 2022/23 Challenge Tasks and ResultsLukasz Kobylinski, Maciej Ogrodniczuk, Piotr Rybak, Piotr Przybyla, Piotr Pezik, Agnieszka Mikolajczyk, Wojciech Janowski, Michal Marcinczuk, Aleksander Smywinski-Pohl. 1243-1250 [doi]
- Punctuation Prediction for Polish Texts using TransformersJakub Pokrywka. 1251-1254 [doi]
- Abbreviation Disambiguation in Polish Press News Using Encoder-Decoder ModelsKrzysztof Wróbel 0002, Jakub Karbowski, Pawel Lewkowicz. 1255-1264 [doi]
- Passage Retrieval of Polish Texts Using OKAPI BM25 and an Ensemble of Cross EncodersJakub Pokrywka. 1265-1269 [doi]
- Hybrid retrievers with generative re-rankersMarek Kozlowski. 1271-1276 [doi]
- Multi-index Retrieve and Rerank with Sequence-to-Sequence ModelKonrad Wojtasik. 1277-1279 [doi]
- Passage Retrieval in question answering systems in Polish languageAnna Pacanowska. 1281-1286 [doi]
- Cybersecurity Threat Detection in the Behavior of IoT Devices: Analysis of Data Mining Competition ResultsMichal Czerwinski, Marcin Michalak 0001, Piotr Biczyk, Blazej Adamczyk, Daniel Iwanicki, Iwona Kostorz, Maksym Brzeczek, Andrzej Janusz, Marek Hermansa, Lukasz Wawrowski, Artur Kozlowski. 1289-1293 [doi]
- Tackling Variable-length Sequences with High-cardinality Features in Cyber-attack DetectionChang Lin. 1295-1299 [doi]
- Beating Gradient Boosting: Target-Guided Binning for Massively Scalable Classification in Real-TimeDymitr Ruta, Ming Liu, Ling Cen. 1301-1306 [doi]
- Spotting Cyber Breaches in IoT DevicesSlawomir Pioronski, Tomasz Górecki. 1307-1310 [doi]
- Gradient boosting models for cybersecurity threat detection with aggregated time series featuresMing Liu, Ling Cen, Dymitr Ruta. 1311-1315 [doi]
- Center for Artificial Intelligence Challenge on Conversational AI CorrectnessMarek Kubis, Pawel Skórzewski, Marcin Sowanski, Tomasz Zietkiewicz. 1319-1324 [doi]
- Boosting conversational AI correctness by accounting for ASR errors using a sequence to sequence modelSzymon Jadczak, Rafal Jaworski. 1325-1328 [doi]
- Temporal Image Caption Retrieval Competition - Description and ResultsJakub Pokrywka, Piotr Wierzchon, Kornel Weryszko, Krzysztof Jassem. 1331-1336 [doi]
- Multimodal Neural Networks in the Problem of Captioning Images in NewspapersPatryk Kaszuba. 1337-1340 [doi]