Abstract is missing.
- Developing a Scalable Cellular Automaton Model of 3D Tumor GrowthCyrus Tanade, Sarah B. Putney, Amanda Randles. 3-16 [doi]
- Human-Level Melodic Line HarmonizationJan Mycka, Adam Zychowski, Jacek Mandziuk. 17-30 [doi]
- Classification Methods Based on Fitting Logistic Regression to Positive and Unlabeled DataKonrad Furmanczyk, Kacper Paczutkowski, Marcin Dudzinski, Diana Dziewa-Dawidczyk. 31-45 [doi]
- Robust Control of Perishable Inventory with Uncertain Lead Time Using Neural Networks and Genetic AlgorithmEwelina Cholodowicz, Przemyslaw Orlowski. 46-59 [doi]
- Batch QR Factorization on GPUs: Design, Optimization, and TuningAhmad Abdelfattah, Stan Tomov, Jack J. Dongarra. 60-74 [doi]
- ChemTab: A Physics Guided Chemistry Modeling FrameworkAmol Salunkhe, Dwyer Deighan, Paul E. DesJardin, Varun Chandola. 75-88 [doi]
- Establishing Metrics to Quantify Underlying Structure in Vascular Red Blood Cell DistributionsSayan Roychowdhury, Erik W. Draeger, Amanda Randles. 89-102 [doi]
- Coevolutionary Approach to Sequential Stackelberg Security GamesAdam Zychowski, Jacek Mandziuk. 103-117 [doi]
- Finch: Domain Specific Language and Code Generation for Finite Element and Finite Volume in JuliaEric Heisler, Aadesh Deshmukh, Hari Sundar. 118-132 [doi]
- Classifying Anomalous Members in a Collection of Multivariate Time Series Data Using Large Deviations Principle: An Application to COVID-19 DataSreelekha Guggilam, Varun Chandola, Abani K. Patra. 133-149 [doi]
- Adaptive Regularization of B-Spline Models for Scientific DataDavid Lenz, Raine Yeh, Vijay Mahadevan, Iulian R. Grindeanu, Tom Peterka. 150-163 [doi]
- Content-Aware Generative Model for Multi-item Outfit RecommendationValery Volokha, Klavdiya Bochenina. 164-177 [doi]
- Retrofitting Structural Graph Embeddings with Node Attribute InformationPiotr Bielak, Daria Puchalska, Tomasz Kajdanowicz. 178-191 [doi]
- Hierarchical Ensemble Based Imbalance ClassificationJie Xie, Mingying Zhu, Kai Hu 0005. 192-204 [doi]
- Numerical Approximation of the One-Way Helmholtz Equation Using the Differential Evolution MethodMikhail S. Lytaev. 205-218 [doi]
- Iterative Solution for the Narrow Passage Problem in Motion PlanningJakub Szkandera, Ivana Kolingerová. 219-232 [doi]
- A Productive and Scalable Actor-Based Programming System for PGAS ApplicationsSri Raj Paul, Akihiro Hayashi, Kun Chen, Vivek Sarkar. 233-247 [doi]
- Is Context All You Need? Non-contextual vs Contextual Multiword Expressions DetectionMaciej Piasecki, Kamil Kanclerz. 248-261 [doi]
- Out-of-Distribution Detection in High-Dimensional Data Using Mahalanobis Distance - Critical AnalysisHenryk Maciejewski, Tomasz Walkowiak, Kamil Szyc. 262-275 [doi]
- Multi-contextual Recommender Using 3D Latent Factor Models and Online Tensor DecompositionBasem Suleiman, Ali Anaissi, Muhammad Johan Alibasa, Harrison Truong. 276-290 [doi]
- Efficient Computational Algorithm for Stress Analysis in Hydro-Sediment-Morphodynamic ModelsAlia Al-Ghosoun, Ashraf S. Osman, Mohammed Seaïd. 291-304 [doi]
- Enhancing Computational Steel Solidification by a Nonlinear Transient Thermal ModelFatima-Ezzahrae Moutahir, Youssef Belhamadia, Mofdi El-Amrani, Mohammed Seaïd. 305-317 [doi]
- Weakly-Supervised Cell Classification for Effective High Content ScreeningAdriana Borowa, Szczepan Kruczek, Jacek Tabor, Bartosz Zielinski 0001. 318-330 [doi]
- Which Visual Features Impact the Performance of Target Task in Self-supervised Learning?Witold Oleszkiewicz, Dominika Basaj, Tomasz Trzcinski, Bartosz Zielinski 0001. 331-344 [doi]
- DITA-NCG: Detecting Information Theft Attack Based on Node Communication GraphZhenyu Cheng 0001, Xiaochun Yun, Shuhao Li, Jinbu Geng, Rui Qin, Li Fan. 345-359 [doi]
- Boosted Ensemble Learning Based on Randomized NNs for Time Series ForecastingGrzegorz Dudek. 360-374 [doi]
- Exploring Ductal Carcinoma In-Situ to Invasive Ductal Carcinoma Transitions Using Energy Minimization PrinciplesVivek M. Sheraton, Shijun Ma. 375-388 [doi]
- Scaling the PageRank Algorithm for Very Large Graphs on the Fugaku SupercomputerMaxence Vandromme, Jérôme Gurhem, Miwako Tsuji, Serge G. Petiton, Mitsuhisa Sato. 389-402 [doi]
- Ultrafast Focus Detection for Automated MicroscopyMaksim Levental, Ryan Chard, Kyle Chard, Ian T. Foster, Gregg A. Wildenberg. 403-416 [doi]
- Models and Metrics for Mining Meaningful MetadataTyler J. Skluzacek, Matthew Chen, Erica Hsu, Kyle Chard, Ian T. Foster. 417-430 [doi]
- HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of PacketsJinbu Geng, Zhenyu Cheng 0001, Zhicheng Liu, Shuhao Li, Rui Qin. 431-444 [doi]
- TROPHY: Trust Region Optimization Using a Precision HierarchyRichard J. Clancy, Matt Menickelly, Jan Hückelheim, Paul D. Hovland, Prani Nalluri, Rebecca Gjini. 445-459 [doi]
- Incremental Mining of Frequent Serial Episodes Considering Multiple OccurrencesThomas Guyet, Wenbin Zhang 0002, Albert Bifet. 460-472 [doi]
- MHGEE: Event Extraction via Multi-granularity Heterogeneous GraphMingyu Zhang, Fang Fang, Hao Li, Qingyun Liu, Yangchun Li, Hailong Wang. 473-487 [doi]
- Consistency Fences for Partial Order Delivery to Reduce LatencyNooshin Eghbal, Paul Lu. 488-501 [doi]
- Dynamic Classification of Bank Clients by the Predictability of Their Transactional BehaviorAlexandra Bezbochina, Elizaveta Stavinova, Anton Kovantsev, Petr Chunaev. 502-515 [doi]
- Unveiling User Behavior on Summit Login Nodes as a UserSean R. Wilkinson, Ketan Maheshwari, Rafael Ferreira da Silva. 516-529 [doi]
- n-type B-N Co-doping and N Doping in Diamond from First PrinciplesDelun Zhou, Lin Tang, Jinyu Zhang, Ruifeng Yue, Yan Wang. 530-540 [doi]
- Stock Predictor with Graph Laplacian-Based Multi-task LearningJiayu He, Nguyen H. Tran, Matloob Khushi. 541-553 [doi]
- Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet SequenceXuebin Wang, Zhipeng Chen, ZeYu Li, Wentao Huang, Meiqi Wang, Shengli Pan, Jinqiao Shi. 554-568 [doi]
- Towards a Scalable Set Similarity Join Using MapReduce and LSHSébastien Rivault, Mostafa Bamha, Sébastien Limet, Sophie Robert 0001. 569-583 [doi]
- Cyberbullying Detection with Side Information: A Real-World Application of COVID-19 News Comment in Chinese LanguageJian-xing, Xiaoyu Zhang 0002, Lin Chen, Yu Ding, Yaru Zhang, Wei Hu, Zhicheng Jin, Jingya Wang, Yaowei Chen, Yi Hong. 584-598 [doi]
- Designing a Training Set for Musical Instruments IdentificationDaniel Kostrzewa, Blazej Koza, Pawel Benecki. 599-610 [doi]
- Characterizing Wildfire Perimeter Polygons from QUIC-FireLi Tan, Raymond A. de Callafon, Ilkay Altintas. 611-622 [doi]
- On a New Generalised Iteration Method in the PSO-Based Newton-Like MethodIreneusz Gosciniak, Krzysztof Gdawiec. 623-636 [doi]
- Peridynamic Damage Model Based on Absolute Bond ElongationShangyuan Zhang, Yufeng Nie. 637-650 [doi]
- Privacy Paradox in Social Media: A System Dynamics AnalysisEktor Arzoglou, Yki Kortesniemi, Sampsa Ruutu, Tommi Elo. 651-666 [doi]
- GPU Power Capping for Energy-Performance Trade-Offs in Training of Deep Convolutional Neural Networks for Image RecognitionAdam Krzywaniak, Pawel Czarnul, Jerzy Proficz. 667-681 [doi]
- Forecasting Bank Default with the Merton Model: The Case of US BanksKihwan Jo, Gahyun Choi, Jongwook Jeong, Kwangwon Ahn. 682-691 [doi]
- Deep Neural Sequence to Sequence Lexical Substitution for the Polish LanguageMichal Pogoda, Karol Gawron, Norbert Ropiak, Michal Swedrowski, Jan Kocon. 692-705 [doi]
- Facial Mask Impact on Human Age and Gender ClassificationKrzysztof Malecki, Adam Nowosielski, Mateusz Krzak. 706-719 [doi]
- 2: Analysis and Comparative ResultsVáclav Skala, Matej Cerny, Josef Yassin Saleh. 720-733 [doi]
- Elastic Resource Allocation Based on Dynamic Perception of Operator Influence Domain in Distributed Stream ProcessingFan Liu, Weilin Zhu, Weimin Mu, Yun Zhang, Mingyang Li, Ziyuan Zhu, Weiping Wang. 734-748 [doi]
- PRISM: Principal Image Sections MappingTomasz Szandala, Henryk Maciejewski. 749-760 [doi]
- The New UPC++ DepSpawn High Performance Library for Data-Flow Computing with Hybrid ParallelismBasilio B. Fraguela, Diego Andrade. 761-774 [doi]