Abstract is missing.
- LIF: a method to infer disease-gene relationships using literature data and impact factorJeongWoo Kim, Chunghun Kim, Jinyoung Lee, Sanghyun Park, Heechul Kang. 3-10 [doi]
- A profile-based probabilistic approach for the detection of anomalies in the cytochrome C oxidase I amplicon sequencesMahdi Belcaid, Guylaine Poisson. 11-17 [doi]
- Inference of regulatory networks with MCMC sampler guided by mutual informationNilzair M. Barreto, Karina S. Machado, Adriano Velasque Werhli. 18-23 [doi]
- Ranking novel regulatory genes in gene expression profiles using NetExpressBelma Yelbay, Alexander Gow, Hasan M. Jamil. 24-27 [doi]
- Biclustering of time series data using factor graphsMatteo Denitto, Alessandro Farinelli, Manuele Bicego. 28-30 [doi]
- Computational study of inward rectifying ion channel in urinary bladder over activity: student research abstractChitaranjan Mahapatra. 31-32 [doi]
- A deep learning framework for identification of microRNA regulatory modules: student research abstractVasu Jindal. 33-36 [doi]
- SmartOrch: an adaptive orchestration system for human-machine collectivesMichael Rovatsos, Dimitrios I. Diochnos, Zhenyu Wen, Sofia Ceppi, Pavlos Andreadis. 37-44 [doi]
- Coordinated execution of adaptation operations in distributed role-based software systemsMartin Weißbach, Thomas Springer. 45-50 [doi]
- Efficient compensation handling via subjective updatesJovana Dedeic, Jovanka Pantovic, Jorge A. Pérez. 51-58 [doi]
- Doctrine based multi-resolution HLA distributed simulationRicardo L. Paul, Raul C. Nunes, Vanderlan D. Oliveira, Diogo Kunde. 59-64 [doi]
- Runtime verification method for self-adaptive software using reachability of transition system modelEuijong Lee, Young-Gab Kim, Young-Duk Seo, Kwangsoo Seol, Doo-Kwon Baik. 65-68 [doi]
- Leveraging the adoption of electronic identities and electronic-signature solutions in EuropeAlexander Marsalek, Thomas Zefferer, Florian Reimair, Çagatay Karabat, Elif Ustundag Soykan. 69-71 [doi]
- Enhanced fraud detection as a service supporting merchant-specific runtime customizationDavy Preuveneers, Bavo Goosens, Wouter Joosen. 72-76 [doi]
- Fraud detection in water meters using pattern recognition techniquesJuliana Patrícia Detroz, André Tavares da Silva. 77-82 [doi]
- Semantic recognition: unified framework for joint object detection and semantic segmentationLotfi Abdi, Aref Meddeb. 83-88 [doi]
- Improving OR-PCA via smoothed spatially-consistent low-rank modeling for background subtractionSajid Javed, Thierry Bouwmans, Soon Ki Jung. 89-94 [doi]
- Video popularity prediction in data streams based on context-independent featuresVitor da Silva, Ana Trindade Winck. 95-100 [doi]
- How to extend the use of the discrete orthogonal stockwell transform to image watermarkingHana Ouazzane, Hela Mahersia, Kamel Hamrouni. 101-107 [doi]
- Multi-shot person re-identification using a novel video covariance approachBassem Hadjkacem, Walid Ayedi, Mohamed Abid. 108-113 [doi]
- Convolutions through time for multi-label movie genre classificationJonatas Wehrmann, Rodrigo C. Barros. 114-119 [doi]
- Nearest neighbor search on total bregman balls treeDaniela Portes L. Ferreira, Bruno M. Rocha, Célia A. Z. Barcelos. 120-124 [doi]
- Learning and reasoning in logic tensor networks: theory and application to semantic image interpretationLuciano Serafini, Ivan Donadello, Artur S. d'Avila Garcez. 125-130 [doi]
- Deep learning traffic sign detection, recognition and augmentationLotfi Abdi, Aref Meddeb. 131-136 [doi]
- Gender-based multimodal deception detectionMohamed Abouelenien, Verónica Pérez-Rosas, Bohan Zhao, Rada Mihalcea, Mihai Burzo. 137-144 [doi]
- Linking knowledge bases to social media profilesYaroslav Nechaev, Francesco Corcoglioniti, Claudio Giuliano. 145-150 [doi]
- CogVis: attention-driven cognitive architecture for visual change detectionShailesh Deshpande, Arcot Sowmya, Piyush Yadav, Shamsuddin Ladha, Priyanka Verma, Karthikeyan Vaiapury, Jay Gubbi, P. Balamuralidhar. 151-154 [doi]
- Towards adaptation of named entity classificationPikakshi Manchanda, Elisabetta Fersini, Matteo Palmonari, Debora Nozza, Enza Messina. 155-157 [doi]
- Variational non rigid registration with bregman divergencesDaniela Portes L. Ferreira, Eraldo Ribeiro, Célia A. Z. Barcelos. 158-163 [doi]
- Fully anisotropic morlet transform for the study of the trabecular bone texture variationsHind Oulhaj, Mohammed El Hassouni, Aouatif Amine, Mohammed Rziza, Rachid Jennane. 164-169 [doi]
- An automatic method for identification of cystine crystals in urine sedimentVicenzo Abichequer Sangalli, Felipe Lammel, Márcio Sarroglia Pinho, Isabel Harb Manssour. 170-173 [doi]
- ClusterVis: visualizing nodes attributes in multivariate graphsRicardo Andrade Cava, Carla Maria Dal Sasso Freitas, Marco Winckler. 174-179 [doi]
- Towards a hypothetical framework of humans related success factors for process improvement in global software development: systematic reviewArif Ali Khan, Jacky W. Keung, Mahmood Niazi, Shahid Hussain. 180-186 [doi]
- DyNetVis: a system for visualization of dynamic networksClaudio D. G. Linhares, Bruno A. N. Travençolo, Jose Gustavo de Souza Paiva, Luis E. C. Rocha. 187-194 [doi]
- SBMI-LTD: stationary background model initialization based on low-rank tensor decompositionSajid Javed, Thierry Bouwmans, Soon Ki Jung. 195-200 [doi]
- Recommendations to improve user experience in second screen applications: a case studyDaniel da S. Souza, Marcos C. da R. Seruffo, Marianne K. Eliasquevici. 201-207 [doi]
- Human enabled green IoT in 5G networksSadia Din, Awais Ahmad, Anand Paul. 208-213 [doi]
- Exploring music rankings with interactive visualizationLeandro Guedes, Carla M. D. S. Freitas. 214-219 [doi]
- User generated soundscapes activating museum visitorsKari Salo, Merja Bauters, Tommi Mikkonen. 220-227 [doi]
- Driver information system: a combination of augmented reality and deep learningLotfi Abdi, Aref Meddeb. 228-230 [doi]
- Distributed smart street LED lights for human satisfaction in smart city: student research abstractM. Mazhar Rathore. 231-234 [doi]
- Exportation to the cloud of distributed robotic tasks implemented in ROSJoão Rosa, Rui P. Rocha. 235-240 [doi]
- Multicriteria optimization in distributed micro-conveying platformHakim Mabed, Eugen Dedu, Haithem Skima. 241-248 [doi]
- Forecasting battery state of charge for robot missionsAmeer Hamza, Nora Ayanian. 249-255 [doi]
- Efficient scene encoding for programmable matter self-reconfiguration algorithmsThadeu Tucci, Benoît Piranda, Julien Bourgeois. 256-261 [doi]
- Path efficient level set estimation for mobile sensorsLorenzo Bottarelli, Jason Blum, Manuele Bicego, Alessandro Farinelli. 262-267 [doi]
- An asynchronous distributed constraint optimization approach to multi-robot path planning with complex constraintsAlberto Viseras Ruiz, Valentina Karolj, Luis Merino. 268-275 [doi]
- A versatile high-performance visual fiducial marker detection system with scalable identity encodingPeter Lightbody, Tomás Krajník, Marc Hanheide. 276-282 [doi]
- Cloud-based cooperative navigation for mobile service robots in dynamic industrial environmentsJannik Abbenseth, Felipe Garcia Lopez, Christian Henkel, Stefan Dörr. 283-288 [doi]
- Predicting coordinated group movements of sharks with limited observations using AUVsCherie Ho, Kimberly Joly, Andrew P. Nosal, Christopher G. Lowe, Christopher M. Clark. 289-296 [doi]
- On-the-fly transformation synthesis for information sharing in heterogeneous multi-agent systemsStefan Niemczyk, Nugroho Fredivianus, Kurt Geihs. 297-299 [doi]
- Automated seam tracking system based on passive monocular vision for automated linear robotic welding processÁtila Astor Weis, Adriano Velasque Werhli, Nelson L. Duarte Filho. 300-302 [doi]
- A semantic federated search engine for domain-specific document retrievalMauro Dragoni, Andi Rexha, Hermann Ziak, Roman Kern. 303-308 [doi]
- Utilizing Wikipedia knowledge in open directory project-based text classificationHaeYong Shin, Geunjae Lee, Woo-Jong Ryu, SangKeun Lee. 309-314 [doi]
- A semantic-enabled platform for supporting healthy lifestylesMauro Dragoni, Tania Bailoni, Claudio Eccher, Marco Guerini, Rosa Maimone. 315-322 [doi]
- Influence of semantic similarity measures on ontology cross-language mappingsJuliana Medeiros Destro, Júlio Cesar dos Reis, Ariadne Maria Brito, Rizzoni Carvalho, Ivan Luiz Marques Ricarte. 323-329 [doi]
- Schema-summarization in linked-data-based feature selection for recommender systemsAzzurra Ragone, Paolo Tomeo, Corrado Magarelli, Tommaso Di Noia, Matteo Palmonari, Andrea Maurino, Eugenio Di Sciascio. 330-335 [doi]
- Bridging context and data warehouses through ontologiesOkba Barkat, Selma Khouri, Ladjel Bellatreche, Boustia Narhimene. 336-341 [doi]
- Reasoning and discovering novel treatments in linked social health recordsPaolo Cappellari, Soon Ae Chun, Dennis Shpitz. 342-348 [doi]
- Syntactic and semantic validation of SPARQL queriesJesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Alfredo Cuzzocrea. 349-352 [doi]
- Towards integration of ontology and text-extracted data for event coreference reasoningStefano Borgo, Loris Bozzato, Alessio Palmero Aprosio, Marco Rospocher, Luciano Serafini. 353-355 [doi]
- Discovering and linking with life sciences linked open data cloud: student research abstractMuntazir Mehdi. 356-357 [doi]
- StopGap: elastic VMs to enhance server consolidationVlad Nitu, Boris Teabe, Leon Fopa, Alain Tchana, Daniel Hagimont. 358-363 [doi]
- Secure storage of user credentials and attributes in federation of cloudsLuciano Barreto, Leomar Scheunemann, Joni da Silva Fraga, Frank Siqueira. 364-369 [doi]
- Verifiable outsourced database in the cloud using game theoryFaryed Eltayesh, Jamal Bentahar. 370-377 [doi]
- HyViDE: a framework for virtual data center network embeddingM. P. Gilesh, S. D. Madhu Kumar, Lillykutty Jacob. 378-383 [doi]
- A predictive approach for enhancing resource utilization in PaaS cloudsHenrique Truta, José Luis Vivas, Andrey Brito, Telles Nobrega. 384-391 [doi]
- ElaScript: a DSL for coding elasticity in cloud computingSimon Dupont, Salma Bouri, Frederico Alvares, Thomas Ledoux. 392-398 [doi]
- A multi-swarm based approach with cooperative learning strategy for composite SaaS placementHaithem Mezni, Jaber Kouki. 399-404 [doi]
- Assessing end-to-end performance and security in cloud computingKaiqi Xiong, Mufaddal Makati. 405-410 [doi]
- Towards scalable and dynamic data encryption for multi-tenant SaaSAnsar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen. 411-416 [doi]
- ICE: self-configuration of information processing in heterogeneous agent teamsStefan Niemczyk, Stephan Opfer, Nugroho Fredivianus, Kurt Geihs. 417-423 [doi]
- Evidence-based security configurations for cloud datastoresFrank Pallas, David Bermbach, Steffen Müller, Stefan Tai. 424-430 [doi]
- Deconstructing source location privacy-aware routing protocolsArshad Jhumka, Matthew Bradbury. 431-436 [doi]
- Choreographing cyber-physical distributed control systems for the energy sectorHugo A. López, Kai Heussen. 437-443 [doi]
- Handling bitcoin conflicts through a glimpse of structureThibaut Lajoie-Mazenc, Romaric Ludinard, Emmanuelle Anceaume. 444-449 [doi]
- Automated generation of policies to support elastic scaling in cloud environmentsRichard Gil Martinez, Antónia Lopes, Luís E. T. Rodrigues. 450-455 [doi]
- Performance trade-offs on a secure multi-party relational databaseRogerio Pontes, Mário Pinto, Manuel Barbosa, Ricardo Vilaça, Miguel Matos, Rui Oliveira. 456-461 [doi]
- Prepared scan: efficient retrieval of structured data from HBaseFrancisco Neves, Ricardo Vilaça, José Orlando Pereira, Rui Oliveira. 462-464 [doi]
- Fault-tolerant clock synchronization in ring-networksKlaus Echtle, Zoha Moztarzadeh. 465-468 [doi]
- An evaluation of service discovery protocols in the internet of thingsChristian Cabrera, Andrei Palade, Siobhán Clarke. 469-476 [doi]
- Sensing by proxy in buildings with agglomerative clustering of indoor temperature movementsDaoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon. 477-484 [doi]
- From IoT big data to IoT big servicesAmir Taherkordi, Frank Eliassen, Geir Horn. 485-491 [doi]
- Knowledge discovery and sharing in the IoT: the physical semantic web visionMichele Ruta, Floriano Scioscia, Saverio Ieva, Giuseppe Loseto, Filippo Gramegna, Agnese Pinto. 492-498 [doi]
- Distributed algorithm for traffic dissemination in manhattan networks with optimal routing-timeSayan Sen Sarma, Koushik Sinha, Goutam Chakraborty, Bhabani P. Sinha. 499-505 [doi]
- ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysisYair Meidan, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa, Nils Ole Tippenhauer, Yuval Elovici. 506-509 [doi]
- Security software module update for heterogeneous VoTKiwook Kang, Kyoungmin Kim, Jinwoo Lee, Joonhyouk Jang, Jiman Hong. 510-511 [doi]
- A novel IoT-based wireless system to monitor heart rate: student research abstractMohammed ElSaadany. 512-515 [doi]
- Secure policy-based device-to-device offloading for mobile applicationsAndreas Reiter. 516-521 [doi]
- An effective and efficient hybrid scan matching algorithm for mobile object applicationsKristijan Lenac, Alfredo Cuzzocrea, Enzo Mumolo. 522-528 [doi]
- Observation-based detection of femtocell attacks in wireless mobile networksMohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga. 529-534 [doi]
- Cyber security patrol: detecting fake and vulnerable wifi-enabled printersJinghui Toh, Muhammad Hatib, Omer Porzecanski, Yuval Elovici. 535-542 [doi]
- MOMOS-MT: mobile monophonic system for music transcription: sheet music generation on mobile devicesMunir Makhmutov, Joseph Alexander Brown, Manuel Mazzara, Leonard Johard. 543-549 [doi]
- BaaS (Bluetooth-as-a-sensor): conception, design and implementation on mobile platformsDouglas Lautner, Xiayu Hua, Scott DeBates, Miao Song 0004, Jagat Shah, Shangping Ren. 550-556 [doi]
- Requirements for a mobile personal health record to improve cardiovascular healthcare servicesSofia Ouhbi, Ali Idri, Rachid Hakmi, Halima Benjelloun, José Luis Fernández Alemán, Ambrosio Toval. 557-562 [doi]
- Flamingo: a framework for smartphone security context managementMd. Shahrear Iqbal, Mohammad Zulkernine. 563-568 [doi]
- Usability evaluation and development of heuristics for second-screen applicationsEduardo Mosqueira-Rey, David Alonso-Ríos, Diego Prado-Gesto, Vicente Moret-Bonillo. 569-571 [doi]
- Utilizing nearby computing resources for resource-limited mobile devicesMinh Le, Young-Woo Kwon. 572-575 [doi]
- Analysing the vulnerability exploitation in Android with the device-mapper-verity (dm-verity): student research abstractAbhishek PC. 576-577 [doi]
- Prediction of the domain name system (DNS) quality attributesMarwan Radwan, Reiko Heckel. 578-585 [doi]
- Upper bound computation for buffer backlog on AFDX networks with multiple priority virtual linksRodrigo Coelho, Gerhard Fohler, Jean-Luc Scharbarg. 586-593 [doi]
- RALL: routing-aware of path length, link quality and traffic load for wireless sensor networksVinicius N. Medeiros, Paulo César G. de Brito, Bruno Silvestre, Vinicius da C. M. Borges. 594-601 [doi]
- Mathematical model for a collaborative indoor position system (IPS) and movement detection of devices within IoT environmentDanilo Reis de Vasconcelos, F. L. R. Pimentel, Rossana M. de Castro Andrade, José Neuman de Souza. 602-608 [doi]
- Phantom walkabouts in wireless sensor networksChen Gu, Matthew Bradbury, Arshad Jhumka. 609-616 [doi]
- Research of the interest packet popple broadcast diffusion attack in NDN VANETBin Pang, Ru Li, Pengfei Yue. 617-620 [doi]
- Joint workload scheduling and BBU allocation in cloud-RAN for 5G networksLilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, Asad Masood Khattak. 621-627 [doi]
- Moving away from the crowd: channel selection in uncoordinated unplanned dense wireless LANsParag Kulkarni, Zhenzhe Zhong, Fengming Cao. 628-633 [doi]
- Design and implementation of a fast handoff scheme supporting vehicular mobility over IEEE 802.11 WLANMade Harta Dwijaksara, MinSik Hwang, Wha Sook Jeon, Dong Geun Jeong. 634-641 [doi]
- NDN goes deep: foreseeing the underwater named data networksSafdar Hussain Bouk, Syed Hassan Ahmed, Dongkyun Kim. 642-646 [doi]
- Signal strength as support to mobility detection on failure detectorsAntonio Rodrigo Delepiane de Vit, César A. M. Marcon, Raul Ceretta Nunes. 647-650 [doi]
- UAV-assisted reactive routing for urban VANETsOmar Sami Oubbati, Abderrahmane Lakas, Mesut Günes, Fen Zhou, Mohamed Bachir Yagoubi. 651-653 [doi]
- A linked open data schema-driven approach for Top-N recommendationsThomas Wever, Flavius Frasincar. 656-663 [doi]
- WebRTC: your privacy is at riskAndreas Reiter, Alexander Marsalek. 664-669 [doi]
- Automatic identification of client-side JavaScript libraries in web applicationsHanyang Cao, Yuxian Peng, Jing Jiang, Jean-Rémy Falleri, Xavier Blanc. 670-677 [doi]
- A quadtree replication method to optimize web and mobile applications dealing with large sets of objects on a mapPatrick Munroe, Jonathan Milot, Eric Beaudry, Naouel Moha, François Grondin. 678-685 [doi]
- A smart MobiWeb mashup trip planner toolMarwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele. 686-688 [doi]
- Situation-aware multi-criteria recommender system: using criteria preferences as contextsYong Zheng. 689-692 [doi]
- Mitigating distributed denial of service attacks at the application layerRobert Bronte, Hossain Shahriar, Hisham M. Haddad. 693-696 [doi]
- Automatic detection of cross-browser incompatibilities using machine learning and screenshot similarity: student research abstractFagner Christian Paes. 697-698 [doi]
- A key-entity graph for clustering multichannel news: student research abstractFederica Rollo. 699-700 [doi]
- Optimal acquisition of input data for decision taking in business processesEkaterina Bazhenova, Mathias Weske. 703-710 [doi]
- Lightweight approach for seamless modeling of process flows in case management modelsChristoph Czepa, Huy Tran, Uwe Zdun, Thanh Thi Kim Tran, Erhard Weiss, Christoph Ruhsam. 711-718 [doi]
- Reduction techniques for efficient behavioral model checking in adaptive case managementChristoph Czepa, Huy Tran, Uwe Zdun, Thanh Thi Kim Tran, Erhard Weiss, Christoph Ruhsam. 719-726 [doi]
- Modeling and handling duration constraints in BPMN 2.0Carlo Combi, Barbara Oliboni, Francesca Zerbato. 727-734 [doi]
- Recommendation patterns for business process imperative modelingMateus Barcellos Costa, Dalila Tamzalit. 735-742 [doi]
- Driving time-dependent paths in clinical BPMN processesCarlo Combi, Pietro Sala, Francesca Zerbato. 743-750 [doi]
- Service-oriented domain and business process modellingGianna Reggio, Maurizio Leotta, Diego Clerissi, Filippo Ricca. 751-758 [doi]
- Declarative process mining for DCR graphsSøren Debois, Thomas T. Hildebrandt, Paw Høvsgaard Laursen, Kenneth Ry Ulrik. 759-764 [doi]
- A descriptive clustering approach to the analysis of quantitative business-process deviancesFrancesco Folino, Massimo Guarascio, Luigi Pontieri. 765-770 [doi]
- Self-tuning techniques for large scale cluster analysis on textual data collectionsEvelina Di Corso, Tania Cerquitelli, Francesco Ventura. 771-776 [doi]
- Towards transforming FDA adverse event narratives into actionable structured data for improved pharmacovigilanceSusmitha Wunnava, Xiao Qin, Tabassum Kakar, Vimig Socrates, Amber Wallace, Elke A. Rundensteiner. 777-782 [doi]
- Feature extraction for the author name disambiguation problem in a bibliographic databaseJorge M. B. Silva, Fernando Silva. 783-789 [doi]
- Hierarchical multi-label classification with chained neural networksJônatas Wehrmann, Rodrigo C. Barros, Silvia N. das Dôres, Ricardo Cerri. 790-795 [doi]
- Discovering spatial contrast and common sets with statistically significant co-location patternsMohomed Shazan Mohomed Jabbar, Osmar R. Zaïane, Alvaro Osornio-Vargas. 796-803 [doi]
- Exploiting implicit and explicit signed trust relationships for effective recommendationsIrfan Ali, Jiwon Hong, Sang-Wook Kim. 804-810 [doi]
- s</u>elective samplingAli Azari, Vandana P. Janeja, Scott Levin. 811-816 [doi]
- A novel ensemble approach on regionalized neural networks for brain disorder predictionLei Zheng, Jingyuan Zhang, Bokai Cao, Philip S. Yu, Ann B. Ragin. 817-823 [doi]
- Ontology-based workflow pattern mining: application to bioinformatics expertise acquisitionAhmed Halioui, Tomas Martin, Petko Valtchev, Abdoulaye Baniré Diallo. 824-827 [doi]
- Improving random projection with genetic algorithms: student research abstractDaniel López Sánchez. 828-829 [doi]
- Fast mutual information computation for dependency-monitoring on data streamsJonathan Boidol, Andreas Hapfelmeier. 830-835 [doi]
- Feature ranking in hoeffding algorithms for regressionJoão Duarte, João Gama. 836-841 [doi]
- Enhanced situation space mining for data streamsYisroel Mirsky, Tal Halpern, Rishabh upadhyay, Sivan Toledo, Yuval Elovici. 842-849 [doi]
- Graph-based clustering with DRepStreamRoss Callister, Mihai Lazarescu, Duc-Son Pham. 850-857 [doi]
- Modeling discrete dynamic topicsSeyed Ali Bahrainian, Ida Mele, Fabio Crestani. 858-865 [doi]
- Understanding the bigger picture: batch-free exploration of streaming sequential patterns with accurate predictionMarwan Hassani, Daniel Töws, Thomas Seidl 0001. 866-869 [doi]
- Personalised fading for stream dataBruno Veloso, Benedita Malheiro, Juan-Carlos Burguillo, Jeremy D. Foss. 870-872 [doi]
- Similarity search through one-dimensional embeddingsHumberto Luiz Razente, Rafael L. Bernardes Lima, Maria Camila Nardini Barioni. 874-879 [doi]
- A log-structured buffer for database systems using non-volatile memoryYongseok Son, Hara Kang, Heon Young Yeom, Hyuck Han. 880-886 [doi]
- Numerical similarity-aware data partitioning for recommendations as a serviceTing-Ting Yang, Hsueh-Wen Tseng. 887-892 [doi]
- Processing skyline queries in temporal databasesChristos Kalyvas, Theodoros Tzouramanis, Yannis Manolopoulos. 893-899 [doi]
- One index to dominate them all: domain indexes for improving queries across multiple tablesPaulo H. Oliveira, Lucas C. Scabora, Caetano Traina Jr., Daniel S. Kaster. 900-905 [doi]
- Exploiting photo location and direction for clustering-based points-of-interest discoveryYuri Almeida Lacerda, Leandro Balby Marinho, Cláudio de Souza Baptista, Chiara Renso, Raffaele Perego. 907-912 [doi]
- The similarity-aware relational division database operatorAndré S. Gonzaga, Robson L. F. Cordeiro. 913-914 [doi]
- Next generation JDBC database drivers for performance, transparent caching, load balancing, and scale-outRamon Lawrence, Erik Brandsberg, Roland Lee. 915-918 [doi]
- Fixed budget pooling strategies based on fusion methodsAldo Lipani, Mihai Lupu, João R. M. Palotti, Guido Zuccon, Allan Hanbury. 919-924 [doi]
- Emphasizing temporal-based user profile modeling in the context of session searchAmeni Kacem, Mohand Boughanem, Rim Faiz. 925-930 [doi]
- Part-of-speech tagging for web search queries using a large-scale web corpusAtsushi Keyaki, Jun Miyazaki. 931-937 [doi]
- ToPI: an approach to identify places of interest using geo-tagged imagesJean R. Ponciano, Jose Gustavo de Souza Paiva, Denise Guliato. 938-943 [doi]
- ES-Rank: evolution strategy learning to rank approachOsman Ali Sadek Ibrahim, Dario Landa Silva. 944-950 [doi]
- Decaying inverted quadtree: index structure for supporting spatio-temporal-keyword query processing of microblog dataSehwa Park, Seog Park. 951-956 [doi]
- Finding duplicate images in biology papersMarkus Zlabinger, Allan Hanbury. 957-959 [doi]
- Personalized ranking for context-aware venue suggestionMohammad Aliannejadi, Ida Mele, Fabio Crestani. 960-962 [doi]
- Using chord distance descriptors to enhance music information retrieval: student research abstractLadislav Marsik. 963-964 [doi]
- Probabilistic quantitative temporal reasoningPaolo Terenziani, Antonella Andolina. 965-970 [doi]
- Temporal reasoning techniques for the analysis of interactions in the treatment of comorbid patientsLuca Anselma, Luca Piovesan, Paolo Terenziani. 971-976 [doi]
- A reconstruction of default conditionals within epistemic logicCostas D. Koutras, Christos Moyzes, Christos Rantsoudis. 977-982 [doi]
- Decidability and complexity of threshold description logics induced by concept similarity measuresFranz Baader, Oliver Fernandez Gil. 983-988 [doi]
- Reasoning by cases in structured argumentationMathieu Beirlaen, Jesse Heyninck, Christian Straßer. 989-994 [doi]
- Propagating degrees of truth on an argumentation framework: an abstract account of fuzzy argumentationPierpaolo Dondio. 995-1002 [doi]
- Analysing the effect of candidate selection and instance ordering in a realtime algorithm configuration systemTadhg Fitzgerald, Barry O'Sullivan. 1003-1008 [doi]
- A gold-standard social media corpus for urban issuesMaxwell Guimarães de Oliveira, Cláudio de Souza Baptista, Cláudio E. C. Campelo, Michela Bertolotto. 1011-1016 [doi]
- Identifying authoritative researchers in digital libraries using external a priori knowledgeBaptiste de La Robertie, Yoann Pitarch, A. Takasu, Olivier Teste. 1017-1022 [doi]
- Understanding how user activities are related to profile images on Twitter through regression analysisTomu Tominaga, Yoshinori Hijikata. 1023-1030 [doi]
- TSViz: a data stream architecture to online collect, analyze, and visualize tweetsRicardo Araújo Rios, Paulo A. Pagliosa, Renato Porfirio Ishii, Rodrigo Fernandes de Mello. 1031-1036 [doi]
- Using stratified privacy for personal reputation defense in online social networksHasan M. Jamil. 1037-1044 [doi]
- Marketing campaign targeting using bridge extractionProkopios Gryllos, Christos Makris, Pantelis Vikatos. 1045-1052 [doi]
- Evolutionary role mining in complex networks by ensemble clusteringSarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fernando M. A. Silva. 1053-1060 [doi]
- Incremental maximum flow computation on evolving networksSergio Greco, Cristian Molinaro, Chiara Pulice, Ximena Quintana. 1061-1067 [doi]
- Survival analysis for modeling critical events that communities may undergo in dynamic social networksEtienne Gael Tajeuna, Mohamed Bouguessa, Shengrui Wang. 1068-1075 [doi]
- Irony detection on microposts with limited set of featuresHande Taslioglu, Pinar Karagoz. 1076-1081 [doi]
- Exploring the viability of tie strength and tags in access controls for photo sharingRicard L. Fogués, Jose M. Such, Agustín Espinosa Minguet, Ana García-Fornes. 1082-1085 [doi]
- Identical user tracking with behavior pattern analysis in online communitySang-Hyun Park, Min-Suk Kang, So-Hye Yoon, Seog Park. 1086-1089 [doi]
- User preferences dynamics on evolving social networks - learning, modeling and prediction: student research abstractFabiola S. F. Pereira. 1090-1091 [doi]
- Trust in requirements elicitation: how does it build, and why does it matter to requirements engineers?Corentin Burnay, Monique Snoeck. 1094-1100 [doi]
- Self-adaptive quality requirement elicitation process for legacy systems: a case study in healthcareNour Ali, Alfonso Martínez-Martínez, Lorena Ayuso-Pérez, Angelina Espinoza. 1102-1107 [doi]
- A gamification requirements catalog for educational software: results from a systematic literature review and a survey with expertsMariana Maia Peixoto, Carla Silva. 1108-1113 [doi]
- An approach based on design practices to specify requirements in agile projectsJuliana Medeiros, Alexandre Vasconcelos, Miguel Goulão, Carla Silva, João Araújo 0001. 1114-1121 [doi]
- i* in practice: identifying frequent problems in its applicationKarina Abad, Wilson Pérez, Juan Pablo Carvallo, Xavier Franch. 1122-1129 [doi]
- A semantic model for action-based adaptive securitySara Sartoli, Akbar Siami Namin. 1130-1135 [doi]
- A new comprehensive approach to security requirements engineering: student research abstractIlham Maskani. 1136-1137 [doi]
- Exploring anomaly detection in systems of systemsTommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli. 1139-1146 [doi]
- Knowledge based decision framework for architecting complex systemsRamakrishnan Raman, Meenakshi D'Souza. 1147-1153 [doi]
- Reconfigurable service-based architecture based on variability descriptionSeza Adjoyan, Abdelhak-Djamel Seriai. 1154-1161 [doi]
- Collaborative development of feature models and evaluation of performance boundsPaolo Arcaini, Catia Trubiani. 1162-1167 [doi]
- Formal verification of storm topologies through D-VerTFrancesco Marconi, Marcello M. Bersani, Matteo Rossi. 1168-1174 [doi]
- Encoding asynchrony in choreographiesLuís Cruz-Filipe, Fabrizio Montesi. 1175-1177 [doi]
- Defining an architecture for evolving environmentsJarkko Hyysalo, Gavin Harper, Jaakko J. Sauvola, Anja Keskinarkaus, Ilkka Juuso, Miikka Salminen, Juha Partala. 1178-1181 [doi]
- Prioritizing random combinatorial test suitesRubing Huang, Yunan Zhou, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Weiwen Zong. 1183-1189 [doi]
- Feedback on how MDE tools are used prior to academic collaborationVasco Sousa, Eugene Syriani, Martin Paquin. 1190-1197 [doi]
- Learning environment model at runtime for self-adaptive systemsMoeka Tanabe, Kenji Tei, Yoshiaki Fukazawa, Shinichi Honiden. 1198-1204 [doi]
- On continuous deployment maturity in customer projectsAntti Virtanen, Kati Kuusinen, Marko Leppänen, Antti Luoto, Terhi Kilamo, Tommi Mikkonen. 1205-1212 [doi]
- Model-based testing of end-user collaboration intensive systemsAlessio Gambi, Christoph Mayr-Dorn, Andreas Zeller. 1213-1218 [doi]
- Nonconformance between programs and contracts: a study on C#/code contracts open source systemsAlysson Milanez, Bianca Lima, José Ferreira, Tiago Massoni. 1219-1224 [doi]
- APR: architectural pattern recommenderShipra Sharma, Balwinder Sodhi. 1225-1230 [doi]
- A theoretical model for capturing the impact of design patterns on quality: the decorator case studySofia Charalampidou, Apostolos Ampatzoglou, Paris Avgeriou, Seren Sencer, Elvira-Maria Arvanitou, Ioannis Stamelos. 1231-1238 [doi]
- On the significance of relationship directions in clustering algorithms for reverse engineeringDavid Jensen, Andreas Lundkvist, Imed Hammouda. 1239-1244 [doi]
- Sync/CC: continuations and aspects to tame callback dependencies on JavaScript handlersPaul Leger, Hiroaki Fukuda. 1245-1250 [doi]
- Software effort estimation using classical analogy ensembles based on random subspaceMohamed Hosni, Ali Idri. 1251-1258 [doi]
- Run-time component allocation in CPU-GPU embedded systemsGabriel Campeanu, Mehrdad Saadatmand. 1259-1265 [doi]
- On the randomness and seasonality of affective metrics for software developmentGiuseppe Destefanis, Marco Ortu, Steve Counsell, Stephen Swift, Roberto Tonelli, Michele Marchesi. 1266-1271 [doi]
- SMT-based consistency analysis of industrial systems requirementsPredrag Filipovikj, Guillermo Rodríguez-Navas, Mattias Nyberg, Cristina Seceleanu. 1272-1279 [doi]
- Analyzing emotion words to predict severity of software bugs: a case study of open source projectsGeunseok Yang, Seungsuk Baek, Jung-Won Lee, Byungjeong Lee. 1280-1287 [doi]
- Deriving use cases from business processes: a goal-oriented transformational approachGrace Park, Fadoua Fellir, Jang-Eui Hong, José Luis Garrido, Manuel Noguera, Lawrence Chung. 1288-1295 [doi]
- Generating test cases and procedures from use cases in dynamic software product linesItalo L. Araújo, Ismayle S. Santos, João Bosco Ferreira Filho, Rossana M. C. Andrade, Pedro de A. Santos Neto. 1296-1301 [doi]
- Empirical evaluation of fuzzy analogy for software development effort estimationIbtissam Abnane, Ali Idri, Alain Abran. 1302-1304 [doi]
- Predicting the quality of contests on crowdsourcing-based software development platforms: student research abstractMohammad Imran Faisal. 1305-1306 [doi]
- A methodology to predict the instable classes: student research abstractShahid Hussain. 1307-1308 [doi]
- Interleaving sessions with predicatesPeter Thiemann. 1312-1318 [doi]
- Semantic similarity based web services composition frameworkAhmed Abid, Nizar Messai, Mohsen Rouached, Mohamed Abid, Thomas Devogele. 1319-1325 [doi]
- Petri nets and dynamic causality for service-oriented computationsGiovanni Casu, G. Michele Pinna. 1326-1333 [doi]
- Compatibility flooding: measuring interaction of services interfacesMeriem Ouederni, Uli Fahrenberg, Axel Legay, Gwen Salaün. 1334-1340 [doi]
- Generating runtime verification specifications based on static code analysis alertsYunus Kiliç, Hasan Sözer. 1342-1347 [doi]
- Moving from Event-B to probabilistic Event-BMohamed Amine, Benoît Delahaye, Arnaud Lanoix. 1348-1355 [doi]
- Statistical model checking of an energy-saving cyber-physical system in the railway domainDavide Basile, Felicita Di Giandomenico, Stefania Gnesi. 1356-1363 [doi]
- Mutation tools for JavaAndrás Márki, Birgitta Lindström. 1364-1415 [doi]
- Specification, design, and verification of an accountability-aware surveillance protocolThibaud Antignac, Mukelabai Mukelabai, Gerardo Schneider. 1372-1378 [doi]
- Runtime verification of LTL on lossy tracesYogi Joshi, Guy Martin Tchamgoue, Sebastian Fischmeister. 1379-1386 [doi]
- GiGAn: evolutionary mutation testing for C++ object-oriented systemsPedro Delgado-Pérez, Inmaculada Medina-Bulo, Sergio Segura, Antonio García-Domínguez, Juan José Domínguez-Jiménez. 1387-1392 [doi]
- CARET model checking for pushdown systemsHuu-Vu Nguyen, Tayssir Touili. 1393-1400 [doi]
- An empirical study on the application of mutation testing for a safety-critical industrial software systemRudolf Ramler, Thomas Wetzlmaier, Claus Klammer. 1401-1408 [doi]
- Failure history data-based test case prioritization for effective regression testJeongho Kim, Hohyeon Jeong, Eunseok Lee. 1409-1415 [doi]
- SmartSen: smart sensing for enhancing real-time activity recognition in phone-based interactive CPSHuan Li, Qinghua Yu, Krithi Ramamritham, Xiaotao Liu. 1416-1423 [doi]
- Multi-CNN and decision tree based driving behavior evaluationShouyi Yin, Jinjin Duan, Peng Ouyang, Leibo Liu, Shaojun Wei. 1424-1429 [doi]
- Resource constrained real-time lane-vehicle detection for advanced driver assistance on mobile devicesTianchen Wang, Kangli Hao, Chunchen Liu, Yiyu Shi. 1430-1435 [doi]
- Self-adaptive control in cyber-physical systems: the autonomous train experimentAlexander Svae, Amir Taherkordi, Peter Herrmann, Jan Olaf Blech. 1436-1443 [doi]
- Towards trusted execution of multi-modal continuous authentication schemesCarlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis. 1444-1451 [doi]
- Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0Davy Preuveneers, Wouter Joosen, Elisabeth Ilie Zudor. 1452-1455 [doi]
- Exploring the trade-off between processing resources and settling time in image-based control through LQR tuningRóbinson Medina Sánchez, Sander Stuijk, Dip Goswami, Twan Basten. 1456-1459 [doi]
- A pattern-aware write strategy to enhance the reliability of flash-memory storage systemsTseng-Yi Chen, Yuan-Hao Chang, Yuan-Hung Kuan, Ming-Chang Yang, Yu-Ming Chang, Pi-Cheng Hsiu. 1460-1466 [doi]
- Synthesis of ada code from graph-based task modelsJakaria Abdullah, Morteza Mohaqeqi, Wang Yi 0001. 1467-1472 [doi]
- Modeling and generation of secure component communications in AUTOSARCinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Dario Varano. 1473-1480 [doi]
- Hardware resource estimation for heterogeneous FPGA-based SoCsMariem Makni, Mouna Baklouti, Smaïl Niar, Mohamed Abid. 1481-1487 [doi]
- A time-triggered message-based multi-core architecture for AUTOSAR: student research abstractMoises Urbina. 1488-1489 [doi]
- From object-oriented code with assertions to behavioural typesCláudio Vasconcelos, António Ravara. 1492-1497 [doi]
- Crossing abstraction barriers when debugging in dynamic languagesBastian Kruck, Tobias Pape, Tim Felgentreff, Robert Hirschfeld. 1498-1504 [doi]
- Detecting spring configurations errorsVincent von Hof, Konrad Fögen, Herbert Kuchen. 1505-1512 [doi]
- A type and effect system for sharingPaola Giannini, Marco Servetto, Elena Zucca. 1513-1515 [doi]
- The influence of resource allocation on cloud computing performanceDionisio Machado Leite Filho, Maycon L. M. Peixoto, Bruno G. Batista, Bruno Tardiole Kuehne, Carlos Henrique Gomes Ferreira. 1516-1521 [doi]
- A page replacement algorithm based on frequency derived from reference historyHong-Bin Tsai, Chin-Laung Lei. 1522-1527 [doi]
- Quantitative analysis of measurement overhead for integrity verificationJuhyung Son, Sungmin Koo, Jongmoo Choi, Seong-je Choi, Seungjae Baek, Gwangil Jeon, Jun-Hyeok Park, HyoungChun Kim. 1528-1533 [doi]
- Coarse-grained mtime update for better fsync() performanceHankeun Son, Seongjin Lee, Gyeongyeol Choi, Youjip Won. 1534-1541 [doi]
- An empirical study on patterns of failure causes in a mass-market operating systemCaio Augusto R. Dos Santos, Rivalino Matias. 1542-1547 [doi]
- Improving service time with a multicore aware middlewareMarisol García-Valls, Christian Calva-Urrego. 1548-1553 [doi]
- Towards energy-efficient storage serversVinícius Machado, Amanda Braga, Natália Rampon, Jean Bez, Francieli Zanon Boito, Rodrigo Kassick, Edson L. Padoin, Julien Diaz, Jean-François Méhaut, Philippe Olivier Alexandre Navaux. 1554-1559 [doi]
- A dynamic duty cycle control mechanism based on mobility for animal trackingSeonil Kim, Jisup Yoon, Seoyeon Kim, Sun Sup So, Noh Sup Kwak, Young-Sun Yun, Jinman Jung, Seongbae Eun. 1560-1562 [doi]
- DACS: dynamic allocation credit scheduler for virtual machinesMyungjoon Shon, Kisu Kim, Hansol Lee, Sung Y. Shin, Jiman Hong. 1563-1565 [doi]
- Multiple back-end support for the armadillo linear algebra interfacePaolo Viviani, Marco Aldinucci, Massimo Torquati, Roberto d'lppolito. 1566-1573 [doi]
- Scalable subgraph counting using MapReduceAhmad Naser Eddin, Pedro Ribeiro. 1574-1581 [doi]
- 3ARSEC: towards parallel patterns benchmarkingMarco Danelutto, Tiziano De Matteis, Daniele De Sensi, Gabriele Mencagli, Massimo Torquati. 1582-1589 [doi]
- CATS: a big network clustering algorithm based on triangle structuresMincheol Shin, JeongWoo Kim, Jungrim Kim, Dongmin Seo, Chihyun Park, Seok-Jong Yu, Sanghyun Park. 1590-1592 [doi]
- Enabling efficient use of algorithmic skeletons in cloud environments: container-based virtualization for hybrid CPU-GPU execution of data-parallel skeletonsFabian Wrede, Vincent von Hof. 1593-1596 [doi]
- Business apps with MAML: a model-driven approach to process-oriented mobile app developmentChristoph Rieger. 1599-1606 [doi]
- Tarski: a platform for automated analysis of dynamically configurable traceability semanticsFerhat Erata, Moharram Challenger, Bedir Tekinerdogan, Anne Monceaux, Eray Tüzün, Geylani Kardas. 1607-1614 [doi]
- Code Spartanization: one rational approach for resolving religious style warsYossi Gil, Matteo Orrù. 1615-1622 [doi]
- LARA as a language-independent aspect-oriented programming approachPedro Pinto, Tiago Carvalho, João Bispo, João M. P. Cardoso. 1623-1630 [doi]
- Computing super reduced program slices by composing slicing techniquesDavid Insa, Sergio Pérez, Josep Silva. 1631-1633 [doi]
- Leveraging multi-dimensional user models for personalized next-track music recommendationDietmar Jannach, Iman Kamehkhosh, Lukas Lerche. 1635-1642 [doi]
- Determining characteristics of successful recommendations from log data: a case studyDietmar Jannach, Malte Ludewig. 1643-1648 [doi]
- Offline performance vs. subjective quality experience: a case study in video game recommendationDietmar Jannach, Lukas Lerche. 1649-1654 [doi]
- Action prediction models for recommender systems based on collaborative filtering and sequence mining hybridizationTural Gurbanov, Francesco Ricci. 1655-1661 [doi]
- A framework for unexpectedness evaluation in recommendationThiago Silveira, Leonardo C. da Rocha, Fernando Mourão, Marcos André Gonçalves. 1662-1667 [doi]
- Improving recommender systems with an intention-based algorithm switching strategyFanjuan Shi, Chirine Ghedira. 1668-1673 [doi]
- Text-based question routing for question answering communities via deep learningAmr Azzam, Neamat Tazi, Ahmad Hossny. 1674-1678 [doi]
- Learning hierarchical category influence on both users and items for effective recommendationZhu Sun, Guibing Guo, Jie Zhang. 1679-1684 [doi]
- Dynamic elicitation of user preferences in a chat-based group recommender systemThuy Ngoc Nguyen, Francesco Ricci. 1685-1692 [doi]
- How item discovery enabled by diversity leads to increased recommendation list attractivenessBruce Ferwerda, Mark P. Graus, Andreu Vall, Marko Tkalcic, Markus Schedl. 1693-1696 [doi]
- A language modeling approach for the recommendation of tourism-related servicesSondess Missaoui, Marco Viviani, Rim Faiz, Gabriella Pasi. 1697-1700 [doi]
- Hiding debuggers from malware with apateHao Shi, Jelena Mirkovic. 1703-1710 [doi]
- Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication networkMuhammad Ajmal Azad, Samiran Bag. 1711-1717 [doi]
- R-PackDroid: API package-based characterization and detection of mobile ransomwareDavide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli. 1718-1723 [doi]
- Preventing relay attacks in mobile transactions using infrared lightIakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 1724-1731 [doi]
- Security and privacy preserving data aggregation in cloud computingLeandro Ventura Silva, Rodolfo Marinho, José Luis Vivas, Andrey Brito. 1732-1738 [doi]
- Attacks landscape in the dark side of the webOnur Catakoglu, Marco Balduzzi, Davide Balzarotti. 1739-1746 [doi]
- TeICC: targeted execution of inter-component communications in AndroidMaqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano. 1747-1752 [doi]
- Measuring login webpage securitySteven Van Acker, Daniel Hausknecht, Andrei Sabelfeld. 1753-1760 [doi]
- On computing similarity of android executables using text mining: student research abstractGyoosik Kim. 1761-1762 [doi]
- A process to establish, model and validate missions of systems-of-systems in reference architecturesLina Maria Garcés Rodriguez, Elisa Yumi Nakagawa. 1765-1772 [doi]
- IoTA-MD: a model-driven approach for applying QoS attributes in the development of the IoT systemsMarcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires. 1773-1780 [doi]
- Iterative multi-scale modeling of software-intensive systems of systems architecturesIlhem Khlif, Mohamed Hadj Kacem, Ahmed Hadj Kacem. 1781-1786 [doi]
- A tool for modeling SoS architectures using bigraphsAmal Gassara, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 1787-1792 [doi]
- System of systems software architecture description using the ISO/IEC/IEEE 42010 standardMariam Chaabane, Ismael Bouassida, Mohamed Jmaiel. 1793-1798 [doi]
- Modeling traceability in system of systemsBedir Tekinerdogan, Ferhat Erata. 1799-1802 [doi]
- Towards safe and secure systems of systems: challenges and opportunitiesAvenir Kobetski, Jakob Axelsson. 1803-1806 [doi]
- TransReport: collaborative supervision of the public transportationRaul S. Ferreira, Renan Prata, Carlos Eduardo Barbosa, Jano Moreira de Souza, Vinicius Mororo, Kleyton Pontes Cotta. 1808-1813 [doi]
- Design and implementation of a message-service oriented middleware for fog of things platformsCássio V. S. Prazeres, Jurandir Barbosa, Leandro José Silva Andrade, Martin Serrano. 1814-1819 [doi]
- MetricStore repository: on the leveraging of performance metrics in databasesAbdelkader Ouared, Yassine Ouhammou, Ladjel Bellatreche. 1820-1825 [doi]
- Genetic algorithm based patching scheme for worm containment on social networkDonghwa Kang, Seoyeon Kim, Jinman Jung, Bongjae Kim, Hong Min, Junyoung Heo. 1826-1828 [doi]
- A computational model to evaluate honesty in social internet of thingsUpul Jayasinghe, Hyun-Woo Lee, Gyu Myoung Lee. 1830-1835 [doi]
- An end-to-end voting-system based on bitcoinStefano Bistarelli, Marco Mantilacci, Paolo Santancini, Francesco Santini. 1836-1841 [doi]
- Learning nuanced cross-disciplinary citation metric normalization using the hierarchical dirichlet process on big scholarly dataHafsah Umar, Ognjen Arandjelovic. 1842-1847 [doi]
- On enhancing trust in cryptographic solutions: student research abstractNikolaos Alexopoulos. 1848-1849 [doi]