Abstract is missing.
- An insight into biological datamining based on rarity and correlation as constraintsSouad Bouasker, Sadok Ben Yahia, Gayo Diallo. 3-10 [doi]
- Drug target discovery using knowledge graph embeddingsSameh K. Mohamed, Aayah Nounu, Vít Novácek. 11-18 [doi]
- Ensemble feature selection for biomarker discovery in mass spectrometry-based metabolomicsAliasghar Shahrjooihaghighi, Hichem Frigui, Xiang Zhang 0003, Xiaoli Wei, Biyun Shi, Craig J. McClain. 19-24 [doi]
- Molecule specific normalization for protein and metabolite biomarker discoveryAmeni Trabelsi, Biyun Shi, Xiaoli Wei, Hichem Frigui, Xiang Zhang 0003, Craig McClain, Aliasghar Shahrjooihaghighi. 25-31 [doi]
- A hybrid reliability metric for SLA predictive monitoringMarco Comuzzi, Alfonso E. Márquez Chamorro, Manuel Resinas. 32-39 [doi]
- Controllability of business processes with temporal variablesJohann Eder, Marco Franceschetti, Julius Köpke. 40-47 [doi]
- Object-centric behavioral constraint models: a hybrid model for behavioral and data perspectivesGuangming Li, Renata Medeiros de Carvalho, Wil M. P. van der Aalst. 48-56 [doi]
- Optimizing customer journey using process mining and sequence-aware recommendationAlessandro Terragni, Marwan Hassani. 57-65 [doi]
- Static analysis of BPMN-based process-driven applicationsKonrad Schneid, Claus A. Usener, Sebastian Thöne, Herbert Kuchen, Christian Tophinke. 66-74 [doi]
- Towards a metamodel for supporting decisions in knowledge-intensive processesSheila Katherine Venero, Julio César dos Reis, Leonardo Montecchi, Cecília Mary Fischer Rubira. 75-84 [doi]
- VIEW: an incremental approach to verify evolving workflowsMohammad Javad Amiri, Divyakant Agrawal. 85-93 [doi]
- Configuring SQL-based process mining for performance and storage optimisationStefan Schönig, Claudio Di Ciccio, Jan Mendling. 94-97 [doi]
- Formal support of process chain networks using model-driven engineering and Petri netsElena Gómez-Martínez, Francisco Pérez Blanco, Juan de Lara, Juan Manuel Vara, Esperanza Marcos. 98-100 [doi]
- On the elicitation and annotation of business activities based on emailsDiana Jlailaty, Daniela Grigori, Khalid Belhajjame. 101-103 [doi]
- A programming model and middleware for high throughput serverless computing applicationsAlfonso Pérez, Germán Moltó, Miguel Caballer, Amanda Calatrava. 106-113 [doi]
- Minimizing financial cost of scientific workflows under deadline constraints in multi-cloud environmentsTianyu Gao, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Ruxia Li, Mingrui Xu. 114-121 [doi]
- Modelling multi level consistency in erasure code based storage systemsOjus Thomas Lee, Vijay Sharma, S. D. Madhu Kumar, Priya Chandran. 122-129 [doi]
- Oversubscribing micro-clouds with energy-aware containers schedulingSergio Mendes, José Simão, Luís Veiga. 130-137 [doi]
- Secure container orchestration in the cloud: policies and implementationGabriel P. Fernandez, Andrey Brito. 138-145 [doi]
- The lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharingAntonis Michalas. 146-155 [doi]
- Performance overhead of container orchestration frameworks for management of multi-tenant database deploymentsEddy Truyen, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen. 156-159 [doi]
- Diabetes care in cloud - research challengesMerlin George, Anu Mary Chacko, Sudeep Koshy Kurien, Naseer Ali. 160-162 [doi]
- An application-oriented evaluation of LTE-V's mode 4 for V2V communicationPhilip Wendland, Guenter Schaefer, Reiner S. Thomä. 165-173 [doi]
- Secure over-the-air firmware updating for automotive electronic control unitsDimitrios Mbakoyiannis, Othon Tomoutzoglou, George Kornaros. 174-181 [doi]
- Using machine learning for handover optimization in vehicular fog computingSalman Memon, Muthucumaru Maheswaran. 182-190 [doi]
- Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networksLukás Chrpa, Mauro Vallati, Simon Parkinson. 191-194 [doi]
- 2D character animating networks: bringing static characters to move via motion transferZackary P. T. Sin, Peter H. F. Ng, Simon C. K. Shiu, Fu-Lai Chung, Hong Va Leong. 196-203 [doi]
- An effective hybrid imperialist competitive algorithm and tabu search for an extended flexible job shop scheduling problemWillian Tessaro Lunardi, Holger Voos, Luiz Henrique Cherri. 204-211 [doi]
- BGrowth: an efficient approach for the segmentation of vertebral compression fractures in magnetic resonance imagingJonathan S. Ramos, Carolina Y. V. Watanabe, Marcello H. Nogueira-Barbosa, Agma J. M. Traina. 220-227 [doi]
- AdaptC: programming adaptation policies for WSN applicationsShashank Gaur, Luís Almeida 0001, Eduardo Tovar. 229-235 [doi]
- Energy optimization of branch-aware data variable allocation on hybrid SRAM+NVM SPM for CPSYixin Li, Jinyu Zhan, Wei Jiang, Jiayu Yu. 236-241 [doi]
- Optimizing fragmentation and segment cleaning for CPS based storage devicesQi Li, Aosong Deng, Congming Gao, Yu Liang, Liang Shi, Edwin Hsing-Mean Sha. 242-249 [doi]
- United SSD block cleaning via constrained victim block selectionYajuan Du, Wei Liu, Yu Zhu, Meng Zhang 0014. 250-257 [doi]
- Emerging COTS architecture support for real-time TSN ethernetJames Coleman, Sara Almalih, Alexander Slota, Yann-Hang Lee. 258-265 [doi]
- A library for services transparent replicationPaola Martins Pereira, Fernando Luís Dotti, Cristina Meinhardt, Odorico Machado Mendizabal. 268-275 [doi]
- Adaptive information dissemination in the Bitcoin networkJoão Marçal, Luís E. T. Rodrigues, Miguel Matos. 276-283 [doi]
- Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystemSubir Halder, Mauro Conti. 284-291 [doi]
- Failure prediction in the internet of things due to memory exhaustionMohammad Rafiuzzaman, Julien Gascon-Samson, Karthik Pattabiraman, Sathish Gopalakrishnan. 292-301 [doi]
- Scalable lightning factories for BitcoinAlejandro Ranchal Pedrosa, Maria Potop-Butucaru, Sara Tucci Piergiovanni. 302-309 [doi]
- Planning workflow executions when using spot instances in the cloudRichard Gil Martinez, Antónia Lopes, Luís Rodrigues. 310-317 [doi]
- Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detectionFilipe Falcão, Tommaso Zoppi, Caio Barbosa Viera Silva, Anderson Santos, Baldoino Fonseca, Andrea Ceccarelli, Andrea Bondavalli. 318-327 [doi]
- Securely deploying distributed computation systems on peer-to-peer networksKobe Vrancken, Frank Piessens, Raoul Strackx. 328-337 [doi]
- Distributed storage system based on permissioned blockchainRacin Nygaard, Hein Meling, Leander Jehl. 338-340 [doi]
- Is it safe to dockerize my database benchmark?Martin Grambow, Jonathan Hasenburg, Tobias Pfandzelter, David Bermbach. 341-344 [doi]
- Analysis of architectural variants for auditable blockchain-based private data sharingVincent Reniers, Dimitri Van Landuyt, Paolo Viviani, Bert Lagaisse, Riccardo Lombardi, Wouter Joosen. 346-354 [doi]
- Building private blockchains over public blockchains (PoP): an attribute-based access control approachDijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang. 355-363 [doi]
- DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chainMourad el Maouchi, Ogruzhan Ersoy, Zekeriya Erkin. 364-373 [doi]
- Hybrid mining: exploiting blockchain's computational power for distributed problem solvingKrishnendu Chatterjee, Amir Kafshdar Goharshady, Arash Pourdamghani. 374-381 [doi]
- MUSCLE: authenticated external data retrieval from multiple sources for smart contractsBjorn van der Laan, Ogruzhan Ersoy, Zekeriya Erkin. 382-391 [doi]
- Smart contracts in view of the civil codeMonika Di Angelo, Alfred Soare, Gernot Salzer. 392-399 [doi]
- The treewidth of smart contractsKrishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady. 400-408 [doi]
- TickEth, a ticketing system built on ethereumPietro Corsi, Giovanni Lagorio, Marina Ribaudo. 409-416 [doi]
- Process traceability in distributed manufacturing using blockchainsSebastian Geiger, Daniel Schall 0001, Sebastian Meixner, Andreas Egger. 417-420 [doi]
- A noise tolerant and schema-agnostic blocking technique for entity resolutionTiago Brasileiro Araújo, Carlos Eduardo Santos Pires, Demetrio Gomes Mestre, Thiago Pereira da Nóbrega, Dimas Cassimiro do Nascimento, Kostas Stefanidis. 422-430 [doi]
- Authorization-aware optimization for multi-provider queriesEkaterina B. Dimitrova, Panos K. Chrysanthis, Adam J. Lee. 431-438 [doi]
- Efficient spatio-temporal RDF query processing in large dynamic knowledge basesAkrivi Vlachou, Christos Doulkeridis, Apostolos Glenis, Georgios M. Santipantakis, George A. Vouros. 439-447 [doi]
- MapReduce algorithms for the K group nearest-neighbor queryPanagiotis Moutafis, Francisco García-García 0001, George Mavrommatis, Michael Vassilakopoulos, Antonio Corral, Luis Iribarne. 448-455 [doi]
- Toward RDB to NoSQL: transforming data with metamorfose frameworkEvandro Miguel Kuszera, Letícia Mara Peres, Marcos Didonet Del Fabro. 456-463 [doi]
- A scalable and persistent key-value store using non-volatile memoryDoyoung Kim, Won Gi Choi, Hanseung Sung, Sanghyun Park. 464-467 [doi]
- The SimilarQL framework: similarity queries in plain SQLCaetano Traina Jr., Andre Moriyama, Guilherme Muzzi da Rocha, Robson L. F. Cordeiro, Cristina Dutra de Aguiar Ciferri, Agma J. M. Traina. 468-471 [doi]
- Anatome: anatomy teaching and learning designed for allMárcia Valéria Rodrigues Ferreira, Laura Sánchez García, André Luiz Pires Guedes, Djanira Aparecida da Luz Veronez, Celia Regina Alves de Araújo Sandrini, Carlos Eduardo de Araujo. 474-483 [doi]
- Web-based authoring of multimedia intervention programs for mobile devices: a case study on elderly digital literacyBruna C. R. Cunha, Kamila R. H. Rodrigues, Isabela Zaine, Leonardo F. Scalco, Caio César Viel, Maria da Graça Campos Pimentel. 484-491 [doi]
- An anomaly detection technique for business processes based on extended dynamic bayesian networksStephen Pauwels, Toon Calders. 494-501 [doi]
- Dirichlet process mixture models made scalable and effective by means of massive distributionKhadidja Meguelati, Benedicte Fontez, Nadine Hilgert, Florent Masseglia. 502-509 [doi]
- Explaining black box models by means of local rulesEliana Pastor, Elena Baralis. 510-517 [doi]
- Graph-based selective outlier ensemblesHamed Sarvari, Carlotta Domeniconi, Giovanni Stilo. 518-525 [doi]
- High-performance probabilistic record linkage via multi-dimensional homomorphismsAri Rasch, Richard Schulze, Waldemar Gorus, Jan Hiller, Sebastian Bartholomäus, Sergei Gorlatch. 526-533 [doi]
- Pairwise normalization in SimRank variants: problem, solution, and evaluationMasoud Reyhani Hamedani, Sang-Wook Kim. 534-541 [doi]
- K-mixed prototypes: a clustering algorithm for relational data with mixed attribute typesRahmah Brnawy, Nematollaah Shiri. 542-545 [doi]
- Mining product opinions with most frequent clusters of aspect termsChukwuma Ejieh, Christie I. Ezeife, Ritu Chaturvedi. 546-549 [doi]
- Cryptocurrency world identification and public concerns detection via social media: student research abstractShaista Bibi. 550-552 [doi]
- Fuzzy-rule based approach for feature selection in text classification: student research abstractBushra Zaheer Abbasi. 553-555 [doi]
- DataSeg: dynamic streaming sensor data segmentation for activity recognitionHela Sfar, Amel Bouzeghoub. 557-563 [doi]
- Exploiting entity information for stream classification over a stream of reviewsChristian Beyer, Vishnu Unnikrishnan, Uli Niemann, Pawel Matuszyk, Eirini Ntoutsi, Myra Spiliopoulou. 564-573 [doi]
- Learning regularized hoeffding trees from data streamsJean Paul Barddal, Fabrício Enembreck. 574-581 [doi]
- Quotient hash tables: efficiently detecting duplicates in streaming dataRémi Géraud, Marius Lombard-Platet, David Naccache. 582-589 [doi]
- Decision tree-based feature ranking in concept drifting data streamsJean Antonio Pereira Karax, Andreia Malucelli, Jean Paul Barddal. 590-592 [doi]
- Streaming piecewise linear approximation for efficient data management in edge computingRomaric Duvignau, Vincenzo Gulisano, Marina Papatriantafilou, Vladimir Savic. 593-596 [doi]
- A new sequential-write-constrained cache management to mitigate write amplification for SMR drivesShuo-Han Chen, Yong-Ching Lin, Yuan-Hao Chang, Ming-Chang Yang, Tseng-Yi Chen, Hsin-Wen Wei, Wei Kuan Shih. 599-606 [doi]
- A time-predictable branch predictorMartin Schoeberl, Benjamin Rouxel, Isabelle Puaut. 607-616 [doi]
- Energy-demand estimation of embedded devices using deep artificial neural networksTimo Hönig, Benedict Herzog, Wolfgang Schröder-Preikschat. 617-624 [doi]
- On assessing the viability of probabilistic scheduling with dependent tasksJaume Abella, Enrico Mezzetti, Francisco J. Cazorla. 625-634 [doi]
- Refresh optimised embedded-dram caches based on zero data detectionSheel Sindhu Manohar, Hemangee K. Kapoor. 635-642 [doi]
- Impact of source scheduling on end-to-end latencies in a QoS-aware avionics networkOana Hotescu, Katia Jaffrès-Runser, Jean-Luc Scharbarg, Christian Fraboul. 643-646 [doi]
- Graphical program transformations for embedded systemsRobert J. Stewart, Bernard Berthomieu, Paulo Garcia, Idris Ibrahim, Greg Michaelson, Andrew M. Wallace. 647-649 [doi]
- A graph based approach for functional urban areas delineationNoudéhouénou Lionel Jaderne Houssou, Jean-Loup Guillaume, Armelle Prigent. 652-658 [doi]
- A transfer learning paradigm for spatial networksChidubem Iddianozie, Gavin McArdle. 659-666 [doi]
- Algorithms for mountain peaks discovery: a comparisonRocio Nahime Torres, Federico Milani, Piero Fraternali. 667-674 [doi]
- From spatio-temporal data to chronological networks: an application to wildfire analysisDidier A. Vega-Oliveros, Moshé Cotacallapa, Leonardo N. Ferreira, Marcos G. Quiles, Liang Zhao 0001, Elbert E. N. Macau, Manoel F. Cardoso. 675-682 [doi]
- Similarity-based visual exploration of very large georeferenced multidimensional datasetsRoger Peralta-Aranibar, Cicero Augusto de Lara Pahins, João Luiz Dihl Comba, Erick Gomez Nieto. 683-686 [doi]
- The role of geographic knowledge in sub-city level geolocationLaura Di Rocco, Davide Buscaldi, Michela Bertolotto, Barbara Catania, Giovanna Guerrini. 687-689 [doi]
- Detecting stress from mouse-gaze attractionJun Wang, Eugene Yujun Fu, Grace Ngai, Hong Va Leong, Michael Xuelin Huang. 692-700 [doi]
- Effects of virtual-avatar motion-synchrony levels on full-body interactionChangyeol Choi, Joohee Jun, Jiwoong Heo, Kwanguk (Kenny) Kim. 701-708 [doi]
- Smart contract's interface for user centric business model in blockchainMalik junaid jami Gul, Anand Paul, Awais Ahmad 0001, Murad Khan, Gwanggil Jeon. 709-714 [doi]
- Stylus knife: improving cutting skill in paper-cutting by implementing pressure controlTakafumi Higashi, Hideaki Kanai. 714-721 [doi]
- Towards textualising analytic provenance for visual analytics using natural language generationWaqas Khawaja. 722-725 [doi]
- Human-enabled sustainable management of mobile cloud on 5G network: student research abstractSadia Din. 726-727 [doi]
- A two-step approach to predictive modeling of individual-based environmental health risksWan D. Bae, Matthew Horak, Shayma Alkobaisi, Sehjeong Kim, Sada Narayanappa, Choon Sik Park, Da Jeong Bae. 729-738 [doi]
- Applying situation-awareness for recommending phonological processes in the children's speechMaria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran, Márcia Keske Soares, Cristiano Cortez da Rocha. 739-746 [doi]
- Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathwaysJeethu V. Devasia, Priya Chandran, Anjana Soman, Aiswarya Elezabeth Mathew, Jaya Jharwal. 747-753 [doi]
- Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANsRim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith, Nesrine Ouled Abdallah. 754-761 [doi]
- Resolving data interoperability in ubiquitous health profile using semi-structured storage and processingFahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, Sungyoung Lee. 762-770 [doi]
- An iterative oversampling approach for ordinal classificationFrancisco Marques, Hugo Duarte, João Santos, Inês Domingues, José P. Amorim, Pedro H. Abreu. 771-774 [doi]
- IPBN: alerts management in intravenous electromedical devices using bayesian networksFabrício Ferreira, Adenauer Yamin, Ana Pernas, Luciano Agostini, Alexandre de Souza, Jorge Barbosa. 775-777 [doi]
- Mortality prediction using medical notes: student research abstractMahnaz Koupaee. 778-781 [doi]
- Video-based decision support for behavioral veterinarians: a case study of canine ADHDAsaf Fux. 782-785 [doi]
- aMV-LSTM: an attention-based model with multiple positional text matchingThiziri Belkacem, Taoufiq Dkaki, Jose G. Moreno, Mohand Boughanem. 788-795 [doi]
- Ask toscanini!: architecting a search engine for music scores beyond metadataArman Bahraini, Eli Tilevich. 796-803 [doi]
- Automatically assessing the quality of Wikipedia contentsElias Bassani, Marco Viviani. 804-807 [doi]
- Hybrid molecule-based information retrievalNathalie Charbel, Christian Sallaberry, Sébastien Laborie, Richard Chbeir. 808-815 [doi]
- The importance of being dissimilar in recommendationVito Walter Anelli, Tommaso Di Noia, Eugenio Di Sciascio, Azzurra Ragone, Joseph Trotta. 816-821 [doi]
- An architecture and its tools for integrating IoT and BPMN in agriculture scenariosJordano Ribeiro Celestrini, Renato N. Rocha, Estêvão B. Saleme, Celso A. S. Santos, José Gonçalves Pereira Filho, Rodrigo Varejão Andreão. 824-831 [doi]
- CyprIoT: framework for modelling and controlling network-based IoT applicationsImad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi. 832-841 [doi]
- Ensemble trees learning based improved predictive maintenance using IIoT for turbofan enginesSourajit Behera, Anurag Choubey, Chandresh S. Kanani, Yashwant Singh Patel, Rajiv Misra, Alberto Sillitti. 842-850 [doi]
- iCore: continuous and proactive extrospection on multi-core IoT devicesPenghui Zhang, Haehyun Cho, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn. 851-860 [doi]
- Privacy-preserving delegable authentication in the internet of thingsClémentine Gritti, Melek Önen, Refik Molva. 861-869 [doi]
- Separate session key generation approach for network and application flows in LoRaWANSuman Bala, Dominique Barthel, Saïd Gharout. 870-879 [doi]
- Toward a lightweight ontology for privacy protection in IoTMayke Ferreira Arruda, Renato de Freitas Bulcão-Neto. 880-888 [doi]
- Hygieia: data quality assessment for smart sensor networkGabriel Rodrigues Caldas de Aquino, Claudio M. de Farias, Luci Pirmez. 889-891 [doi]
- PEDAL: power-delay product objective function for internet of things applicationsBardia Safaei, Ali Asghar Mohammad Salehi, Maryam Shirbeigi, Amir Mahdi Hosseini Monazzah, Alireza Ejlali. 892-895 [doi]
- Communication-based cooperative tasks: how the language expressiveness affects reinforcement learningJacopo Talamini, Eric Medvet, Alberto Bartoli. 898-905 [doi]
- Correlation clustering based coalition formation for multi-robot task allocationAyan Dutta, Vladimir Ufimtsev, Asai Asaithambi. 906-913 [doi]
- Distributed adaptive-neighborhood control for stochastic reachability in multi-agent systemsAnna Lukina, Ashish Tiwari, Scott A. Smolka, Radu Grosu. 914-921 [doi]
- Hierarchical multi-agent deep reinforcement learning to develop long-term coordinationMarie Ossenkopf, Mackenzie Jorgensen, Kurt Geihs. 922-929 [doi]
- Subspace clustering for situation assessment in aquatic dronesAlberto Castellini, Francesco Masillo, Manuele Bicego, Domenico Bloisi, Jason Blum, Alessandro Farinelli, Sergio Peigner. 930-937 [doi]
- Support vector regression based sensor localization using UAVRolif Lima, Kaushik Das, Debasish Ghose. 938-945 [doi]
- Trail formation using large swarms of minimal robotsPere Molins, Sabine Hauert. 946-952 [doi]
- RoboPlanner: autonomous robotic action planning via knowledge graph queriesAjay Kattepur, Balamuralidhar P.. 953-956 [doi]
- Social robot navigation based on HRI non-verbal communication: a case study on avocado harvestingJuan Pablo Vasconez, Leonardo Guevara, Fernando Alfredo Auat Cheeín. 957-960 [doi]
- Taking stigmergy out of the lab and into the field: student research abstractSiobhan Duncan. 961-964 [doi]
- A case-based approach using phonological knowledge for identifying error patterns in children's speechMaria Helena Franciscatto, João Carlos Damasceno Lima, Celio Trois, Vinícius Maran, Márcia Keske Soares, Cristiano Cortez da Rocha. 968-975 [doi]
- Detecting reliable novel word senses: a network-centric approachAbhik Jana, Animesh Mukherjee 0001, Pawan Goyal. 976-983 [doi]
- Exploring lexico-semantic patterns for aspect-based sentiment analysisFrederique Baas, Olivier Bus, Alexander Osinga, Nikki van de Ven, Steffie van Loenhout, Lisanne Vrolijk, Kim Schouten, Flavius Frasincar. 984-992 [doi]
- Few-shot classification in named entity recognition taskAlexander Fritzler, Varvara Logacheva, Maksim Kretov. 993-1000 [doi]
- Out-of-context fine-grained multi-word entity classification: exploring token, character n-gram and NN-based models for multilingual entity classificationGuillaume Jacquet, Jakub Piskorski, Sophie Chesney. 1001-1010 [doi]
- Populating the knowledge base of a conversational agent: human vs. machineHugo Rodrigues 0001, Luísa Coheur, Eric Nyberg. 1011-1018 [doi]
- Same but different: distant supervision for predicting and understanding entity linking difficultyRenato Stoffalette João, Pavlos Fafalios, Stefan Dietze. 1019-1026 [doi]
- Study of linguistic features incorporated in a literary book recommender systemHaifa Alharthi, Diana Inkpen. 1027-1034 [doi]
- Unveiling middle-level concepts through frequency trajectories and peaks analysisLuigi Di Caro, Alice Ruggeri. 1035-1042 [doi]
- Vocabulary-based community detection and characterizationGiorgia Ramponi, Marco Brambilla 0001, Stefano Ceri, Florian Daniel, Marco Di Giovanni. 1043-1050 [doi]
- A hybrid deep learning network for modelling opinionated contentPantelis Agathangelou, Ioannis Katakis. 1051-1053 [doi]
- A portable grammar-based NLG system for verbalization of structured dataSimon Mille, Stamatia Dasiopoulou, Leo Wanner. 1054-1056 [doi]
- Looking into the past: evaluating the effect of time gaps in a personalized sentiment modelSiwen Guo, Sviatlana Höhn, Christoph Schommer. 1057-1060 [doi]
- Overwhelmed by negative emotions?: maybe you are being cyber-bullied!Pinar Arslan, Michele Corazza, Elena Cabrio, Serena Villata. 1061-1063 [doi]
- An effective and efficient algorithm for ranking web documents via genetic programmingRicardo A. Baeza-Yates, Alfredo Cuzzocrea, Domenico Crea, Giovanni Lo Bianco. 1065-1072 [doi]
- How to implement a big data clustering algorithm: a brief report on lesson learnedMichele Ianni, Elio Masciari, Giuseppe M. Mazzeo, Carlo Zaniolo. 1073-1080 [doi]
- On-line aggregation of POIs from Google and FacebookMaurizio Toccu, Giuseppe Psaila, Davide Altomare. 1081-1089 [doi]
- Topic-based indexing of federated datasetsCiro Sorrentino, Ester Giallonardo, Eugenio Zimeo. 1090-1098 [doi]
- VisCrimePredict: a system for crime trajectory prediction and visualisation from heterogeneous data sourcesAhsan Morshed, Abdur Rahim Mohammad Forkan, Pei-wei Tsai, Prem Prakash Jayaraman, Timos Sellis, Dimitrios Georgakopoulos, Irene Moser, Rajiv Ranjan. 1099-1106 [doi]
- A deep learning based community detection approachGiancarlo Sperlì. 1107-1110 [doi]
- Catfish density estimation by aerial images analysis and deep learningDonatello Conte, Pierre Gaucher, Carlo Sansone. 1111-1114 [doi]
- Conflict history based search for constraint satisfaction problemDjamal Habet, Cyril Terrioux. 1117-1122 [doi]
- ALCSCC conceptsFranz Baader. 1123-1130 [doi]
- Inferential equivalence, normal forms, and isomorphisms of knowledge bases in institutions of conditional logicsChristoph Beierle. 1131-1138 [doi]
- Interpretations and models for assumption-based argumentationSamy Sá, João Alcântara. 1139-1146 [doi]
- On scaling the enumeration of the preferred extensions of abstract argumentation frameworksGianvincenzo Alfano, Sergio Greco, Francesco Parisi. 1147-1153 [doi]
- Representing and comparing large sets of extensions of abstract argumentation frameworksOdinaldo Rodrigues. 1154-1161 [doi]
- Hybrid temporal situation calculusVitaliy Batusov, Giuseppe De Giacomo, Mikhail Soutchanski. 1162-1164 [doi]
- Automatic derivation of formulas by graph embedding and pattern matching networkMinCong Luo China. 1165-1167 [doi]
- Modelling the dynamics of forgetting and remembering by a system of belief changes: student research abstractKai Sauerwald. 1168-1171 [doi]
- A multi-objective indoor localization service for smartphonesAndreas Konstantinidis 0002, Aphrodite Demetriades, Savvas Pericleous. 1174-1181 [doi]
- A scalable and accurate feature representation method for identifying malicious mobile applicationsBo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi 0001, Daisuke Inoue. 1182-1189 [doi]
- Acousess: smartphone-based logger to assess acoustical conditions: subjective noise conditions on some circumference and intraindividual variationTakahiro Miura, Mari Ueda, Masaaki Hiroe, Ken-ichiro Yabu. 1190-1199 [doi]
- Machine learning for improving mobile user satisfactionIsmat Chaib Draa, Fabien Bouquillon, Smaïl Niar, Emmanuelle Grislin-Le Strugeon. 1200-1207 [doi]
- MoCA: a novel privacy-preserving contextual advertising platform on mobile devicesJung-Hyun Lee, Woo-Jong Ryu, Kang Min Kim, SangKeun Lee. 1208-1215 [doi]
- Extended sammon projection and wavelet kernel extreme learning machine for gait-based legitimate user identificationMuhammad Ahmad, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Amjad Ali, Ali Tufail. 1216-1219 [doi]
- Smart mobile crowdsensing for tinnitus research: student research abstractMuntazir Mehdi. 1220-1223 [doi]
- An extensible data-driven approach for evaluating the quality of microservice architecturesMario Cardarelli, Ludovico Iovino, Paolo Di Francesco, Amleto Di Salle, Ivano Malavolta, Patricia Lago. 1225-1234 [doi]
- Attack graph generation for microservice architectureAmjad Ibrahim, Stevica Bozhinoski, Alexander Pretschner. 1235-1242 [doi]
- Reactive microservices for the internet of things: a case study in fog computingCleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio Vinicius Serafim Prazeres. 1243-1251 [doi]
- Transparent tracing of microservice-based applicationsMatheus Santana, Adalberto R. Sampaio Jr., Marcos Andrade, Nelson S. Rosa. 1252-1259 [doi]
- A model-driven workflow for distributed microservice developmentFlorian Rademacher, Jonas Sorgalla, Sabine Sachweh, Albert Zündorf. 1260-1262 [doi]
- An adaptive framework for applying machine learning in smart spacesSachin Bhardwaj, Keon-Myung Lee, Jee-Hyong Lee. 1263-1270 [doi]
- Causality relationship among attributes applied in an educational data setWalisson Ferreira de Carvalho, Luis Enrique Zárate. 1271-1277 [doi]
- Evolving MIMO multi-layered artificial neural networks using grammatical evolutionQadeer Ahmad, Atif Rafiq, Muhammad Adil Raja, Noman Javed. 1278-1285 [doi]
- Exact gaussian process regression with distributed computationsDuc-Trung Nguyen, Maurizio Filippone, Pietro Michiardi. 1286-1295 [doi]
- GAN is a friend or foe?: a framework to detect various fake face imagesShahroz Tariq, Sangyup Lee, Hoyoung Kim, Youjin Shin, Simon S. Woo. 1296-1303 [doi]
- How do implementation bugs affect the results of machine learning algorithms?Maurizio Leotta, Dario Olianas, Filippo Ricca, Nicoletta Noceti. 1304-1313 [doi]
- Influence maximization for effective advertisement in social networks: problem, solution, and evaluationSuk-Jin Hong, Yun-Yong Ko, Moon Jeung Joe, Sang-Wook Kim. 1314-1321 [doi]
- Marlon: a domain-specific language for multi-agent reinforcement learning on networksTim Molderez, Bjarno Oeyen, Coen De Roover, Wolfgang De Meuter. 1322-1329 [doi]
- Population anomaly detection through deep gaussianizationDavid Tolpin. 1330-1336 [doi]
- Real-time botnet detection using nonnegative tucker decompositionHideaki Kanehara, Yuma Murakami, Jumpei Shimamura, Takeshi Takahashi 0001, Daisuke Inoue, Noboru Murata. 1337-1344 [doi]
- Convolutional neural network with structural input for visual object trackingMustansar Fiaz, Arif Mahmood, Soon Ki Jung. 1345-1352 [doi]
- An efficient deep learning platform for detecting objectsHansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong. 1353-1354 [doi]
- Machine learning based real-time vehicle data analysis for safe driving modelingPamul Yadav, Sangsu Jung, Dhananjay Singh. 1355-1358 [doi]
- Multiple perspectives HMM-based feature engineering for credit card fraud detectionYvan Lucas, Pierre-Edouard Portier, Léa Laporte, Sylvie Calabretto, Olivier Caelen, Liyun He-Guelton, Michael Granitzer. 1359-1361 [doi]
- Toward a continuous authentication system using a biologically inspired machine learning approach: a case studyObada Al Zoubi, Mariette Awad. 1362-1364 [doi]
- A hierarchical architectural model for network security exploring situational awarenessRicardo Borges Almeida, Victor Covalski, Roger da Silva Machado, Diórgenes Yuri Leal da Rosa, Adenauer Corrêa Yamin, Lucas Medeiros Donato, Ana Marilza Pernas. 1365-1372 [doi]
- On simplifying congestion window handling for CMT-SCTPMarcelo Ricardo Leitner, Mauro Sergio Pereira Fonseca, Anelise Munaretto. 1373-1377 [doi]
- On the analogy between quantum circuit design automation and virtual network embeddingAndreas Fischer, Alexandra Paler. 1378-1383 [doi]
- Reducing energy consumption in SDN-based data center networks through flow consolidation strategiesMarcelo Da Silva Conterato, Tiago Coelho Ferreto, Fabio D. Rossi, Wagner dos Santos Marques, Paulo Silas Severo de Souza. 1384-1391 [doi]
- Implementing content-based publish/subscribe with OpenFlowHelge Parzyjegla, Christian Wernecke, Gero Mühl, Eike Bjoern Schweissguth, Dirk Timmermann. 1392-1395 [doi]
- Extending LoRa networks: dynamic routing protocols and sub-GHz radio technology for very long range mesh networks: student research abstractRoger Pueyo Centelles. 1396-1397 [doi]
- Safe usage of registers in BSPlibArvid Jakobsson, Frédéric Dabrowski, Wadoud Bousdira. 1400-1407 [doi]
- A solution for a detailed mathematical model for the aircraft landing problem on a single and multiple runway systemMeriem Ben Messaoud, Khaled Ghédira. 1408-1414 [doi]
- Binary transformation of applications to run on bare PCsRasha Almajed, Ramesh K. Karne, Alexander L. Wijesinha. 1416-1423 [doi]
- Cache-aware block allocation for memory-technology storage targeted file systemsJaeheong Ahn, Choulseung Hyun, Donghee Lee, Sam H. Noh. 1424-1431 [doi]
- A robust and secure backup system for protecting malwareMyungjoon Shon, Heejin Kim, Kicheol Park, Juw Won Park, Kwanghee Won, Jiman Hong. 1432-1437 [doi]
- HPanal: a framework for analyzing tradeoffs of huge pagesGunhee Choi, Juhyung Son, Jongmoo Choi, Seong Je Cho, Youjip Won. 1438-1443 [doi]
- Multithreaded double queuing for balanced CPU-GPU memory copyingSanghun Cho, Jaewan Hong, Jungsik Choi, Hwansoo Han. 1444-1450 [doi]
- My cloudy time machine: a scalable microservice-based platform for data processing in cloud-edge systems: a proof of concept for the ROBIN-cloud projectDarius-Florentin Neatu, Radu-Dumitru Stochitoiu, Andrei Vlad Postoaca, Ion-Dorinel Filip, Florin Pop. 1451-1458 [doi]
- A rendezvous node selection protocol for drone-based data collectionHong Min, Kwangsoo Jo, Jinman Jung, Bongjae Kim, Junyoung Heo. 1459-1461 [doi]
- Predicting 24-hours ahead photovoltaic power output using forecast informationJaehyun Kim, Taehyoung Kim, Jieun Lee, Kyung Sun Ham. 1462-1464 [doi]
- Dynamic attribute-based privacy-preserving genomic susceptibility testingMina Namazi, Cihan Eryonucu, Erman Ayday, Fernando Pérez-González. 1467-1474 [doi]
- Engineering privacy by design: lessons from the design and implementation of an identity wallet platformFatbardh Veseli, Jetzabel Serna-Olvera, Tobias Pulls, Kai Rannenberg. 1475-1483 [doi]
- Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysisFabio Aiolli, Mauro Conti, Ankit Gangwal, Mirko Polato. 1484-1491 [doi]
- Privacy-enhanced system design modeling based on privacy featuresAmir Shayan Ahmadian, Daniel Strüber 0001, Jan Jürjens. 1492-1499 [doi]
- Recommender-based privacy requirements elicitation - EPICUREAN: an approach to simplify privacy settings in IoT applications with respect to the GDPRChristoph Stach, Frank Steimle. 1500-1507 [doi]
- AILocker: authenticated image locker for videoJihye Kim, Hankyung Ko, Hyunok Oh. 1508-1511 [doi]
- A comparison of system description models for data protection by designPierre Dewitte, Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Ivo Emanuilov, Peggy Valcke, Wouter Joosen. 1512-1515 [doi]
- An attribute language definition for adaptable parsing expression grammarsElton M. Cardoso, Rodrigo G. Ribeiro, Leonardo Vieira dos Santos Reis, Mariza A. S. Bigonha, Roberto S. Bigonha, Vladimir Oliveira Di Iorio. 1518-1525 [doi]
- CPEG: a typed tree construction from parsing expression grammars with regex-like capturesDaisuke Yamaguchi, Kimio Kuramitsu. 1526-1533 [doi]
- Musket: a domain-specific language for high-level parallel programming with algorithmic skeletonsChristoph Rieger, Fabian Wrede, Herbert Kuchen. 1534-1543 [doi]
- PureMEM: a structured programming model for transiently powered computersCaglar Durmaz, Kasim Sinan Yildirim, Geylani Kardas. 1544-1551 [doi]
- Retrieval of individual solutions from encapsulated search with a potentially infinite search spaceJan C. Dageförde, Herbert Kuchen. 1552-1561 [doi]
- π: towards a simple formal semantic framework for compiler constructionChristiano Braga. 1562-1569 [doi]
- Applying a data-centric framework for developing model transformationsLuiz Carlos Camargo, Marcos Didonet Del Fabro. 1570-1573 [doi]
- Fyr: a memory-safe and thread-safe systems programming languageTorben Weis, Marian Waltereit, Maximilian Uphoff. 1574-1577 [doi]
- Parallel programming with Coq: map and reduce skeletons on treesJolan Philippe, Frédéric Loulergue. 1578-1581 [doi]
- ARRoW: automatic runtime reappraisal of weights for self-adaptationLuis Hernán García Paucar, Nelly Bencomo, Kevin Kam Fung Yuen. 1584-1591 [doi]
- Contemporary requirements challenges and issues: an empirical study in 11 organizationsFeng Chen, Norah Power, J. J. Collins, Fuyuki Ishikawa. 1592-1599 [doi]
- Goal modeling for collaborative groups of cyber-physical systems with GRL: reflections on applicability and limitations based on two studies conducted in industryMarian Daun, Viktoria Stenkova, Lisa Krajinski, Jennifer Brings, Torsten Bandyszak, Thorsten Weyer. 1600-1609 [doi]
- Logic-based methodology to help security architects in eliciting high-level network security requirementsRomain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri. 1610-1619 [doi]
- Requirements for preventing logic flaws in the authentication procedure of web applicationsYoussou Ndiaye, Olivier Barais, Arnaud Blouin, Ahmed Bouabdallah, Nicolas Aillery. 1620-1628 [doi]
- Elicitation of technical requirements in large research projects: the CERBERO approachM. Masin, Francesca Palumbo, J. Adriaanse, H. Myrhaug, Francesco Regazzoni, M. Sanchez, K. Zedda. 1629-1632 [doi]
- SRCMIMM: managing requirements change activities in global software development: student research abstractMuhammad Azeem Akbar. 1633-1636 [doi]
- Community-aware diversification of recommendationsMesut Kaya, Derek Bridge. 1639-1646 [doi]
- Global versus individual accuracy in contextual multi-armed banditNicolas Gutowski, Tassadit Amghar, Olivier Camp, Fabien Chhel. 1647-1654 [doi]
- Matrix factorization based heuristics for constraint-based recommendersSeda Polat Erdeniz, Alexander Felfernig, Ralph Samer, Muesluem Atas. 1655-1662 [doi]
- Top-N group recommendations with fairnessDimitris Sacharidis. 1663-1670 [doi]
- Towards explaining recommendations through local surrogate modelsCaio Nóbrega, Leandro Balby Marinho. 1671-1678 [doi]
- CoRE: a cold-start resistant and extensible recommender systemMostafa Bayomi, Annalina Caputo, Matthew Nicholson, Anirban Chakraborty, Séamus Lawless. 1679-1682 [doi]
- Preselection of documents for personalized recommendations of job postings based on word embeddingsSteffen Schnitzer, Dominik Reis, Wael Alkhatib, Christoph Rensing, Ralf Steinmetz. 1683-1686 [doi]
- The influence of trust cues on the trustworthiness of online reviews for recommendationsCatalin Mihai Barbu, Guillermo Carbonell, Jürgen Ziegler 0001. 1687-1689 [doi]
- A RESTful architecture for data exploration as a serviceYun Zhang, Xiwei Xu, Suhrid Satyal, Shiping Chen, Liming Zhu. 1692-1700 [doi]
- Aiding the realization of service-oriented distributed systemsMarco Autili, Amleto Di Salle, Francesco Gallo, Claudio Pompilio, Massimo Tivoli. 1701-1710 [doi]
- An exploratory study of MVC-based architectural patterns in Android appsAymen Daoudi, Ghizlane El-Boussaidi, Naouel Moha, Segla Kpodjedo. 1711-1720 [doi]
- JCaliper: search-based technical debt managementPanagiotis Kouros, Theodore Chaikalis, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Theodoros Amanatidis. 1721-1730 [doi]
- The effect of gamification on software architecture knowledge management: a student experiment and focus group studyBenjamin Mayer, Rainer Weinreich. 1731-1740 [doi]
- A model-driven approach for behavior-driven GUI testingHendrik Bünder, Herbert Kuchen. 1742-1751 [doi]
- A novel approach to automatic query reformulation for IR-based bug localizationMisoo Kim, Eunseok Lee. 1752-1759 [doi]
- On the classification of software change messages using multi-label active learningSirine Gharbi, Mohamed Wiem Mkaouer, Ilyes Jenhani, Montassar Ben Messaoud. 1760-1767 [doi]
- JUniVerse: large-scale JUnit-test analysis in the wildOmar Javed, Alex Villazón, Walter Binder. 1768-1775 [doi]
- Live and global consistency checking in a collaborative engineering environmentMichael Alexander Tröls, Atif Mashkoor, Alexander Egyed. 1776-1785 [doi]
- MarValous: machine learning based detection of emotions in the valence-arousal space in software engineering textMd Rakibul Islam, Md Kauser Ahmmed, Minhaz F. Zibran. 1786-1793 [doi]
- NodeMOP: runtime verification for Node.js applicationsFilippo Schiavio, Haiyang Sun, Daniele Bonetta, Andrea Rosà, Walter Binder. 1794-1801 [doi]
- Parallel property checking with staged symbolic executionJunye Wen, Guowei Yang. 1802-1809 [doi]
- Revisiting continuous deployment maturity: a two-year perspectiveSimo Mäkinen, Timo Lehtonen, Terhi Kilamo, Mikko Puonti, Tommi Mikkonen, Tomi Männistö. 1810-1817 [doi]
- Runtime observable and adaptable UML state machines: [email protected] approachMiren Illarramendi Rezabal, Leire Etxeberria, Xabier Elkorobarrutia, Goiuria Sagardui. 1818-1827 [doi]
- A case study of systematic top-down design of cyber-physical models with integrated validation and formal verificationChristoph Luckeneder, Hermann Kaindl. 1828-1836 [doi]
- Toward a declarative language to generate explorable sets of modelsThéo Le Calvar, Fabien Chhel, Frédéric Jouault, Frédéric Saubion. 1837-1844 [doi]
- Usability evaluation of VR products in industry: a systematic literature reviewSai Anirudh Karre, Neeraj Mathur, Y. Raghu Reddy. 1845-1851 [doi]
- Using design sprint as a facilitator in active learning for students in the requirements engineering course: an experience reportVinícius Gomes Ferreira, Edna Dias Canedo. 1852-1859 [doi]
- Classifying software issue reports through association miningMohd Syafiq Zolkeply, Jianhua Shao. 1860-1863 [doi]
- Mining constraints for monitoring systems of systemsThomas Krismayer, Rick Rabiser, Paul Grünbacher. 1864-1866 [doi]
- Privacy preserving 2-party queries on bipartite graphs with private set intersectionSara Ramezanian, Tommi Meskanen, Valtteri Niemi. 1867-1870 [doi]
- Synthesising call sequences from OCL operational contractsHao Wu. 1871-1873 [doi]
- TestLocal: just-in-time parametrized testing of local variablesMarcel Heimlich, Akbar Siami Namin. 1874-1877 [doi]
- Towards a requirements language for modeling emotion in videogamesGonçalo Miguéis, João Araujo, Ana Moreira 0001. 1878-1880 [doi]
- VeriCCM: improving the syntax and semantics of requirements modelsDanielle Gaither, Kaushik Madala, Hyunsook Do, Barrett R. Bryant. 1881-1884 [doi]
- Empirical study on developer's perception regarding reward practices: student research abstractHina Gul Afridi. 1885-1887 [doi]
- A coarse-grained password model with memorable unit-based recurrent neural networksRui Xu, Xiaojun Chen, Jinqiao Shi. 1890-1897 [doi]
- A real-time remote IDS testbed for connected vehiclesValentin Zieglmeier, Severin Kacianka, Thomas Hutzelmann, Alexander Pretschner. 1898-1905 [doi]
- CoauthenticationJay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry B. Goldgof. 1906-1915 [doi]
- Detection of algorithmically generated domain names used by botnets: a dual arms raceJan Spooren, Davy Preuveneers, Lieven Desmet, Peter Janssen, Wouter Joosen. 1916-1923 [doi]
- Enabling change-driven workflows in continuous information security managementMichael Brunner, Andrea Mussmann, Ruth Breu. 1924-1933 [doi]
- Secure multi-execution in AndroidDhiman Chakraborty, Christian Hammer 0001, Sven Bugiel. 1934-1943 [doi]
- Spectre without shared memoryBen Amos, Niv Gilboa, Arbel Levy. 1944-1951 [doi]
- Static security evaluation of an industrial web applicationGebrehiwet B. Welearegai, Max Schlueter, Christian Hammer 0001. 1952-1961 [doi]
- The ROP needle: hiding trigger-based injection vectors via code reusePietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu. 1962-1970 [doi]
- Towards automated network mitigation analysisPatrick Speicher, Marcel Steinmetz, Jörg Hoffmann 0001, Michael Backes 0001, Robert Künnemann. 1971-1978 [doi]
- "Hard to understand, easy to ignore: " an automated approach to predict mobile app permission requests: student research abstractMajid Hatamian. 1979-1982 [doi]
- Digital forensics in the internet of things: student research abstractMonina Schwarz. 1983-1985 [doi]
- Evaluation of ACE properties of traditional SQL and NoSQL big data systemsMaría Teresa González-Aparicio, Muhammad Younas 0001, Javier Tuya, Rubén Casado. 1988-1995 [doi]
- Fog computing as the key for seamless connectivity handover in future vehicular networksMaria Rita Palattella, Ridha Soua, Abdelmajid Khelil, Thomas Engel 0001. 1996-2000 [doi]
- Resource-sharing optimization for multicast D2D communications underlaying LTE-A uplink cellular networksDevarani Devi Ningombam, Seokjoo Shin. 2001-2007 [doi]
- Towards a seamless coordination of cloud and fog: illustration through the internet-of-thingsZakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Mohammed Al-Khafajiy, Vanilson Arruda Burégio. 2008-2015 [doi]
- Word2Vec based spelling correction method of Twitter messageJeongin Kim, Taekeun Hong, PanKoo Kim. 2016-2019 [doi]
- Constructing product-line safety cases from contract-based specificationsDamir Nesic, Mattias Nyberg, Barbara Gallina. 2022-2031 [doi]
- Towards a fractionation-based verification: application on SysML activity diagramsSamir Ouchani. 2032-2039 [doi]
- The preliminary results of a mapping study of deployment and orchestration for IoTPhu H. Nguyen, Nicolas Ferry 0001, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg. 2040-2043 [doi]
- Data-driven environment modeling for adaptive system-of-systemsYong-Jun Shin, Young Min Baek, Eunkyoung Jee, Doo-Hwan Bae. 2044-2047 [doi]
- A computationally efficient multi-modal classification approach of disaster-related Twitter imagesYara Rizk, Hadi Samer Jomaa, Mariette Awad, Carlos Castillo. 2050-2059 [doi]
- Brand community analysis on social networks using graph representation learningMarco Brambilla 0001, Mattia Gasparini. 2060-2069 [doi]
- Collaboration profiles and their impact on musical successMariana O. Silva, Laís Mota de Alencar Rocha, Mirella M. Moro. 2070-2077 [doi]
- Community evolution prediction in dynamic social networks using community features' change ratesNarimene Dakiche, Fatima Benbouzid-Si Tayeb, Yahya Slimani, Karima Benatchba. 2078-2085 [doi]
- Event detection for exploring emotional upheavals of depressive peoplePinHua Wu, Jia-Ling Koh, Arbee L. P. Chen. 2086-2095 [doi]
- Identification of credulous users on TwitterAlessandro Balestrucci, Rocco De Nicola, Omar Inverso, Catia Trubiani. 2096-2103 [doi]
- KidsGUARD: fine grained approach for child unsafe video representation and detectionShubham Singh, Rishabh Kaushal, Arun Balaji Buduru, Ponnurangam Kumaraguru. 2104-2111 [doi]
- Multidimensional analysis of hot events from social media sourcesAbir Troudi, Salma Jamoussi, Corinne Amel Zayani, Ikram Amous. 2112-2119 [doi]
- A tool for spatio-temporal analysis of social anxiety with Twitter dataJoohong Lee, Dongyoung Sohn, Yong Suk Choi. 2120-2123 [doi]
- Evaluating neural word embeddings created from online course reviews for sentiment analysisDanilo Dessì, Mauro Dragoni, Gianni Fenu, Mirko Marras, Diego Reforgiato Recupero. 2124-2127 [doi]
- Knapsack-based reverse influence maximization for target marketing in social networksAshis Talukder, Choong Seon Hong. 2128-2130 [doi]
- Predicting event attendance exploring social influenceFatemeh Salehi Rizi, Michael Granitzer. 2131-2134 [doi]
- Semantic analysis for paraphrase identification using semantic role labelingEunji Lee, Htet Myet Lynn, Hyoungju Kim, SoonJa Yeom, PanKoo Kim. 2135-2138 [doi]
- Analysis of application installation logs on Android systemsJinwoo Lee, Yena Lee, Ming Jin, John Kim, Jiman Hong. 2140-2145 [doi]
- Design and implementation of emulab-based malware analysis service through EmuLiBGibeom Song, Manhee Lee. 2146-2151 [doi]
- Energy efficient IO stack design for wearable deviceJunghoon Kim, Sundoo Kim, Juseong Yun, Youjip Won. 2152-2159 [doi]
- A design and implementation wind farm real-time simulator with various types of wind turbine considering wake effectTaehyoung Kim, Jaehyun Kim, Jieun Lee, Kyung Sun Ham. 2160-2163 [doi]
- A novel approach for collecting and sharing software metrics dataIlya Khomyakov, Alberto Sillitti. 2164-2167 [doi]
- Bounded invariance checking of simulink modelsPredrag Filipovikj, Guillermo Rodríguez-Navas, Cristina Seceleanu. 2168-2177 [doi]
- Dynamic symbolic execution for the analysis of web server applications in JavaDaniel Balasubramanian, Zhenkai Zhang, Dan McDermet, Gabor Karsai. 2178-2185 [doi]
- Logic against ghosts: comparison of two proof approaches for a list moduleAllan Blanchard, Nikolai Kosmatov, Frédéric Loulergue. 2186-2195 [doi]
- Matching implementations to specifications: the corner cases of iocoRamon Janssen, Jan Tretmans. 2196-2205 [doi]
- Specification of temporal properties of functions for runtime verificationJoshua Heneage Dawes, Giles Reger. 2206-2214 [doi]
- Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interferenceIsabella Mastroeni, Michele Pasqua. 2215-2223 [doi]
- Study of trivial compiler equivalence on C++ object-oriented mutation operatorsPedro Delgado-Pérez, Sergio Segura. 2224-2230 [doi]
- Verification-based test case generation for information-flow propertiesMihai Herda, Shmuel S. Tyszberowicz, Joachim Müssig, Bernhard Beckert. 2231-2238 [doi]
- A tool for exploring networks of computer scientists as a graphMirko Cesarini, Fabio Mercorio, Mario Mezzanzanica, Vincenzo Moscato, Antonio Picariello. 2240-2242 [doi]
- Embedding cardinality constraints in neural link predictorsEmir Muñoz, Pasquale Minervini, Matthias Nickles. 2243-2250 [doi]
- Exploiting context and quality for linked data source selectionBarbara Catania, Giovanna Guerrini, Beyza Yaman. 2251-2258 [doi]
- GeoSensor: semantifying change and event detection over big dataNikiforos Pittaras, George Papadakis 0001, George Stamoulis, Giorgos Argyriou, Efi Karra Taniskidou, Emmanouil Thanos, George Giannakopoulos, Leonidas Tsekouras, Manolis Koubarakis. 2259-2266 [doi]
- How many and what types of SPARQL queries can be answered through zero-knowledge link traversal?Pavlos Fafalios, Yannis Tzitzikas. 2267-2274 [doi]
- Improving the performance of querying multidimensional RDF data using aggregatesFranck Ravat, Jiefu Song, Olivier Teste, Cássia Trojahn. 2275-2284 [doi]
- Partitioning and local matching learning of large biomedical ontologiesAmir Laadhar, Faïza Ghozzi, Imen Megdiche, Franck Ravat, Olivier Teste, Faïez Gargouri. 2285-2292 [doi]
- Semi-automatic ontology-driven development documentation: generating documents from RDF data and DITA templatesYevgen Pikus, Norbert Weißenberg, Bernhard Holtkamp, Boris Otto. 2293-2302 [doi]
- Using contemporary constraints to ensure data consistencyDavid Abián, Jorge Bernad, Raquel Trillo Lado. 2303-2310 [doi]
- The scientific events ontology of the OpenResearch.org curation platformSaid Fathalla, Sahar Vahdati, Sören Auer, Christoph Lange 0002. 2311-2313 [doi]
- User's profile ontology-based semantic model for personalized hotel room recommendation in the web of things: student research abstractRonald Ojino. 2314-2316 [doi]
- Cognitive workload of in-car auditory-vocal interfaces on visuospatial sketchpad based on a dual task of visual pattern testTakahiro Miura, Ken-ichiro Yabu, Youji Shimizu, Kenichi Tanaka, Masamitsu Furukawa, Seiko Michiyoshi, Tetsuya Yamamoto, Kazutaka Ueda, Tohru Ifukube. 2319-2327 [doi]
- Usability problems discovery based on the automatic detection of usability smellsRafael Fontinele Ribeiro, Matheus de Meneses Campanhã Souza, Pedro Almir Martins de Oliveira, Pedro de Alcântara dos Santos Neto. 2328-2335 [doi]
- Developing a mental model for use in the context of computer securityIsaiah Liljestrand, Marcelo Gonzales, Dongwan Shin. 2336-2339 [doi]
- User experience evaluation focused on viewpoints and embodimentCristina Scheibler, Maria Andréia Formico Rodrigues. 2340-2343 [doi]
- A generic traceability metamodel for enabling unified end-to-end traceability in software product linesPhilipp Heisig, Jan-Philipp Steghöfer, Christopher Brink, Sabine Sachweh. 2344-2353 [doi]
- Evaluating variability at the software architecture level: an overviewAna Paula Allian, Bruno Sena, Elisa Yumi Nakagawa. 2354-2361 [doi]
- Test case selection using structural coverage in software product lines for time-budget constrained scenariosUrtzi Markiegi, Aitor Arrieta, Leire Etxeberria, Goiuria Sagardui. 2362-2371 [doi]
- Towards variant management and change impact analysis in safety-oriented process-product linesMuhammad Atif Javed, Barbara Gallina, Anna Carlsson. 2372-2375 [doi]
- A matching based coexistence mechanism between eMBB and uRLLC in 5G wireless networksAnupam Kumar Bairagi, Md. Shirajum Munir, Madyan Alsenwi, Nguyen H. Tran, Choong Seon Hong. 2377-2384 [doi]
- A new CoAP congestion control scheme using message loss feedback for IoUTMinseok Kim, Sungwon Lee, Muhammad Toaha Raza Khan, Junho Seo, Yeongjoon Bae, Yonghwan Jeong, Dongkyun Kim. 2385-2390 [doi]
- An adaptive energy efficient scheme for energy constrained wireless sensor networksBilal Jan, Haleem Farman, Murad Khan, Syed Hassan Ahmad. 2391-2398 [doi]
- Energy-aware medium access control for energy-harvesting machine-to-machine networksDohyung Kim, Young-Bae Ko. 2399-2405 [doi]
- On the feasibility of using IEEE 802.11ad mmWave for accurate object detectionHossein Ajorloo, Cormac J. Sreenan, Adrian Loch, Joerg Widmer. 2406-2413 [doi]
- Reliability of ADS-B communications: novel insights based on an experimental assessmentSavio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro. 2414-2421 [doi]
- SoftH: soft handover multicriteria mechanismGuilherme R. M. de Oliveira, Carlos Renato Storck, Fatima de L. P. Duarte-Figueiredo. 2422-2429 [doi]
- A new fuzzy/evidential approach to address the area coverage problem in mobile wireless sensor networksAdda Boualem, Youcef Dahmani, Marwane Ayaida, Cyril De Runz. 2430-2433 [doi]
- A web-based e-assessment tool for design patterns in UML class diagramsTobias Reischmann, Herbert Kuchen. 2435-2444 [doi]
- Anchoring interactive points of interest on web-based instructional video: effects on students' interaction behavior and perceived experienceMaria da Graça Campos Pimentel, Cristiane A. Yaguinuma, Diogo Santana Martins, Isabela Zaine. 2445-2452 [doi]
- Integrating context-awareness and multi-criteria decision making in educational learningYong Zheng, Shephalika Shekhar, Alisha Anna Jose, Sunil Kumar Rai. 2453-2460 [doi]
- Meet cyrus: the query by voice mobile assistant for the tutoring and formative assessment of SQL learnersJosue Espinosa Godinez, Hasan M. Jamil. 2461-2468 [doi]
- Resources for healthcare workflow modeling and analysisHossain Shahriar, Chi Zhang, Md Arabin Islam Talukder, Sheikh Iqbal Ahamed. 2469-2472 [doi]
- More than the sum of its parts: designing learning formats from core componentsNiels Heller, Sebastian Mader, François Bry. 2473-2476 [doi]
- A literature review of studies on interactive 3D information visualization for the webLuiz Soares dos Santos Baglie, Diego Roberto Colombo Dias, Marcelo de Paiva Guimarães, José Remo Ferreira Brega. 2479-2488 [doi]
- ALDONA: a hybrid solution for sentence-level aspect-based sentiment analysis using a lexicalised domain ontology and a neural attention modelDonatas Meskele, Flavius Frasincar. 2489-2496 [doi]
- Mind the cache: large-scale explorative study of web cachingHoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath. 2497-2506 [doi]
- Standards-driven metamodel to increase retrievability of heterogeneous servicesMartin Garriga, Andres Flores. 2507-2514 [doi]
- AwaitViz: a visualizer of JavaScript's async/await execution orderEna Tominaga, Yoshitaka Arahori, Katsuhiko Gondow. 2515-2524 [doi]
- Context-aware recommendations via sequential predictionsYong Zheng, Alisha Anna Jose. 2525-2528 [doi]
- Utility-based multi-criteria recommender systemsYong Zheng. 2529-2531 [doi]
- MapperPatrick Vanvorce, Hasan M. Jamil. 2532-2534 [doi]