Abstract is missing.
- Formal analysis of the biological circuits using higher-order-logic theorem provingSa'ed Abed, Adnan Rashid, Osman Hasan. 3-7 [doi]
- De novo drug design using self attention mechanismVedang Mandhana, Rutuja Taware. 8-12 [doi]
- Survey of public assay data: opportunities and challenges to understanding antimicrobial resistanceAkshay Agarwal 0002, Gowri Nayar, James H. Kaufman. 13-16 [doi]
- Classification of 3D interpolated EEG signals using hybrid R-3DCNNVedang Mandhana, Rutuja Taware. 17-19 [doi]
- Multimodal deep learning based approach for cells state classification: student research abstractPaula Raissa Silva. 20-23 [doi]
- Process discovery using in-database minimum self distance abstractionsAlifah Syamsiyah, Sander J. J. Leemans. 26-35 [doi]
- Event-log abstraction using batch session identification and clusteringMassimiliano de Leoni, Safa Dündar. 36-44 [doi]
- Resource-centric process mining: clustering using local process modelsLandelin Delcoucq, Fabian Lecron, Philippe Fortemps, Wil M. P. van der Aalst. 45-52 [doi]
- Comparing BPMN to BPMN + DMN for IoT process modelling: a case-based inquiryFaruk Hasic, Estefanía Serral, Monique Snoeck. 53-60 [doi]
- Enhancing business processes with trustworthiness using blockchain: a goal-oriented approachHaan Johng, Doohwan Kim, Grace Park, Jang-Eui Hong, Tom Hill, Lawrence Chung. 61-68 [doi]
- Improving mobile business process monitoring with enhanced NFV MANO: a method to elicit connectivity requirements from process modelsGiovanni Meroni, Marouan Mizmizi, Pierluigi Plebani, Luca Reggiani. 69-76 [doi]
- Logging statements' prediction based on source code clonesSina Gholamian, Paul A. S. Ward. 82-91 [doi]
- Identification of data propagation paths for efficient dynamic information flow trackingSanoop Mallissery, Yu-Sung Wu, Chih-Hao Hsieh, Chun-An Bau. 92-99 [doi]
- Comparing identifiers and comments in engineered and non-engineered code: a large-scale empirical studyOtávio Augusto Lazzarini Lemos, Marcelo Suzuki, Adriano Carvalho de Paula, Claire Le Goes. 100-109 [doi]
- Is there a correlation between code comments and issues?: an exploratory studyVishal Misra, Jakku Sai Krupa Reddy, Sridhar Chimalakonda. 110-117 [doi]
- Towards summarizing program statements in source code searchVictor J. Marin, Iti Bansal, Carlos R. Rivero. 118-120 [doi]
- Comparing maintainability index, SIG Method, and SQALE for technical debt identificationPeter Strecanský, Stanislav Chren, Bruno Rossi 0001. 121-124 [doi]
- Evaluating techniques for method-exact energy measurements: towards a framework for platform-independent code-level energy measurementsFelix Rieger, Christoph Bockisch. 125-128 [doi]
- Semantic code clone detection for enterprise applicationsJan Svacina, Jonathan Simmons, Tomás Cerný. 129-131 [doi]
- Using application knowledge to reduce cold starts in FaaS servicesDavid Bermbach, Ahmet-Serdar Karakaya, Simon Buchholz. 134-143 [doi]
- King louie: reproducible availability benchmarking of cloud-hosted DBMSDaniel Seybold, Stefan Wesner, Jörg Domaschka. 144-153 [doi]
- On making xen detect hypercalls and memory accesses for simulating virtualization-enabled processorsSwapneel C. Mhatre, Priya Chandran. 154-161 [doi]
- Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applicationsEddy Truyen, André Jacobs, Stef Verreydt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen. 162-169 [doi]
- Multi-objective load balancing in distributed computing environment: an evolutionary computing approachAvadh Kishor, Rajdeep Niyogi. 170-175 [doi]
- Towards a formal model for composable container systemsFabio Burco, Marino Miculan, Marco Peressotti. 173-175 [doi]
- Cloud computing is a cost saver only if...: towards a model for cloud cost estimation: student research abstractRasha Makhlouf. 176-179 [doi]
- EvoU-Net: an evolutionary deep fully convolutional neural network for medical image segmentationTahereh Hassanzadeh, Daryl Essam, Ruhul A. Sarker. 181-189 [doi]
- M2P3: multimodal multi-pedestrian path prediction by self-driving cars with egocentric visionAtanas Poibrenski, Matthias Klusch, Igor Vozniak, Christian Müller. 190-197 [doi]
- FINE: improving time and precision of segmentation techniques for vertebral compression fractures in MRIJonathan S. Ramos, Mirela T. Cazzolato, Marcello H. Nogueira-Barbosa, Agma J. M. Traina. 198-201 [doi]
- Reinforcing the energy efficiency of cyber-physical systems via direct and split cache consolidation on MLC STT-RAMShuo-Han Chen, Yu-Pei Liang, Yuan-Hao Chang, Yun-fei Liu, Chun-Feng Wu, Hsin-Wen Wei, Wei Kuan Shih. 202-209 [doi]
- An analytics-based method for performance anomaly classification in cyber-physical systemsHugo Meyer, Uraz Odyurt, Andy D. Pimentel, Evangelos Paradas, Ignacio Gonzalez Alonso. 210-217 [doi]
- Inter-task cache interference aware partitioned real-time schedulingZhishan Guo, Kecheng Yang 0001, Fan Yao, Amro Awad. 218-226 [doi]
- ReLUSyn: Synthesizing stealthy attacks for deep neural network-based safety-critical cyber-physical systems: student research abstractAarti Kashyap. 227-229 [doi]
- Benchmarking microservice performance: a pattern-based approachMartin Grambow, Lukas Meusel, Erik Wittern, David Bermbach. 232-241 [doi]
- QoE-aware auto-scaling of heterogeneous containerized services (and its application to health services)Guilherme Santos, Hervé Paulino, Tomé R. Vardasca. 242-249 [doi]
- Privacy preserving cooperative computation for personalized web search applicationsNesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. 250-258 [doi]
- Black-box inter-application traffic monitoring for adaptive container placementFrancisco Neves, Ricardo Vilaça, José Pereira 0001. 259-266 [doi]
- Towards a replication service for data-intensive fog applicationsJonathan Hasenburg, Martin Grambow, David Bermbach. 267-270 [doi]
- ALISI: a lightweight identification system based on IrohaGiuseppe Bernieri, Mauro Conti, Matteo Sovilla, Federico Turrin. 271-273 [doi]
- Spatial bloom filter in named data networking: a memory efficient solutionFilippo Berto, Luca Calderoni, Mauro Conti, Eleonora Losiouk. 274-277 [doi]
- Blockchain real estate relational value surveyJean-Marc Seigneur, Sophie Pusterla, Xavier Socquet-Clerc. 279-285 [doi]
- Design and implementation of cast-as-intended verifiability for a blockchain-based voting systemChristian Killer, Bruno Rodrigues, Raphael Matile, Eder J. Scheid, Burkhard Stiller. 286-293 [doi]
- Volatility effect on the adoption and valuation of tokenomicsJollen Chen, Dung-Cheng Lin, Chuan-Hsiang Han. 294-300 [doi]
- KYChain: user-controlled KYC data sharing and certificationConstantin Catalin Dragan, Mark Manulis. 301-307 [doi]
- Toward scalable blockchains with transaction aggregationSina Rafati Niya, Fabio Maddaloni, Thomas Bocek, Burkhard Stiller. 308-315 [doi]
- PrivateEx: privacy preserving exchange of crypto-assets on blockchainLei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi. 316-323 [doi]
- Authenticated and auditable data sharing via smart contractVincent Reniers, Yuan Gao, Ren Zhang 0003, Paolo Viviani 0001, Akash Madhusudan, Bert Lagaisse, Svetla Nikova, Dimitri Van Landuyt, Riccardo Lombardi, Bart Preneel, Wouter Joosen. 324-331 [doi]
- TRIDEnT: towards a decentralized threat indicator marketplaceNikolaos Alexopoulos, Emmanouil Vasilomanolakis, Stéphane Le Roux 0001, Steven Rowe, Max Mühlhäuser. 332-341 [doi]
- Self-sovereign identity on public blockchains and the GDPRGalia Kondova, Jörn Erbguth. 342-345 [doi]
- Truver: a blockchain for verifying credentials: posterAhmed Taha, Ahmed Zakaria. 346-348 [doi]
- An n/2 byzantine node tolerate blockchain sharding approachYibin Xu, Yangyu Huang. 349-352 [doi]
- Etherolic: a practical security analyzer for smart contractsMohammadreza Ashouri. 353-356 [doi]
- A blockchain-based protocol for message exchange in a ICS network: student research abstractRicardo Brandão. 357-360 [doi]
- ARTAS: automatic research trend analysis system for information securitySeungsoo Park, Manhee Lee. 361-368 [doi]
- A format-preserving encryption FF1, FF3-1 using lightweight block ciphers LEA and, SPECKWonyoung Jang, Sun-Young Lee. 369-375 [doi]
- ACIDroid: a practical app cache integrity protection system on Android RuntimeJusop Choi, Soolin Kim, Junsung Cho, Kuyju Kim, Seok Hong, Hyoungshick Kim. 376-383 [doi]
- An analysis of mapping strategies for storing RDF data into NoSQL databasesLuiz Henrique Zambom Santana, Ronaldo dos Santos Mello. 386-392 [doi]
- DEMETER: hardware-assisted database checkpointingHyeonseok Oh, Hyeongwon Jang, Jae Eun Kim, Jong Bin Kim, Hyuck Han, Sooyong Kang, Hyungsoo Jung. 394-403 [doi]
- Enhancing recursive graph querying on RDBMS with data clustering approachesLucas C. Scabora, Gabriel Spadon, Paulo H. Oliveira, José F. Rodrigues Jr., Caetano Traina Jr.. 404-411 [doi]
- Schema-agnostic blocking for streaming dataTiago Brasileiro Araújo, Kostas Stefanidis, Carlos Eduardo Santos Pires, Jyrki Nummenmaa, Thiago Pereira da Nóbrega. 412-419 [doi]
- Memory efficient fork-based checkpointing mechanism for in-memory database systemsJiwoong Park, Yun-Jae Lee, Heon Young Yeom, Yongseok Son. 420-427 [doi]
- Link prediction via community detection in bipartite multi-layer graphsMaksim Koptelov, Albrecht Zimmermann, Bruno Crémilleux, Lina Soualmia. 430-439 [doi]
- Affirmative action policies for top-k candidates selection: with an application to the design of policies for university admissionsMichael Mathioudakis, Carlos Castillo 0001, Giorgio Barnabò, Sergio Celis. 440-449 [doi]
- Understanding emotions in SNS images from posters' perspectivesJunho Song, Kyungsik Han, Dongwon Lee 0001, Sang-Wook Kim. 450-457 [doi]
- Predicting disease genes for complex diseases using random watcher-walkerLorenzo Madeddu, Giovanni Stilo, Paola Velardi. 458-465 [doi]
- Applying binary decision diagram to extract concepts from triadic formal contextJulio C. V. Neves, Kaio H. A. Ananias, Cristiane Nobre, Luis E. Zárate, Mark A. J. Song. 466-469 [doi]
- Constraining deep representations with a noise module for fair classificationMattia Cerrato, Roberto Esposito, Laura Li Puma. 470-472 [doi]
- Characterization of long-lived and non-long lived profiles through biclusteringMarta D. M. Noronha, Marcos W. Rodrigues, Caio Eduardo Ribeiro, Cristiane Neri Nobre, Mark A. J. Song, Luis E. Zárate. 473-476 [doi]
- Coping for missing content and missing links in document network embedding: student research abstractJean Dupuy. 477-480 [doi]
- Fraud detection using heavy hitters: a case studyBruno Veloso, Carlos Martins, Raphael Espanha, Raul Azevedo, João Gama. 482-489 [doi]
- SOHUPDS: a single-pass one-phase algorithm for mining high utility patterns over a data streamBijay Prasad Jaysawal, Jen-Wei Huang. 490-497 [doi]
- Cost-sensitive learning for imbalanced data streamsLucas Loezer, Fabrício Enembreck, Jean Paul Barddal, Alceu de Souza Britto Jr.. 498-504 [doi]
- Scale invariant learning from trapezoidal data streamsJeevithan Alagurajah, Xu Yuan, Xindong Wu 0001. 505-508 [doi]
- A stream reasoning framework based on a multi-agents modelWafaa Mebrek, Amel Bouzeghoub. 509-512 [doi]
- Proof searching in HOL4 with genetic algorithmM. Zohaib Nawaz, Osman Hasan, M. Saqib Nawaz, Philippe Fournier-Viger, Meng Sun 0002. 513-520 [doi]
- Leveraging asynchronous parallel computing to produce simple genetic programming computational modelsAliyu Sani Sambo, R. Muhammad Atif Azad, Yevgeniya Kovalchuk, Vivek Padmanaabhan Indramohan, Hanifa Shah. 521-528 [doi]
- Profiled glucose forecasting using genetic programming and clusteringSergio Contactor, J. Manuel Velasco, Oscar Garnica, José Ignacio Hidalgo. 529-536 [doi]
- High-content screening images streaming analysis using the STriGen methodologyLaura Melgar-García, David Gutiérrez-Avilés, Cristina Rubio-Escudero, Alicia Troncoso. 537-539 [doi]
- Vulnerability coverage for adequacy security testingShuvalaxmi Dass, Akbar Siami Namin. 540-543 [doi]
- Thermal-aware memory system synthesis for MPSoCs with 3D-stacked hybrid memoriesChia-Yin Liu, Yi-Jung Chen, Masanori Hariyama. 546-553 [doi]
- CleanET: enabling timing validation for complex automotive systemsSergi Vilardell, Isabel Serra, Hamid Tabani, Jaume Abella, Joan del Castillo, Francisco J. Cazorla. 554-563 [doi]
- IntPred: flexible, fast, and accurate object detection for autonomous driving systemsHamid Tabani, Matteo Fusi, Leonidas Kosmidis, Jaume Abella, Francisco J. Cazorla. 564-571 [doi]
- Adaptive partitioning of real-time tasks on multiple processorsLuca Abeni, Tommaso Cucinotta. 572-579 [doi]
- On the reliability of hardware event monitors in MPSoCs for critical domainsJavier Barrera, Leonidas Kosmidis, Hamid Tabani, Enrico Mezzetti, Jaume Abella, Mikel Fernández, Guillem Bernat, Francisco J. Cazorla. 580-589 [doi]
- Early eviction and swapping for MLC STT-RAM-based LLCPing Cheng, Jen-Wei Hsieh. 590-592 [doi]
- Security based design space exploration for CPSLukas Gressl, Alexander Rech, Christian Steger, Andreas Daniel Sinnhofer, Ralph Weissnegger. 593-595 [doi]
- VIRA: a virtualization assisted deterministic system-level simulationsHsin-I Wu, Ren-Song Tsay, Hsu-Hsun Chin. 596-598 [doi]
- Learning locality maps from noisy geospatial labelsManjeet Dahiya, Devendra Samatia, Kabir Rustogi. 601-608 [doi]
- Sampling strategies to create moving regions from real world observationsRogério Luís de Carvalho Costa, Enrico Miranda, Paulo Dias, José Moreira. 609-616 [doi]
- Automatic flood detection in SentineI-2 images using deep convolutional neural networksPallavi Jain 0003, Bianca Schoen-Phelan, Robert Ross. 617-623 [doi]
- Exploring frequency-based approaches for efficient trajectory classificationFrancisco Vicenzi, Lucas May Petry, Camila Leite da Silva, Luis Otávio Alvares, Vania Bogorny. 624-631 [doi]
- Mining association rules in asymmetric data for territorial evolution modelingAsma Gharbi, Cyril De Runz, Herman Akdag, Sami Faïz. 632-634 [doi]
- A contextual edit distance for semantic trajectoriesClement Moreau, Thomas Devogele, Verónika Peralta, Laurent Étienne. 635-637 [doi]
- Respiration signal based two layer stress recognition across non-verbal and verbal situationsMunhee Lee, Junhyung Moon, Dongmi Cheon, Juneil Lee, Kyoungwoo Lee. 638-645 [doi]
- Explaining reasoning algorithms with persuasiveness: a case study for a behavioural change systemIvan Donadello, Mauro Dragoni, Claudio Eccher. 646-653 [doi]
- An agent program in an IoT system to recommend activities to minimize childhood obesity problemsJerffeson Teixeira de Souza, Gustavo Augusto Lima de Campos, Cleilton Rocha, Eriko Werbet, Leonardo Ferreira da Costa, Rodrigo Teixeira de Melo, Lucas Vieira Alves. 654-661 [doi]
- Evaluating semantic textual similarity in clinical sentences using deep learning and sentence embeddingsRui Antunes, João Figueira Silva, Sérgio Matos. 662-669 [doi]
- Rule-based extraction of family history information from clinical notesJoão Rafael Almeida, Sérgio Matos. 670-675 [doi]
- Deep learning from spontaneous reporting systems data to detect ADR signalsCheng-hao Wang, Wen-Yang Lin. 676-678 [doi]
- Evaluating the usefulness of citation graph and document metadata in scientific document recommendation for neophytesBissan Audeh, Michel Beigbeder, Christine Largeron, Diana Ramírez-Cifuentes. 681-689 [doi]
- Forward and backward feature selection for query performance predictionSébastien Déjean, Radu-Tudor Ionescu, Josiane Mothe, Md Zia Ullah. 690-697 [doi]
- Iterative learning to rank from explicit relevance feedbackMateus Pereira, Elham Etemad, Fernando Paulovich. 698-705 [doi]
- Unsupervised cross-modal audio representation learning from unstructured multilingual textAlexander Schindler, Sergiu Gordea, Peter Knees. 706-713 [doi]
- Retrieval of visiting paths through relevant resources and services for enabling smart communitiesGloria Bordogna, Luca Frigerio, Anna Rampini. 714-716 [doi]
- AutoIoT: a framework based on user-driven MDE for generating IoT applicationsThiago Nepomuceno, Tiago Carneiro, Paulo Henrique Maia, Muhammad Adnan, Thalyson Nepomuceno, Alexander Martin 0001. 719-728 [doi]
- OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis frameworkVinay Sachidananda, Suhas Bhairav, Yuval Elovici. 729-738 [doi]
- Sensmart: sensor data market for the internet of thingsRicardo Miranda, Miguel L. Pardal, António Grilo 0001. 739-746 [doi]
- Embedded machine learning-based data reduction in application-specific constrained IoT networksAdarsh Pal Singh, Sachin Chaudhari. 747-753 [doi]
- A smart speaker performance measurement toolHyunsu Mun, Hyungjin Lee, Soohyun Kim, Youngseok Lee. 755-762 [doi]
- Empowering personalized feedback on hot water usage: a field study with shower metersSebastian A. Günther, Carlo Stingl, Vlad C. Coroama, Samuel Schöb, Thorsten Staake. 763-766 [doi]
- SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NGEugene Frimpong, Antonis Michalas. 767-769 [doi]
- Towards a heterogeneous IoT privacy architectureSanonda Datta Gupta, Sepideh Ghanavati. 770-772 [doi]
- Optimized directed roadmap graph for multi-agent path finding using stochastic gradient descentChristian Henkel, Marc Toussaint. 776-783 [doi]
- Topology-based group routing in partially known environmentsJory Denny, Benjamin T. Fine. 784-791 [doi]
- A distributed approach for autonomous cooperative transportation in a dynamic multi-robot environmentAmar Nath, Arun AR, Rajdeep Niyogi. 792-799 [doi]
- Towards a distributed planning of decision making under uncertainty for a fleet of robotsPaul Jourdan, Guillaume Lozenguez, Luc Fabresse, Noury Bouraqadi. 800-807 [doi]
- Greedy randomized adaptive search procedure for close enough orienteering problemPetra Stefaníková, Petr Vána, Jan Faigl. 808-814 [doi]
- A model transformation approach to constructing agent-oriented design models for CPS/IoT systemsHiroyuki Nakagawa, Shinpei Ogata, Yoshitaka Aoki, Kazuki Kobayashi. 815-822 [doi]
- Agents in dynamic contexts, a system for learning plansFrancesco Lanza, Patrick Hammer, Valeria Seidita, Pei Wang 0002, Antonio Chella. 823-825 [doi]
- Dynamic proxemia modeling approach (DPMA) for navigation and interaction with a group of personsAbir Bellarbi, Abdel-Illah Mouaddib, Nouara Achour, Noureddine Ouadah. 826-828 [doi]
- On finding time-efficient trajectories for fixed-wing aircraft using dubins paths with multiple radiiKristýna Kucerová, Petr Vana, Jan Faigl. 829-831 [doi]
- Using word embeddings for ontology-driven aspect-based sentiment analysisSophie de Kok, Flavius Frasincar. 834-842 [doi]
- Aspect level sentiment classification with unbiased attention and target enhanced representationsPeng Liu, Tingwen Liu, Jinqiao Shi, Xuebin Wang, Zelin Yin, Can Zhao. 843-850 [doi]
- Better together: an ensemble learner for combining the results of ready-made entity linking systemsRenato Stoffalette João, Pavlos Fafalios, Stefan Dietze. 851-858 [doi]
- Semantic similarity to improve question understanding in a virtual patientFréjus A. A. Laleye, Antonia Blanié, Antoine Brouquet, Dan Behnamou, Gaël de Chalendar. 859-866 [doi]
- Mining micro-influencers from social media postsSimone Leonardi, Diego Monti, Giuseppe Rizzo 0002, Maurizio Morisio. 867-874 [doi]
- Decoupled word embeddings using latent topicsHeesoo Park, Jongwuk Lee. 875-882 [doi]
- Diversity regularized autoencoders for text generationHyeseon Ko, Junhyuk Lee, JinHong Kim, Jongwuk Lee, Hyunjung Shim. 883-891 [doi]
- On document representations for detection of biased news articlesAndre Ferreira Cruz, Gil Rocha, Henrique Lopes Cardoso. 892-899 [doi]
- Personalizing large-scale text classification by modeling individual differencesJungho Lee, Byung-Ju Choi, Yeachan Kim, Kang Min Kim, Woo-Jong Ryu, SangKeun Lee 0001. 900-902 [doi]
- Adapting deep learning for sentiment classification of code-switched informal short textMuhammad Haroon Shakeel, Asim Karim. 903-906 [doi]
- Selecting suitable configurations for automated link discoveryCarlos R. Rivero, David Ruiz 0001. 907-914 [doi]
- An E-sports video highlight generator using win-loss probability modelSeok-kyu Kang, Jee-Hyong Lee. 915-922 [doi]
- Conflict or cooperation?: predicting future tendency of international relationsPeng Chen, Adam Jatowt, Masatoshi Yoshikawa. 923-930 [doi]
- Some lessons learned using health data literature for smart information retrievalMario Ciampi, Giuseppe De Pietro, Elio Masciari, Stefano Silvestri. 931-934 [doi]
- A deep learning based chatbot for cultural heritageGiancarlo Sperlì. 935-937 [doi]
- Formal verification of debates in argumentation theoryRia Jha, Francesco Belardinelli, Francesca Toni. 940-947 [doi]
- On satisfiability problem in modal logic S5Yakoub Salhi. 948-955 [doi]
- A categorization of simultaneous localization and mapping knowledge for mobile robotsMaria A. Cornejo Lupa, Regina P. Ticona-Herrera, Yudith Cardinale, Dennis Barrios-Aranibar. 956-963 [doi]
- GrCluster: a score function to model hierarchy in knowledge graph embeddingsVarun Ranganathan, Siddharth Suresh, Yash Mathur, Natarajan Subramanyam, Denilson Barbosa. 964-971 [doi]
- Substitute selection for a missing tool using robot-centric conceptual knowledge of objectsMadhura Thosar, Christian A. Mueller, Georg Jäger, Max Pfingsthorn, Michael Beetz, Sebastian Zug, Till Mossakowski. 972-979 [doi]
- Argumentation for allNikolaos Spanoudakis, Konstantinos Kostis, Katerina Mania. 980-982 [doi]
- A model-driven approach to cross-platform development of accessible business appsChristoph Rieger, Daniel Lucrédio, Renata Pontin M. Fortes, Herbert Kuchen, Felipe Dias, Lianna Duarte. 984-993 [doi]
- Prongle: lightweight communication over unassociated wi-fiOtto Waltari, Jussi Kangasharju. 994-1001 [doi]
- A game-theoretic approach for the multi-objective frequency assignment problem in mobile networksFatma Laidoui, Fatima Benbouzid-Si Tayeb, Malika Bessedik, Fatima Zahra Laidi. 1002-1009 [doi]
- AppSpeedXray: a mobile application performance measurement toolHyunsu Mun, Youngseok Lee. 1010-1012 [doi]
- Event ticket price prediction with deep neural network on spatial-temporal sparse dataFei Huang, Hao Huang. 1013-1020 [doi]
- GMDH modelling for mobile user throughput forecastingIsah A. Lawal. 1021-1025 [doi]
- A novel network traffic classification approach via discriminative feature learningLixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng. 1026-1033 [doi]
- Applying fast matrix multiplication to neural networksAhmed Khaled 0001, Amir F. Atiya, Ahmed H. Abdel-Gawad. 1034-1037 [doi]
- CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM networkShahroz Tariq, Sangyup Lee, Simon S. Woo. 1048-1055 [doi]
- Automatic baseball commentary generation using deep learningByeong Jo Kim, Yong Suk Choi. 1056-1065 [doi]
- A generative semi-supervised classifier for datasets with unknown classesStefan Schrunner, Bernhard C. Geiger, Anja Zernig, Roman Kern. 1066-1074 [doi]
- Attention history-based attention for abstractive text summarizationHyunsoo Lee, Yunseok Choi, Jee-Hyong Lee. 1075-1081 [doi]
- Mining environmental chemicals with boosted treesNatalia Khuri. 1082-1089 [doi]
- Long bone fracture type classification for limited number of CT data with deep learningKeon-Myung Lee, Sang Yeon Lee, Chan Sik Han, Seung Myung Choi. 1090-1095 [doi]
- Similarity-based calibration method for zero-shot recognition in multi-object scenesDoo Soo Chang, Gun-hee Cho, Yong Suk Choi. 1096-1103 [doi]
- Robust ECG R-peak detection using LSTMJuho Laitala, Mingzhe Jiang, Elise Syrjälä, Emad Kasaeyan Naeini, Antti Airola, Amir M. Rahmani, Nikil D. Dutt, Pasi Liljeberg. 1104-1111 [doi]
- Understanding features on evolutionary policy optimizations: feature learning difference between gradient-based and evolutionary policy optimizationsSangyeop Lee, Myoung Hoon Ha, Byoungro Moon. 1112-1118 [doi]
- Data augmentation and semi-supervised learning for deep neural networks-based text classifierHeereen Shim, Stijn Luca, Dietwig Lowet, Bart Vanrumste. 1119-1126 [doi]
- Analysis of label noise in graph-based semi-supervised learningBruno Klaus de Aquino Afonso, Lilian Berton. 1127-1134 [doi]
- TextCSN: a semi-supervised approach for text clustering using pairwise constraints and convolutional siamese networkLucas Akayama Vilhagra, Eraldo Rezende Fernandes, Bruno Magalhães Nogueira. 1135-1142 [doi]
- Large-scale machine learning for business sector predictionMitch N. Angenent, António Pereira Barata, Frank W. Takes. 1143-1146 [doi]
- Attentive recurrent text categorisation models using word-category cross embedding on financial commentsMacedo Maia, Vivian Dos Santos Silva, Markus Endres, André Freitas, Siegfried Handschuh. 1147-1149 [doi]
- Extracting architectural patterns of deep neural networks for disease detection: student research abstractMafalda Falcão Ferreira. 1150-1153 [doi]
- Enhanced network intrusion detection system protocol for internet of thingsBacem Mbarek, Mouzhi Ge, Tomás Pitner. 1156-1163 [doi]
- Adapting priority schemes to achieve network slice isolationAfonso Oliveira, Teresa Maria Vazão. 1164-1171 [doi]
- Spark-based port and net scan detectionAntonia Affinito, Alessio Botta, Luigi Gallo, Mauro Garofalo, Giorgio Ventre. 1172-1179 [doi]
- Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanismsJúlio Mendonça, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Armin Zimmermann, Dong Seong Kim. 1180-1189 [doi]
- Resource allocation for edge computing with multiple tenant configurationsAndrea Araldo, Alessandro Di Stefano, Antonella Di Stefano. 1190-1199 [doi]
- Advanced system for the prevention and early detection of forest fires (ASPires)Peter Peinl, Rossitza Goleva, Jugoslav Achkoski. 1200-1203 [doi]
- SOM-based behavioral analysis for virtualized network functionsGiacomo Lanciano, Antonio Ritacco, Tommaso Cucinotta, Marco Vannucci, Antonino Artale, Luca Basili, Enrica Sposato, João Barata. 1204-1206 [doi]
- An exploration of targeted provenance for reliabilityRobert Roy, Erika Dennis, An-I Andy Wang, Peter L. Reiher, Sarah M. Diesburg. 1207-1213 [doi]
- Fast journaling made simple with NVMWoong Sul, Kihwang Kim, Minsoo Ryu, Hyungsoo Jung, Hyuck Han. 1214-1221 [doi]
- GPU swap-aware scheduler: virtual memory management for GPU applicationsSu-Wei Yang, Zhao-Wei Qiu, Ya-Shu Chen. 1222-1227 [doi]
- An efficient tinification of the linux kernel for minimizing resource consumptionTakuya Shizukuishi, Katsuya Matsubara. 1228-1237 [doi]
- An efficient garbage collection in java virtual machine via swap I/O optimizationHyojeong Lee, Qichen Chen, Heon Young Yeom, Yongseok Son. 1238-1245 [doi]
- Two-tier garbage collection for persistent objectDokeun Lee, Youjip Won, Yongjun Park, Seongjin Lee. 1246-1255 [doi]
- Efficient scheme for compressing and transferring data in hadoop clustersSeungYeon Lee, Jusuk Lee, Yongmin Kim, Kicheol Park, Jiman Hong, Junyoung Heo. 1256-1263 [doi]
- Near real-time scheduling in cloud-edge platformsVasile-Daniel Balteanu, Alexandru Neculai, Catalin Negru, Florin Pop, Adrian Stoica. 1264-1271 [doi]
- Bringing privacy control back to citizens: DISPEL - a distributed privacy management platform for the internet of thingsChristoph Stach, Clémentine Gritti, Bernhard Mitschang. 1272-1279 [doi]
- A descriptive study of assumptions made in LINDDUN privacy threat elicitationDimitri Van Landuyt, Wouter Joosen. 1280-1287 [doi]
- Towards application-layer purpose-based access controlFrank Pallas, Max-Robert Ulbricht, Stefan Tai, Thomas Peikert, Marcel Reppenhagen, Daniel Wenzel, Paul Wille, Karl Wolf. 1288-1296 [doi]
- A framework and roadmap for enhancing the application of privacy design patternsJulio C. Caiza, José M. del Álamo, Danny S. Guamán. 1297-1304 [doi]
- Using natural language processing to detect privacy violations in online contractsPaulo Silva, Carolina Gonçalves, Carolina Godinho, Nuno Antunes, Marília Curado. 1305-1307 [doi]
- PEEPLL: privacy-enhanced event pseudonymisation with limited linkabilityEphraim Zimmer, Christian Burkert, Tom Petersen, Hannes Federrath. 1308-1311 [doi]
- Inferring types and effects via static single assignmentLeonardo Filipe Rigon, Paulo Torrens, Cristiano D. Vasconcellos. 1314-1321 [doi]
- On the nature of cooperative scheduling in active objectsVlad Nicolae Serbanescu, Frank S. de Boer. 1322-1329 [doi]
- Analyses of a model-based real-time language embedded in C++Tadeus Prastowo, Luigi Palopoli, Luca Abeni, Giuseppe Lipari. 1330-1339 [doi]
- Usability heuristics for domain-specific languages (DSLs)Eduardo Mosqueira-Rey, David Alonso-Ríos. 1340-1343 [doi]
- Distributed futures for efficient data transfer between parallel processesPierre Leca, Wijnand Suijlen, Ludovic Henrio, Françoise Baude. 1344-1347 [doi]
- Expressing disambiguation filters as combinatorsJosé Nuno Macedo, João Saraiva. 1348-1351 [doi]
- Managing sessions of creative requirements elicitation and assessmentRafael Pinto, Lyrene Silva, Ricardo Valentim. 1355-1362 [doi]
- A process to support the creation of iStar extensionsEnyo Gonçalves, João Araújo 0001, Jaelson Castro. 1363-1370 [doi]
- Towards a library of usability requirementsAlberto Rodrigues da Silva, Carolina Lisboa Sequeira. 1371-1378 [doi]
- Lessons learned about oral-auditory and visual-spatial communication in requirements engineering with deaf stakeholdersAntônio C. F. Silva, Cássio L. Rodrigues, Neuma Chaveiro, Renata Rodrigues de Oliveira Garcia, Soraya Bianca Duarte, Mariá A. R. Araújo, Vinícius B. Santos, Karina R. G. da Silva, Paulo M. S. Rodrigues, Luíla M. Oliveira, Caio César Silva Sousa. 1379-1386 [doi]
- Goal-based configuration analysis for networks of collaborative cyber-physical systemsJennifer Brings, Marian Daun, Thorsten Weyer, Klaus Pohl. 1387-1396 [doi]
- Incorporating the voice of the customer into mass-market software product managementDana Naous, Andrea Giessmann, Christine Legner. 1397-1404 [doi]
- Towards the improvement of natural language requirements descriptions: the C&&L toolEdgar Sarmiento-Calisaya, Edward Hinojosa Cárdenas, Victor Cornejo-Aparicio, Guina Sotomayor Alzamora. 1405-1413 [doi]
- Request for comments: conversation patterns in issue tracking systems of open-source projectsMichael Rath 0002, Patrick Mäder. 1414-1417 [doi]
- Towards a non-functional requirements discovery approach for persuasive systemsNelly Condori-Fernández, João Araújo 0001, Alejandro Catalá, Patricia Lago. 1418-1420 [doi]
- Defining agile requirements change management: a mapping studyDanyllo Albuquerque, Everton Guimarães, Mirko Perkusich, Alexandre Costa, Emanuel Dantas, Felipe Barbosa Araújo Ramos, Hyggo Oliveira de Almeida. 1421-1424 [doi]
- Mixture-preference bayesian matrix factorization for implicit feedback datasetsShaowen Peng, Tsunenori Mine. 1427-1434 [doi]
- Debiased offline evaluation of recommender systems: a weighted-sampling approachDiego Carraro, Derek Bridge. 1435-1442 [doi]
- Fair sequential group recommendationsMaria Stratigi, Jyrki Nummenmaa, Evaggelia Pitoura, Kostas Stefanidis. 1443-1452 [doi]
- A recommender system for investing in early-stage enterprisesJohannes Luef, Christian Ohrfandl, Dimitris Sacharidis, Hannes Werthner. 1453-1460 [doi]
- Modeling user exposure with recommendation influenceMasahiro Sato, Janmajay Singh, Sho Takemori, Takashi Sonoda, Qian Zhang, Tomoko Ohkuma. 1461-1464 [doi]
- Designing a recommender system for board gamesMichael Ion, Dimitris Sacharidis, Hannes Werthner. 1465-1467 [doi]
- Engineering trustable choreography-based systems using blockchainFlávio Corradini, A. Marcelletti, A. Morichetta, Andrea Polini, B. Re, Francesco Tiezzi. 1470-1479 [doi]
- Detecting architectural integrity violation patterns using machine learningAlla Zakurdaeva, Michael Weiss 0001, Steven Muegge. 1480-1487 [doi]
- An architectural style for internet of things systemsLidiane Oliveira dos Santos, Eduardo Silva, Thaís Batista, Everton Cavalcante, Jair C. Leite, Flávio Oquendo. 1488-1497 [doi]
- An overview of reference architectures for cloud of thingsDiógenes Dias, Flávia Coimbra Delicato, Paulo F. Pires, Atslands R. Rocha, Elisa Yumi Nakagawa. 1498-1505 [doi]
- Modeling microservice architecture: a comparative experiment towards the effectiveness of two approachesJonas Sorgalla, Florian Rademacher, Sabine Sachweh, Albert Zündorf. 1506-1509 [doi]
- A toolchain for model-based development of a robot application: student research abstractMickaël Trezzy. 1510-1513 [doi]
- A structural modeling notation for the typed functional paradigmYusuf Moosa Motara. 1515-1522 [doi]
- How bugs are fixed: exposing bug-fix patterns with edits and nesting levelsMd Rakibul Islam, Minhaz F. Zibran. 1523-1531 [doi]
- floss-refactoringJaziel S. Moreira, Everton L. G. Alves, Wilkerson de L. Andrade. 1532-1539 [doi]
- Customer requests matter: early stage software effort estimation using k-gramsKazim Kivanç Eren, Can Özbey, Beyza Eken, Ayse Tosun. 1540-1547 [doi]
- Actions and impediments for technical debt prevention: results from a global family of industrial surveysSávio Freire, Nicolli Rios, Manoel G. Mendonça, Davide Falessi, Carolyn B. Seaman, Clemente Izurieta, Rodrigo O. Spínola. 1548-1555 [doi]
- On the measurement of software complexity for plc industrial control systems using TIQVAAdnan Muslija, Eduard Enoiu. 1556-1565 [doi]
- The current practices of changing secure software: an empirical studyAmeerah-Muhsinah Jamil, Lotfi Ben Othmane, Altaz Valani, Moataz AbdelKhalek, Ayhan Tek. 1566-1575 [doi]
- Benchmarking elasticity of FaaS platforms as a foundation for objective-driven design of serverless applicationsJörn Kuhlenkamp, Sebastian Werner, Maria C. Borges, Dominik Ernst, Daniel Wenzel. 1576-1585 [doi]
- What 5 million job advertisements tell us about testing: a preliminary empirical investigationMaura Cerioli, Maurizio Leotta, Filippo Ricca. 1586-1594 [doi]
- Dealing with uncertainty in model transformationsYouness Laghouaouta, Pierre Laforcade. 1595-1603 [doi]
- FACT-from actual to conceptual tie-ins: a multi-level knowledge graph structured on context and semantics of software artefactsShipra Sharma, Balwinder Sodhi. 1604-1613 [doi]
- A metric suite for evaluating interactive scenarios in video games: an empirical validationMaria Eleni Paschali, Apostolos Ampatzoglou, Remi Escourrou, Alexander Chatzigeorgiou, Ioannis Stamelos. 1614-1623 [doi]
- TAMAA: UPPAAL-based mission planning for autonomous agentsRong Gu, Eduard Enoiu, Cristina Seceleanu. 1624-1633 [doi]
- Applying deep learning algorithm to automatic bug localization and repairGeunseok Yang, Kyeongsic Min, Byungjeong Lee. 1634-1641 [doi]
- On investigating metamodel inaccurate structuresElyes Cherfa, Soraya Kesraoui, Chouki Tibermacine, Régis Fleurquin, Salah Sadou. 1642-1649 [doi]
- UC2Map: automatic translation of use case maps from specificationSaurabh Tiwari 0001, Rishab Arora, Ashray Bharambe. 1650-1653 [doi]
- Chaining model transformations to develop a system model verification tool: application to capella state machines and data flows modelsChristophe Duhil, Jean-Philippe Babau, Eric Lépicier, Jean-Luc Voirin, Juan F. Navas . 1654-1657 [doi]
- Verification of forensic readiness in software development: a roadmapLukas Daubner, Martin Macak, Barbora Buhnova, Tomás Pitner. 1658-1661 [doi]
- An investigation of the project management approaches of agile and plan-based companiesIlya Khomyakov, Ruzilya Mirgalimova, Alberto Sillitti. 1662-1665 [doi]
- Interpretable and adversarially-resistant behavioral malware signaturesXiao Han, Baptiste Olivier. 1668-1677 [doi]
- Raccoon: automated verification of guarded race conditions in web applicationsSimon Koch, Tim Sauer, Martin Johns, Giancarlo Pellegrino. 1678-1687 [doi]
- MANIS: evading malware detection system on graph structurePeng Xu, Bojan Kolosnjaji, Claudia Eckert 0001, Apostolis Zarras. 1688-1695 [doi]
- HeadPrint: detecting anomalous communications through header-based application fingerprintingRiccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter. 1696-1705 [doi]
- TrustEV: trustworthy electric vehicle charging and billingAndreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova. 1706-1715 [doi]
- Hybrid taint analysis for Java EEFlorian D. Loch, Martin Johns, Martin Hecker, Martin Mohr, Gregor Snelting. 1716-1725 [doi]
- HAL-RD: cross-correlating heterogeneous alerts and logs using resource dependenciesMahdieh Safarzadeh, Mahdi Abadi, Alireza Nowroozi. 1726-1735 [doi]
- Write-protection enforcement: hypervisor-backed kernel hardeningAhmed Abdelraoof, Mohamed Azab, Igor Stoppa. 1736-1744 [doi]
- WAF-A-MoLE: evading web application firewalls through adversarial machine learningLuca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio. 1745-1752 [doi]
- Polymorphic circuit generation using random boolean logic expansionJeffrey Todd McDonald, Trinity L. Stroud, Todd R. Andel. 1753-1762 [doi]
- An experiment-driven performance model of stream processing operators in fog computing environmentsHamidReza Arkian, Guillaume Pierre, Johan Tordsson, Erik Elmroth. 1763-1771 [doi]
- Access control method using electrocardiogram signal for fog computing securityJin-Su Kim, Min-Gu Kim, Myung-Won Lee, Sung Bum Pan. 1772-1777 [doi]
- Situation awareness via information hovering in post-disaster communicationsGaetano Manzo, Flavien Bonvin, Christian Esposito, Torsten Braun, Gianluca Rizzo. 1778-1784 [doi]
- Comparison of simulators for fog computingChristian Kunde, Zoltán Ádám Mann. 1792-1795 [doi]
- Modeling and verification method for an early evaluation of systems of systems interactionsRonan Baduel, Iulian Ober, Jean-Michel Bruel. 1798-1805 [doi]
- Topology-aware distributed smart grid control using a clustering-based utility maximization approachMarius Stübs, Hanko Ipach, Christian Becker 0007. 1806-1815 [doi]
- Comparing automatically extracted topics from online suicidal ideation and the responses they invokeElise Glaser, Alexander Morain, Jonathan Gemmell, Daniela Raicu. 1818-1825 [doi]
- You are what emojis say about your pictures: language-independent gender inference attack on FacebookBizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch. 1826-1834 [doi]
- Sponsored content and user engagement dynamics on InstagramLucas Machado de Oliveira, Olga Goussevskaia. 1835-1842 [doi]
- Graph sampling methods for big complex networks integrating centrality, k-core, and spectral sparsificationSeok-Hee Hong, Shan Lu. 1843-1851 [doi]
- FOCAS: penalising friendly citations to improve author rankingJorge M. B. Silva, David Aparício, Pedro Ribeiro, Fernando M. A. Silva. 1852-1860 [doi]
- Investigation of biases in identity linkage DataSetsRishabh Kaushal, Shubham Gupta, Ponnurangam Kumaraguru. 1861-1868 [doi]
- Wide-spectrum characterization of long-running political phenomena on social media: the brexit caseEmre Calisir, Marco Brambilla 0001. 1869-1876 [doi]
- Signed heterogeneous network embedding in social mediaFatemeh Salehi Rizi, Michael Granitzer. 1877-1880 [doi]
- Topology and robustness analysis of temporal air transport networkHumberto Hayashi Sano, Lilian Berton. 1881-1884 [doi]
- Finding interest groups from Twitter listsMohamed Benabdelkrim, Jean Savinien, Céline Robardet. 1885-1887 [doi]
- Influence maximization through user interaction modelingDavid Oriedi, Cyril De Runz, Zahia Guessoum, Amine Aït Younes, Henry O. Nyongesa. 1888-1890 [doi]
- Smart home platform supporting decentralized adaptive automation controlPaolo Arcaini, Raffaela Mirandola, Elvinia Riccobene, Patrizia Scandurra, Alberto Arrigoni, Daniele Bosc, Federico Modica, Rita Pedercini. 1893-1900 [doi]
- Time series analysis for enhancing the recognition of license plate number in video stream of IOT cameraBada Kim, Doohyuk Chang, Junyoung Heo, Sung Y. Shin. 1901-1905 [doi]
- AppGen: a framework for automatic generation of data collection appsMostafa Alaa, Alia El Bolock, Mostafa Abas, Slim Abdennadher, Cornelia Herbert. 1906-1913 [doi]
- Counterfeiting scalable detection image based system for e-commerceRobert-Ioan Onesim, Lenuta Alboaie, Andrei Pricop, Andrei Panu. 1914-1919 [doi]
- Smart transportation platform for private transportationVially Kazadi Mutombo, Yena Lee, Heejin Kim, Younggwan Kim, Natalia Weronika Debska, Jiman Hong. 1920-1927 [doi]
- Internet of things based virtual display platform to provide a screenSeoyeon Kim, Jaehyeok Jeong, Inhwan Na, Young-Sun Yun, Seongbae Eun, Jinman Jung. 1934-1935 [doi]
- Estimating fault masking using squeeziness based on Rényi's entropyAlfredo Ibias, Manuel Núñez 0001. 1936-1943 [doi]
- Cross-program taint analysis for IoT systemsAmit Kr Mandal, Pietro Ferrara, Yuliy Khlyebnikov, Agostino Cortesi, Fausto Spoto. 1944-1952 [doi]
- En-Route: on enabling resource usage testing for autonomous driving frameworksMiguel Alcon, Hamid Tabani, Jaume Abella, Leonidas Kosmidis, Francisco J. Cazorla. 1953-1962 [doi]
- Data-flow-based evolutionary fault localizationDeuslirio Silva-Junior, Plínio de Sá Leitão Júnior, Altino Dantas, Celso G. Camilo-Junior, Rachel Harrison. 1963-1970 [doi]
- Constrained detecting arrays for fault localization in combinatorial testingHao Jin, Ce Shi, Tatsuhiro Tsuchiya. 1971-1978 [doi]
- A sound abstract interpreter for dynamic codeVincenzo Arceri, Isabella Mastroeni. 1979-1988 [doi]
- Testing as a service (TaaS): a systematic literature mapGustavo Girardon, Victor Costa, Rodrigo Machado, Maicon Bernardino, Guilherme Legramante, Fabio Paulo Basso, Elder de Macedo Rodrigues, Anibal Neto. 1989-1996 [doi]
- Taxonomy of performance testing tools: a systematic literature reviewVictor Costa, Gustavo Girardon, Maicon Bernardino, Rodrigo Machado, Guilherme Legramante, Anibal Neto, Fabio Paulo Basso, Elder de Macedo Rodrigues. 1997-2004 [doi]
- Trends in prioritization of test cases: 2017-2019M. Carmen de Castro-Cabrera, Antonio García-Domínguez, Inmaculada Medina-Bulo. 2005-2011 [doi]
- Injection of automatically selected DBpedia subjects in electronic medical records to boost hospitalization predictionRaphaël Gazzotti, Catherine Faron-Zucker, Fabien Gandon, Virginie Lacroix-Hugues, David Darmon. 2013-2020 [doi]
- VTKEL: a resource for visual-textual-knowledge entity linkingShahi Dost, Luciano Serafini, Marco Rospocher, Lamberto Ballan, Alessandro Sperduti. 2021-2028 [doi]
- Ontology-based knowledge model for human-robot interactive servicesDoo Soo Chang, Gun-hee Cho, Yong Suk Choi. 2029-2038 [doi]
- MOMENT: temporal meta-fact generation and propagation in knowledge graphsFatiha Saïs, Joana E. Gonzales Malaverri, Gianluca Quercini. 2039-2048 [doi]
- Representation learning for entity type rankingMd. Mostafizur Rahman, Atsuhiro Takasu, Gianluca Demartini. 2049-2056 [doi]
- Towards the semantic formalization of scienceSaid Fathalla, Sören Auer, Christoph Lange 0002. 2057-2059 [doi]
- Towards an ontology for personalized hotel room recommendation: student research abstractRonald Ochieng Ojino. 2060-2063 [doi]
- Siamese-rPPG network: remote photoplethysmography signal estimation from face videosYun-Yun Tsou, Yi-An Lee, Chiou-Ting Hsu, Shang-Hung Chang. 2066-2073 [doi]
- Lightweight network architecture for real-time action recognitionAlexander Kozlov, Vadim Andronov, Yana Gritsenko. 2074-2080 [doi]
- Robust, efficient and privacy-preserving violent activity recognition in videosJaved Imran, Balasubramanian Raman, Amitesh Singh Rajput. 2081-2088 [doi]
- Appearance features for online multiple camera multiple target trackingCuong Le Quoc, Moncef Hidane. 2089-2096 [doi]
- Markerless gait analysis in stroke survivors based on computer vision and deep learning: a pilot studyMatteo Moro, Giorgia Marchesi, Francesca Odone, Maura Casadio. 2097-2104 [doi]
- Template co-updating in multi-modal human activity recognition systemsAnnalisa Franco, Antonio Magnani, Dario Maio. 2113-2116 [doi]
- Towards a data-driven method for RGB video-based hand action quality assessment in real timeTianyu Wang, Minhao Jin, Jingying Wang, Yijie Wang, Mian Li. 2117-2120 [doi]
- Enhanced clustering approach for traffic regulation in directional antennas based nanonetworksLina Aliouat, Hakim Mabed, Julien Bourgeois. 2121-2128 [doi]
- Enabling wireless ad hoc edge systems with yggdrasilPedro Ákos Costa, André Rosa, João Leitão 0001. 2129-2136 [doi]
- An effective AP placement scheme for reliable wifi connection in industrial environmentHan Ul Lee, Wha Sook Jeon, Dong Geun Jeong. 2137-2143 [doi]
- A service-aware channel partition and selection for advertising in bluetooth low energy networksTing-Ting Yang, Hsueh-Wen Tseng. 2144-2150 [doi]
- A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networksHana Rhim, Ryma Abassi, Karim Tamine, Damien Sauveron, Sihem Guemara El Fatmi. 2151-2157 [doi]
- A new CoAP congestion control scheme considering strong and weak RTT for IoUTJunho Seo, Sungwon Lee, Muhammad Toaha Raza Khan, Dongkyun Kim. 2158-2162 [doi]
- Trustworthy intelligent industrial monitoring architecture for early event detection by exploiting social IoTAbdul Rehman 0003, Anand Paul, Muhammad Azfar Yaqub, Muhammad Mazhar Ullah Rathore. 2163-2169 [doi]
- Evaluation of fog topologies in fog planning for IoT task schedulingZhiming He, Limei Peng. 2177-2180 [doi]
- An elastic net regularized matrix factorization technique for recommender systemsBianca Mitroi, Flavius Frasincar. 2184-2192 [doi]
- A browserless architecture for extracting web pricesJorge Lloret-Gazo. 2193-2200 [doi]
- XIEv: dynamic analysis for crawling and modeling of web applicationsManuel Leithner, Dimitris E. Simos. 2201-2210 [doi]
- Censorship-resistant web annotations based on ethereum and IPFSJoão Santos, Nuno Santos, David Dias. 2211-2213 [doi]
- RAMLFlask: managing artifact coupling for web APIsStefan Sobernig, Michael Maurer, Mark Strembeck. 2214-2217 [doi]