Abstract is missing.
- Efficient DNA sequence partitioning using probabilistic subsets and hypergraphsMahdi Belcaid, Cédric Arisdakessian, Yuliia Kravchenko. 4-9 [doi]
- a: a deep sequential framework to predict epidemic spreadDario Aragona, Luca Podo, Bardh Prenkaj, Paola Velardi. 10-17 [doi]
- Natural vs balanced distribution in deep learning on whole slide images for cancer detectionIsmat Ara Reshma, Sylvain Cussat-Blanc, Radu-Tudor Ionescu, Hervé Luga, Josiane Mothe. 18-25 [doi]
- Protein secondary structure prediction based on fusion of machine learning classifiersGabriel Bianchin de Oliveira, Hélio Pedrini, Zanoni Dias. 26-29 [doi]
- Stargate: remote data access between hadoop clustersIllyoung Choi, John H. Hartman. 32-39 [doi]
- SLA definition for network intrusion detection systems in IaaS cloudsAmir Teshome Wonjiga, Louis Rilling, Christine Morin. 40-49 [doi]
- StorNIR, a multi-objective replica placement strategy for cloud federationsAmina Chikhaoui, Laurent Lemarchand, Kamel Boukhalfa, Jalil Boukhobza. 50-59 [doi]
- Reducing cold starts during elastic scaling of containers in kubernetesEmad Heydari Beni, Eddy Truyen, Bert Lagaisse, Wouter Joosen, Jordy Dieltjens. 60-68 [doi]
- An energy saving approach: understanding microservices as multidimensional entities in p2p networksHernán Humberto Álvarez-Valera, Marc Dalmau, Philippe Roose, Jorge Larracoechea, Christina Herzog. 69-78 [doi]
- Workload classification in multi-vm cloud environment using deep neural network modelParas Bhagtya, S. Raghavan, K. Chandraseakran, Usha D.. 79-82 [doi]
- Cost minimization for deploying serverless functionsÖzgür Sedefoglu, Hasan Sözer. 83-85 [doi]
- A bargaining game based energy-aware load balancing in cloud data centersAvadh Kishor, Rajdeep Niyogi. 86-88 [doi]
- Low-cost automatic fish measuring estimationVicent Sanz Marco, David G. Valcarce, Marta F. Riesco, Vanesa Robles. 90-97 [doi]
- Topple-free foot strategy applied to real-time motion capture data using kinect sensorDanilo Borges da Silva, Creto Augusto Vidal, Joaquim B. Cavalcante Neto, Italo N. S. Pessoa, Rubens Fernandes Nunes. 98-106 [doi]
- EMIDAS: explainable social interaction-based pedestrian intention detection across streetNora Muscholl, Matthias Klusch, Patrick Gebhard, Tanja Schneeberger. 107-115 [doi]
- Poisoning attacks on cyber attack detectors for industrial control systemsMoshe Kravchik, Battista Biggio, Asaf Shabtai. 116-125 [doi]
- Improving CNN performance on FPGA clusters through topology explorationRuihao Li, Ke Liu, Xiaojun Cai, Mengying Zhao, Lizy K. John, Zhiping Jia. 126-134 [doi]
- Using regression learners to predict performance problems on software updates: a case study on elevators dispatching algorithmsAitor Gartziandia, Aitor Arrieta, Aitor Agirre, Goiuria Sagardui, Maite Arratibel. 135-144 [doi]
- Partial order based non-preemptive communication scheduling towards real-time networks-on-chipPeng Chen, Hui Chen, Jun Zhou, Di Liu, Shiqing Li, Weichen Liu, Wanli Chang 0001, Nan Guan. 145-154 [doi]
- Exploring planning and operations design space for EV charging stationsSangyoung Park, Alma Pröbstl, Wanli Chang 0001, Anuradha Annaswamy, Samarjit Chakraborty. 155-163 [doi]
- Proactive feedback for networked CPSSumana Ghosh, Arnab Mondal, Debayan Roy, Philipp H. Kindt, Soumyajit Dey, Samarjit Chakraborty. 164-173 [doi]
- Quantitative comparison of supervised algorithms and feature sets for traffic sign recognitionMuhammad Atif, Tommaso Zoppi, Mohamad Gharib, Andrea Bondavalli. 174-177 [doi]
- Reducing tail latency of LSM-tree based key-value store via limited compactionYongchao Hu, Yajuan Du. 178-181 [doi]
- Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodesMatthew Bradbury, Arshad Jhumka, Tim Watson. 184-193 [doi]
- Analysis of VM migration scheduling as moving target defense against insider attacksMatheus Torquato, Paulo Romero Martins Maciel, Marco Vieira. 194-202 [doi]
- Reducing the subscription latency in reliable causal publish-subscribe systemsFilipa Pedrosa, Luís Rodrigues. 203-212 [doi]
- SmartStream: towards byzantine resilient data streamingJohannes Köstler, Hans P. Reiser, Gerhard Habiger, Franz J. Hauck. 213-222 [doi]
- Blockchain-based root of trust management in security credential management system for vehicular communicationsArijet Sarker, SangHyun Byun, Wenjun Fan, Sang-Yoon Chang. 223-231 [doi]
- Understanding the properness of incorporating machine learning algorithms in safety-critical systemsMohamad Gharib, Tommaso Zoppi, Andrea Bondavalli. 232-234 [doi]
- Automation and prioritization of replica balancing in HDFSRhauani Weber Aita Fazul, Patrícia Pitthan Barcelos. 235-238 [doi]
- Blockchain-based bug bounty frameworkLital Badash, Nachiket Tapas, Asaf Nadler, Francesco Longo 0001, Asaf Shabtai. 239-248 [doi]
- Towards decentralized bicycle insurance system based on blockchainWei-Yang Chiu, Weizhi Meng 0001. 249-256 [doi]
- Exploring the storj network: a security analysisSammy de Figueiredo, Akash Madhusudan, Vincent Reniers, Svetla Nikova, Bart Preneel. 257-264 [doi]
- Highlighting poor anonymity and security practice in the blockchain of BitcoinStefano Bistarelli, Ivan Mercanti, Francesco Faloci, Francesco Santini 0001. 265-272 [doi]
- An efficient multi-signature wallet in blockchain using bloom filterJongbeen Han, Mansub Song, Hyeonsang Eom, Yongseok Son. 273-281 [doi]
- Microeconomic foundations of decentralised organisationsMauricio Jacobo-Romero, André Freitas. 282-290 [doi]
- SnapshotSave: fast and low storage demand blockchain bootstrappingLiuyang Ren, Wei-Ting Chen, Paul A. S. Ward. 291-300 [doi]
- State-witnessed virtual transactions for atomic execution of complexity-unconstrained smart contractsI. Smagin. 301-304 [doi]
- A decentralized document management system using blockchain and secret sharingJongbeen Han, Heemin Kim, Hyeonsang Eom, Yongseok Son. 305-308 [doi]
- A study of work distribution and contention in database primitives on heterogeneous CPU/GPU architecturesMichael Gowanlock, Zane Fink, Ben Karsin, Jordan Wright. 311-320 [doi]
- Adaptive flash sorting for memory-constrained embedded devicesRamon Lawrence. 321-326 [doi]
- VD-tree: how to build an efficient and fit metric access method using voronoi diagramsAndre Moriyama, Lucas S. Rodrigues, Lucas C. Scabora, Mirela T. Cazzolato, Agma J. M. Traina, Caetano Traina. 327-335 [doi]
- SHARq: sharing recursive queries in relational databasesLucas C. Scabora, Gabriel Spadon, Mirela T. Cazzolato, Daniel S. Kaster, Agma J. M. Traina, Jose F. Rodrigues Jr., Caetano Traina Jr.. 336-339 [doi]
- A two-party private string matching fuzzy vault schemeXhino Mullaymeri, Alexandros Karakasidis 0001. 340-343 [doi]
- Flight data anomaly detection and diagnosis with variable association changeSijie He, Hao Huang, Shinjae Yoo, Weizhong Yan, Feng Xue, Tianyi Wang, Chenxiao Xu. 346-354 [doi]
- GraphMDL+: interleaving the generation and MDL-based selection of graph patternsFrancesco Bariatti, Peggy Cellier, Sébastien Ferré. 355-363 [doi]
- Concept drift detection and localization in process mining: an integrated and efficient approach enabled by trace clusteringRafael Gaspar de Sousa, Sarajane Marques Peres, Marcelo Fantinato, Hajo Alexander Reijers. 364-373 [doi]
- Unsupervised behavioural mining and clustering for malware family identificationKhanh-Huu-The Dam, Thomas Given-Wilson, Axel Legay. 374-383 [doi]
- Clustering sequences of multi-dimensional sets of semantic elementsClement Moreau, Alexandre Chanson, Verónika Peralta, Thomas Devogele, Cyril De Runz. 384-391 [doi]
- Implicitly distributed fuzzy random forestsMarco Barsacchi, Alessio Bechini, Francesco Marcelloni. 392-399 [doi]
- ICE: a visual analytic tool for interactive clustering ensembles generationJose Castro-Ochante, Guillermo Cámara Chávez, Erick Gomez Nieto. 400-408 [doi]
- Detecting and categorizing Android malware with graph neural networksPeng Xu, Claudia Eckert 0001, Apostolis Zarras. 409-412 [doi]
- A flexible and lightweight interactive data mining tool to visualize and analyze digital citizen participation contentSergio Bachiller, Lara Quijano Sánchez, Iván Cantador. 413-416 [doi]
- A new self-organizing map based algorithm for multi-label stream classificationRicardo Cerri, Joel David C. Junior, Elaine R. Faria, João Gama 0001. 418-426 [doi]
- Towards an architecture integrating complex event processing and temporal graphs for service monitoringJuan Marcelo Parra Ullauri, Antonio García-Domínguez, Juan Boubeta-Puig, Nelly Bencomo, Guadalupe Ortiz. 427-435 [doi]
- ADELA: attention based deep ensemble learning for activity recognition in smart collaborative environmentsHyunju Kim, Dongman Lee. 436-444 [doi]
- DeepStream: autoencoder-based stream temporal clusteringShimon Harush, Yair Meidan, Asaf Shabtai. 445-448 [doi]
- Modelling and optimization of run-of-mine stockpile recoveryHirad Assimi, Ben Koch, Chris Garcia, Markus Wagner, Frank Neumann 0001. 450-458 [doi]
- Inverse pheromone-based decentralized route guidance for connected vehiclesTri-Hai Nguyen, Jason J. Jung. 459-463 [doi]
- On-the-fly simplification of genetic programming modelsNoman Javed, Fernand Gobet. 464-471 [doi]
- Evolving a multi-classifier system with cartesian genetic programming for multi-pitch estimation of polyphonic piano musicRolando Miragaia, Francisco Fernández de Vega, Gustavo Reis. 472-480 [doi]
- Automating the design flow under dynamic partial reconfiguration for hardware-software co-design in FPGA SoCBiruk B. Seyoum, Marco Pagani, Alessandro Biondi, Giorgio C. Buttazzo. 481-490 [doi]
- TONIC: towards oblivious neural inference compilerPo-Hsuan Huang, Chia-Heng Tu, Shen-Ming Chung. 491-500 [doi]
- Energy-aware scheduling of multi-version tasks on heterogeneous real-time systemsJulius Roeder, Benjamin Rouxel, Sebastian Altmeyer, Clemens Grelck. 501-510 [doi]
- MUCH: exploiting pairwise hardware event monitor correlations for improved timing analysis of complex MPSoCsSergi Vilardell, Isabel Serra, Enrico Mezzetti, Jaume Abella, Francisco J. Cazorla. 511-520 [doi]
- RaFIO: a random forest I/O-aware algorithmCamélia Slimani, Chun-Feng Wu, Yuan-Hao Chang 0001, Stéphane Rubini, Jalil Boukhobza. 521-528 [doi]
- Aarith: an arbitrary precision number libraryOliver Keszöcze, Marcel Brand, Michael Witterauf, Christian Heidorn, Jürgen Teich. 529-534 [doi]
- Incorporating spatial context into remaining-time predictive process monitoringNiyi Ogunbiyi, Artie Basukoski, Thierry J. Chaussalet. 535-542 [doi]
- An algorithm to interpolate concavitiesJosé Duarte, Mark McKenney. 543-550 [doi]
- A novel similarity measure for multiple aspect trajectory clusteringIraklis Varlamis, Christos Sardianos, Vania Bogorny, Luis Otávio Alvares, Jônata Tyska Carvalho, Chiara Renso, Raffaele Perego 0001, John Violos. 551-558 [doi]
- Learning embeddings for cross-time geographic areas represented as graphsMargarita Khokhlova, Nathalie Abadie, Valérie Gouet-Brunet, Liming Chen 0002. 559-568 [doi]
- Discovering predictive trend-event patterns in temporal clinical dataMatteo Mantovani 0001, Beatrice Amico, Carlo Combi. 570-579 [doi]
- Identifying surgical-mask speech using deep neural networks on low-level aggregationXinzhou Xu, Jun Deng, Zixing Zhang 0001, Chen Wu, Björn W. Schuller. 580-585 [doi]
- Enriching surgical process models by BPMN extensions for temporal durationsCarlo Combi, Francesca Galetto, Hirenkumar Chandrakant Nakawala, Giuseppe Pozzi, Francesca Zerbato. 586-593 [doi]
- Development of an explainable clinical decision support system for the prediction of patient quality of life in amyotrophic lateral sclerosisAnna Markella Antoniadi, Miriam Galvin, Mark Heverin, Orla Hardiman, Catherine Mooney. 594-602 [doi]
- A thermal comfort estimation method by wearable sensorsHaomin Mao, Shuhei Tsuchida, Yongbeom Kim, Rintaro Kanada, Takayuki Hori, Tsutomu Terada, Masahiko Tsukamoto. 603-610 [doi]
- The interplay of a conversational ontology and AI planning for health dialogue managementMilene Santos Teixeira, Vinícius Maran, Mauro Dragoni. 611-619 [doi]
- Pay attention to the cough: early diagnosis of COVID-19 using interpretable symptoms embeddings with cough sound signal processingAnkit Pal, Malaikannan Sankarasubbu. 620-628 [doi]
- Detection of COVID-19 in chest X-ray images using transfer learning with deep convolutional neural networkLuis H. S. Vogado, Pablo Vieira, Pedro Santos Neto, Lucas A. Lopes, Gleison Silva, Flávio H. D. Araújo, Rodrigo Veras. 629-636 [doi]
- Attention-based stress detection exploiting non-contact monitoring of movement patterns with IR-UWB radarJonghoon Shin, Junhyung Moon, Beomsik Kim, Jihwan Eom, Noseong Park, Kyoungwoo Lee. 637-640 [doi]
- Cost-effective identification of on-topic search queries using multi-armed banditsDavid E. Losada, Matthias Herrmann, David Elsweiler. 645-654 [doi]
- Testing the tests: simulation of rankings to compare statistical significance tests in information retrieval evaluationJavier Parapar, David E. Losada, Álvaro Barreiro. 655-664 [doi]
- ISSumSet: a tweet summarization dataset hidden in a TREC trackAlexis Dusart, Karen Pinel-Sauvagnat, Gilles Hubert. 665-671 [doi]
- The wisdom of the rankers: a cost-effective method for building pooled test collections without participant systemsDavid Otero 0001, Javier Parapar, Álvaro Barreiro. 672-680 [doi]
- Search and evaluation methods for class level information retrieval: extended use and evaluation of methods applied in expertise retrievalAndreas Henrich, Markus Wegmann. 681-684 [doi]
- Heterogeneous document embeddings for cross-lingual text classificationAlejandro Moreo, Andrea Pedrotti, Fabrizio Sebastiani 0001. 685-688 [doi]
- Interoperability requirements for a smart cityJahoon Koo, Young-Gab Kim. 690-698 [doi]
- Privacy-preserving smart grid traceability using blockchain over IoT connectivityAamir Shahzad, Kaiwen Zhang 0001, Abdelouahed Gherbi. 699-706 [doi]
- An analysis of asset interoperability for I4.0 middlewareSune Chung Jepsen, Torben Worm, Thomas Ingemann Mørk, Jakob Hviid. 707-710 [doi]
- Cloud-edge coupling to mitigate execution failuresZakaria Maamar, Mohammed Al-Khafajiy. 711-718 [doi]
- Edge scheduling framework for real-time and non real-time tasksOlamilekan Fadahunsi, Yuxiang Ma, Muthucumaru Maheswaran. 719-728 [doi]
- A federated fog-cloud framework for data processing and orchestration: a case study in smart citiesDapeng Lan, Yu Liu 0011, Amir Taherkordi, Frank Eliassen, Stéphane Delbruel, Liu Lei 0031. 729-736 [doi]
- Called function identification of IoT devices by network traffic analysisDaichi Koike, Shigemi Ishida, Yutaka Arakawa. 737-743 [doi]
- Service consumption planning for efficient service migration in mobile edge computing environmentsMoonyoung Lee, In-Young Ko. 744-751 [doi]
- Auto-labeling of sensor data using social media messages: a case study for a smart cityDae Young Park, In-Young Ko. 752-760 [doi]
- Differential privacy applied to smart meters: a mapping studyJacob Marks, Brandon Montano, Jiwan Chong, Manjusha Raavi, Raisa Islam, Tomás Cerny, Dongwan Shin. 761-770 [doi]
- Yet another BLE technology based tracking systemFlavia Schneider, Adriano Branco, Ariane M. B. Rodrigues, Felipe Oliveira Carvalho, Simone D. J. Barbosa, Markus Endler, Hélio Lopes. 771-774 [doi]
- Multi-agent reinforcement learning with directed exploration and selective memory reuseShuo Jiang, Christopher Amato. 777-784 [doi]
- Cooperative place recognition in robotic swarmsSarah Brent, Chengzhi Yuan, Paolo Stegagno. 785-792 [doi]
- A spatio-temporal exposure correction neural network for autonomous vehicleAlbano Borba, Johann Pires, Rafael Escher, Rodrigo de Bem, Paulo Drews Jr.. 793-800 [doi]
- FlatPack: flexible temporal planning with verification and controller synthesisAjay Kattepur, Swarup Kumar Mohalik. 801-810 [doi]
- An LQR-assisted control algorithm for an under-actuated in-pipe robot in water distribution systemsSaber Kazeminasab, Roozbeh Jafari, M. Katherine Banks. 811-814 [doi]
- NavDog: robotic navigation guide dog via model predictive control and human-robot modelingLiyang Wang, Jinxin Zhao, Liangjun Zhang. 815-818 [doi]
- Explaining a neural attention model for aspect-based sentiment classification using diagnostic classificationLisa Meijer, Flavius Frasincar, Maria Mihaela Trusca. 821-827 [doi]
- Data augmentation in a hybrid approach for aspect-based sentiment analysisTomas Liesting, Flavius Frasincar, Maria Mihaela Trusca. 828-835 [doi]
- Taxonomy extraction using knowledge graph embeddings and hierarchical clusteringFélix Martel, Amal Zouaq. 836-844 [doi]
- Leveraging emoji to improve sentiment classification of tweetsTiago Martinho de Barros, Hélio Pedrini, Zanoni Dias. 845-852 [doi]
- Context- and sequence-aware convolutional recurrent encoder for neural machine translationRitam Mallick, Seba Susan, Vaibhaw Agrawal, Rizul Garg, Prateek Rawal. 853-856 [doi]
- Structurally enriched entity mention embedding from semi-structured textual contentLee-Hsun Hsieh, Yang-Yin Lee, Ee-Peng Lim. 857-860 [doi]
- L policiesFranz Baader, Francesco Kriegel, Adrian Nuradiansyah, Rafael Peñaloza. 863-872 [doi]
- Strong admissibility for abstract dialectical frameworksAtefeh Keshavarzi Zafarghandi, Rineke Verbrugge, Bart Verheij. 873-880 [doi]
- First-order ASP programs as CHR programsIgor Stéphan. 881-888 [doi]
- Towards a framework of hansson's descriptor revision for conditionalsJonas Haldimann, Kai Sauerwald, Martin von Berg, Gabriele Kern-Isberner, Christoph Beierle. 889-891 [doi]
- Taint analysis of arrays in Android applicationsAssad Maalouf, Lunjin Lu. 893-899 [doi]
- detectBiklio: detecting bicycle usage with a smartphone appWilliam Janoti, Paulo Ferreira. 900-907 [doi]
- App2SecApp: privacy protection from Android applicationsParjanya Vyas, R. K. Shyamasundar, Bhagyesh Patil. 908-911 [doi]
- Behavior control-based approach to influencing user's cybersecurity actions using mobile news appVincent Lombardi, Sarah Ortiz, Jen Phifer, Tomás Cerný, Dongwan Shin. 912-915 [doi]
- Using game theory to guide the classification of inhibitors of human iodide transportersNatalia Khuri, Anish Prasanna. 916-923 [doi]
- Interpretable temporal GANs for industrial imbalanced multivariate time series simulation and classificationHao Huang, Chenxiao Xu, Shinjae Yoo. 924-933 [doi]
- Fuzzy time series for predicting phenological stages of apple treesTiago Boechel, Lucas Micol Policarpo, Gabriel de Oliveira Ramos, Rodrigo Da Rosa Righi. 934-941 [doi]
- BertLoc: duplicate location record detection in a large-scale location datasetSujin Park, Sangwon Lee, Simon S. Woo. 942-951 [doi]
- DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNNAlsharif Abuadbba, Hyoungshick Kim, Surya Nepal. 952-959 [doi]
- NDNet: natural deformation of apparel for better virtual try-on experienceVedang Mandhana, Toshal Agrawal, Ashish Sardana. 960-966 [doi]
- Transfer learning approach for detecting psychological distress in brexit tweetsSean-Kelly Palicki, Shereen Fouad, Mariam Adedoyin-Olowe, Zahraa S. Abdallah. 967-975 [doi]
- Identifying lameness in horses through deep learningYiqi Wang, Jiawen Li, Yabing Zhang, Richard O. Sinnott. 976-985 [doi]
- Graph convolutional networks for skeleton-based action recognition with LSTM using tool-informationYoung Min Seo, Yong Suk Choi. 986-993 [doi]
- Efficiency and fairness in recurring data-driven risk assessments of violent recidivismMarzieh Karimi-Haghighi, Carlos Castillo. 994-1002 [doi]
- Multi-view 3D seismic facies classifierElton Alves Trindade, Mauro Roisenberg. 1003-1011 [doi]
- Dependency tree positional encoding method for relation extractionChunghyeon Cho, Yong Suk Choi. 1012-1020 [doi]
- k of clusters in the data by active query selectionHério Sousa, Marcilio C. P. de Souto, Reginaldo Massanobu Kuroshu, Ana Carolina Lorena. 1021-1029 [doi]
- P2E-WGAN: ECG waveform synthesis from PPG with conditional wasserstein generative adversarial networksKhuong Vo, Emad Kasaeyan Naeini, Amir Naderi, Daniel Jilani, Amir M. Rahmani, Nikil D. Dutt, Hung Cao. 1030-1036 [doi]
- Dance self-learning application and its dance pose evaluationsJong-Hyeok Choi, Jae Jun Lee, Aziz Nasridinov. 1037-1045 [doi]
- Adversarial feature refinement for cross-view action recognitionAntonio Marsella, Gaurvi Goyal, Francesca Odone. 1046-1054 [doi]
- An embedding method for unseen words considering contextual information and morphological informationMin-Sub Won, Yunseok Choi, Samuel Kim, CheolWon Na, Jee-Hyong Lee. 1055-1062 [doi]
- Regular echo state networks: simple and accurate reservoir models to real-world applicationsLucas Z. Bissaro, Yaochu Jin, Murillo G. Carneiro. 1063-1069 [doi]
- Deep sparse dictionary-based representation for 3D non-rigid shape retrievalHela Haj Mohamed, Samir Belaid, Wady Naanaa, Lotfi Ben Romdhane. 1070-1077 [doi]
- The next best question: a lazy, anytime framework for adaptive feature acquisitionSagy Tuval, Bracha Shapira. 1078-1081 [doi]
- A study of the effectiveness of transfer learning in individualized asthma risk predictionWan D. Bae, Shayma Alkobaisi, Matthew Horak, Sungroul Kim, Choon Sik Park, Mark Chesney. 1082-1085 [doi]
- Classification of drug prescribing information using long short-term memory networksTianen Liu, Natalia Khuri. 1086-1089 [doi]
- Depth-enhanced gaze following methodJi-Eun Jeong, Yong Suk Choi. 1090-1093 [doi]
- ARMemNet: autoregressive memory networks for multivariate time series forecastingJinuk Park, Chanhee Park, Hongchan Roh, Sanghyun Park. 1094-1097 [doi]
- Discovering accurate deep learning based predictive models for automatic customer support ticket classificationPaolo Zicari, Gianluigi Folino, Massimo Guarascio, Luigi Pontieri. 1098-1101 [doi]
- Privacy preserving distributed extremely randomized treesAmin Aminifar, Fazle Rabbi 0001, Ka-I Pun, Yngve Lamo. 1102-1105 [doi]
- Leaf shape reconstruction and damage estimation using a U-net-based conditional GANMateus C. Silva, Andrea G. C. Bianchi, Sérvio P. Ribeiro, Ricardo A. R. Oliveira. 1106-1109 [doi]
- Protocol transformation for transiently powered wireless sensor networksDavid Richardson, Arshad Jhumka, Luca Mottola. 1112-1121 [doi]
- A wifi-slicing MANO solution to enable elastic wifi-sharing communication service end-to-end provisionDouglas Braz Maciel, Emidio Paiva, Kevin Costa, Mathews Lima, Vitor Lopes, Augusto Neto 0001, Felipe Dantas, Silvio Sampaio. 1122-1129 [doi]
- Source-side DoS attack detection with LSTM and seasonality embeddingSungwoong Yeom, Chulwoong Choi, Kyungbaek Kim. 1130-1137 [doi]
- VeriNeS: runtime verification of outsourced network services orchestrationMoubarak Zoure, Toufik Ahmed, Laurent Réveillère. 1138-1146 [doi]
- smCompactor: a workload-aware fine-grained resource management framework for GPGPUsQichen Chen, Hyerin Chung, Yongseok Son, Yoonhee Kim, Heon Young Yeom. 1147-1155 [doi]
- GPUKV: an integrated framework with KVSSD and GPU through P2P communication supportMin-Gyo Jung, Chang Gyu Lee, DongGyu Park, Sungyong Park, Jungki Noh, Woosuk Chung, Kyoung Park, Youngjae Kim 0001. 1156-1164 [doi]
- Storage service for edge computingDaniel-Ilie Sirbu, Catalin Negru, Florin Pop, Christian Esposito. 1165-1171 [doi]
- Concurrent file metadata structure using readers-writer lockChang Gyu Lee, Sunghyun Noh, Hyeongu Kang, Soon Hwang, Youngjae Kim 0001. 1172-1181 [doi]
- Quantifying context switch overhead of artificial intelligence workloads on the cloud and edgesKun Suo, Yong Shi, Chih-Cheng Hung, Patrick Bobbie. 1182-1189 [doi]
- A trace-driven methodology to evaluate and optimize memory management services of distributed operating systems for lightweight manycoresEmmanuel Podestá Junior, Pedro Henrique Penna, João Fellipe Uller, Márcio Castro. 1190-1198 [doi]
- Efficient and robust data integrity verification scheme for high-performance storage devicesHwajung Kim, Inhwi Hwang, Heon Y. Yeom. 1199-1202 [doi]
- mStream: stream management for mobile file system using Android file contextsYunji Kang, Dongkun Shin. 1203-1208 [doi]
- An exploratory experiment on privacy patterns: limitations and possibilitiesJulio C. Caiza, José M. del Álamo, Danny S. Guamán, Angel Jaramillo-Alcázar. 1209-1216 [doi]
- Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patternsAla'a Al-Momani, Kim Wuyts, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch. 1217-1225 [doi]
- PeQES: a platform for privacy-enhanced quantitative empirical studiesDominik Meißner, Felix Engelmann, Frank Kargl, Benjamin Erb. 1226-1234 [doi]
- privacy by defaultBorce Stojkovski, Gabriele Lenzini, Vincent Koenig. 1235-1246 [doi]
- Evolving domain-specific languages depending on external librariesKhady Fall, Eugene Syriani. 1247-1255 [doi]
- Domain-specific programming assistance in an embedded DSL for generating processor emulatorsKatsumi Okuda, Shigeru Chiba. 1256-1264 [doi]
- SecureJS compiler: portable memory isolation in JavaScriptYoonseok Ko, Tamara Rezk, Manuel Serrano. 1265-1274 [doi]
- C language mechanism for error handling and deferred cleanupJens Gustedt, Robert C. Seacord. 1275-1277 [doi]
- Computation with cells enhanced by costsBogdan Aman, Gabriel Ciobanu. 1278-1280 [doi]
- A method for the automated generating of the code-coverage ensuring input test data based on the control flow analysisRichard Lipka. 1281-1288 [doi]
- An exploratory study on the identification and evaluation of bad smell agglomerationsAmanda Santana, Daniel Cruz, Eduardo Figueiredo. 1289-1297 [doi]
- Automated error log resolution: a case studyMark Fuller, Elizabeth Brighton, Micah Schiewe, Dipta Das, Tomás Cerný, Pavel Tisnovsky. 1298-1304 [doi]
- Algorithm for generation of complex test data for interface-based regression testing of software componentsTomas Potuzak, Richard Lipka. 1305-1311 [doi]
- Sector classification for crowd-based software requirementsKushagra Bhatia, Arpit Sharma. 1312-1320 [doi]
- RE-BERT: automatic extraction of software requirements from app reviews using BERT language modelAdailton Ferreira de Araújo, Ricardo Marcondes Marcacini. 1321-1327 [doi]
- Towards priority-awareness in autonomous intelligent systemsHuma Samin, Luis Hernán García Paucar, Nelly Bencomo, Peter Sawyer. 1328-1337 [doi]
- Towards an understanding of benefits and challenges in the use of design thinking in requirements engineeringLauriane Pereira, Rafael Parizi, Matheus Prestes, Sabrina Marczak, Tayana Conte. 1338-1345 [doi]
- Requirements engineering in the pre-contract stage: exploring the processes and practices used in small and medium-sized software enterprisesTomás Vera, Sergio F. Ochoa, Daniel Perovich. 1346-1353 [doi]
- Extracting features from app descriptions based on POS and dependencyYinghao Zhi, Tong Li 0001, Zhen Yang. 1354-1358 [doi]
- How to put users in control of their data in federated top-N recommendation with learning to rankVito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia, Antonio Ferrara, Fedelucio Narducci. 1359-1362 [doi]
- On the instability of embeddings for recommender systems: the case of matrix factorizationGiovanni Gabbolini, Edoardo D'Amico, Cesare Bernardis, Paolo Cremonesi. 1363-1370 [doi]
- Incorporating multi-level positive feedback to session-based nearest-neighborQian Zhang 0061, Masahiro Sato, Sho Takemori, Tomoko Ohkuma. 1371-1374 [doi]
- Improving preference elicitation in a conversational recommender system with active learning strategiesAndrea Iovine, Pasquale Lops, Fedelucio Narducci, Marco de Gemmis, Giovanni Semeraro. 1375-1382 [doi]
- On mitigating popularity bias in recommendations via variational autoencodersRodrigo Borges, Kostas Stefanidis. 1383-1389 [doi]
- Analysing and extending privacy patterns with architectural contextSu Yen Chia, Xiwei Xu, Hye-Young Paik, Liming Zhu. 1390-1398 [doi]
- Architectural strategies for interoperability of software-intensive systems: practitioners' perspectivePedro Henrique Dias Valle, Lina Garcés, Elisa Yumi Nakagawa. 1399-1408 [doi]
- Identification of microservices from monolithic applications through topic modellingMiguel Brito, Jácome Cunha, João Saraiva. 1409-1418 [doi]
- A temporal configuration logic for dynamic reconfigurable systemsAntoine El-Hokayem, Marius Bozga, Joseph Sifakis. 1419-1428 [doi]
- Coach: classification-based architectural patterns detection in Android appsChaima Chekhaba, Hocine Rebatchi, Ghizlane El-Boussaidi, Naouel Moha, Sègla Kpodjedo. 1429-1438 [doi]
- InMap: automated interactive code-to-architecture mappingZipani Tom Sinkala, Sebastian Herold. 1439-1442 [doi]
- Securing system-of-systems through a game theory approachJamal El Hachem, Elena Lisova, Aida Causevic. 1443-1446 [doi]
- Just-in-time defect prediction for Android apps via imbalanced deep learning modelKunsong Zhao, Zhou Xu 0003, Meng Yan, Yutian Tang, Ming Fan, Gemma Catolino. 1447-1454 [doi]
- A comparison of similarity based instance selection methods for cross project defect predictionSeyedrebvar Hosseini, Burak Turhan. 1455-1464 [doi]
- On the effect of incompleteness to check requirement-to-method tracesMouna Hammoudi, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed. 1465-1474 [doi]
- Measuring Agile teamwork: a comparative analysis between two modelsManuel Silva, Arthur Silva Freire, Mirko Perkusich, Danyllo Albuquerque, Everton Guimarães, Angelo Hyggo Almeida, Kyller Gorgônio Perkusich. 1475-1483 [doi]
- A comparative study of smartphone and smartwatch appsXiao Chen, Wanli Chen 0001, Kui Liu, Chunyang Chen, Li Li. 1484-1493 [doi]
- Integrating semantic reasoning in information loss-based transformation chain rankersFrancesco Basciani, Daniele Di Pompeo, Davide Di Ruscio, Ludovico Iovino, Alfonso Pierantonio. 1494-1503 [doi]
- Uncovering data-flow anomalies in BPMN-based process-driven applicationsKonrad Schneid, Herbert Kuchen, Sebastian Thöne, Sascha Di Bernardo. 1504-1512 [doi]
- Software professionals' information needs in continuous integration and deliveryAzeem Ahmad, Ola Leifler, Kristian Sandahl. 1513-1520 [doi]
- Supervised learning over test executions as a test oracleFoivos Tsimpourlas, Ajitha Rajan, Miltiadis Allamanis. 1521-1531 [doi]
- STRAB: state recovery using reverse execution at IR level for concurrent programsShinji Hoshino, Yoshitaka Arahori, Katsuhiko Gondow. 1532-1541 [doi]
- Software engineering meets deep learning: a mapping studyFábio F. Ferreira, Luciana Lourdes Silva, Marco Tulio Valente. 1542-1549 [doi]
- An analysis of Monte Carlo simulations for forecasting software projectsPedro Miranda, João Pascoal Faria, Filipe Figueiredo Correia, Ahmed Fares, Ricardo Graça, João Mendes-Moreira. 1550-1558 [doi]
- Contract-based verification of model transformations: a formally founded approachGuillaume Brau, Mohammed Foughali. 1559-1568 [doi]
- A systematic review on the use of DevOps in internet of things software systemsIgor Muzetti Pereira, Tiago Garcia de Senna Carneiro, Eduardo Figueiredo 0001. 1569-1571 [doi]
- Instant distribution of consistency-relevant change information in a hierarchical multi-developer engineering environmentMichael Alexander Tröls, Atif Mashkoor, Alexander Egyed. 1572-1575 [doi]
- Which type of exclusion region is better for restricted random testing?: an empirical studyWeifeng Sun, Rubing Huang, Chenhui Cui, Haibo Chen, Weijie Liu. 1576-1579 [doi]
- Exploiting the progress of OO refactoring tools with Android code smells: RAndroid, a plugin for Android studioAbderraouf Gattal, Abir Hammache, Nabila Bousbia, Adel Nassim Henniche. 1580-1583 [doi]
- CLUE: towards discovering locked cryptocurrencies in ethereumXiaoqi Li 0001, Ting Chen, Xiapu Luo, Chenxu Wang. 1584-1587 [doi]
- Spectra: detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloadsWissam Aoudi, Nasser Nowdehi, Magnus Almgren, Tomas Olovsson. 1588-1597 [doi]
- Preventing serialization vulnerabilities through transient field detectionPierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. 1598-1606 [doi]
- Developing a Personal Voting Machine for the Estonian Internet Voting SystemValeh Farzaliyev, Kristjan Krips, Jan Willemson. 1607-1616 [doi]
- Branchboozle: a side-channel within a hidden pattern history table of modern branch prediction unitsAndrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin. 1617-1625 [doi]
- Preventing server-side request forgery attacksBahruz Jabiyev, Omid Mirzaei, Amin Kharraz, Engin Kirda. 1626-1635 [doi]
- SNAPPY: programmable kernel-level policies for containersMaxime Bélair, Sylvie Laniepce, Jean-Marc Menaud. 1636-1645 [doi]
- A decentralized dynamic PKI based on blockchainMohsen Toorani, Christian Gehrmann. 1646-1655 [doi]
- FUMVar: a practical framework for generating fully-working and unseen malware variantsBeomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong. 1656-1663 [doi]
- Hawk-Eye: holistic detection of APT command and control domainsAlmuthanna Alageel, Sergio Maffeis. 1664-1673 [doi]
- Investigating behavioral differences between IoT malware via function call sequence graphsReo Kawasoe, Chansu Han, Ryoichi Isawa, Takeshi Takahashi 0001, Jun'ichi Takeuchi. 1674-1682 [doi]
- A hidden-password online password managerMaliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk. 1683-1686 [doi]
- DeepTective: detection of PHP vulnerabilities using hybrid graph neural networksRishi Rabheru, Hazim Hanif, Sergio Maffeis. 1687-1690 [doi]
- Integrity guarantees over highly dynamic outsourced map dataFrancesco Buccafurri, Vincenzo De Angelis, Cecilia Labrini. 1691-1696 [doi]
- A3Graph: adversarial attributed autoencoder for graph representation learningMingliang Hou, Lei Wang, Jiaying Liu 0006, Xiangjie Kong, Feng Xia 0001. 1697-1704 [doi]
- COVID-19 ads as political weaponMárcio Silva, Fabrício Benevenuto. 1705-1710 [doi]
- Crisis communication: a comparative study of communication patterns across crisis events in social mediaHernan Sarmiento, Barbara Poblete. 1711-1720 [doi]
- COVID-19 hits the job market: an 88 million job ads analysisMaura Cerioli, Maurizio Leotta, Filippo Ricca. 1721-1726 [doi]
- Bringing WebAssembly up to speed with dynamic linkingNiko Mäkitalo, Victor Bankowski, Paulius Daubaris, Risto Mikkola, Oleg Beletski, Tommi Mikkonen. 1727-1735 [doi]
- A maturity assessment framework for conversational AI development platformsJohan Aronsson, Philip Lu, Daniel Strüber 0001, Thorsten Berger. 1736-1745 [doi]
- A blockchain-based marketplace platform for circular economyMirko Koscina, Marius Lombard-Platet, Claudia Negri Ribalta. 1746-1749 [doi]
- Configuring test generators using bug reports: a case study of GCC compiler and CsmithMd. Rafiqul Islam Rabin, Mohammad Amin Alipour. 1750-1758 [doi]
- Embeddings between state and action labeled probabilistic systemsSusmoy Das, Arpit Sharma 0002. 1759-1767 [doi]
- DiverJS: path exploration heuristic for difference analysis of event-driven codeEna Tominaga, Yoshitaka Arahori, Katsuhiko Gondow. 1768-1777 [doi]
- Symbolic execution of NoSQL applications using versioned schemasHendrik Winkelmann, Herbert Kuchen. 1778-1787 [doi]
- Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modellingPedro Antonino, A. W. Roscoe 0001. 1788-1797 [doi]
- Symblicit exploration and elimination for probabilistic model checkingErnst Moritz Hahn, Arnd Hartmanns. 1798-1806 [doi]
- Conformance testing of ARINC 653 compliance for a safety critical RTOS using UPPAAL model checkerAbhishek Singh, Meenakshi D'Souza, Arshad Ebrahim. 1807-1814 [doi]
- A small-step approach to multi-trace checking against interactionsErwan Mahe, Boutheina Bannour, Christophe Gaston, Arnault Lapitre, Pascale Le Gall. 1815-1822 [doi]
- Enhancing constraint-based repair of data structure errors that recur using memoizationNima Dini, Razieh Nokhbeh Zaeem, Sarfraz Khurshid. 1823-1832 [doi]
- Offline monitoring of LTL with bit vectorsKun Xie, Sylvain Hallé. 1833-1836 [doi]
- Runtime verification of implantable medical devices using multiple physiological signalsAbhinandan panda, Srinivas Pinisetty, Partha S. Roop, Ajay Babu K, Sabarimalai Manikandan M. 1837-1840 [doi]
- Discovering multiple design approaches in programming assignment submissionsNikhila K. N, Sujit Kumar Chakrabarti, Manish Gupta. 1841-1845 [doi]
- Towards a knowledge graph-based approach for context-aware points-of-interest recommendationsLavdim Halilaj, Jürgen Lüttin, Susanne Rothermel, Santhosh Kumar Arumugam, Ishan Dindorkar. 1846-1854 [doi]
- ArDO: an ontology to describe the dynamics of multimedia archival recordsOleksandra Vsesviatska, Tabea Tietz, Fabian Hoppe, Mirjam Sprau, Nils Meyer, Danilo Dessì, Harald Sack. 1855-1863 [doi]
- A semantic-based access control mechanism for distributed systemsMersedeh Sadeghi, Luca Sartor, Matteo Rossi. 1864-1873 [doi]
- OntoConnect: unsupervised ontology alignment with recursive neural networkJaydeep Chakraborty, Srividya K. Bansal, Luca Virgili, Krishanu Konar, Beyza Yaman. 1874-1882 [doi]
- A domain independent semantic measure for keyword sense disambiguationMaría Granados Buey, Carlos Bobed, Jorge Gracia, Eduardo Mena. 1883-1886 [doi]
- Towards an ontology for urban tourismAlexander Pinto-De la Gala, Yudith Cardinale, Irvin Dongo, Regina P. Ticona-Herrera. 1887-1890 [doi]
- Real-time shallow water image retrieval and enhancement for low-cost unmanned underwater vehicle using Raspberry PiGhulam Nabi Ahmad Hassan Yar, Abu-Bakar Noor-ul-Hassan, Hanzla Siddiqui. 1891-1899 [doi]
- Reliable interest forwarding strategy for underwater vehicular NDNMuhammad Toaha Raza Khan, Malik Muhammad Saad 0001, Junho Seo, Syed Hassan Ahmed, Dongkyun Kim. 1900-1905 [doi]
- Swarm intelligence based localization in wireless sensor networksJunaid Akram, Arslan Javed, Sikander Khan, Awais Akram, Hafiz Suliman Munawar, Waqas Ahmad. 1906-1914 [doi]
- EBR-RL: energy balancing routing protocol based on reinforcement learning for WSNVially Kazadi Mutombo, Sung Y. Shin, Jiman Hong. 1915-1920 [doi]
- Intent-based networking platform: an automated approach for policy and configuration of next-generation networksTalha Ahmed Khan, Muhammad Afaq, Khizar Abbas, Wang-Cheol Song. 1921-1930 [doi]
- Utilizing textual reviews in latent factor models for recommender systemsTatev Karen Aslanyan, Flavius Frasincar. 1931-1940 [doi]
- Semantic table-of-contents for efficient web screen readingJavedul Ferdous, Sami Uddin, Vikas Ashok. 1941-1949 [doi]
- WAIT: protecting the integrity of web applications with binary-equivalent transparencyDominik Meißner, Frank Kargl, Benjamin Erb. 1950-1953 [doi]