Abstract is missing.
- Transpose-xen: virtualized mixed-criticality through dynamic allocationJohn McFarland, Amro Awad. 3-12 [doi]
- Domain name service trust delegation in cloud computing: exploitation, risks, and defenseCraig Laprade, H. Howie Huang. 13-21 [doi]
- Security interoperability in heterogeneous IoT platforms: threat model of the interoperable OAuth 2.0 frameworkSe-Ra Oh, Jahoon Koo, Young-Gab Kim. 22-31 [doi]
- Deep learning based self-adaptive framework for environmental interoperability in internet of thingsEuijong Lee, Sukhoon Lee, Young-Duk Seo. 32-35 [doi]
- RT-kubernetes: containerized real-time cloud computingStefano Fiori, Luca Abeni, Tommaso Cucinotta. 36-39 [doi]
- The impact of different facial expression intensities on the performance of pre-trained emotion recognition modelsHermon Faria de Araujo, Fátima L. S. Nunes, Ariane Machado-Lima. 41-48 [doi]
- A better loss for visual-textual groundingDavide Rigoni, Luciano Serafini, Alessandro Sperduti. 49-57 [doi]
- Adversarial defense by restricting in-variance and co-variance of representationsJeevithan Alagurajah, Chee-Hung Henry Chu. 58-65 [doi]
- Time2Vec transformer: a time series approach for gas detection in seismic dataPetterson Sousa Diniz, Domingos Alves Dias Júnior, João Otávio Bandeira Diniz, Anselmo Cardoso de Paiva, Aristófanes Corrêa Silva, Marcelo Gattass, Roberto Quevedo, Diogo Michelon, Carlos Siedschlag, Roberto Ribeiro. 66-72 [doi]
- Automated video editing based on learned styles using LSTM-GANHsin-I Huang, Chi-Sheng Shih, Zi-Lin Yang. 73-80 [doi]
- Autorevise: annotation refinement using motion signal patternsJennifer Piane, Yiyang Wang, Xufan Ma, Jacob D. Furst, Daniela Stan Raicu. 81-84 [doi]
- Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time seriesJeong-Han Yun, Jonguk Kim, Won-Seok Hwang, Young-geun Kim, Simon S. Woo, Byung-gil Min. 87-96 [doi]
- CSP specification and verification of relay-based railway interlocking systemsD. I. de Almeida Pereira, M. V. M. Oliveira, P. E. R. Bezerra, Philippe Bon, Simon Collart Dutilleul. 97-106 [doi]
- On enduring more data through enabling page rewrite capability on multi-level-cell flash memoryYu-Ming Chang, Chien-Chung Ho, Che-Wei Tsao, Shu-Hsien Liao 0002, Wei-Chen Wang, Tei-Wei Kuo, Yuan-Hao Chang 0001. 107-115 [doi]
- RAM: exploiting restrained and approximate management for enabling neural network training on NVM-based systemsChien-Chung Ho, Wei-Chen Wang, Szu-Yu Chen, Yung-Chun Li, Kun-Chi Chiang. 116-123 [doi]
- CIIA: critical infrastructure impact assessmentOlga Carvalho, Filipe Apolinario, Nelson Escravana, Carlos Ribeiro. 124-132 [doi]
- Fast, lightweight IoT anomaly detection using feature pruning and PCAJohn Carter, Spiros Mancoridis, Erick Galinkin. 133-138 [doi]
- Software-defined hardware-assisted isolation for trusted next-generation IoT systemsFilippos-George Kolimbianakis, George Kornaros. 139-146 [doi]
- PICO: privacy-preserving access control in IoT scenarios through incomplete informationSavio Sciancalepore, Nicola Zannone. 147-156 [doi]
- Improving response time of home IoT services in federated learningDongjun Hwang, Hyunsu Mun, Youngseok Lee 0002. 157-163 [doi]
- SureSpace: orchestrating beacons and witnesses to certify device locationJoão Tiago, Samih Eisa, Miguel L. Pardal. 164-173 [doi]
- Ontology-based user privacy management in smart gridRaisa Islam, Tomás Cerný, Dongwan Shin. 174-182 [doi]
- FingerCI: generating specifications for critical infrastructuresFilipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia 0001. 183-186 [doi]
- Efficient and scalable geographical peer matching for P2P energy sharing communitiesRomaric Duvignau, Vincenzo Gulisano, Marina Papatriantafilou. 187-190 [doi]
- Planetary digital twin: a case study in aquacultureRafael R. Teixeira, Juliana B. Puccinelli, Bruna de Vargas Guterres, Marcelo Rita Pias, Vinícius Menezes Oliveira, Silvia Silva da Costa Botelho, Luis Poersch, Nelson Duarte Filho, Ahmed Janati, Maxime Paris. 191-197 [doi]
- A framework for representing internet of things security and privacy policies and detecting potential problemsAnthony Opara, Haan Johng, Tom Hill, Lawrence Chung. 198-201 [doi]
- cpp-tiny-client: a secure API client generator for IoT devicesAnders Aaen Springborg, Martin Kaldahl Andersen, Kaare Holland Hattel, Michele Albano. 202-205 [doi]
- Energy-efficient fog computing-enabled data transmission protocol in tactile internet-based applicationsAli Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphaël Couturier. 206-209 [doi]
- Rethinking the security of IoT from the perspective of developer customized device-cloud interactionYiWei Zhang, Juanru Li, Dawu Gu. 210-213 [doi]
- A general and configurable framework for blockchain-based marketplacesAndrea Merlina, Roman Vitenberg, Vinay Setty. 216-225 [doi]
- Redundant dataflow applications on clustered manycore architecturesChristoph Kühbacher, Theo Ungerer, Sebastian Altmeyer. 226-235 [doi]
- RANC: reward-all nakamoto consensusRami A. Khalil, Naranker Dulay. 236-245 [doi]
- ElastiQuant: elastic quantization strategy for communication efficient distributed machine learning in IoTBharath Sudharsan, John G. Breslin, Muhammad Intizar Ali, Peter Corcoran 0001, Rajiv Ranjan. 246-254 [doi]
- An event-driven strategy for reactive replica balancing on apache hadoop distributed file systemRhauani Weber Aita Fazul, Patrícia Pitthan Barcelos. 255-263 [doi]
- Adaptive database synchronization for an online analytical cioud-to-edge continuumDaniel Costa, José Pereira 0001, Ricardo Vilaça, Nuno Faria. 264-266 [doi]
- An architecture proposal for checkpoint/restore on stateful containersRodrigo H. Müller, Cristina Meinhardt, Odorico M. Mendizabal. 267-270 [doi]
- 2Chain: trackability and traceability of graph data in blockchain with linkage privacyWenyi Tang, Changhao Chenli, Chanyang Ju, Taeho Jung. 272-281 [doi]
- Calibrating the performance and security of blockchains via information propagation delays: revisiting an old approach with a new perspectiveJulius Fechner, Balakrishnan Chandrasekaran 0002, Marc X. Makkes. 282-289 [doi]
- Porting a benchmark with a classic workload to blockchain: TPC-C on hyperledger fabricAttila Klenik, Imre Kocsis. 290-298 [doi]
- FL-MAB: client selection and monetization for blockchain-based federated learningZahra Batool, Kaiwen Zhang 0001, Matthew Toews. 299-307 [doi]
- Towards CBDC-based machine-to-machine payments in consumer IoTNadia Pocher, Mirko Zichichi. 308-315 [doi]
- Model checking of vulnerabilities in smart contracts: a solidity-to-CPN approachIkram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul. 316-325 [doi]
- Manipulation detection in cryptocurrency markets: an anomaly and change detection based approachOlaf Kampers, Abdulhakim Qahtan, Swati Mathur, Yannis Velegrakis. 326-329 [doi]
- Towards a decentralized social trust solution to proof-of-addressSuzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur. 330-333 [doi]
- ++, a DAG-based permissionless ledgerAimen Djari, Emmanuelle Anceaume, Sara Tucci Piergiovanni. 334-336 [doi]
- Toward replicated and asynchronous data streams for edge-cloud applicationsOwais Qayyum, Weihai Yu. 339-346 [doi]
- Evaluating the integration of datasetsMatteo Paganelli, Francesco Del Buono, Francesco Guerra 0001, Nicola Ferro 0001. 347-356 [doi]
- A graph-based blocking approach for entity matching using pre-trained contextual embedding modelsJohn Bosco Mugeni, Toshiyuki Amagasa. 357-364 [doi]
- Unifying categorical representation of multi-model dataPavel Koupil, Irena Holubová. 365-371 [doi]
- Indexer++: workload-aware online index tuning with transformers and reinforcement learningVishal Sharma, Curtis E. Dyreson. 372-380 [doi]
- Querying multidimensional big data through a chatbot systemMaria Helena Franciscatto, Marcos Didonet Del Fabro, Celio Trois, Jordi Cabot, Leon Augusto Okida Gonçalves. 381-384 [doi]
- A comprehensive approach to conceptual modelling and visual representation of log filesEvelina Rakhmetova, Marco Garosi, Carlo Combi. 385-388 [doi]
- Spatial data processing meets RDF graph exploration: student research abstractHoussameddine Yousfi. 389-392 [doi]
- Variable size segmentation for efficient representation and querying of non-uniform time series datasetsLamia Djebour, Reza Akbarinia, Florent Masseglia. 395-402 [doi]
- "Do you know existing accuracy metrics overrate time-series anomaly detections?"Won-Seok Hwang, Jeong-Han Yun, Jonguk Kim, Byung-gil Min. 403-412 [doi]
- K-core decomposition on super large graphs with limited resourcesShicheng Gao, Jie Xu 0007, Xiaosen Li, Fangcheng Fu, Wentao Zhang, Wen Ouyang, Yangyu Tao, Bin Cui 0001. 413-422 [doi]
- Sparse tensor storage by tensor unfoldingK. M. Azharul Hasan, Md. Safayet Hossain. 423-428 [doi]
- EiFFFeL: enforcing fairness in forests by flipping leavesSeyum Assefa Abebe, Claudio Lucchese, Salvatore Orlando 0001. 429-436 [doi]
- Efficient memory utilization in conformance checking of process event streamsRashid Zaman, Marwan Hassani, Boudewijn F. van Dongen. 437-440 [doi]
- Nested trees for longitudinal classificationSergey Ovchinnik, Fernando E. B. Otero, Alex Alves Freitas. 441-444 [doi]
- Mining high average utility pattern using bio-inspired algorithm: student research abstractNam Ngoc Pham. 445-449 [doi]
- Optimizing ADWIN for steady streamsHassan Moharram, Ahmed Awad, Passent M. El-Kafrawy. 450-459 [doi]
- pi-Lisco: parallel and incremental stream-based point-cloud clusteringHannaneh Najdataei, Vincenzo Gulisano, Philippas Tsigas, Marina Papatriantafilou. 460-469 [doi]
- Learning on streaming graphs with experience replayMassimo Perini, Giorgia Ramponi, Paris Carbone, Vasiliki Kalavri. 470-478 [doi]
- Improving CRPD analysis for EDF scheduling: trading speed for precisionFabien Bouquillon, Giuseppe Lipari, Smaïl Niar. 481-490 [doi]
- Simulating execution time and power consumption of real-time tasks on embedded platformsGabriele Ara, Tommaso Cucinotta, Agostino Mascitti. 491-500 [doi]
- CETAS: a cluster based energy and temperature efficient real-time scheduler for heterogeneous platformsYanshul Sharma, Sanjay Moulik. 501-509 [doi]
- Detecting return-oriented programming on firmware-only embedded devices using hardware performance countersAdebayo Omotosho, Gebrehiwet B. Welearegai, Christian Hammer 0001. 510-519 [doi]
- Towards privacy aware deep learning for embedded systemsVasisht Duddu, Antoine Boutet, Virat Shejwalkar. 520-529 [doi]
- At-scale assessment of weight clustering for energy-efficient object detection acceleratorsMartí Caro, Hamid Tabani, Jaume Abella 0001. 530-533 [doi]
- A priority-aware multiqueue NIC design for real-time IoT devicesIlja Behnke, Philipp Wiesner, Robert Danicki, Lauritz Thamsen. 534-538 [doi]
- Place embedding across cities in location-based social networksChristophe Haikal, Pegah Alizadeh, Christophe Rodrigues, Chongke Bi. 539-546 [doi]
- An ETL-like platform for the processing of mobility dataMaxime Masson, Cécile Cayèré, Marie-Noëlle Bessagnet, Christian Sallaberry, Philippe Roose, Cyril Faucher. 547-555 [doi]
- Propagation measure on circulation graphs for tourism behavior analysisHugo Prevoteau, Sonia Djebali, Laiping Zhao, Nicolas Travers. 556-563 [doi]
- Discovery of tourists' movement patterns in venice from public transport dataHéctor Cogollos Adrián, Santiago Porras Alfonso, Bruno Baruque Zanon, Alessandra Raffaetà, Filippo Zanatta. 564-568 [doi]
- SAGA-Net: efficient pointcloud completion with shape-assisted graph attention neural networkLiuyue Xie, Tinglin Duan, Kenji Shimada. 569-576 [doi]
- Learning football player features using graph embeddings for player recommendation systemÖznur Ilayda Yilmaz, Sule Gündüz Ögüdücü. 577-584 [doi]
- Deep graph neural network for video-based facial pain expression assessmentSabrina Patania, Giuseppe Boccignone, Sathya Bursic, Alessandro D'Amelio, Raffaella Lanzarotti. 585-591 [doi]
- Compact graph neural network models for node classificationLuca Pasa, Nicolò Navarin, Alessandro Sperduti. 592-599 [doi]
- Continuous-time generative graph neural network for attributed dynamic graphs: student research abstractAlice Moallemy-Oureh. 600-603 [doi]
- Using local activity encoding for dynamic graph pooling in stuctural-dynamic graphs: student research abstractSilvia Beddar-Wiesing. 604-609 [doi]
- A fast unsupervised assignment of ICD codes with clinical notes through explanationsAmit Kumar, Suman Roy 0001, Sourabh Kumar Bhattacharjee. 610-618 [doi]
- Improving ligand transport trajectory within flexible receptor in CaverDockPetra Nemcová, Jana Hozzová, Jiri Filipovic. 619-626 [doi]
- Configuring a federated network of real-world patient health data for multimodal deep learning prediction of health outcomesChristian Haudenschild, Louis J. Vaickus, Joshua J. Levy. 627-635 [doi]
- Development of biologically interpretable multimodal deep learning model for cancer prognosis predictionZarif L. Azher, Louis J. Vaickus, Lucas A. Salas, Brock C. Christensen, Joshua J. Levy. 636-644 [doi]
- Disentangling temporal and amplitude variations in ECG synthesis using anchored GANsNour Neifar, Afef Mdhaffar, Achraf Ben-Hamadou, Mohamed Jmaiel, Bernd Freisleben. 645-652 [doi]
- A hybrid descriptor to improve kidney pathologies classificationLaiara Cristina da Silva, Vinícius Ponte Machado, Rodrigo de Melo Souza Veras, Keylla Maria de Sá Urtiga Aita, Semiramis Jamil Hadad do Monte, Nayze Lucena Sangreman Aldeman. 653-659 [doi]
- DAM-AL: dilated attention mechanism with attention loss for 3D infant brain image segmentationDinh-Hieu Hoang, Gia-Han Diep, Minh-Triet Tran, Ngan T. H. Le. 660-668 [doi]
- CheReS: a deep learning-based multi-faceted system for similarity search of chest X-raysAshery Mbilinyi, Heiko Schuldt. 669-676 [doi]
- Emotion detection from smartphone keyboard interactions: role of temporal vs spectral featuresSalma Mandi, Surjya Ghosh, Pradipta De, Bivas Mitra. 677-680 [doi]
- Data-driven depot pre-positioning model and location-routing algorithm for management of disasters and disease outbreaksSampson E. Akwafuo, Armin R. Mikler, Christopher Ihinegbu. 681-687 [doi]
- Collaborative is better than adversarial: generative cooperative networks for topic clusteringAndrea Lenzi, Paola Velardi. 688-695 [doi]
- Aspect based sentiment analysis in music: a case study with spotifyGiovanni Maria Biancofiore, Tommaso Di Noia, Eugenio Di Sciascio, Fedelucio Narducci, Paolo Pastore. 696-703 [doi]
- Query-relevant sentiment summarization based on facet identification and sentence clusteringMatthew Moulton, Sophie Gao, Yiu-Kai Ng. 704-712 [doi]
- Towards open data discovery: a comparative studyMaria Helena Franciscatto, Marcos Didonet Del Fabro, Celio Trois, Hegler Tissot. 713-716 [doi]
- Assessing health misinformation in online contentStefano Di Sotto, Marco Viviani. 717-722 [doi]
- Towards fast fiducial marker with full 6 DOF pose estimationJirí Ulrich, Ahmad Alsayed, Farshad Arvin, Tomás Krajník. 723-730 [doi]
- Semi-supervised learning for image alignment in teach and repeat navigationZdenek Rozsypálek, George Broughton, Pavel Linder, Tomás Roucek, Keerthy Kusumam, Tomás Krajník. 731-738 [doi]
- Learning state-variable relationships for improving POMCP performanceMaddalena Zuccotto, Alberto Castellini, Alessandro Farinelli. 739-747 [doi]
- Learning adaptive control in dynamic environments using reproducing kernel priors with bayesian policy gradientsApan Dastider, Sayyed Jaffar Ali Raza, Mingjie Lin. 748-757 [doi]
- Bootstrapped learning for car detection in planar lidarsGeorge Broughton, Jirí Janota, Jan Blaha, Zhi Yan 0001, Tomás Krajník. 758-765 [doi]
- Curriculum learning for safe mapless navigationLuca Marzari, Davide Corsi, Enrico Marchesini, Alessandro Farinelli. 766-769 [doi]
- Bounding optimal headings in the Dubins Touring ProblemPetr Vána, Jan Faigl. 770-773 [doi]
- Realization of adaptive system transitions in self-adaptive autonomous robotsAna Petrovska, Julian Weick. 774-777 [doi]
- GraphSPARQL: a GraphQL interface for linked dataKevin Angele, Manuel Meitinger, Marc Bußjäger, Stephan Föhl, Anna Fensel. 778-785 [doi]
- Relational learning with hierarchical attention encoder and recoding validator for few-shot knowledge graph completionXu Yuan, Chengchuan Xu, Peng Li, Zhikui Chen. 786-794 [doi]
- Query-oriented entity spatial-temporal summarization in fuzzy knowledge graphErhe Yang, Fei Hao 0001, Aziz Nasridinov, Geyong Min, Doo-Soon Park. 795-798 [doi]
- Effective use of BERT in graph embeddings for sparse knowledge graph completionXinglan Liu, Hussain Hussain, Houssam Razouk, Roman Kern. 799-802 [doi]
- Attractiveness based conference rankingChen Zhang, Falih Febrinanto, Mujie Liu, Xiangjie Kong 0001, Dongyu Zhang, Sardar M. N. Islam. 803-806 [doi]
- Towards diversity-tolerant RDF-storesMasoud Salehpour, Joseph G. Davis. 807-812 [doi]
- Attention-based clinical note summarizationNeel Kanwal, Giuseppe Rizzo 0002. 813-820 [doi]
- Linguistic characterization of answer passages for fact-seeking question answeringBahadorreza Ofoghi. 821-828 [doi]
- Iterative adversarial removal of gender bias in pretrained word embeddingsYacine Gaci, Boualem Benatallah, Fabio Casati, Khalid Benabdeslem. 829-836 [doi]
- Named-entity recognition for a low-resource language using pre-trained language modelHailemariam Mehari Yohannes, Toshiyuki Amagasa. 837-844 [doi]
- Using distributional thesaurus to enhance transformer-based contextualized representations for low resource languagesGopalakrishnan Venkatesh, Abhik Jana, Steffen Remus, Özge Sevgili, Gopalakrishnan Srinivasaraghavan 0001, Chris Biemann. 845-852 [doi]
- Practical and efficient out-of-domain detection with adversarial learningBo Wang, Tsunenori Mine. 853-862 [doi]
- Leveraging multimodal content for podcast summarizationLorenzo Vaiani, Moreno La Quatra, Luca Cagliero, Paolo Garza. 863-870 [doi]
- Question answering over logic puzzles using theorem provingAdrian Groza, Cristian Nitu. 871-874 [doi]
- Effective utilization of labeled data from related tasks using graph contrastive pretraining: application to disaster related text classificationSamujjwal Ghosh, Subhadeep Maji, Maunendra Sankar Desarkar. 875-878 [doi]
- Context matters!: identifying argumentative relations in essaysGil Rocha, Henrique Lopes Cardoso. 879-882 [doi]
- Dual architecture for name entity extraction and relation extraction with applications in medical corpora: student research abstractErnesto Quevedo Caballero. 883-888 [doi]
- Belief selection through argumentationSouhila Kaci, Yakoub Salhi. 889-896 [doi]
- Topological semantics for default conditional logic: preliminary reportCostas D. Koutras, Christos Nomikos. 897-902 [doi]
- εL concepts with next and globalSatyadharma Tirtarasa, Anni-Yasmin Turhan. 903-910 [doi]
- Update models for lying and misleading announcementsLoc Pham, Tran Cao Son, Enrico Pontelli. 911-916 [doi]
- CEMDA: detecting android complex file events to infer the user's mental modelMichael J. May, Yaakov Cohen, Hovav Menachem, Yogev Swisa. 917-925 [doi]
- An automatic approach to detect problems in Android builds through screenshot analysisLorena P. de Figueiredo, Jonathan P. Gomes, Flavia de S. Santos, Guilherme M. Queiroz, Felipe T. Giuntini, Juliano E. Sales. 926-932 [doi]
- Estimating the lifetime of transient context for adaptive caching in IoT applicationsShakthi Weerasinghe, Arkady B. Zaslavsky, Seng W. Loke, Alexey Medvedev, Amin Abken. 933-942 [doi]
- Pktpit: separating routing and packet transfer for fast and scalable software routersYukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki. 943-951 [doi]
- OpenFlow rule placement in carrier networks for augmented reality applicationsRafael George Amado, Kim Khoa Nguyen, Mohamed Cheriet. 952-959 [doi]
- Statistical verification using learned usages for evaluating energy-efficient mobile device designJiyoung Song, Youlim Jung, Chiwoo Cho, Eunkyoung Jee, Doo-Hwan Bae. 960-963 [doi]
- Generating synthetic mobility data for a realistic population with RNNs to improve utility and privacyAlex Berke, Ronan Doorley, Kent Larson, Esteban Moro. 964-967 [doi]
- Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interceptionXavier Bultel, Cristina Onete. 968-970 [doi]
- Enhanced strawberry image classification using multi-task deep neural learningSandya De Alwis, Bahadorreza Ofoghi, Myung Hwan Na. 971-978 [doi]
- Dual hybridization method for the classification of ultrasound breast tumorsMingue Song, Yanggon Kim. 979-986 [doi]
- Representation learning via consistent assignment of views to clustersThalles Silva, Adín Ramírez Rivera. 987-994 [doi]
- Leveraging n-gram neural embeddings to improve deep learning DGA detectionChristian Morbidoni, Luca Spalazzi, Antonio Teti, Alessandro Cucchiarelli. 995-1004 [doi]
- Automatic disease vector mosquitoes identification via hierarchical data stream classificationEduardo Tieppo, Jean Paul Barddal, Júlio César Nievola. 1005-1012 [doi]
- A comparison of spatio-temporal prediction methods: a parking availability case studyClaudio Lucchese, Gianmarco Callegher, Mirko Modenese, Silvia Dassié. 1013-1020 [doi]
- PTD: privacy-preserving human face processing framework using tensor decompositionJeongho Kim, Shahroz Tariq, Simon S. Woo. 1021-1030 [doi]
- Repairing misclassifications in neural networks using limited dataPatrick Henriksen, Francesco Leofante, Alessio Lomuscio. 1031-1038 [doi]
- Visual context embeddings for zero-shot recognitionGun-hee Cho, Yong Suk Choi. 1039-1047 [doi]
- Correlation-based regularization for fast and energy-efficient spiking neural networksChan Sik Han, Keon-Myung Lee. 1048-1055 [doi]
- A new reference-based algorithm based on non-euclidean geometry for multi-stakeholder media planningFodil Benali, Damien Bodénès, Cyril De Runz, Nicolas Labroche. 1056-1065 [doi]
- A motion-based approach for real-time detection of pornographic content in videosJhonatan Geremias, Eduardo K. Viegas, Alceu S. Britto Jr., Altair O. Santin. 1066-1073 [doi]
- Run-of-mine stockyard recovery scheduling and optimisation for multiple reclaimersHirad Assimi, Ben Koch, Chris Garcia, Markus Wagner 0007, Frank Neumann 0001. 1074-1083 [doi]
- IA-BERT: context-aware sarcasm detection by incorporating incongruity attention layer for feature extractionIda Ayu Putu Ari Crisdayanti, JinYeong Bak, Yunseok Choi, Jee-Hyong Lee. 1084-1091 [doi]
- A classification and review of tools for developing and interacting with machine learning systemsEduardo Mosqueira-Rey, Elena Hernández-Pereira, David Alonso-Ríos, José Bobes-Bascarán. 1092-1101 [doi]
- Adjusting inference time for power efficiency in neuromorphic architecturesSeungYeon Lee, Jaeseop Kim, Bongjae Kim, Sung Y. Shin, Juw Won Park, Jiman Hong. 1102-1108 [doi]
- CAIBAL: cluster-attribute interdependency based automatic labelerMarcel Moura, Rodrigo Veras, Vinícius P. Machado. 1109-1116 [doi]
- Cross-silo federated learning based decision treesSaikishore Kalloori, Severin Klingler. 1117-1124 [doi]
- Feature selection under fairness constraintsGinel Dorleon, Imen Megdiche, Nathalie Bricon-Souf, Olivier Teste. 1125-1127 [doi]
- What averages do not tell: predicting real life processes with sequential deep learningIstván Ketykó, Felix Mannhardt, Marwan Hassani, Boudewijn F. van Dongen. 1128-1131 [doi]
- A similarity-based deep feature extraction method using divide and conquer for image classificationSeunghui Jang, Yanggon Kim. 1132-1135 [doi]
- Semi-supervised clustering via information-theoretic markov chain aggregationSophie Steger, Bernhard C. Geiger, Marek Smieja. 1136-1139 [doi]
- Improving wheat head detection: a data-centric approach by domain variance reductionAbhi Lad, Mehul S. Raval. 1140-1143 [doi]
- A transfer learning approach to predict shipment description qualityXi Chen, Stefano Bromuri, Marko C. J. D. van Eekelen. 1144-1147 [doi]
- A novel approach to discover numerical association based on the coronavirus optimization algorithmC. Segarra-Martín, María Martínez-Ballesteros, Alicia Troncoso, Francisco Martínez-Álvarez. 1148-1151 [doi]
- Similarity-based uncertainty scores for interpretable deep learning in scientific applicationsLilly Roelofs, Claire Weissman, Daniela Raicu, Jacob Furst, Roselyne Tchoua. 1152-1155 [doi]
- A framework for OS portability: from formal models to low-level codeRenata Martins Gomes, Marcel Baunach. 1156-1165 [doi]
- Enhanced configurable snapshot: snapshot-based fast booting on NAND flash with lifetime controlKyungsik Lee, Gunho Lee, Taejoon Song. 1166-1175 [doi]
- DMAFV: testing device drivers against DMA faultsMasanori Misono, Toshiki Hatanaka, Takahiro Shinagawa. 1176-1182 [doi]
- cuPSO: GPU parallelization for particle swarm optimization algorithmsChuan Chi Wang, Chun-Yen Ho, Chia-Heng Tu, Shih-Hao Hung. 1183-1189 [doi]
- R&R tool for Android applications hiding malicious featuresJusuk Lee, Ajung Kim, Sumin Lee, Jiman Hong. 1190-1196 [doi]
- An efficient log-structured scheme for disk arraysGuangyu Zhu, Sangjin Lee, Yongseok Son. 1197-1204 [doi]
- Copying values v.s. references for memory page compaction in virtualized systemsNaoki Aoyama, Hiroshi Yamada. 1205-1207 [doi]
- An efficient and parallel file defragmentation scheme for flash-based SSDsGuangyu Zhu, Jeongeun Lee, Yongseok Son. 1208-1211 [doi]
- Band selection techniques using discrete ranges and maxpooling operations for hyperspectral image pixel classificationDuhyeuk Chang, Jungsoo Lee, Byunghyun Jeong, Junyoung Heo. 1212-1217 [doi]
- Can blockchains and data privacy laws be reconciled?: a fundamental study of how privacy-aware blockchains are feasibleChristoph Stach, Clémentine Gritti, Dennis Przytarski, Bernhard Mitschang. 1218-1227 [doi]
- Ensuring privacy in the application of the Brazilian general data protection law (LGPD)Evandro Thalles Vale de Castro, Geovana R. S. Silva, Edna Dias Canedo. 1228-1235 [doi]
- Mitigation lost in translation: leveraging threat information to improve privacy solution selectionAla'a Al-Momani, Christoph Bösch, Kim Wuyts, Laurens Sion, Wouter Joosen, Frank Kargl. 1236-1247 [doi]
- Synchronous semantics of multi-mode multi-periodic systemsFrédéric Fort, Julien Forget. 1248-1257 [doi]
- Constraint-logic object-oriented programming on the Java virtual machineHendrik Winkelmann, Herbert Kuchen. 1258-1267 [doi]
- Condition-based synchronization in data-centric concurrency controlDavid Neves, Hervé Paulino. 1268-1275 [doi]
- Model-driven customizing of ERP systems: a case studyJonathan Neugebauer, Herbert Kuchen. 1276-1279 [doi]
- Differential testing of simulation-based VM generators: automatic detection of VM generator semantic gaps between simulation and generated VMsPierre Misse-Chanabier, Guillermo Polito, Stéphane Ducasse, Noury Bouraqadi, Luc Fabresse, Pablo Tesone. 1280-1283 [doi]
- Synchronization operator for communication privacyBogdan Aman, Gabriel Ciobanu. 1284-1290 [doi]
- A survey on requirements notations in software engineering researchLarissa Mangolim Amaral, Fábio Levy Siqueira, Anarosa Alves Franco Brandão. 1291-1298 [doi]
- Requirements engineering for autonomous vehicles: a systematic literature reviewQuelita A. D. S. Ribeiro, Moniky Ribeiro, Jaelson Castro. 1299-1308 [doi]
- Studying industry practices of accessibility requirements in agile developmentDarliane Miranda, João Araujo. 1309-1317 [doi]
- Elicitation of adaptive requirements using creativity triggers: a controlled experimentFabian Kneer, Erik Kamsties, Klaus Schmid. 1318-1326 [doi]
- A Bayesian network-based model to understand the role of soft requirements in technology acceptance: the case of the NHS COVID-19 test and trace app in England and WalesLuis Hernán García Paucar, Nelly Bencomo, Alistair G. Sutcliffe, Pete Sawyer. 1327-1336 [doi]
- Impact of Korean culture on the selection of RE elicitation methodsAlexander Uder, Isabel John, Seok-Won Lee. 1337-1340 [doi]
- A user-centric threat model and repository for cyber attacksPrerit Datta, Sara Sartoli, Luis Felipe Gutiérrez, Faranak Abri, Akbar Siami Namin, Keith S. Jones. 1341-1346 [doi]
- Predicting links in a social network based on recognised personalitiesAndrew Aquilina, Charlie Abela. 1347-1354 [doi]
- Rating consistency is consistently underrated: an exploratory analysis of movie-tag rating inconsistencyDenis Kotkov, Alan Medlar, Umesh Raj Satyal, Alexandr V. Maslov, Mats Neovius, Dorota Glowacka. 1355-1364 [doi]
- Shap-enhanced counterfactual explanations for recommendationsJinfeng Zhong, Elsa Negre. 1365-1372 [doi]
- GAN-based matrix factorization for recommender systemsErvin Dervishaj, Paolo Cremonesi. 1373-1381 [doi]
- IPreMom: a continual learning-based image rating framework for infant precious moments capturingYu Huang, Ju-Hui Tseng, Ching-Jui Hsiao, Hui-Mei Hung, Vincent S. Tseng. 1382-1390 [doi]
- F2VAE: a framework for mitigating user unfairness in recommendation systemsRodrigo Borges, Kostas Stefanidis. 1391-1398 [doi]
- On the impact of data sampling on hyper-parameter optimisation of recommendation algorithmsMatteo Montanari, Cesare Bernardis, Paolo Cremonesi. 1399-1402 [doi]
- Bias disparity in graph-based collaborative filtering recommendersGeorgios Boltsis, Evaggelia Pitoura. 1403-1409 [doi]
- Software layer recovery through ego network analysisSanjay B. Thakare, Arvind W. Kiwelekar. 1410-1416 [doi]
- HYGAR: a hybrid genetic algorithm for software architecture recoveryMilad Elyasi, Muhammed Esad Simitcioglu, Abdullah Saydemir, Ali Ekici, Hasan Sözer. 1417-1424 [doi]
- Continuous evaluation of software architectures: an overview of the state of the artRodrigo C. Soares, Vinicius dos Santos, Elisa Yumi Nakagawa. 1425-1431 [doi]
- A federated machine learning approach to detect international revenue share fraud on the 5G edgeLuís Ferreira, Leopoldo Silva, Diana Pinho, Francisco Morais, Carlos Manuel Martins, Pedro Miguel Pires, Pedro Fidalgo, Helena Rodrigues, Paulo Cortez 0001, André Luiz Pilastri. 1432-1439 [doi]
- FEAST: a framework for evaluating implementation architectures of self-adaptive IoT systemsFederico Di Menna, Henry Muccini, Karthik Vaidhyanathan. 1440-1447 [doi]
- X-IoT: a model-driven approach for cross-platform IoT applications developmentFlavio Corradini, Arianna Fedeli, Fabrizio Fornari 0001, Andrea Polini, Barbara Re 0001. 1448-1451 [doi]
- DevOps and microservices in scientific system development: experience on a multi-year industry research projectMaximilien de Bayser, Vinícius C. V. B. Segura, Leonardo Guerreiro Azevedo, Leonardo P. Tizzei, Raphael Thiago, Elton F. S. Soares, Renato Cerqueira. 1452-1455 [doi]
- Estimating the energy consumption of software components from size, complexity and code smells metricsDaniel Guamán, Jennifer Pérez, Priscila Valdiviezo Díaz, Norberto Canas. 1456-1459 [doi]
- Microservices-based systems visualization: student research abstractAmr S. Abdelfattah. 1460-1464 [doi]
- A longitudinal study of hacker behaviourThomas Walshe, Andrew Simpson. 1465-1474 [doi]
- Evolution of a haskell repository and its use of monads: an exploratory study of stackagePaul Leger, Felipe Ruiz, Nicolás Sepúlveda, Ismael Figueroa. 1475-1482 [doi]
- Are tags 'it?': analysis of the impact of tags on StackOverflow questionsVon Ithipathachai, Maral Azizi. 1483-1490 [doi]
- Automating the measurement of heterogeneous chatbot designsPablo C. Cañizares, Sara Pérez-Soler, Esther Guerra, Juan de Lara. 1491-1498 [doi]
- Constraint-logic object-oriented programming for test case generationHendrik Winkelmann, Laura Troost, Herbert Kuchen. 1499-1508 [doi]
- How does the first buggy file work well for iterative IR-based bug localization?Misoo Kim, YoungKyoung Kim, Eunseok Lee. 1509-1516 [doi]
- Fighting evil is not enough when refactoring metamodels: promoting the good also mattersOussama Ben Sghaier, Houari A. Sahraoui, Eugene Syriani. 1517-1526 [doi]
- Investigating technological risks and mitigation strategies in software projectsEmanuel Dantas, Ademar França de Sousa Neto, Dalton Valadares, Mirko Perkusich, Felipe Barbosa Araújo Ramos, Hyggo Oliveira de Almeida, Angelo Perkusich. 1527-1535 [doi]
- Feature assortment for deep learning-based bug localization with a program graphYoungKyoung Kim, Misoo Kim, Eunseok Lee. 1536-1544 [doi]
- Design patterns mining using neural sub-graph matchingPasquale Ardimento, Lerina Aversano, Mario Luca Bernardi, Marta Cimitile. 1545-1553 [doi]
- RepCoder: an automated program repair framework for probability-based program synthesisSuhwan Ji, Sang-Min Choi, Sang-Ki Ko, Dohyung Kim 0005, Hyeonseung Im. 1554-1561 [doi]
- Metrics to quantify software developer experience: a systematic mappingRenata Brasil-Silva, Fábio Levy Siqueira. 1562-1569 [doi]
- Optimized flight safety event detection in the national general aviation flight information databaseAidan P. LaBella, Joshua A. Karns, Farhad Akhbardeh, Travis Desell, Andrew J. Walton, Zechariah Morgan, Brandon Wild, Mark Dusenbury. 1570-1579 [doi]
- How do developers deal with security issue reports on GitHub?Noah Bühlmann, Mohammad Ghafari. 1580-1589 [doi]
- Learning to characterize performance regression introducing code changesDeema Alshoaibi, Hiten Gupta, Max Mendelson, Ilyes Jenhani, Ali Ben Mrad, Mohamed Wiem Mkaouer. 1590-1597 [doi]
- Towards automated library migrations with error prone and refasterRick Ossendrijver, Stephan Schroevers, Clemens Grelck. 1598-1606 [doi]
- A new scrum and CMMI level 2 compatible model for small software firms in order to enhance their software qualitySabir Saheel, Labib Bin Rahman, Fairuz Humaira, Farzana Sadia, Mahady Hasan. 1607-1610 [doi]
- A comparative study of name entity recognition techniques in software engineering textsMichelle Y. Chew, Yi J. Cheng, Oliver Mahan, Md. Rakibul Islam. 1611-1614 [doi]
- Bridging the gap between source code and high-level concepts in static code analysis: student research abstractMicah Schiewe. 1615-1618 [doi]
- On language-agnostic abstract-syntax trees: student research abstractJacob Curtis. 1619-1625 [doi]
- CHORS: hardening high-assurance security systems with trusted computingWojciech Ozga, Rasha Faqeh, Do Le Quoc, Franz Gregor, Silvio Dragone, Christof Fetzer. 1626-1635 [doi]
- Generative adversarial networks for subdomain enumerationLuca Degani, Francesco Bergadano, Seyed Ali Mirheidari, Fabio Martinelli, Bruno Crispo. 1636-1645 [doi]
- The dawn of a text-dependent society: deepfakes as a threat to speech verification systemsAnton Firc, Kamil Malinka. 1646-1655 [doi]
- Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approachManuel Kern, Florian Skopik, Max Landauer, Edgar R. Weippl. 1656-1665 [doi]
- MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALingOlivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade 0001, Cristina Onete, Léo Robert. 1666-1673 [doi]
- Towards effective preservation of robust safety propertiesMatteo Busi, Pierpaolo Degano, Letterio Galletta. 1674-1683 [doi]
- ANUBIS: a provenance graph-based framework for advanced persistent threat detectionMd. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin. 1684-1693 [doi]
- Hardening the security analysis of browser extensionsBenjamin Eriksson, Pablo Picazo-Sanchez, Andrei Sabelfeld. 1694-1703 [doi]
- Effective TLB thrashing: unveiling the true short reach of modern TLB designsAndrés Rainiero Hernández Coronado, Wei-Ming Lin. 1704-1712 [doi]
- Security risks of porting C programs to webassemblyQuentin Stiévenart, Coen De Roover, Mohammad Ghafari. 1713-1722 [doi]
- What you see is not what you get: a man-in-the-middle attack applied to video channelsMauro Conti, Eleonora Losiouk, Alessandro Visintin. 1723-1726 [doi]
- Deriving optimal deep learning models for image-based malware classificationRikima Mitsuhashi, Takahiro Shinagawa. 1727-1731 [doi]
- An architecture for data integrity in untrustworthy social networksCarlos Eduardo da Silva, Angus Young. 1732-1739 [doi]
- User awareness and defenses against sockpuppet friend invitations in FacebookSajedul Talukder, Nestor Hernandez, Mozhgan Azimpourkivi, Bogdan Carbunar. 1740-1747 [doi]
- Combining clutter reduction methods for temporal network visualizationJean R. Ponciano, Claudio D. G. Linhares, Luis E. C. Rocha, Elaine R. Faria, Bruno A. N. Travençolo. 1748-1755 [doi]
- POSLAN: disentangling chat with positional and language encoded post embeddingsBhashithe Abeysinghe, Dhara Shah, Christopher Freas, Robert W. Harrison, Rajshekhar Sunderraman. 1756-1763 [doi]
- Incremental communication patterns in blockchain online social mediaBarbara Guidi, Andrea Michienzi, Laura Ricci. 1764-1770 [doi]
- D-FEND: a diffusion-based fake news detection framework for news articles related to COVID-19Soeun Han, Yun-Yong Ko, Yushim Kim, Seong Soo Oh, Heejin Park, Sang-Wook Kim. 1771-1778 [doi]
- Group oriented trust-aware location recommendation for location-based social networksHuseyin Alper Teoman, Pinar Karagoz. 1779-1788 [doi]
- Characterizing the impact of fact-checking on the COVID-19 misinformation combatCefas Garcia Pereira, Humberto Torres Marques-Neto. 1789-1796 [doi]
- A comparison of online hate on reddit and 4chan: a case study of the 2020 US electionFatima Zahrah, Jason R. C. Nurse, Michael Goldsmith. 1797-1800 [doi]
- Cluster boosting and data discovery in social networksMaria Tomasso, Lucas J. Rusnak, Jelena Tesic. 1801-1803 [doi]
- A diversity personalization approach towards recommending POIs for Jeju islandJongsoo Lee, Jung Ah Shin, Dong-Kyu Chae. 1804-1807 [doi]
- Summarization of branching loopsMartin Blicha, Jan Kofron, William Tatarko. 1808-1816 [doi]
- Verifying opacity by abstract interpretationIsabella Mastroeni, Michele Pasqua. 1817-1826 [doi]
- Leveraging hardware-dependent knowledge extraction with multiple program analysis techniquesThuy Nguyen, Takashi Tomita, Junpei Endo, Geon-ung Kang, Toshiaki Aoki. 1827-1836 [doi]
- A lightweight approach for sound call graph approximationAharon Abadi, Bar Makovitzki, Ron Shemer, Shmuel S. Tyszberowicz. 1837-1844 [doi]
- Model sketching by abstraction refinement for lifted model checkingAleksandar S. Dimovski. 1845-1848 [doi]
- Verifying redundant-check based countermeasures: a case studyThibault Martin, Nikolai Kosmatov, Virgile Prevosto. 1849-1852 [doi]
- A simple proof of data-race freedom and coherence for simpson's 4-slot algorithmXu Wang, Qiwen Xu. 1853-1856 [doi]
- Capturing program models with BISMChukri Soueidi, Yliès Falcone. 1857-1861 [doi]
- Predicting the category of customers' next product to buy in web shopsLaura Rekasiute, Alvaro Jose Jimenez Palenzuela, Nijole Salnaite, Ramon Carrera Cuenca, Flavius Frasincar. 1862-1871 [doi]
- Could jamstack be the future of web applications architecture?: an empirical studyDragana Markovic, Milic Scekic, Alessio Bucaioni, Antonio Cicchetti. 1872-1881 [doi]
- Knowledge graph enhanced multi-task learning between reviews and ratings for movie recommendationYun Liu, Jun Miyazaki, Qiong Chang. 1882-1889 [doi]
- Generalized graph pattern discovery in linked data with data properties and a domain ontologyTomas Martin, Victor Fuentes, Petko Valtchev, Abdoulaye Baniré Diallo, René Lacroix. 1890-1899 [doi]
- A blockchain-based framework for drug traceability: ChainDrugTracEddy Kiomba Kambilo, Hajer Baazaoui Zghal, Chirine Ghedira Guegan, Vlado Stankovski, Petar Kochovski, Dan Vodislav. 1900-1907 [doi]
- EABlock: a declarative entity alignment block for knowledge graph creation pipelinesSamaneh Jozashoori, Ahmad Sakor, Enrique Iglesias, Maria-Esther Vidal. 1908-1916 [doi]
- v-TCM: vertical-aware transformer click model for web searchKritarth Bisht, Seba Susan. 1917-1920 [doi]
- 5D-IoT, a semantic web based framework for assessing IoT data qualityShubham Mante, Nathalie Hernandez, Aftab M. Hussain, Sachin Chaudhari, Deepak Gangadharan, Thierry Monteil 0001. 1921-1924 [doi]
- UAV-VANET authentication for real-time highway surveillanceOtto Benjamin Piramuthu, Matthew C. Caesar. 1925-1931 [doi]
- Cluster-based AUV communication for delay-sensitive vulnerability detection using NDNJunho Seo, Ayesha Siddiqa, Muhammad Ashar Tariq, Malik Muhammad Saad 0001, Dongkyun Kim. 1932-1937 [doi]
- A reinforcement learning-based path planning for collaborative UAVsShahnila Rahim, Mian Muaz Razaq, Shih Yu Chang, Limei Peng. 1938-1943 [doi]
- On hybrid front-haul for 5G NR mmWave indoor coverageSyed Hassan Raza Naqvi, Pin-Han Ho. 1944-1949 [doi]
- A meta-policy approach for learning suitable caching replacement policies in information-centric networksStéfani S. Pires, Adriana Ribeiro, Leobino Sampaio. 1950-1959 [doi]
- Multi-antenna covert communications in random wireless networks with full-duplex relayYan Liu, Huihui Wu, Yulong Shen, Xiaohong Jiang 0001. 1960-1966 [doi]
- Optimization of IoT slices in wifi enterprise networksForoutan Fami, Nessrine Hammami, Chuan Pham, Kim Khoa Nguyen. 1967-1974 [doi]
- Lightweight VANET authentication protocolsOtto Benjamin Piramuthu, Matthew Caesar 0001. 1975-1978 [doi]
- GPGPU wide-area calculations for estimation of electromagnetic field human exposure levelsDariusz P. Wiecek, Jacek W. Wronski. 1979-1982 [doi]
- An intelligent blockchain application for emergency medical servicesThomas Lavigne, Bacem Mbarek, Tomás Pitner. 1983-1986 [doi]