Abstract is missing.
- EdGCon: Auto-assigner of Iconicity Ratings Grounded by Lexical Properties to Aid in Generation of Technical GesturesSameena Hossain, Payal Kamboj, Aranyak Maity, Tamiko Azuma, Ayan Banerjee, Sandeep K. S. Gupta. 3-10 [doi]
- Image4Assess: Automatic learning processes recognition using image processingHsin-Yu Lee, Maral Hooshyar, Chia-Ju Lin, Wei-Sheng Wang, Yueh-Min Huang. 11-16 [doi]
- Analysis of AI Models for Student Admissions: A Case StudyKelly M. Van Busum, Shiaofen Fang. 17-22 [doi]
- A Semantic Evidence-based Approach to Continuous Cloud Service CertificationChristian Banse, Immanuel Kunz, Nico Haas, Angelika Schneider. 24-33 [doi]
- Digital Forgetting Using Key DecayMarwan Adnan Darwish, Apostolis Zarras. 34-41 [doi]
- CEDCES: A Cost Effective Deadline Constrained Evolutionary Scheduler for Task Graphs in Multi-Cloud SystemAtharva Tekawade, Suman Banerjee 0002. 42-44 [doi]
- AI Enabled Cloud Service to detect Conversion Fraud in E-commerceAbhay Narayan, Disha Galve, Anu Mary Chacko. 45-48 [doi]
- On the Measurement of Performance Metrics for Virtualization-Enhanced ArchitecturesSwapneel C. Mhatre, Priya Chandran. 49-56 [doi]
- COSTA: A cost-driven solution for migrating applications in multi-cloud environmentsLeandro Costa da Silva, Robson De Medeiros, Nelson S. Rosa. 57-63 [doi]
- RAB: Recomputation Aided Backup for Energy Efficient Non-volatile ProcessorsShuo Xu, Huichuan Zheng, Hao Zhang, Mengying Zhao. 64-71 [doi]
- Efficient Sanitization Design for LSM-based Key-Value Store over 3D MLC NAND FlashLiang-Chi Chen, Shu-Qi Yu, Chien-Chung Ho, Wei-Chen Wang, Yung-Chun Li. 72-75 [doi]
- Towards A High-interaction Physics-aware Honeynet for Industrial Control SystemsMarco Lucchese, Massimo Merro, Federica Paci, Nicola Zannone. 76-79 [doi]
- CCFlash: A Correlation-Aware Compression Approach in Flash MemoryJianqiang Chen, Qiongxia Huang, Jiebin Zhai, Zhirong Shen. 80-87 [doi]
- BcBench: Exploring Throughput Processor Designs based on Blockchain BenchmarkingXiurui Pan, Yue Chen, Shushu Yi, Jie Zhang. 88-97 [doi]
- Enhancing Polar Codes Efficiency on 3D Flash Memory by Exploiting Multiple Error VariationsYajuan Du, Ziye Wang, Yao Zhou, Taiyu Zhou. 98-105 [doi]
- IoMiRCA: Root cause analysis in IoT-extended 5G microservice environmentsZeno Heeb, Onur Kalinagac, Wissem Soussi, Gürkan Gür. 106-108 [doi]
- Traffic Intersections as Agents: A model checking approach for analysing communicating agentsThamilselvam B, Yenda Ramesh, Subrahmanyam Kalyanasundaram, M. V. Panduranga Rao. 109-118 [doi]
- An Extensible Framework for Implementing Byzantine Fault-Tolerant ProtocolsHanish Gogada, John Ingve Olsen, Hein Meling, Leander Jehl. 121-124 [doi]
- Detection of Adversarial Attacks by Observing Deep Features with Structured Data AlgorithmsTommaso Puccetti, Andrea Ceccarelli, Tommaso Zoppi, Andrea Bondavalli. 125-134 [doi]
- SOTERIA: Preserving Privacy in Distributed Machine LearningCláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira 0001, João Paulo 0001. 135-142 [doi]
- Deduplication vs Privacy Tradeoffs in Cloud StorageRodrigo Silva, Cláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues. 143-151 [doi]
- Proof of Swarm Based Ensemble Learning for Federated Learning ApplicationsAli Raza 0005, Kim Phuc Tran, Ludovic Koehl, Shujun Li. 152-155 [doi]
- Acala: Aggregate Monitoring for Geo-Distributed Cluster FederationsChih-Kai Huang 0003, Guillaume Pierre. 156-164 [doi]
- Cost-effective Data Upkeep in Decentralized Storage SystemsRacin Nygaard, Hein Meling, John Ingve Olsen. 165-173 [doi]
- Stateful Adaptive Streams with Approximate Computing and Elastic ScalingJoão Francisco, Miguel E. Coimbra, Pedro Fernandes Ribeiro Neto, Felix Freitag, Luís Veiga. 174-183 [doi]
- Defektor: An Extensible Tool for Fault Injection Campaign Management in Microservice SystemsGoncalo Baptista, Jaime Correia, André Bento, João Soares, Antonio Ferreira, João Durães, Raul Barbosa, Filipe Araújo. 184-187 [doi]
- Maude Specification of Nets-Within-Nets: A Formal Model of Adaptable Distributed SystemsLorenzo Capra, Michael Köhler-Bußmeier. 188-191 [doi]
- Fluidity: Location-Awareness in Replicated State MachinesJohannes Köstler, Hans P. Reiser, Franz J. Hauck, Gerhard Habiger. 192-201 [doi]
- SBvote: Scalable Self-Tallying Blockchain-Based VotingIvana Stancíková, Ivan Homoliak. 203-211 [doi]
- Ethereum Proof-of-Stake under ScrutinyUlysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci Piergiovanni. 212-221 [doi]
- DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based mannerKristof Jannes, Vincent Reniers, Wouter Lenaerts, Bert Lagaisse, Wouter Joosen. 222-230 [doi]
- Distributed Key Generation with Smart Contracts using zk-SNARKsMichael Sober, Max Kobelt, Giulia Scaffino, Dominik Kaaser, Stefan Schulte 0002. 231-240 [doi]
- NFT Trust SurveyJean-Marc Seigneur, Suzana Mesquita de Borba Maranhão Moreno. 241-244 [doi]
- RESTChain: a Blockchain-based Mediator for REST Interactions in Service ChoreographiesFrancesco Donini, Alessandro Marcelletti, Andrea Morichetta 0001, Andrea Polini. 245-248 [doi]
- A Technology Readiness Level for BlockchainGarry Clawson. 249-257 [doi]
- Alleviating High Gas Costs by Secure and Trustless Off-chain Execution of Smart ContractsSoroush Farokhnia, Amir Kafshdar Goharshady. 258-261 [doi]
- Towards automated verification of Bitcoin-based decentralised applicationsStefano Bistarelli, Andrea Bracciali, Rick Klomp, Ivan Mercanti. 262-269 [doi]
- PoRt: Non-Interactive Continuous Availability Proof of Replicated StorageReyhaneh Rabaninejad, Bin Liu, Antonis Michalas. 270-279 [doi]
- Student Research Abstract: SplitChain: Blockchain with fully decentralized dynamic sharding resilient to fast adaptive adversariesArthur Rauch. 280-283 [doi]
- A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot PersistenceDimitri Van Landuyt, Julien Benaouda, Vincent Reniers, Ansar Rafique, Wouter Joosen. 286-293 [doi]
- HSMR-RAID: Enabling a Low Overhead RAID-5 System over a Host-managed Shingled Magnetic Recording Disk ArrayTing-Yu Lin, Tseng-Yi Chen. 294-296 [doi]
- On evaluating text similarity measures for customer data deduplicationPawel Boinski, Mariusz Sienkiewicz, Robert Wrembel, Bartosz Bebel, Witold Andrzejewski. 297-300 [doi]
- EHS: An Efficient Hashing Scheme for Persistent MemoryDereje Regassa, Dong-Kyu Sung, Sunggon Kim, Heon Young Yeom, Yongseok Son. 301-304 [doi]
- NF-Log: Revisiting Log Writes in Relational Database for Efficient Persistent Memory UtilizationSara Zguem, Qichen Chen, Heon Young Yeom. 305-312 [doi]
- Exploring alternatives of Complex Event Processing execution engines in demanding casesStyliani Kyrama, Anastasios Gounaris. 313-320 [doi]
- OCC2T: An Early-Read Dual-Track OCC Algorithm For Mixed Mode SystemsAbdullah Alhajri, Arshad Jhumka, Richard Kirk. 321-330 [doi]
- MUTUAL: Multi-Domain Sentiment Classification via Uncertainty SamplingKaterina Katsarou, Roxana Jeney, Kostas Stefanidis. 331-339 [doi]
- Elastic Data Binning for Transient Pattern Analysis in Time-Domain AstrophysicsThanapol Phungtua-Eng, Yoshitaka Yamamoto, Shigeyuki Sako. 342-349 [doi]
- Real-life Performance of Fairness Interventions - Introducing A New Benchmarking Dataset for Fair MLDaphne Lenders, Toon Calders. 350-357 [doi]
- A fully automated and scalable Parallel Data Augmentation for Low Resource Languages using image and text analyticsPrawaal Sharma, Navneet Goyal, Poonam Goyal, Vishnupriyan R. 358-361 [doi]
- Summarizing Fuzzy Tensors with Sub-TensorsVictor Henrique Silva Ribeiro, Loïc Cerf. 362-364 [doi]
- Discovering Process Models that Support Desired Behavior and Avoid Undesired BehaviorAli Norouzifar, Wil M. P. van der Aalst. 365-368 [doi]
- Enforcement of Minimal Size and Area Constraints before and while Mining Patterns in Fuzzy TensorsLoïc Cerf. 369-376 [doi]
- Multivariate Time Series Evapotranspiration Forecasting using Machine Learning TechniquesChalachew Liyew, Rosa Meo, Elvira Di Nardo, Stefano Ferraris. 377-380 [doi]
- An active learning budget-based oversampling approach for partially labeled multi-class imbalanced data streamsGabriel Aguiar, Alberto Cano 0001. 382-389 [doi]
- Aging and rejuvenating strategies for fading windows in multi-label classification on data streamsMartha Roseberry, Saso Dzeroski, Albert Bifet, Alberto Cano 0001. 390-397 [doi]
- Accelerating the quality control of genetic sequences through stream processingÓscar Castellanos-Rodríguez, Roberto R. Expósito, Juan Touriño. 398-401 [doi]
- A DTW Approach for Complex Data A Case Study with Network Data StreamsPaula Raissa Silva, João Vinagre, João Gama 0001. 402-409 [doi]
- Transformer based Early Classification for Real-time Human Activity Recognition in Smart HomesTae Hoon Lee, Hyunju Kim, Dongman Lee. 410-417 [doi]
- Online adaptive learning for out-of-round railway wheels detectionAfonso Lourenço, Jorge Meira, Goreti Marreiros. 418-421 [doi]
- Estimating Instantaneous Vehicle EmissionsThiago Andrade, João Gama. 422-424 [doi]
- Quality Diversity Evolutionary Learning of Decision TreesAndrea Ferigo, Leonardo Lucio Custode, Giovanni Iacca. 425-432 [doi]
- Evolutionary computation to explain deep learning models for time series forecastingAngela Troncoso-Garcia, Alicia Troncoso Lora, Francisco Martínez-Álvarez, María Martínez-Ballesteros. 433-436 [doi]
- Optimal Location of Charging Stations for Electric Vehicles: A Theoretically-Sound Heuristic ModelAlfredo Cuzzocrea, Luigi Canada, Riccardo Nicolicchia, Luca Roldo. 437-440 [doi]
- A bioinspired ensemble approach for multi-horizon reference evapotranspiration forecasting in PortugalManuel Jesus Jimenez Navarro, Maria Martinez Ballesteros, Isabel Sofia Brito, Francisco Martínez-Álvarez, Gualberto Asencio Cortés. 441-448 [doi]
- A Software-Only Approach to Enable Diverse Redundancy on Intel GPUs for Safety-Related KernelsNikolaos Andriotis, Alejandro Serrano-Cases, Sergi Alcaide, Jaume Abella 0001, Francisco J. Cazorla, Yang Peng, Andrea Baldovin, Michael Paulitsch, Vladimir Tsymbal. 451-460 [doi]
- Tracking Coherence-Related Contention Delays in Real-Time Multicore SystemsRoger Pujol, Mohamed Hassan, Hamid Tabani, Jaume Abella 0001, Francisco Javier Cazorla-Almeida. 461-470 [doi]
- ASCOM: Affordable Sequence-aware COntention Modeling in Crossbar-based MPSoCsJeremy Jens Giesen León, Enrico Mezzetti, Jaume Abella 0001, Francisco Javier Cazorla-Almeida. 471-474 [doi]
- A Makespan and Energy-Aware Scheduling Algorithm for Workflows under Reliability Constraint on a Multiprocessor PlatformSuman Banerjee 0002, Atharva Tekawade. 475-482 [doi]
- CAT: Context Aware Tracing for Rust Asynchronous ProgramsTsung-Yen Wang, Shao-Hua Wang, Chia-Heng Tu, Wen-Yew Liang. 483-492 [doi]
- Detecting Road Intersections from Satellite Images using Convolutional Neural NetworksFatmaelzahraa Eltaher, Luis Miralles Pechuán, Jane Courtney, Susan McKeever. 495-498 [doi]
- Graph-based semi-supervised classification for similar wildfire dynamicsLilian Berton, Pedro Oliveira, Didier A. Vega-Oliveros. 499-506 [doi]
- POI types characterization based on geographic feature embeddingsSalatiel Dantas Silva, Cláudio Elízio Calazans Campelo, Maxwell Guimarães de Oliveira. 507-514 [doi]
- A general methodology for building multiple aspect trajectoriesFrancesco Lettich, Chiara Pugliese, Chiara Renso, Fabio Pinelli. 515-517 [doi]
- SymptomGraph: Identifying Symptom Clusters from Narrative Clinical Notes using Graph ClusteringFattah Muhammad Tahabi, Susan Storey, Xiao Luo 0002. 518-527 [doi]
- G-HIN2Vec: Distributed heterogeneous graph representations for cardholder transactionsFarouk Damoun, Hamida Seba, Jean Hilger, Radu State. 528-535 [doi]
- Topology preserving maps as aggregations for Graph Convolutional Neural NetworksPaolo Frazzetto, Luca Pasa, Nicolò Navarin, Alessandro Sperduti. 536-543 [doi]
- Quasi-CliquePool: Hierarchical Graph Pooling for Graph ClassificationWaqar Ali, Sebastiano Vascon, Thilo Stadelmann, Marcello Pelillo. 544-552 [doi]
- Parallel construction of RNA databases for extensive lncRNA-RNA interaction predictionIñaki Amatria-Barral, Jorge González-Domínguez, Juan Touriño. 555-558 [doi]
- A Synthetic Dataset Generation for the Uveitis Pathology Based on MedWGAN ModelHeithem Sliman, Imen Megdiche, Sami Yangui, Aida Drira, Ines Drira, Elyes Lamine. 559-566 [doi]
- Mapping Strategies for Declarative Queries over Online Heterogeneous Biological Databases for Intelligent ResponsesHasan M. Jamil, Kallol Naha. 567-574 [doi]
- MGCMA: Multi-scale Generator with Channel-wise Mask Attention to generate Synthetic Contrast-enhanced Chest Computed TomographyJeongho Kim 0007, Yun-Gyoo Lee, Donggeun Ko, Taejune Kim, Soo-Youn Ham, Simon S. Woo. 575-584 [doi]
- Automatic Detection of Signalling Behaviour from Assistance Dogs as they Forecast the Onset of Epileptic Seizures in HumansHitesh Raju, Ankit Sharma, Aoife Smeaton, Alan F. Smeaton. 585-592 [doi]
- Personalized Graph Attention Network for Multivariate Time-series Change Analysis: A Case Study on Long-term Maternal MonitoringYuning Wang, Iman Azimi, Mohammad Feli, Amir M. Rahmani, Pasi Liljeberg. 593-598 [doi]
- Diversity-Promoting Ensemble for Medical Image SegmentationMariana-Iuliana Georgescu, Radu-Tudor Ionescu, Andreea-Iuliana Miron. 599-606 [doi]
- Unsupervised Forecasting and Anomaly Detection of ADLs in single-resident elderly smart homesZahraa Khais Shahid, Saguna Saguna, Christer Åhlund. 607-610 [doi]
- Mobile Freeze-Net with Attention-based Loss Function for Covid-19 Detection from an Imbalanced CXR DatasetSantanu Roy, Rahul Khurana. 611-613 [doi]
- Patient-GAT: Sarcopenia Prediction using Multi-modal Data Fusion and Weighted Graph Attention NetworksCary Xiao, Nam Pham, Erik Imel, Xiao Luo. 614-617 [doi]
- Automatic Pain Assessment with Ultra-short Electrodermal Activity SignalXinwei Ji, Tianming Zhao, Wei Li, Albert Y. Zomaya. 618-625 [doi]
- An ML Model for Mental Health Monitoring using Facial Emotion Detection and Analyzing Social Media PostsShafna V, Sd Madhu Kumar. 626-628 [doi]
- The Case for tinyML in Healthcare: CNNs for Real-Time On-Edge Blood Pressure EstimationBailian Sun, Safin Bayes, Abdelrhman Mohamed Abotaleb, Mohamed Hassan. 629-638 [doi]
- Multiple Choice Online Algorithms for Technology-Assisted ReviewsOtto Benjamin Piramuthu. 639-645 [doi]
- On the Effect of Low-Ranked Documents: A New Sampling Function for Selective Gradient BoostingClaudio Lucchese, Federico Marcuzzi, Salvatore Orlando 0001. 646-652 [doi]
- Student Research Abstract: Unsupervised Key Term Extraction of Tornado Narratives from NOAA Storm Events DatabaseEmma Louise McDaniel. 653-656 [doi]
- MP-DDPG: Optimal Latency-Energy Dynamic Offloading Scheme in Collaborative Cloud NetworksJui Mhatre, Ahyoung Lee. 658-660 [doi]
- An Energy-efficient FaaS Edge Computing platform over IoT Nodes: Focus on Consensus AlgorithmDavid Fernández Blanco, Frederic Le Mouel, Trista Lin, Julien Ponge. 661-670 [doi]
- Software Aging in a Real-Time Object Detection System on an Edge ServerKengo Watanabe, Fumio Machida, Ermeson Carneiro de Andrade, Roberto Pietrantuono, Domenico Cotroneo. 671-678 [doi]
- Efficient Resource Augmentation of Resource Constrained UAVs Through EdgeCPSSangil Ha, Euteum Choi, Dongbeom Ko, Sungjoo Kang, Seongjin Lee. 679-682 [doi]
- Dynamic Load Balancing of RDF Reasoning in Fog-Computing EnvironmentsYuma Kokubo, Toshiyuki Amagasa. 683-690 [doi]
- Reducing Power Consumption during Server Maintenance on Edge Computing InfrastructuresFelipe Rubin, Paulo Silas Severo de Souza, Tiago Ferreto. 691-698 [doi]
- The not-so-easy task of taking heavy-lift ML models to the edge: a performance-watt perspectiveLucas Caetano Pereira, Bruna Guterres, Kauê Sbrissa, Amanda Mendes, Francisca Vermeulen, Lisl Lain, Marié Smith, Javier Martinez, Paulo Drews Jr., Nelson Duarte Filho, Vinicus Oliveira, Silvia Botelho, Marcelo Pias. 699-706 [doi]
- Swapping training optimizers and tiny partial datasets to improve performance of lighter neural networks for edge devicesAlexandre Moreira Nascimento, Vinicius Melo, Márcio P. Basgalupp. 707-714 [doi]
- Design and Implementation of a Blockchain-based e-Voting system by using the Algorand platformChristian Esposito 0001, Chang Choi. 715-723 [doi]
- Towards Deployment of Mobile Robot driven Preference Learning for User-State-Specific Thermal Control in A Real-World Smart SpaceGeon Kim, Hyunju Kim, Dongman Lee. 724-731 [doi]
- Student Research Abstract: A Hybrid Approach to Design Embedded Software Using JavaScript's Non-blocking PrincipleFernando Oliveira. 732-735 [doi]
- Interoperable Access Control Framework for Services Demanding High Level Security among Heterogeneous IoT PlatformsJahoon Koo, Giluk Kang, Young-Gab Kim. 737-740 [doi]
- Interoperability of Heterogeneous Systems of Systems: Review of Challenges, Emerging Requirements and OptionsMersedeh Sadeghi, Alessio Carenini, Óscar Corcho, Matteo Rossi, Riccardo Santoro, Andreas Vogelsang. 741-750 [doi]
- Relation Modeling on Knowledge Graph for Interoperability in Recommender SystemsSeungjoo Lee, Seokho Ahn, Youngduk Seo. 751-758 [doi]
- WiFi-enabled Occupancy Monitoring in Smart Buildings with a Self-Adaptive MechanismMuhammad Salman, Young-Duk Soe, Youngtae Noh. 759-762 [doi]
- Model-Driven Integration and the OSLC Standard: a Mapping of Applied StudiesFábio Basso, Bruno Marcelo Soares Ferreira, Rafael Torres, Rafael Z. Frantz, Diego Kreutz, Maicon Bernardino, Elder de Macedo Rodrigues. 763-770 [doi]
- A Hierarchical Game-Theoretic Decision-Making for Cooperative Multiagent Systems Under the Presence of Adversarial AgentsQin Yang 0001, Ramviyas Parasuraman. 773-782 [doi]
- Optimising Redundancy in Distributed Sensor NetworksCyril Monette, James Wilson. 783-786 [doi]
- An Empirical Method for Benchmarking Multi-Robot Patrol Strategies in Adversarial EnvironmentsJames C. Ward, Edmund R. Hunt. 787-790 [doi]
- Autonomous Topological Optimisation for Multi-robot Systems in LogisticsZuyuan Zhu, Gautham P. Das, Marc Hanheide. 791-799 [doi]
- Low-Power Footprint Inference with a Deep Neural Network offloaded to a Service Robot through Edge ComputingPedro Silva, Rui Rocha. 800-807 [doi]
- Multi-Robot Expansive Planning and Trajectory Evaluation for Tracking and Localization of Marine LifeKehlani Fay, Michael Giordano, Alberto Soto, Christopher M. Clark, Emily Spurgeon, James Anderson, Christopher G. Lowe. 808-815 [doi]
- A formalization of multi-agent planning with explicit agent representationAlessandro Trapasso, Sofia Santilli, Luca Iocchi, Fabio Patrizi. 816-823 [doi]
- Finding Indicator Diseases of Psychiatric Disorders in BigData using Clustered Association Rule MiningMarkus Bertl, Mahtab Shahin, Peeter Ross, Dirk Draheim. 826-833 [doi]
- Improving the Quality of Public Transportation by Dynamically Adjusting the Bus Departure TimeShuheng Cao, Syauki Aulia Thamrin, Arbee Chen. 834-843 [doi]
- Multimodal Semantographic Metalanguage (MSM): A novel methodology for digital enablement of semi-literatesPrawaal Sharma, Navneet Goyal, Poonam Goyal. 844-851 [doi]
- An Efficient Feature-based Method for People CountingDaniel Helmer, Heiko Hinkelmann, Thomas Hollstein. 852-855 [doi]
- Modeling a Conversational Agent using BDI FrameworkAlexandre Yukio Ichida, Felipe Meneguzzi. 856-863 [doi]
- On the Shift to Decentralised Identity Management in Distributed Data Exchange SystemsMariia Bakhtina, Raimundas Matulevicius, Ahmed Awad 0001, Petteri Kivimäki. 864-873 [doi]
- Deep-Learning based Trust Management with Self-Adaptation in the Internet of BehaviorHind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Buhnova. 874-881 [doi]
- Migration from HL7 Clinical Document Architecture (CDA) to Fast Health Interoperability Resources (FHIR) in Infectious Disease Information System of EstoniaIgor Bossenko, Kerli Linna, Gunnar Piho, Peeter Ross. 882-885 [doi]
- AI4CITY - An Automated Machine Learning Platform for Smart CitiesPedro José Pereira, Carlos Gonçalves, Lara Lopes Nunes, Paulo Cortez 0001, André Luiz Pilastri. 886-889 [doi]
- Dynamic Named Entity RecognitionTristan Luiggi, Vincent Guigue, Laure Soulier, Siwar Jendoubi, Aurélien Baelde. 890-897 [doi]
- Call Reason Prediction using Hierarchical ModelsVijay Varma Malladi, Suman Roy 0001. 898-901 [doi]
- FREDA: Flexible Relation Extraction Data AnnotationMichael Strobl, Amine Trabelsi, Osmar R. Zaïane. 902-910 [doi]
- Zero-Shot Taxonomy Mapping for Document ClassificationLorenzo Bongiovanni, Luca Bruno, Fabrizio Dominici, Giuseppe Rizzo 0002. 911-918 [doi]
- REFORMIST: Hierarchical Attention Networks for Multi-Domain Sentiment Classification with Active LearningKaterina Katsarou, Nabil Douss, Kostas Stefanidis. 919-928 [doi]
- BERTEPro : A new Sentence Embedding Framework for the Education and Professional Training domainGuillaume Lefebvre, Haytham Elghazel, Théodore Guillet, Alexandre Aussem, Matthieu Sonnati. 929-935 [doi]
- A General and NLP-based Architecture to perform Recommendation: A Use Case for Online Job Search and Skills AcquisitionRubén Alonso, Danilo Dessì, Antonello Meloni, Diego Reforgiato Recupero. 936-938 [doi]
- Impact of Character n-grams Attention Scores for English and Russian News Articles Authorship AttributionLiliya Makhmutova, Robert Ross, Giancarlo D. Salton. 939-941 [doi]
- Arabic Aspect Category Detection for Hotel Reviews based on Data Augmentation and Classifier ChainsAsma Ameur, Sana Hamdi 0001, Sadok Ben Yahia. 942-949 [doi]
- A Biomedical Entity Extraction Pipeline for Oncology Health Records in PortugueseHugo Sousa, Alípio Mário Jorge, Arian Pasquali, Catarina Sousa Santos, Mário Amorim-Lopes. 950-956 [doi]
- Reasoning about Non-Deterministic Observability and Hypothetical Action Occurrences in Multi-Agent DomainsLoc Pham, Tran Cao Son, Enrico Pontelli. 957-964 [doi]
- Dynamic Controllability of Parameterized CSTNUsMarco Franceschetti, Roberto Posenato, Carlo Combi, Johann Eder. 965-973 [doi]
- Treating Role Assertions as First-class Citizens in Repair and Error-tolerant ReasoningFranz Baader, Francesco Kriegel, Adrian Nuradiansyah. 974-982 [doi]
- Optimal Repairs in Ontology Engineering as Pseudo-Contractions in Belief ChangeFranz Baader. 983-990 [doi]
- Breaking Symmetry for Knowledge CompilationAndrea Balogh, Barry O'Sullivan. 991-994 [doi]
- Representing and Manipulating Large Sequences of Argumentation LabellingsOdinaldo Rodrigues. 995-1002 [doi]
- Translating FOL-theories into SROIQ-TboxesFatima Danash, Danielle Ziébelin. 1003-1006 [doi]
- An Exploratory Study About Non-functional Requirements Documentation Practices in Agile TeamsShahraz Nasir, Eduardo Martins Guerra, Luciana A. M. Zaina, Jorge Melegati. 1009-1017 [doi]
- Which Challenges Do Exist With Agile Culture in Practice?Thorben Kuchel, Michael Neumann, Philipp Diebold, Eva-Maria Schön. 1018-1025 [doi]
- Agile GUI Testing by computing novel Mobile App Coverage Using Appium ToolSangharatna Godboley, Debasish Dalei, Ravichandra Sadam, Durga Prasad Mohapatra. 1026-1029 [doi]
- Challenges in Large-Scale Agile Software Development ProjectsHina Saeeda, Muhammad Ovais Ahmad, Tomas Gustavsson. 1030-1037 [doi]
- Differences in performance, scalability, and cost of using microservice and monolithic architecturePrzemyslaw Jatkiewicz, Szymon Okrój. 1038-1041 [doi]
- Tailoring Hybrid Software Processes in a Medium-size Software CompanyJacqueline Marín, Julio Ariel Hurtado, María Cecilia Bastarrica, Luis Silvestre. 1042-1050 [doi]
- Towards a Recommender System-based Process for Managing Risks in Scrum ProjectsAdemar França de Sousa Neto, Felipe Barbosa Araújo Ramos, Danyllo Albuquerque, Emanuel Dantas, Mirko Barbosa Perkusich, Hyggo Oliveira de Almeida, Angelo Perkusich. 1051-1059 [doi]
- Student Research Abstract: Why and Where Software Developers are (not) using Project Data in Agile RetrospectivesLeon Bein. 1060-1063 [doi]
- Exploiting Machine-learning Prediction for Enabling Real-time Pixel-scaling Techniques in Mobile Camera ApplicationsShih-En Wei, Sheng-Da Tsai, Chun-Han Lin. 1065-1067 [doi]
- CrossChat: Instant Messaging across Different Apps on Mobile DevicesMenglong Cui, Mingsong Lv, Chuancai Gu, Tao Yang, Qiulin Chen, Nan Guan. 1068-1077 [doi]
- Adaptive Context Caching for Efficient Distributed Context Management SystemsShakthi Yasas Weerasinghe, Arkady B. Zaslavsky, Seng Wai Loke, Amin Abken, Alireza Hassani, Alexey Medvedev. 1078-1087 [doi]
- Prediction of readmissions in hospitalized children and adolescents by machine learningNayara Cristina da Silva, Marcelo Keese Albertini, André Ricardo Backes, Geórgia das Graças Pena. 1088-1091 [doi]
- Robust DeepFake Detection Method based on Ensemble of ViT and CNNHyunsoo Ha, Minsang Kim, Songhun Han, Sangjun Lee. 1092-1095 [doi]
- ComplAI: Framework for Multi-factor Assessment of Black-Box Supervised Machine Learning ModelsArkadipta De, Satya Swaroop Gudipudi, Sourab Panchanan, Maunendra Sankar Desarkar. 1096-1099 [doi]
- Exploring Candlesticks and Multi-Time Windows for Forecasting Stock-Index MovementsKanghyeon Seo, Jihoon Yang. 1100-1109 [doi]
- Estimating Phenotypic Characteristics of Tuberculosis BacteriaDerek Sloan, Evelin Dombay, Wilber Sabiiti, Bariki Mtafya, Ognjen Arandjelovic, Marios Zachariou. 1110-1113 [doi]
- FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised LearningShubham Malaviya, Manish Shukla 0001, Pratik Korat, Sachin Lodha. 1114-1121 [doi]
- Analysis of active semi-supervised learningLilian Berton, Felipe Mitsuishi, Didier Augusto Vega-Oliveros. 1122-1129 [doi]
- S-ViT: Sparse Vision Transformer for Accurate Face RecognitionGeunsu Kim, Gyudo Park, Soohyeok Kang, Simon S. Woo. 1130-1138 [doi]
- Show, Prefer and Tell: Incorporating User Preferences into Image CaptioningAnnika Lindh, Robert J. Ross, John D. Kelleher. 1139-1142 [doi]
- Finite Multivariate McDonald's Beta Mixture Model Learning Approach in Medical ApplicationsDarya Forouzanfar, Narges Manouchehri, Nizar Bouguila. 1143-1150 [doi]
- IMG-NILM: A Deep learning NILM approach using energy heatmapsJonah Edmonds, Zahraa S. Abdallah. 1151-1153 [doi]
- Sec2vec: Anomaly Detection in HTTP Traffic and Malicious URLsMateusz Gniewkowski, Henryk Maciejewski, Tomasz Surmacz, Wiktor Walentynowicz. 1154-1162 [doi]
- Semi-Supervised Hybrid Predictive Bi-Clustering Trees for Drug-Target Interaction PredictionAndré Hallwas Ribeiro Alves, Pedro Ilidio, Ricardo Cerri. 1163-1170 [doi]
- Are alternatives to backpropagation useful for training Binary Neural Networks? An experimental study in image classificationBen Crulis, Barthélemy Serres, Cyril De Runz, Gilles Venturini. 1171-1178 [doi]
- SLResNet: Neural-Network-Based End-to-End Structure Light 3D Reconstruction for EndoscopeChi-Sheng Shih 0001, Yu-shian Lin, Kai Ju Cheng, Chin Kang Chang. 1179-1188 [doi]
- Machine Learning Applied on Hydraulic Actuator ControlThomaz Pereira Da Silva Junior, Everson da Silva Flores, Vagner Santos Da Rosa, Fabio Augusto Pires Borges. 1189-1196 [doi]
- MultiPathGAN: Structure Preserving Stain Normalization using Unsupervised Multi-domain Adversarial Network with Perception LossHaseeb Nazki, Ognjen Arandjelovic, In Hwa Um, David J. Harrison. 1197-1204 [doi]
- Convolutional Method for Modeling Video Temporal Context Effectively in TransformerHae-Sung Park, Yong Suk Choi. 1205-1208 [doi]
- Federated Hyperparameter Optimisation with Flower and OptunaJuan Parra-Ullauri, Xunzheng Zhang, Anderson Bravalheri, Reza Nejabati, Dimitra Simeonidou. 1209-1216 [doi]
- Classification by Frequent Association RulesMd Rayhan Kabir, Osmar Zaïane. 1217-1220 [doi]
- MAFD: A Federated Distillation Approach with Multi-head Attention for Recommendation TasksAming Wu, Young-Woo Kwon 0001. 1221-1224 [doi]
- Discrete Wavelet Coefficient-based Embeddable Branch for Ultrasound Breast Masses ClassificationMingue Song, Yanggon Kim. 1225-1232 [doi]
- ACL TA-DA: A Dataset for Text Summarization and GenerationMin Su Park, Eunil Park. 1233-1239 [doi]
- Gradient-based Counterfactual Generation for Sparse and Diverse Counterfactual ExplanationsChan Sik Han, Keon-Myung Lee. 1240-1247 [doi]
- Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial ImagesGiljun Lee, Jinbeom Kim, Taejune Kim, Simon S. Woo. 1248-1255 [doi]
- Adaptive Feature Selection Using an Autoencoder and Classifier: Applied to a Radiomics CaseReza Hassanpour, Niels Netten, Tony Busker, Mortaza Shoae-Bargh, Sunil Choenni. 1256-1259 [doi]
- Interpretable ML enhanced CNN Performance Analysis of cuBLAS, cuDNN and TensorRTZhumakhan Nazir, Vladislav Yarovenko, Jurn-Gyu Park. 1260-1265 [doi]
- PKache: A Generic Framework for Data Plane CachingRoy Friedman, Or Goaz, Dor Hovav. 1268-1276 [doi]
- Topology Analysis of the XRP LedgerVytautas Tumas, Sean Rivera, Damien Magoni, Radu State. 1277-1284 [doi]
- Time-limited Bloom FilterAna Rodrigues, Ariel Shtul, Carlos Baquero, Paulo Sérgio Almeida. 1285-1288 [doi]
- A Lightweight Authentication and Privacy Preservation Scheme for MQTTSijia Tian, Vassilios Vassilakis. 1289-1292 [doi]
- Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability WindowsMana Senuki, Kenta Ishiguro, Kenji Kono. 1293-1300 [doi]
- Hot-patching Platform for Executable and Linkable Format Binary Application for System ResilienceHaegeon Jeong, Kyungtae Kang, Jinsung An. 1301-1304 [doi]
- Comparative Study on Fuchsia and Linux Device Driver ArchitectureTaejoon Song, Youngjin Kim. 1305-1308 [doi]
- MFence: Defending Against Memory Access Interference in a Disaggregated Cloud Memory PlatformJinhoon Lee, Yeonwoo Jung, Suyeon Lee, Safdar Jamil, Sungyong Park, Kwangwon Koh, Hongyeon Kim, Youngjae Kim, Kangho Kim. 1309-1317 [doi]
- An Efficient Profiling Tool for Baseboard Management ControllersJaeseop Kim, Juw Won Park, Sung Y. Shin, Austin Hanson, Jae-Hoon An, Younghwan Kim, Jiman Hong. 1318-1324 [doi]
- Hibernation Execution Interval based Hybrid Boot for Baseboard Management ControllersAjung Kim, Gwangyong Kim, Bongjae Kim, Jiman Hong. 1325-1331 [doi]
- Spidermine: Low Overhead User-Level PrefetchingJiwoong Won, Sangwoon Yun, Jemin Ahn, Jong Chan Kim, Kyungtae Kang. 1332-1341 [doi]
- zCeph: Achieving High Performance On Storage System Using Small Zoned ZNS SSDJin-Yong Ha, Heon Young Yeom. 1342-1351 [doi]
- Privacy Compliance in Software Development: A Guide to Implementing the LGPD PrinciplesLucas Dalle Rocha, Geovana Ramos Sousa Silva, Edna Dias Canedo. 1352-1361 [doi]
- Privacy by Design in Software Engineering: An update of a Systematic Mapping StudyShirlei Aparecida de Chaves, Fabiane Barreto Vavassori Benitti. 1362-1369 [doi]
- Type-based Termination Analysis for Parsing Expression GrammarsElton M. Cardoso, Regina Sarah Monferrari Amorim De Paula, Daniel Freitas Pereira, Leonardo Vieira dos Santos Reis, Rodrigo Geraldo Ribeiro. 1372-1379 [doi]
- Synchronous cooperative threading model in MSSLDarine Rammal, Wadoud Bousdira, Frédéric Dabrowski. 1380-1383 [doi]
- Optimizing the Order of Bytecode Handlers in Interpreters using a Genetic AlgorithmWanhong Huang, Stefan Marr, Tomoharu Ugawa. 1384-1393 [doi]
- Anticipation of Method Execution in Mixed Consistency SystemsMarco Giunti, Hervé Paulino, António Ravara. 1394-1401 [doi]
- A Multi-layered Collaborative Framework for Evidence-driven Data Requirements Engineering for Machine Learning-based Safety-critical SystemsSangeeta Dey, Seok-Won Lee. 1404-1413 [doi]
- Towards a FAIR Dataset for non-functional requirementsMaría Isabel Limaylla Lunarejo, Nelly Condori-Fernández, Miguel R. Luaces. 1414-1421 [doi]
- Building User Stories and Behavior Driven Development Scenarios with a Strict Set of Concepts: Ontology, Benefits and Primary ValidationSamedi Heng, Konstantinos Tsilionis, Yves Wautelet. 1422-1429 [doi]
- Using Automatically Recommended Seed Mappings for Machine Learning-Based Code-to-Architecture MappersSebastian Herold, Zipani Tom Sinkala. 1432-1439 [doi]
- A Theoretical Framework for Self-Adaptive Systems: Specifications, Formalisation, and Architectural ImplicationsAna Petrovska, Thomas Hutzelmann, Stefan Kugele. 1440-1449 [doi]
- Expressive and Systematic Risk Assessments with Instance-Centric Threat ModelsStef Verreydt, Dimitri Van Landuyt, Wouter Joosen. 1450-1457 [doi]
- Specialization of Run-time Configuration Space at Compile-time: An Exploratory StudyXhevahire Tërnava, Mathieu Acher, Benoît Combemale. 1459-1468 [doi]
- Source Code Metrics for Software Defects PredictionDominik Arne Rebro, Stanislav Chren, Bruno Rossi 0001. 1469-1472 [doi]
- Deriving metrics for software architectures from the "protected entry points" security patternsMonica Buitrago, Isabelle Borne, Jérémy Buisson. 1473-1475 [doi]
- PyLC: A Framework for Transforming and Validating PLC Software using Python and Pynguin Test GeneratorMikael Ebrahimi Salari, Eduard Paul Enoiu, Wasif Afzal, Cristina Seceleanu. 1476-1485 [doi]
- Optimization of the Product Configuration System of RenaultHao Xu, Souheib Baarir, Tewfik Ziadi, Siham Essodaigui, Yves Bossu, Lom-Messan Hillah. 1486-1489 [doi]
- Survey on Trust in Software Engineering for Autonomous Dynamic EcosystemsBarbora Buhnova, David Halasz, Danish Iqbal, Hind Bangui. 1490-1497 [doi]
- Applying Gamification to Prioritize Requirements in Agile ProjectsDaniel Silva, Maria Lencastre 0001, João Pimentel, Jaelson Castro, Luiza Lira. 1498-1507 [doi]
- MCRepair: Multi-Chunk Program Repair via Patch Optimization with Buggy BlockJisung Kim, Byungjeong Lee. 1508-1515 [doi]
- A Performant and Secure Single Sign-On System Using MicroservicesMahyar Tourchi Moghaddam, Andreas Edal Pedersen, William Walter Lillebroe Bolding, Torben Worm. 1516-1519 [doi]
- Free Willy: Prune System Calls to Enhance Software SecurityCharlie Groh, Sergej Proskurin, Apostolis Zarras. 1522-1529 [doi]
- CryptSan: Leveraging ARM Pointer Authentication for Memory Safety in C/C++Konrad Hohentanner, Philipp Zieris, Julian Horsch. 1530-1539 [doi]
- ARGANIDS: a novel Network Intrusion Detection System based on adversarially Regularized Graph AutoencoderAndrea Venturi, Matteo Ferrari, Mirco Marchetti, Michele Colajanni. 1540-1548 [doi]
- Realism versus Performance for Adversarial Examples Against DL-based NIDSHuda Ali Alatwi, Charles Morisset. 1549-1557 [doi]
- RMC-PVC: A Multi-Client Reusable Verifiable Computation ProtocolGael Marcadet, Pascal Lafourcade 0001, Léo Robert. 1558-1565 [doi]
- The EVIL Machine: Encode, Visualize and Interpret the LeakageValence Cristiani, Maxime Lecomte, Philippe Maurine. 1566-1575 [doi]
- Scalable Coercion-Resistant E-Voting under Weaker Trust AssumptionsThomas Haines, Johannes Müller 0001, Iñigo Querejeta-Azurmendi. 1576-1584 [doi]
- Generic Privacy Preserving Private Permissioned BlockchainsFrederic A. Hayek, Mirko Koscina, Pascal Lafourcade 0001, Charles Olivier-Anclin. 1585-1592 [doi]
- A Cross-Domain Aspect-Based Sentiment Classification by Masking the Domain-Specific WordsJunhee Lee, Flavius Frasincar, Maria Mihaela Trusca. 1595-1602 [doi]
- Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter DataJamie Knott, Haiyue Yuan, Matthew Boakes, Shujun Li. 1603-1606 [doi]
- SocioPedia: Visualizing Social Knowledge over TimeTra My Nguyen, Jason J. Jung. 1607-1614 [doi]
- Personalized Prediction of Offensive News Comments by Considering the Characteristics of CommentersTeruki Nakahara, Taketoshi Ushiama. 1615-1622 [doi]
- Topic Aware Influential Member Detection in MeetupArpan Dam, Suryansh Kumar, Debarati Bhattacharjee, Sayan Pathak, Bivas Mitra. 1623-1632 [doi]
- Graph Convolutional Neural Network for Multimodal Movie RecommendationPrabir Mondal, Daipayan Chakder, Subham Raj, Sriparna Saha 0001, Naoyuki Onoe. 1633-1640 [doi]
- Detecting and Measuring the Polarization Effects of Adversarial Botnets on TwitterYeonjung Lee, Mert Ozer, Steven R. Corman, Hasan Davulcu. 1641-1649 [doi]
- Comparing Modern Build Automation Tools for an Insurance CompanyArne Koschel, Kim Chi Tran, Alexander Grunewald, Moritz Lange, Anna Pakosch, Irina Astrova. 1650-1655 [doi]
- Hierarchical Platform Design for the Comprehensive Test and Validation of Future Power Device using DT, RTDS, and PHILSJeongtaek Lim, Minho Kim, Kyung Sun Ham, Taehyoung Kim. 1656-1658 [doi]
- Optimal Charging Method for Effective Li-ion Battery Life Extension Based on Reinforcement LearningMinho Kim, Jeongtaek Lim, Kyung Sun Ham, Taehyoung Kim. 1659-1661 [doi]
- Detecting Suspicious Conditional Statement using App Execution LogSumin Lee, Minho Park, Jiman Hong. 1662-1668 [doi]
- Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign MethodIn-Pyo Hong, Gyu Ho Choi, PanKoo Kim, Chang Choi. 1669-1672 [doi]
- Formalizing an Efficient Runtime Assertion Checker for an Arithmetic Language with Functions and PredicatesThibaut Benjamin, Julien Signoles. 1673-1680 [doi]
- A formal analysis of Dutch Generic Integral Tunnel Design modelsKevin H. J. Jilissen, Peter Dieleman, Jan Friso Groote. 1681-1684 [doi]
- Ownership-Based Owicki-Gries ReasoningMikhail Semenyuk, Brijesh Dongol. 1685-1694 [doi]
- BlueCov: Integrating Test Coverage and Model Checking with JBMCMatthias Güdemann, Peter Schrammel. 1695-1697 [doi]
- Multi-thread Combinatorial Test Generation with SMT solversAndrea Bombarda, Angelo Gargantini, Andrea Calvagna. 1698-1705 [doi]
- An Efficient Black-Box Support of Advanced Coverage Criteria for KleeNicolas Berthier, Steven de Oliveira, Nikolai Kosmatov, Delphine Longuet, Romain Soulat. 1706-1715 [doi]
- Exhaustive Branch Coverage with TreeFrogNicky Williams. 1716-1723 [doi]
- Ontology-Mediated Data Migration: Deriving Migration Rules by Reasoning on Schema DescriptionsLoris Bozzato, Luciano Serafini. 1724-1731 [doi]
- Inferring Threatening IoT Dependencies using Semantic Digital Twins Toward Collaborative IoT Device ManagementAmal Guittoum, François Aïssaoui, Sébastien Bolle, Fabienne Boyer, Noel De Palma. 1732-1741 [doi]
- An Ontology-Driven Approach for Process-Aware Risk PropagationGal Engelberg, Mattia Fumagalli, Adrian Kuboszek, Dan Klein, Pnina Soffer, Giancarlo Guizzardi. 1742-1745 [doi]
- DISO: A Domain Ontology for Modeling Dislocations in Crystalline MaterialsAhmad Zainul Ihsan, Said Fathalla, Stefan Sandfeld. 1746-1753 [doi]
- Automatic Extraction of Effective Relations in Knowledge Graph for a Recommendation Explanation SystemShi-Jun Luo, Hyoil Han, Qiong Chang, Jun Miyazaki. 1754-1761 [doi]
- CEM: an Ontology for Crime Events in Newspaper ArticlesFederica Rollo, Laura Po, Alessandro Castellucci. 1762-1765 [doi]
- Scalable Simultaneous Connectivity with Multiple APs and Virtual UEs in CF-NetworksAyesha Siddiqa, Junho Seo, Malik Muhammad Saad 0001, Bomi Jeong, Dongkyun Kim. 1766-1771 [doi]
- Fairness Analysis of Deep Reinforcement Learning based Multi-Path QUIC SchedulingErnesto Quevedo Caballero, Michael Jeff Donahoo, Tomas Cerny. 1772-1781 [doi]
- An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT EnvironmentSanjay Kumar, Kumar Abhishek 0004, Rutvij Jhaveri, Abdulatif Alabdulatif, Rajkumar Gaur. 1782-1788 [doi]
- Machine Learning for VRUs accidents prediction using V2X dataBruno Ribeiro, Maria João Nicolau, Alexandre Santos. 1789-1791 [doi]
- Towards the support of Industrial IoT applications with TSCHIvanilson França Vieira Júnior, Marília Curado, Jorge Granjal. 1792-1798 [doi]
- Weighted Neural Collaborative Filtering: Deep Implicit Recommendation with Weighted Positive and Negative FeedbackStan Hennekes, Flavius Frasincar. 1799-1808 [doi]
- Usability Heuristics and Guidelines for RESTful APIs and Application to a Case StudyEduardo Mosqueira-Rey, David Alonso-Ríos, Nerea Vazquez-Callejon. 1809-1812 [doi]
- Million.js: A Fast Compiler-Augmented Virtual DOM for the WebAiden Bai. 1813-1820 [doi]
- Semantic-based Adaptation of Quality of Experience in Web Multimedia StreamsGiuseppe Loseto, Floriano Scioscia, Michele Ruta, Filippo Gramegna, Ivano Bilenchi. 1821-1830 [doi]
- Proxy-based Web Prefetching Exploiting Long Short-Term MemoryJiwoong Won, Wenbo Zou, Jemin Ahn, Jiseoup Lim, Gun-Woo Kim, Kyungtae Kang. 1831-1834 [doi]