Abstract is missing.
- Toward Scalable and Transparent Multimodal Analytics to Study Standard Medical Procedures: Linking Hand Movement, Proximity, and Gaze DataVille Heilala, Sami Lehesvuori, Raija Hämäläinen, Tommi Kärkkäinen. 3-10 [doi]
- The effectiveness of lightweight automated support for learning about dynamic systems with qualitative representationsMarco Kragten, Bert Bredeweg. 11-20 [doi]
- Decoding the Naturally Arisen Leadership in Collaborative Learning: A Bayesian Simulation and Human Network StudyZheng Fang, Jaeyoung Han, Ahmad Ari Aldino, Zhijie Feng, Toby Cai. 21-28 [doi]
- SIG-Net: GNN based dropout prediction in MOOCs using Student Interaction GraphDaeyoung Roh, Donghee Han, Daehee Kim, Keejun Han, Mun Yong Yi. 29-37 [doi]
- Exploring The Effectiveness of Reading vs. Tutoring For Enhancing Code Comprehension For NovicesPriti Oli, Rabin Banjade, Arun Balajiee Lekshmi Narayanan, Peter Brusilovsky, Vasile Rus. 38-47 [doi]
- The Temporal Dynamics of Procrastination and its Impact on Academic Performance: The Case of a Task-oriented Programming CourseJavier Conde, Sonsoles López-Pernas, Enrique Barra, Mohammed Saqr. 48-55 [doi]
- On the relation of causality- versus correlation-based feature selection on model fairnessMirka Saarela. 56-64 [doi]
- ChatGPT as a Math Questioner? Evaluating ChatGPT on Generating Pre-university Math QuestionsVan Long Phuoc Pham, Duc Anh Vu 0002, Nhat-Minh Hoang, Xuan Long Do, Anh Tuan Luu. 65-73 [doi]
- Generative AI-Enhanced Academic Writing: A Stakeholder-Centric Approach for the Design and Development of CHAT4ISP-AIMohammed Ahmed Taiye, Christopher High, Johanna Velander, Khaled Matar, Rihards Okmanis, Marcelo Milrad. 74-80 [doi]
- Contextual Embeddings and Graph Convolutional Networks for Concept Prerequisite LearningJean-Charles Layoun, Amal Zouaq, Michel C. Desmarais. 81-90 [doi]
- Equity and Fairness Challenges in Online Learning in the Age of ChatGPTHasan Jamil. 91-92 [doi]
- Utilizing Explainable AI to Enhance Real-time Student Performance Prediction in Educational Serious GamesManuel J. Gomez, Álvaro Armada Sánchez, Mariano Albaladejo-González, Félix J. García Clemente, José A. Ruipérez Valiente. 93-94 [doi]
- Open Player Modeling - Using AI to help Reflection and Learning in Serious GamesSai Siddartha Maram, Jennifer Villareale, Jichen Zhu, Magy Seif El-Nasr. 95-97 [doi]
- An Instructor's Lens into the Role of AI in Teaching Experimental Research via GamificationSai Siddartha Maram, Anna Amato, Giovanni Maria Troiano, Steven C. Sutherland, Camillia Matuk, Edward F. Melcer, Elín Carstensdóttir, Casper Harteveld, Magy Seif El-Nasr. 98-100 [doi]
- Authoring Worked Examples for JAVA Programming with Human AI CollaborationMohammad Hassany, Jiaze Ke, Peter Brusilovsky, Arun Balajiee Lekshmi Narayanan, Kamil Akhuseyinoglu. 101-103 [doi]
- An Integer Linear Programming Model Based on Competences for Student-Industry Placement AllocationMoumena Salah Yassen, Víctor Sánchez-Anguix, Juan M. Alberola, Fulgencia Villa. 104-105 [doi]
- Duty vs. Consequence: Exploring Teachers' Assessment of the Ethical Dimensions of Generative AI TechnologiesStephen J. Aguilar, Changzhao Wang. 106-108 [doi]
- Disjunctive Multi-Level Digital Forgetting SchemeMarwan Adnan Darwish, Georgios Smaragdakis. 112-121 [doi]
- Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging ApplicationsRabimba Karanjai, Lei Xu, Lin Chen, Nour Diallo, Weidong Shi. 122-130 [doi]
- FuncMem: Reducing Cold Start Latency in Serverless Computing Through Memory Prediction and Adaptive Task ExecutionManish Pandey, Young-Woo Kwon 0001. 131-138 [doi]
- SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic EncryptionPriyanka Singh, Jash Rathi, Priyankaben Babulal Patel. 139-141 [doi]
- Hardware and Software Generation from Large Actor Machines in Streaming ApplicationsGareth Callanan, Flavius Gruian. 142-150 [doi]
- Satellite Imagery-Assisted Link-Budget Analysis Algorithm for Smart Grid Wireless Backhaul Network PlanningMarina Luísa de Souza Carrasco Vieira, Marina De Lara, Marcelo Eduardo Pellenz, Mauricio Biczkowski, Marcos Alberto Mochinski, Fabrício Enembreck, Edgard Jamhour, Voldi Costa Zambenedetti. 151-158 [doi]
- MOT-AS: Real-Time Scheduling Framework for Multi-Object Tracking Capturing Accuracy and StabilityDonghwa Kang, Kilho Lee, Cheol-Ho Hong, Youngmoon Lee, Jinkyu Lee 0001, Hyeongboo Baek. 159-168 [doi]
- Binary Folding Compression for Efficient Software DistributionJinheng Li, Qiao Li, Hu Wan 0001, Chun Jason Xue. 169-176 [doi]
- SatPrint: Satellite Link FingerprintingGabriele Oligeri, Savio Sciancalepore, Alireza Sadighian. 177-185 [doi]
- Temporal Logic Formalisation of ISO 34502 Critical Scenarios: Modular Construction with the RSS Safety DistanceJesse Reimann, Nico Mansion, James Haydon, Benjamin Bray, Agnishom Chattopadhyay, Sota Sato 0001, Masaki Waga, Étienne André, Ichiro Hasuo, Naoki Ueda, Yosuke Yokoyama. 186-195 [doi]
- Bridging DNA Storage and Computation: An Integrated Framework for Efficient Biomolecular Data ManagementYi-Syuan Lin, Yu-Pei Liang, Yuan-Hao Chang 0001, Wei Kuan Shih, Wen Sheng Lim. 196-203 [doi]
- CANLP: NLP-Based Intrusion Detection System for CANKavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran. 212-214 [doi]
- OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor AuthenticationMarco De Vincenzi 0001, Chiara Bodei, Ilaria Matteucci. 215-217 [doi]
- Autoencoder-based Continual Outlier Correlation Detection for Real-Time Traffic Flow PredictionHimanshu Choudhary, Marwan Hassani. 218-220 [doi]
- Investigating the Effectiveness of 3D Monocular Object Detection Methods for Roadside ScenariosSilvio Barra, Mirko Marras, Sondos Mohamed, Alessandro Sebastian Podda, Roberto Saia. 221-223 [doi]
- Dynamic Optimization of the Latency Throughput Trade-off in Parallel Chain Distributed LedgersPedro Camponês, Henrique Domingos. 226-234 [doi]
- Enabling Adaptation in Dynamic Manufacturing Environments with Decentralized Agent-Based Systems and Local PerceptionSebastian Schmid 0001, Andreas Harth. 235-242 [doi]
- Fortress: Securing IoT Peripherals with Trusted Execution EnvironmentsPeterson Yuhala, Jämes Ménétrey, Pascal Felber, Marcelo Pasin, Valerio Schiavoni. 243-250 [doi]
- Solvability of Byzantine Fault-Tolerant Causal Ordering: Synchronous Systems CaseAnshuman Misra, Ajay D. Kshemkalyani. 251-256 [doi]
- On the Reliability of Time-Sensitive Network InfrastructuresWilli Brekenfelder, Tom Reincke, Helge Parzyjegla, Peter Danielis, Omer Hanif Khan, Gero Mühl. 257-258 [doi]
- Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymizationDaiki Ito, Yuta Takata, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono. 259-268 [doi]
- Electricity Consumption of Ethereum and Filecoin: Advances in Models and EstimatesElitsa Pankovska, Ashish Rajendra Sai, Harald Vranken, Alan Ransil. 269-277 [doi]
- Unsealing the secrets of blockchain consensus: A systematic comparison of the formal security of proof-of-work and proof-of-stakeIván Abellán Álvarez, Vincent Gramlich, Johannes Sedlmeir. 278-287 [doi]
- A Study of MEV Extraction Techniques on a First-Come-First-Served BlockchainBurak Öz, Filip Rezabek, Jonas Gebele, Felix Hoops, Florian Matthes. 288-297 [doi]
- Using Blockchain for Incentive-Driven FHIR-based Health Record ExchangeMoritz Rosar, Kun-Ta Chuang. 298-299 [doi]
- Formalization and Verification of Delegate Contract Signing Mechanism Based on Smart Contract Using CSPBangjie Zhu, Jiaqi Yin, Sini Chen, Huibiao Zhu. 300-304 [doi]
- A Declarative Query Language Enabled Autonomous Deep Web Search EngineKallol Naha, Hasan Jamil. 305-312 [doi]
- Cross-Lingual Learning Strategies for Improving Product Matching QualityAndré Luiz Firmino Alves, Cláudio de Souza Baptista, Luciano Barbosa, Clecio B. M. Araujo. 313-320 [doi]
- MIGUE-Sim: Speeding Up Similarity Queries with Native RDBMS ResourcesIgor A. R. Eleutério, Mirela T. Cazzolato, Larissa Roberta Teixeira, Marco Antonio Gutierrez 0001, Agma Juci Machado Traina, Caetano Traina. 321-328 [doi]
- Regret Minimization in Billboard Advertisement under Zonal Influence ConstraintDildar Ali, Suman Banerjee 0002, Yamuna Prasad. 329-336 [doi]
- DiApprox: Differential Privacy-based Online Range Queries Approximation for Multidimensional DataAla Eddine Laouir, Abdessamad Imine. 337-344 [doi]
- EmbedDB: A High-Performance Database for Resource-Constrained Embedded Systems Too Small for SQLiteJustin Schoenit, Seth Akins, Ramon Lawrence. 345-346 [doi]
- Modelling and Evolution Management of Multi-Model DataJáchym Bártík, Pavel Koupil, Irena Holubová. 347-350 [doi]
- Just Change on Change: Adaptive Splitting Time for Decision Trees in Data Stream ClassificationDaniel Nowak Assis, Jean Paul Barddal, Fabrício Enembreck. 351-357 [doi]
- Detecting and Explaining Anomalies in the Air Production Unit of a TrainNarjes Davari, Bruno Veloso, Rita Paula Ribeiro, João Manuel Portela da Gama. 358-364 [doi]
- Where Do We Go From Here? Location Prediction from Time-Evolving Markov ModelsThiago Andrade, João Gama 0001. 365-367 [doi]
- DriftGAN: Using historical data for Unsupervised Recurring Drift DetectionChristofer Fellicious, Sahib Julka, Lorenz Wendlinger, Michael Granitzer. 368-369 [doi]
- A Genetic Algorithm-based Auto-ML System for Survival AnalysisTossapol Pomsuwan, Alex Alves Freitas. 370-377 [doi]
- An adaptive biased random-key genetic algorithm for the tactical berth allocation problemAntônio Augusto Chaves, José Fernando Gonçalves, Rudinei M. Oliveira, Luiz Antonio Nogueira Lorena. 378-385 [doi]
- An evolutionary triclustering approach to discover electricity consumption patterns in FranceDavid Gutiérrez-Avilés, José F. Torres, Francisco Martínez-Álvarez, Jairo Cugliari. 386-394 [doi]
- Evolutionary Feature Selection for Time-Series ForecastingMaria Lourdes Linares-Barrera, Manuel Jesús Jiménez-Navarro, Isabel Sofia Brito, José C. Riquelme, María Martínez-Ballesteros. 395-399 [doi]
- Avoiding Empty Instances and Offset Drifts of Basic Sequencer Tasks in Automotive Operating SystemMuhammad Tanveer Ali Ahmad, Michael Krisper, Leandro Batista Ribeiro, Marcel Baunach. 400-409 [doi]
- Traffic Signal Preemption and Prioritization for High-Density Road NetworksChun-Ting Wu, Yung-Jen Hsu, Chia-Heng Tu, Shao-Hua Wang. 410-419 [doi]
- On Enhancing Data Integrity with Low-cost Retention-Refillable Programming SchemeKun-Chi Chiang, Yung-Chun Li, Wei-Chen Wang 0002, Wei Kuan Shih. 420-427 [doi]
- PIGMMaLIOn: a Partial Incremental Gaussian Mixture Model with a Low I/O DesignMeriem Bouzouad, Yasmine Benhamadi, Camélia Slimani, Jalil Boukhobza. 428-435 [doi]
- Fair and Starvation-Free Spinlock for Real-Time AUTOSAR systems: M-HLPDrona Nagarajan, Tobias Scheipel, Marcel Baunach. 436-445 [doi]
- Profiling vs Static Analysis: The Impact on Precision TuningLev Denisov, Gabriele Magnani, Daniele Cattaneo 0002, Giovanni Agosta, Stefano Cherubin. 446-448 [doi]
- Packet-Type Aware Scheduling of Moldable Streaming Tasks on Multicore Systems with DVFSMichail Boulasikis, Christoph W. Kessler, Flavius Gruian, Jörg Keller 0001, Sebastian Litzinger. 449-451 [doi]
- Increasing Testing Robustness of GPU Software in Embedded Critical SystemsJavier Barrera, Leonidas Kosmidis, Enrico Mezzetti, Jaume Abella 0001, Francisco J. Cazorla. 452-453 [doi]
- Student Research Abstract: Real-Time 3D Registration and Fusion with SRAM-based Analog In-Memory ComputingXin-You Liu. 454-457 [doi]
- Informed Heterogeneous Attention Networks for Metapath Based LearningLorenz Wendlinger, Michael Granitzer. 458-465 [doi]
- Change Point Detection in Evolving Graph using MartingaleShen-Shyang Ho, Tarun Teja Kairamkonda. 466-473 [doi]
- Beyond the Additive Nodes' Convolutions: a Study on High-Order Multiplicative IntegrationPaolo Frazzetto, Luca Pasa, Nicolò Navarin, Alessandro Sperduti. 474-481 [doi]
- Gender Classification via Graph Convolutional Networks on 3D Facial ModelsGiorgio Blandano, Jacopo Burger, Annalisa Cappella, Claudia Dolci, Giuseppe Maurizio Facchi, Federico Pedersini, Chiarella Sforza, Gianluca Martino Tartaglia. 482-489 [doi]
- Learning to Solve Combinatorial Optimization Problems on Graphs with State-Aware Multi-Relation AggregationHui-Ju Hung, Wang-Chien Lee, Tao-Yang Fu, Chih-Ya Shen, Zhen Lei 0005. 490-491 [doi]
- Less is More: A Streamlined Graph-Based Fashion Outfit Recommendation without Multimodal DependencyDaehee Kim, Donghee Han, Daeyoung Roh, Keejun Han, Mun Yong Yi. 492-495 [doi]
- Prior-Based Enhanced ASD-POCS for Artifact Suppression and Structural Preservation in Sparse-View CBCTD. M. Bappy, Donghwa Kang, Jinkyu Lee 0001, Hyeongboo Baek. 496-505 [doi]
- Applying dynamic balancing to improve the performance of MPI parallel genomics applicationsAlejandro Fernández-Fraga, Jorge González-Domínguez, María J. Martín. 506-514 [doi]
- A novel hierarchy-based knowledge discovery framework for elucidating human aging-related phenotypic abnormalitiesCen Wan, Carl Barton. 515-522 [doi]
- Knowledge Synthesis using Large Language Models for a Computational Biology Workflow EcosystemHasan Jamil, Stephen A. Krawetz, Alexander Gow. 523-530 [doi]
- Analysis of voice recordings features for Classification of Parkinson's DiseaseBeatriz Pérez-Sánchez, Noelia Sánchez-Maroño, Miguel A. Díaz-Freire. 531-532 [doi]
- Federated Learning for Unsupervised Anomaly Detection in ADLs of Elderly in Single-resident Smart HomesZahraa Khais Shahid, Saguna Saguna, Christer Åhlund, Karan Mitra. 533-535 [doi]
- IoT Query Latency Enhancement by Resource-Aware Task Placement in the FogFatima Abdullah, Mian Muaz Razaq, Youyang Kim, Limei Peng, Young-Kyoon Suh, Byungchul Tak. 536-544 [doi]
- DCS-Oriented IoT Architecture for Enhanced Cattle Feed PrecisionGuilherme Augusto Defalque, Ricardo Ribeiro dos Santos, Pedro Arfux, Marcio Pache, Ricardo Aguiar. 545-552 [doi]
- Ethereum Attestation Service as a solution for the revocation of hardware-based password-less mechanismsBiagio Boi, Christian Esposito 0001, Jung-Taek Seo. 553-559 [doi]
- Quad-Biometrics for Few-Shot User IdentificationJunho Yoon, Christian Esposito 0001, Chang Choi. 560-564 [doi]
- RUL Prediction of Lithium-ion Batteries using a Federated and Homomorphically Encrypted Learning MethodVíctor López, Oscar Fontenla-Romero, Elena Hernández-Pereira, Bertha Guijarro-Berdiñas, Carlos Blanco-Seijo, Samuel Fernandez-Paz. 565-571 [doi]
- Cost-based Load Balancing of RDF Reasoning in Fog-Computing EnvironmentsYuma Kokubo, Toshiyuki Amagasa. 572-579 [doi]
- Improving Privacy in Federated Learning-Based Intrusion Detection for IoT NetworksLamine Syne, Pino Caballero-Gil, Candelaria Hernández-Goya. 580-583 [doi]
- Integrated Interoperability Based Panoramic Video Synopsis FrameworkPalash Yuvraj Ingle, Young-Gab Kim. 584-591 [doi]
- LINK: Self-Adaptive System with Human-Machine Teaming-based Loop for Interoperability in IoT EnvironmentsHongseok Oh, Kyungchang Jeong, Euijong Lee, Ji-Hoon Jeong. 592-599 [doi]
- RecKG: Knowledge Graph for Recommender SystemsJunhyuk Kwon, Seokho Ahn, Young-Duk Seo. 600-607 [doi]
- Cross-Chain Payments on Blockchain Networks: An Apartment Booking Use-CaseDusan Morhác, Viktor Valastín, Kristian Kostal, Ivan Kotuliak. 608-611 [doi]
- Trustful Coopetitive Infrastructures for the New Space Exploration EraRenan Lima Baima, Loïck Chovet, Eduard Hartwich, Abhishek Bera, Johannes Sedlmeir, Gilbert Fridgen, Miguel Angel Olivares-Méndez. 612-621 [doi]
- Attention for the Allocation of Tasks in Multi-Agent Pickup and DeliveryAdrià Fenoy, Jacopo Zagoli, Filippo Bistaffa, Alessandro Farinelli. 622-629 [doi]
- Collective Anomaly Perception During Multi-Robot Patrol: Constrained Interactions Can Promote Accurate ConsensusZachary R. Madin, Jonathan Lawry, Edmund R. Hunt. 630-637 [doi]
- Graph Learning-based Fleet Scheduling for Urban Air Mobility under Operational Constraints, Varying Demand & UncertaintiesSteve Paul, Jhoel Witter, Souma Chowdhury. 638-645 [doi]
- Bayesian Soft Actor-Critic: A Directed Acyclic Strategy Graph Based Deep Reinforcement LearningQin Yang 0001, Ramviyas Parasuraman. 646-648 [doi]
- Student Research Abstract: Coordination of Marine Multi-Robot Systems with Communication ConstraintsAntoni Martorell-Torres. 649-651 [doi]
- Towards a labeling method for Education Process Mining and a case study on higher educationLuiz Fernando Puttow Southier, Marcelo Teixeira, Dalcimar Casanova, Edson Emílio Scalabrin. 654-660 [doi]
- Petri Nets for Smart Grids: The Story So FarMouzhi Ge, Bruno Rossi 0001, Stanislav Chren, José Miguel Blanco 0002. 661-670 [doi]
- Evaluating Trustworthiness of Online News Publishers via Article ClassificationJohn Bianchi, Manuel Pratelli, Marinella Petrocchi, Fabio Pinelli. 671-678 [doi]
- On the relevance of value system structure for automated value-aligned decision-makingMarcelo Karanik, Holger Billhardt, Alberto Fernández 0002, Sascha Ossowski. 679-686 [doi]
- From Self-Sovereign Identity to Fiduciary Identity: A Journey Towards Greater User Privacy and UsabilityFrederico Schardong, Ricardo Custódio. 687-694 [doi]
- PotholeVision: An Automated Pothole Detection and Reporting System using Computer VisionZachary Jeffreys, Kshama Kumar, Zhuojing Xie, Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa. 695-697 [doi]
- Employee eXperience Representation for Personalization within Digital Business EcosystemsMustapha Kamal Benramdane, Elena Kornyshova, Sebastien Ruelle, Charles Vidal. 698-700 [doi]
- Student Research Abstract: Detection of War-Caused Agricultural Field Damages Using Sentinel-2 Satellite Data with Machine Learning and Anomaly DetectionSofiia Drozd. 701-705 [doi]
- CoSMo: A multilingual modular language for Content Selection ModellingKutz Arrieta, Pablo R. Fillottrani, C. Maria Keet. 706-713 [doi]
- Causal-Evidence Graph for Causal Relation ClassificationYuni Susanti, Kanji Uchino. 714-722 [doi]
- EmoSum: Conversation Summarization with Emotional ConsistencyYoungjin Jo, JinYeong Bak. 723-730 [doi]
- Wiki-based Prompts for Enhancing Relation Extraction using Language ModelsAmirhossein Layegh, Amir Hossein Payberah, Ahmet Soylu, Dumitru Roman, Mihhail Matskin. 731-740 [doi]
- Impact of Position Bias on Language Models in Token ClassificationMehdi Ben Amor, Michael Granitzer, Jelena Mitrovic. 741-745 [doi]
- Collective Attacks in Assumption-Based ArgumentationOfer Arieli, Jesse Heyninck. 746-753 [doi]
- The Abstract Expressive Power of First-Order and Description Logics with Concrete DomainsFranz Baader, Filippo De Bortoli. 754-761 [doi]
- Equipping Abstract Argumentation Solvers for Verifying Negative ResultsWolfgang Dvorák, Alexander Greßler, Stefan Woltran. 762-769 [doi]
- Towards value-awareness in administrative processes: an approach based on constraint answer set programmingJoaquín Arias, Mar Moreno-Rebato, José Antonio Rodríguez-García, Sascha Ossowski. 770-778 [doi]
- A Mathematical Conceptualization of Bundle Sets in Defeasible Logic ProgrammingYamil Osvaldo Soto, Cristhian Ariel David Deagustini, Maria Vanina Martinez, Gerardo Ignacio Simari. 779-786 [doi]
- Classifying Words with 3-sort AutomataTomasz Jastrzab, Frédéric Lardeux, Éric Monfroy. 787-788 [doi]
- An epistemic logic for modeling decisions in the context of incomplete knowledgeDorde Markovic, Simon Vandevelde, Linde Vanbesien, Joost Vennekens, Marc Denecker. 789-793 [doi]
- Common LeSS Transformation PatternsAlena Buchalcevová, Jakub Hermanek. 794-801 [doi]
- Beyond Technical Debt Unravelling Organisational Debt ConceptMuhammad Ovais Ahmad, Osama Al-Baik. 802-809 [doi]
- Challenges to Sustaining Agility: An Exploratory Case StudyMali Senapathi, Diane E. Strode. 810-817 [doi]
- Navigating Cultural Diversity: Barriers and Benefits in Multicultural Agile Software Development TeamsDaniel Welsch, Luisa Burk, David Mötefindt, Michael Neumann. 818-825 [doi]
- Technical Debt Management in Agile Context: A new framework and case study in a large financial institutionGisela M. Q. M. Archela, Ana C. V. Melo, Vagner Luiz Gava. 826-833 [doi]
- Revisiting Technical Debt Types and Indicators for Software SystemsDilek Caglayan, Özden Özcan Top. 834-841 [doi]
- The use of prototypes as a tool in Agile software developmentVivian Larrea, Milene Selbach Silveira, Tiago Silva da Silva. 842-849 [doi]
- UMask-AFL: Unmasking All Reachable Targets for Comprehensive Agile FuzzingSangharatna Godboley, Bikash Singha, Monika Rani Golla, P. R. Krishna. 850-852 [doi]
- Implementing Action Items Over Improving the Format of RetrosYen Ying Ng, Ryszard Kuduk. 853-855 [doi]
- Identifying Chinese Handwriting Characteristics for Detecting Children with AutismLing Kai Yen, Jasin Wong, Arbee Chen. 856-865 [doi]
- Navigating WebAI: Training Agents to Complete Web Tasks with Large Language Models and Reinforcement LearningLucas-Andrei Thil, Mirela Popa, Gerasimos Spanakis. 866-874 [doi]
- Leveraging Sentinel-2 time series for bark beetle-induced forest dieback inventoryGiuseppina Andresini, Annalisa Appice, Donato Malerba. 875-882 [doi]
- RAAD: Reinforced Adversarial Anomaly DetectorSimon S. Woo, Daeyoung Yoon, Yuseung Gim, Eunseok Park. 883-891 [doi]
- Exploring The Efficient Market Hypothesis for Accurate Stock Movement Prediction via Feature-Axis TransformerKanghyeon Seo, Jihoon Yang. 892-901 [doi]
- A Heterogeneous Ensemble Method for Handling Class Noise in Supervised Machine LearningRashida Hasan, Chee-Hung Henry Chu. 902-909 [doi]
- Optimizing Movie Selections: A Multi-Task, Multi-Modal Framework with Strategies for Missing Modality ChallengesSubham Raj, Pawan Agrawal, Sriparna Saha 0001, Brijraj Singh, Niranjan Pedanekar. 910-918 [doi]
- Action Attention GRU: A Data-Driven Approach for Enhancing Purchase Predictions in Digital MarketingGirim Ban, Simon S. Woo, David Sung. 919-926 [doi]
- DTC-TranGru: Improving the performance of the next-DTC Prediction Model with Transformer and GRUAbdul Basit Hafeez, Eduardo Alonso, Atif Riaz. 927-934 [doi]
- CADI: Contextual Anomaly Detection using an Isolation-ForestVéronne Yepmo, Grégory Smits, Marie-Jeanne Lesot, Olivier Pivert. 935-944 [doi]
- Cross-Domain Coral Image Classification Using Dual-Stream Hierarchical Neural NetworksHongyong Han, Wei Wang, Gaowei Zhang, Mingjie Li, Yi Wang. 945-952 [doi]
- GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic EncryptionEugene Frimpong, Khoa Nguyen 0005, Mindaugas Budzys, Tanveer Khan, Antonis Michalas. 953-962 [doi]
- Efficient Dual Attention Transformer for Image Super-ResolutionSoobin Park, Yuna Jeong, Yong Suk Choi. 963-970 [doi]
- Explainable Artificial Intelligence (XAI) Approach for Reinforcement Learning SystemsMaria J. P. Peixoto, Akramul Azim. 971-978 [doi]
- Fast Bipartite Forests for Semi-supervised Interaction PredictionPedro Ilidio, André Hallwas Ribeiro Alves, Ricardo Cerri. 979-986 [doi]
- Improving Soft Skill Extraction via Data Augmentation and Embedding ManipulationMuhammad Uzair-Ul-Haq, Paolo Frazzetto, Alessandro Sperduti, Giovanni Da San Martino. 987-996 [doi]
- Training Heterogeneous Client Models using Knowledge Distillation in Serverless Federated LearningMohak Chadha, Pulkit Khera, Jianfeng Gu, Osama Abboud, Michael Gerndt. 997-1006 [doi]
- Reward Specifications in Collaborative Multi-agent Learning: A Comparative StudyMaram Hasan, Rajdeep Niyogi. 1007-1013 [doi]
- Explainable Ponzi Schemes Detection on EthereumLetterio Galletta, Fabio Pinelli. 1014-1023 [doi]
- Ar-Spider: Text-to-SQL in ArabicSaleh Almohaimeed, Saad Almohaimeed, Mansour Al Ghanim, Liqiang Wang. 1024-1030 [doi]
- A Model for Detecting Abnormality in Activities of Daily Living Sequences Using Inverse Reinforcement LearningFateme Akbari, Kamran Sartipi. 1031-1033 [doi]
- M-DBSCAN: Modified DBSCAN Clustering Algorithm for Detecting and Controlling OutliersMomotaz Begum, Mehedi Hasan Shuvo, Md. Golam Mostofa, ABM Kamrul Islam Riad, Md Arabin Islam Talukder, Mst. Shapna Akter, Hossain Shahriar. 1034-1035 [doi]
- Decoupling Decision-Making in Fraud Prevention through Classifier Calibration for Business Logic ActionEmanuele Luzio, Moacir Ponti, Christian Ramirez Arevalo, Luis Argerich. 1036-1037 [doi]
- Enhancing Video Capture in Mobile Applications for Power Saving Through Machine LearningTzu-Heng Chen, Sheng-Da Tsai, Chun-Han Lin. 1038-1039 [doi]
- Elevating CTR Prediction: Field Interaction, Global Context Integration, and High-Order RepresentationsSojeong Kim, Dongjun Lee, Jaekwang Kim. 1040-1042 [doi]
- DroPacter : Compacter-based Tuning with Layer Freezing in Pre-Trained Language ModelSaurabh Anand, Shubham Malaviya, Manish Shukla 0001, Sachin Lodha. 1043-1044 [doi]
- Rebalancing Shared Mobility Systems by User Incentive Schemes: State-Action Representation Design and AnalysisMatthew Schofield, Ning Wang, Shen-Shyang Ho. 1045-1047 [doi]
- Open-Vocabulary And Multitask Image SegmentationLihu Pan, Yunting Yang, Zhengkui Wang, Wen Shan, Jiali Yin. 1048-1049 [doi]
- An effective and efficient green federated learning method for one-layer neural networksOscar Fontenla-Romero, Bertha Guijarro-Berdiñas, Elena Hernández-Pereira, Beatriz Pérez-Sánchez. 1050-1052 [doi]
- Evaluating Knowledge Retention in Continual LearningAndrii Krutsylo. 1053-1055 [doi]
- Multimodal Fusion of Heterogeneous Representations for Anomaly Classification in Satellite ImageryYoungsun Jang, Maryam Moshrefizadeh, Abir Mohammad Hadi, Kwanghee Won, John Kim. 1056-1058 [doi]
- Towards aircraft trajectory prediction using LSTM networksJorge Silvestre, Paula Mielgo, Aníbal Bregón, Miguel A. Martínez-Prieto, Pedro C. Álvarez-Esteban. 1059-1060 [doi]
- Controlling the Latent Space of GANs through Reinforcement Learning: A Case Study on Task-based Image-to-Image TranslationMahyar Abbasian, Taha Rajabzadeh, Ahmadreza Moradipari, Seyed Amir Hossein Aqajari, Hongsheng Lu, Amir M. Rahmani. 1061-1063 [doi]
- The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLsSaroj Gopali, Akbar Siami Namin, Faranak Abri, Keith S. Jones. 1064-1066 [doi]
- Identifying Out-of-stock Items at Retail Stores Using Computer VisionCamilla Fonseca, Maria Nicos Alain Pasaylo, Nour Kawni, Bethlehem Megabiaw Tassew. 1067-1071 [doi]
- Rescuing QUIC Flows From Countermeasures Against UDP Flooding AttacksJunseok Lee, Minhyeong Kim, WonJun Song, Younghoon Kim, Dohyung Kim 0005. 1072-1080 [doi]
- Classification of Home Network Problems with TransformersJeremias Dötterl, Zahra Hemmati Fard. 1081-1087 [doi]
- Virtual Link Embedding in Collaborative Sliced Multi-Administrative Multi-Domain NetworksStanislas Pedebearn, Slim Abdellatif, Pascal Berthou, Dariusz Nogalski, Dallal Belabed. 1088-1095 [doi]
- Micro-Chain: Towards the use of NDN microservicesOtávio Augusto Rocha Da Cruz, Carlos Eduardo Pereira, Edison Pignaton de Freitas, Paulo Mendes 0001, Denis Lima do Rosário, Eduardo Coelho Cerqueira, Antonio Arlis Santos da Silva, Julio Cesar Santos dos Anjos. 1099-1103 [doi]
- Compiling Haskell for Energy Efficiency: Empirical Analysis of Individual TransformationsMaja Hanne Kirkeby, Bernardo Santos 0003, João Paulo Fernandes, Alberto Pardo. 1104-1113 [doi]
- Lightweight Compilation of Method Invocation Bytecodes in JavaHarpreet Kaur, Scott Ryan Young, Marius Pirvu, Kenneth Blair Kent. 1114-1121 [doi]
- Lightweight DSL for Describing Extensible Transition SystemsSeiji Umatani. 1122-1131 [doi]
- An Asynchronous Scheme for Rollback Recovery in Message-Passing Concurrent Programming LanguagesGermán Vidal. 1132-1139 [doi]
- A Domain-Specific Language for Augmented Reality GamesRubén Campos-López, Esther Guerra, Juan de Lara. 1140-1142 [doi]
- An Empirical Study of the Impact of Waterfall and Agile Methods on Numbers of Requirements-Related DefectsAnzira Rahman, Luiz Marcio Cysneiros, Daniel M. Berry. 1143-1152 [doi]
- How Facial Recognition Technologies Affect the Transgender Community? A Systematic Mapping StudyMichel Perilo, George Valença. 1153-1160 [doi]
- A Catalog of Non-Functional Requirements and Patterns for Microservices MigrationMarcio Veronez, Ivonei Freitas da Silva, Victor Francisco Araya Santander, Elder Elisandro Schemberger. 1161-1168 [doi]
- A View of the Technical, Individual, and Social Dimensions of Sustainable Software Systems: A Systematic Literature ReviewQuelita A. D. S. Ribeiro, Abimael Santos, Karolyne Oliveira, Jaelson Castro, Maria Lencastre 0001. 1169-1177 [doi]
- Ensuring Requirements Confidentiality during System Design ModellingMichel Bourdellès, Jamal El Hachem, Salah Sadou. 1178-1179 [doi]
- Hybrid Active Teaching Methodology for Learning Development: A Self-assessment Case Study Report in Computer EngineeringRenan Lima Baima, Tiago Miguel Barao Caetano, Ana Carolina Oliveira Lima, Emília Oliveira Lima Leal, Tiago Miguel Pereira Candeias, Silvia Maria Dias Pedro Rebouças. 1180-1184 [doi]
- Software Architecture Recovery from Multiple Dependency ModelsMetin Altinisik, Hasan Sözer, Gonca Gürsun. 1185-1192 [doi]
- ML-enabled Service Discovery for Microservice Architecture: a QoS ApproachKarthik Vaidhyanathan, Mauro Caporuscio, Stefano Florio, Henry Muccini. 1193-1200 [doi]
- Comparing the Similarity of OpenAPI-Based MicroservicesZhongyi Lu, Declan T. Delaney, David Lillis. 1201-1208 [doi]
- VAMP: Visual Analytics for Microservices PerformanceLuca Traini, Jessica Léone, Giovanni Stilo, Antinisca Di Marco. 1209-1218 [doi]
- Fine-Grained Authorization in Microservice Architecture: A Decentralized ApproachNiklas Sänger, Sebastian Abeck. 1219-1222 [doi]
- You cannot improve what you do not measure: A triangulation study of software security metricsArina Kudriavtseva, Olga Gadyatskaya. 1223-1232 [doi]
- SBOM Generation Tools Under Microscope: A Focus on The npm EcosystemMd. Fazle Rabbi, Arifa Islam Champa, Costain Nachuma, Minhaz Fahim Zibran. 1233-1241 [doi]
- Ranked Syntax Completion With LR ParsingKwanghoon Choi 0001, Sooyeon Hwang, Hyeonah Moon, Isao Sasano. 1242-1251 [doi]
- VeriFog: A Generic Model-based Approach for Verifying Fog Systems at Design TimeHiba Awad, Abdelghani Alidra, Hugo Bruneliere, Thomas Ledoux, Étienne Leclercq, Jonathan Rivalan. 1252-1261 [doi]
- Information Needs in Continuous Integration and Delivery in Large Scale Organizations: An Observational StudyAzeem Ahmad, Kristian Sandahl, Daniel Hasselqvist, Pontus Sandberg. 1262-1271 [doi]
- A Large-Scale Study of ML-Related Python ProjectsSamuel Idowu, Yorick Sens, Thorsten Berger, Jacob Krüger, Michael Vierhauser. 1272-1281 [doi]
- From Fine-tuning to Output: An Empirical Investigation of Test Smells in Transformer-Based Test Code GenerationAhmed Aljohani, Hyunsook Do. 1282-1291 [doi]
- Methodology for Resiliency Analysis of Mission-critical SystemsMahmoud Abdelgawad, Indrakshi Ray. 1292-1300 [doi]
- A practical tool for detecting cross-language code pairs with similar control structuresFeng Dai, Shigeru Chiba. 1301-1303 [doi]
- Towards the Integration Support for Machine Learning of Inter-Model Relations in Model ViewsJames William Pontes Miranda, Hugo Bruneliere, Massimo Tisi, Gerson Sunyé. 1304-1306 [doi]
- Supporting Secure Coding for ErlangMelinda Tóth, István Bozó. 1307-1311 [doi]
- Deepfake Speech Detection: A Spectrogram AnalysisAnton Firc, Kamil Malinka, Petr Hanácek. 1312-1320 [doi]
- Detection of Slowloris Attacks using Machine Learning AlgorithmsVinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire. 1321-1330 [doi]
- Evading Botnet DetectionLisa-Marie Geiginger, Tanja Zseby. 1331-1340 [doi]
- OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoTClémentine Gritti. 1341-1349 [doi]
- Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller SystemsXi Tan, Sagar Mohan, Md. Armanuzzaman, Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Hongxin Hu, Ziming Zhao 0001. 1350-1357 [doi]
- Obfuscated PHP Webshell Detection Using the Webshell Tailored TextRank AlgorithmHye Ju Lee, SeonJin Hwang, Millati Pratiwi, Yoon Ho Choi. 1358-1365 [doi]
- GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege SeparationSeongman Lee, Seoye Kim, Chihyun Song, Byeongsu Woo, Eunyeong Ahn, Junsu Lee, Yeongjin Jang, Jinsoo Jang, Hojoon Lee 0001, Brent ByungHoon Kang. 1366-1375 [doi]
- Security Implications of Deepfakes in Face AuthenticationMilan Salko, Anton Firc, Kamil Malinka. 1376-1384 [doi]
- Finding Harmony in the Noise: Blending Security Alerts for Attack DetectionTom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapien, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich. 1385-1394 [doi]
- Patch Pilgrimage: Exploring the Landscape of TCP Reflective Attacks and User Patching ExpeditionJoost Oortwijn, Carlos Gañán. 1395-1404 [doi]
- Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel AttacksShan Jin, Minghua Xu 0003, Yiwei Cai. 1405-1414 [doi]
- Collection and Analysis of Sensitive Data with Privacy Protection by a Distributed Randomized Response ProtocolFaisal Imran, Rosa Meo. 1415-1424 [doi]
- Modeling and verification of smart contracts with Abstract State MachinesChiara Braghin, Elvinia Riccobene, Simone Valentini. 1425-1432 [doi]
- A Privacy-Aware Remapping Mechanism for Location DataGuilherme Duarte, Mariana Cunha, João P. Vilela. 1433-1440 [doi]
- Forget About It: Batched Database SanitizationJames Wagner, Alexander Rasin. 1441-1452 [doi]
- Are k-cores meaningful for temporal graph analysis?Alessio Conte, Davide Rucci. 1453-1460 [doi]
- A Large Language Model Approach to Detect Hate Speech in Political Discourse Using Multiple Language CorporaAillkeen Bezerra de Oliveira, Cláudio de Souza Baptista, Anderson Almeida Firmino, Anselmo Cardoso de Paiva. 1461-1468 [doi]
- All Polarized but Still Different: a Multi-factorial Metric to Discriminate between Polarization Behaviors on Social MediaCélina Treuillier, Sylvain Castagnos, Armelle Brun. 1469-1478 [doi]
- Cooperative Embedding - A Novel Approach to Tackle the Out-Of-Vocabulary Dilemma in Bot ClassificationAkhila VH, Anu Mary Chacko. 1479-1486 [doi]
- Towards Optimizations of Quantum Circuit Simulation for Solving Max-Cut Problems with QAOAYu-Cheng Lin, Chuan Chi Wang, Chia-Heng Tu, Shih-Hao Hung. 1487-1494 [doi]
- Optimizing Read Performance of HBase through Dynamic Control of Data Block Sizes and KVCacheSangeun Chae, Wonbae Kim, Daegyu Han, Jeongmin Kim, Beomseok Nam. 1495-1503 [doi]
- High Energy Efficiency Mobile AR Applications under Adaptive Object Detection Engine and Self-learning GovernorHe-Ru Chen, Kun-Sheng Liu, Ya-Shu Chen, Hsiu-Yi Ou Yang. 1504-1510 [doi]
- Knowledge Sharing based Lightweight Transformer for Construction Safety Accident PreventionNamgyu Jung, Saebom Lee, Chang Choi. 1511-1516 [doi]
- VulnHunt-GPT: a Smart Contract vulnerabilities detector based on OpenAI chatGPTBiagio Boi, Christian Esposito 0001, Sokjoon Lee. 1517-1524 [doi]
- GPU Memory Reallocation Techniques in Fully Homomorphic Encryption WorkloadsJake Choi, Sunchul Jung, Heon Young Yeom. 1525-1532 [doi]
- Measuring and Optimizing the Performance of the Android Virtualization FrameworkHao-Jung Wei, Leng-Kai Lin, Chun-Yen Lin, Shih-wei Li. 1533-1535 [doi]
- Secure Crowdsource-Based Open-Source Code Verification (SC)^2VMor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran, Oleg Brodt, Aviad Elyashar, Yuval Elovici, Asaf Shabtai. 1536-1538 [doi]
- Scalable and automated Evaluation of Blue Team cyber posture in Cyber RangesFederica Bianchi, Enrico Bassetti, Angelo Spognardi. 1539-1541 [doi]
- An Efficient SNN Model Generation Method for IoT Edge ComputingSeoyeon Kim, Jinsung Cho, Bongjae Kim, Jinman Jung. 1542-1543 [doi]
- Audio capture devices for mobile platforms using SBCChanwoo Lee, Seongjin Kim, Kang Choi, Seongbin Cho, Junghyeon Yun, Junyoung Heo. 1544-1548 [doi]
- Data Poisoning Detection in Federated LearningDenise-Phi Khuu, Michael Sober, Dominik Kaaser, Mathias Fischer 0001, Stefan Schulte 0002. 1549-1558 [doi]
- Validation of Safety Metrics for Object Detectors in Autonomous DrivingAndreas Rønnestad, Andrea Ceccarelli, Leonardo Montecchi. 1559-1568 [doi]
- Can you trust your Agent? The Effect of Out-of-Distribution Detection on the Safety of Reinforcement Learning SystemsTom Haider, Karsten Roscher, Benjamin Herd, Felippe Schmoeller Roza, Simon Burton 0001. 1569-1578 [doi]
- Can you trust your ML metrics? Using Subjective Logic to determine the true contribution of ML metrics for safetyBenjamin Herd, Simon Burton. 1579-1586 [doi]
- Multi-Confederated Learning: Inclusive Non-IID Data handling with Decentralized Federated LearningMichael Duchesne, Kaiwen Zhang, Talhi Chamseddine. 1587-1595 [doi]
- Understanding the Process of Data Labeling in CybersecurityTobias Braun, Irdin Pekaric, Giovanni Apruzzese. 1596-1605 [doi]
- Deceptive Skies: Leveraging GANs for Drone Sensor Data FalsificationMehmed Kerem Uludag, Maryna Veksler, Yasin Yilmaz, Kemal Akkaya. 1606-1613 [doi]
- Student Research Abstract: Enhancing Safety in Cyber-Physical Systems Through Runtime EnforcementIgnacio D. Lopez-Miguel. 1614-1616 [doi]
- Knowledge Base Grounded Pre-trained Language Models via DistillationRaphaël Sourty, José G. Moreno 0001, François-Paul Servant, Lynda Tamine. 1617-1625 [doi]
- Tracing the Impact of Bias in Link PredictionMayra Russo, Sammy Fabian Sawischa, Maria-Esther Vidal. 1626-1633 [doi]
- Process Knowledge Extraction and Knowledge Graph Construction Through Prompting: A Quantitative AnalysisPatrizio Bellan, Mauro Dragoni, Chiara Ghidini. 1634-1641 [doi]
- Efficient Key-based Data Linking Through Key Transfer Between Knowledge GraphsThibaut Soulard, Fatiha Saïs, Joe Raad, Gianluca Quercini. 1642-1649 [doi]
- An Experiment in Retrofitting Competency Questions for Existing OntologiesReham Alharbi, Valentina A. M. Tamma, Floriana Grasso, Terry R. Payne. 1650-1658 [doi]
- A Two-Stage Calibration Approach for Mitigating Bias and Fairness in Recommender SystemsRodrigo Souza, Marcelo Manzato. 1659-1661 [doi]
- Designing Metadata for the Use of Artificial Intelligence in AcademiaJavier Conde, Gonzalo Martínez, Pedro Reviriego, Joaquín Salvachúa, José Alberto Hernández 0001. 1662-1664 [doi]
- A News Article Tag Categorization OntologyLisa Ehrlinger, Harald Holzner, Nora Hemelmayr, Wolfram Wöß. 1665-1667 [doi]
- KGSaw: One Size Does Not Fit All- Planning Methods for Data Fragmentation for Efficiently Creating Knowledge GraphsEnrique Iglesias, Maria-Esther Vidal. 1668-1670 [doi]
- Student Research Abstract: MARS RANK: Specificity of search resultsMahdi Cherif. 1671-1674 [doi]
- Verification of Concurrent Machine Code Running on a Single-Core MachineNarges Khakpour. 1675-1683 [doi]
- (Nearest) Neighbors You Can Rely On: Formally Verified k-d Tree Construction and Search in CoqNadeem Abdul Hamid. 1684-1693 [doi]
- Resource Constrained Test Case Prioritization with Simulated Annealing in an Industrial ContextEric Felding, Per Erik Strandberg, Nils-Hassan Quttineh, Wasif Afzal. 1694-1701 [doi]
- Quantifying Software Correctness by Combining Architecture Modeling and Formal Program AnalysisFlorian Lanzinger, Christian Martin, Frederik Reiche, Samuel Teuber, Robert Heinrich, Alexander Weigl. 1702-1711 [doi]
- A Formal Framework of Model and Logical Embeddings for Verification of Stochastic SystemsSusmoy Das, Arpit Sharma 0002. 1712-1721 [doi]
- Concurrent NetKAT with PortsHui Feng, Marcello M. Bonsangue. 1722-1730 [doi]
- Isabelle-verified correctness of Datalog programs for program analysisAnders Schlichtkrull, René Rydhof Hansen, Flemming Nielson. 1731-1734 [doi]
- Dynamic Backhaul Clustering for Enhanced Scalability in Cell-Free Massive MIMO NetworksMahnoor Ajmal, Ayesha Siddiqa, Muhammad Ashar Tariq, Malik Muhammad Saad 0001, Dongkyun Kim. 1735-1741 [doi]
- Efficient Time Slot Recovery Protocol for Wireless NetworksHicham Lakhlef, Khaled Abid, Ghada Jaber, Fabio D'Andreagiovanni. 1742-1748 [doi]
- Exploring Architectural Strategies for Mobility Experimentation: A Simulation-Based StudyVictoria Botelho Martins, Douglas D. J. de Macedo, Laércio Pioli Júnior. 1749-1756 [doi]
- Routing Optimization Based on Distributed Intelligent Network Softwarization for the Internet of ThingsMohamed Ali Zormati, Hicham Lakhlef, Sofiane Ouni. 1757-1764 [doi]
- An Adaptive Transmission Strategy for Tiled 360-Degree VR Videos in NOMA SystemsHsueh-Wen Tseng, Ting-Ting Yang, Yi Yang. 1765-1773 [doi]
- UX-Analyzer: Visualizing the interaction effort for web analyticsJuan Cruz Gardey, Julián Grigera, Andrés Rodríguez 0002, Alejandra Garrido 0001. 1774-1780 [doi]
- AsyncSLA: Towards a Service Level Agreement for Asynchronous ServicesMarc Oriol, Abel Gómez 0001, Jordi Cabot. 1781-1788 [doi]
- Elysia: Optimizing JavaScript Web FrameworkChayapatr Archiwaranguprok, Kongkeit Khunpanitchot, Phoomparin Mano, Manachai Toahchoodee. 1789-1796 [doi]
- Student Research Abstract: Least Privilege Persistent-Storage Access in Web BrowsersGayatri Priyadarsini Kancherla. 1797-1799 [doi]