Abstract is missing.
- Prescriptive Analytics: When Data- and Simulation-based Models Interact in a Cooperative WayMichael Affenzeller, Michael Bögl, Lukas Fischer 0001, Florian Sobieczky, Kaifeng Yang, Jan Zenisek. 1-8 [doi]
- Complex Network Analysis using Artificial Intelligence AlgorithmsCamelia Chira. 1-3 [doi]
- Implementation Techniques for Mathematical Model CheckingWolfgang Schreiner. 12-15 [doi]
- What's New In QBF Solving? : (Invited Talk)Martina Seidl. 16-18 [doi]
- Extreme Points of the Unit Ball B4 in the Space of Real Polynomials of Degree at most Four with the Supremum NormJan-Michael Holzinger, Róbert Vajda. 19-26 [doi]
- Homotopy Techniques for Analytic Combinatorics in Several VariablesKisun Lee, Stephen Melczer, Josip Smolcic. 27-34 [doi]
- Balanced Dense Multivariate Multiplication: The General CaseMarc Moreno Maza, Haoze Yuan. 35-42 [doi]
- Detecting Implicit Indeterminates in Symbolic ComputationStephen M. Watt. 43-50 [doi]
- F-polynomials & Newton polytopesGleb A. Koshevoy, Denis Mironov. 51-54 [doi]
- Artificial Conflict Sampling for Real Satisfiability ProblemsJames H. Davenport, Ali Kemal Uncu. 55-58 [doi]
- A web version of Tarski, a system for computing with Tarski formulas and semialgebraic setsZoltán Kovács, Christopher W. Brown, Tomás Recio, Róbert Vajda. 59-62 [doi]
- Algorithm for intersecting symbolic and approximate linear differential varietiesSiyuan Deng, Zahra Mohammadi, Gregory J. Reid. 63-70 [doi]
- IPO-MAXSAT: The In-Parameter-Order Strategy combined with MaxSAT solving for Covering Array GenerationIrene Hiess, Ludwig Kampel, Michael Wagner 0026, Dimitris E. Simos. 71-79 [doi]
- FERPModels: A Certification Framework for Expansion-Based QBF SolvingVedad Hadzic, Roderick Bloem, Ankit Shukla, Martina Seidl. 80-83 [doi]
- Deciding Whether two Codes Have the Same Ambiguities is in co-NPYannick Chevalier, Michaël Rusinowitch. 84-91 [doi]
- Fully-adaptive Model for Broadcasting with Universal ListsSaber Gholami, Hovhannes A. Harutyunyan. 92-99 [doi]
- n latticeShashank K. Mehta, Mahesh Sreekumar Rajasree. 100-107 [doi]
- Proof of Useful Work Based on Matrix ComputationCojocaru Dragos. 108-116 [doi]
- Quantitative Programming and Markov Decision ProcessesEneia Nicolae Todoran. 117-124 [doi]
- Empirical evaluation of LZW-Compressed Multiple Pattern Matching AlgorithmsMario Reja. 125-132 [doi]
- FB-RO-Offense - A Romanian Dataset and Baseline Models for Detecting Offensive Language in Facebook CommentsGabriel-Razvan Busuioc, Andrei Paraschiv, Mihai Dascalu. 133-142 [doi]
- Accelerating heuristic convergence on the "Evolution of Mona Lisa" problem by including image-centric mutation operatorsTheodor-Alexandru Vlad, Eugen Croitoru. 143-149 [doi]
- Fact-checking with explanationsAdrian Groza, Áron Katona. 150-157 [doi]
- Unsupervised Extractive Summarization with BERTAndreea-Nicoleta Dutulescu, Mihai Dascalu, Stefan Ruseti. 158-164 [doi]
- Evaluation of Class Activation Methods for Understanding Image Classification TasksAndrei Dugaesescu, Adina Magda Florea. 165-172 [doi]
- Exploring the potential of prototype-based soft-labels data distillation for imbalanced data classificationRadu-Andrei Rosu, Mihaela Elena Breaban, Henri Luchian. 173-180 [doi]
- The Impact of Convolutional Neural Network Parameters in the Binary Classification of MammogramsMadalina Dicu, Laura Diosan, Anca Andreica, Camelia Chira, Alin Cordos. 181-188 [doi]
- Advantages of a neuro-symbolic solution for monitoring IT infrastructures alertsDarian M. Onchis, Codruta Istin, Eduard Hogea. 189-194 [doi]
- Using N-Gram Variations in Static Analysis for Malware DetectionMarco Radovancovici, Darius Galis, Ciprian Pungila. 195-199 [doi]
- Authors and Collaborator Groups Ranking Analysis on SYNASC using Centrality MeasuresVictor Bogdan, Alin Brîndusescu. 200-207 [doi]
- An Ant Colony Optimisation Approach to the Densest k-Subgraph ProblemZoltán Tasnádi, Noémi Gaskó. 208-211 [doi]
- Proof of Concept for a Roundtrip Engineering IS for the New Enterprise in the Industry 4.0 EraAndrei Chis, Ana-Maria Ghiran, Robert Andrei Buchmann. 212-215 [doi]
- Building customized Named Entity Recognition models for specific process automation tasksVasile Ionut Iga, Gheorghe Cosmin Silaghi. 216-219 [doi]
- Intelligent Agent for Food Recognition in a Smart FridgeFlorin Dumitrescu, Adina Magda Florea, Mihai Trascau, Alexandru Sorici. 220-225 [doi]
- Machine Learning Models to Predict Soil Moisture for Irrigation ScheduleMd Nahin Islam, Doina Logofatu. 226-232 [doi]
- Learning networks hyper-parameter using multi-objective optimization of statistical performance metricsGuillermo Torres, Carles Sánchez, Debora Gil. 233-238 [doi]
- Eye Detection For Drivers Using Convolutional Neural Networks With Automatically Generated Ground Truth DataSorin Valcan, Mihail Gaianu. 239-244 [doi]
- Pedestrian Trajectory Prediction Based on Tree Method using Graph Neural NetworksBogdan Ilie Sighencea. 245-249 [doi]
- Motorage - Computer vision-based self-sufficient smart parking systemBogdan Budihala, Todor Ivascu, Sebastian Stefaniga. 250-257 [doi]
- Improving the Diagnostic of Contrast Enhanced Ultrasound Imaging using Optical Flow for Focal Liver Lesion DetectionCristina Laura Sîrbu, Georgiana Simion, Catalin-Daniel Caleanu. 258-263 [doi]
- Semi-Supervised Pipeline for Human Sprites Neural RenderingAlexandru Ionascu, Sebastian Stefaniga. 264-267 [doi]
- The XGBoost Tuning by Improved Firefly Algorithm for Network Intrusion DetectionLuka Jovanovic, Dijana Jovanovic, Milos Antonijevic, Miodrag Zivkovic, Nebojsa Budimirovic, Ivana Strumberger, Nebojsa Bacanin. 268-275 [doi]
- On Using Perceptual Loss within the U-Net Architecture for the Semantic Inpainting of Textile Artefacts with Traditional MotifsCatalin Stoean, Nebojsa Bacanin, Ruxandra Stoean, Leonard Ionescu, Cristian Alecsa, Mircea Hotoleanu, Miguel A. Atencia Ruiz, Gonzalo Joya. 276-283 [doi]
- An Evaluation of Image Texture Descriptors and their Invariant PropertiesRoxana Sipos-Lascu, Laura-Silvia Diosan. 284-292 [doi]
- Organic Structures Emerging From Bio-Inspired Graph-Rewriting AutomataPaul Cousin, Aude Maignan. 293-296 [doi]
- Identification of Discrete Non-Linear Dynamics of a Radio-Frequency Power Amplifier Circuit using Symbolic RegressionMartin Steiger, Hans Georg Brachtendorf, Gabriel Kronberger. 297-303 [doi]
- Local Optimization Often is Ill-conditioned in Genetic Programming for Symbolic RegressionGabriel Kronberger. 304-310 [doi]
- Application of Symbolic Regression in Polymer ProcessingWolfgang Roland, Michael Kommenda, Gerald R. Berger-Weber. 311-318 [doi]
- Comparison of OLS and NLS to fit Transformation-Interaction-Rational expressionsFabrício Olivetti de França. 319-322 [doi]
- Symbolic Regression with augmented dataset using RuleFitFabrício Olivetti de França. 323-326 [doi]
- Steel Phase Kinetics Modeling using Symbolic RegressionDavid Piringer, Bernhard Bloder, Gabriel Kronberger. 327-330 [doi]
- A Practical Analysis of Techniques for Minting Genetic Information as NFTs in Blockchain TechnologyMarco Radovancovici, Darius Galis, Ciprian Pungila. 331-337 [doi]
- AlphaFold-based protein analysis pipelineOctavian-Florin Maghiar. 338-341 [doi]
- Cerebral Metastases Segmentation using Transfer Gliomas Learning and GrabCutCiprian-Mihai Ceausescu, Bogdan Alexe. 342-346 [doi]
- Obfuscation Techniques Based on Random Strings Used in Malicious VBA ScriptsMarilena Lupascu. 347-352 [doi]
- Reducing Adversarial Vulnerability Using GANsCiprian-Alin Simion. 353-358 [doi]
- One side class SVM training methods for malware detectionGeorge Popoiu. 359-364 [doi]
- Evaluating the effort of building a Machine Learning model for malware detection from ground zeroAnton Dan Gabriel. 365-370 [doi]
- On Measuring the Dissimilarity between Biological SequencesAlina Carunta, Mihai Plesu. 371-374 [doi]