Abstract is missing.
- Comparison of Collision Avoidance Algorithms for Autonomous Multi-agent SystemsMarco Moletta, Matteo Tadiello. 1-9 [doi]
- Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network BusMd Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi. 10-17 [doi]
- Socially-Aware Multi-agent Velocity Obstacle Based Navigation for Nonholonomic VehiclesManuel Boldrer, Luigi Palopoli, Daniele Fontanelli. 18-25 [doi]
- Deep Learning for Hardware-Constrained Driverless CarsBharathwaj Krishnaswami Sreedhar, Nagarajan Shunmugam. 26-29 [doi]
- A Comparative Analysis of Foraging Strategies for Swarm Robotics using ARGoS SimulatorAmbikeya Pradhan, Marta Boavida, Daniele Fontanelli. 30-35 [doi]
- Improving the Behavior of Evasive Targets in Cooperative Target ObservationThayanne França da Silva, Matheus Santos Araújo, Raimundo Juracy Campos Ferro Junior, Leonardo Ferreira da Costa, João Pedro Bernardino Andrade, Gustavo Augusto Lima de Campos, Joaquim Celestino Jr.. 36-41 [doi]
- A Real-Time Feature Indexing System on Live Video StreamsAditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu. 42-50 [doi]
- Optimization of Parallel Applications Under CPU OvercommitmentTokiko Takayama, Kenichi Kourai. 51-60 [doi]
- Pre-Design Stage Cost Estimation for Cloud ServicesTomohisa Aoshima, Kenichi Yoshida. 61-66 [doi]
- Towards an Architecture for Customizable DronesMahmoud Hussein, Réda Nouacer. 67-72 [doi]
- Mobi-PMFS: An Efficient and Durable In-Memory File System for Mobile DevicesChunhua Xiao, Fangzhu Lin, Xiaoxiang Fu, Ting Wu, Yuanjun Zhu, Weichen Liu. 73-78 [doi]
- Heterogeneous Systems Modelling with Adaptive Traffic Profiles and Its Application to Worst-Case Analysis of a DRAM ControllerMatteo Andreozzi, Frances Conboy, Giovanni Stea, Raffaele Zippo. 79-86 [doi]
- Resource Depedency Analysis in Multi-Core SystemsJakob Danielsson, Tiberiu Seceleanu, Marcus Jägemar, Moris Behnam, Mikael Sjödin. 87-94 [doi]
- UNIFORM: Automatic Alignment of Open Learning DatasetsLuca Cagliero, Lorenzo Canale, Laura Farinetti. 95-102 [doi]
- MannAccess: A Novel Low Cost Assistive Educational Tool of Digital Image for Visually ImpairedAlisson Renan Svaigen, Lailla Milainny Siqueira Bine, Wuigor Ivens Siqueira Bine, Linnyer Beatrys Ruiz. 103-112 [doi]
- Enhancing the Learning of Computing/IT Students with Open Educational ResourcesHenry C. B. Chan, Yik Him Ho, Edmundo Tovar, Sorel Reisman. 113-122 [doi]
- The Use of Metadata in Open Educational Resources Repositories: An Exploratory StudyWilliam Simão de Deus, Ellen Francine Barbosa. 123-132 [doi]
- DSLE: A Smart Platform for Designing Data Science CompetitionsGiuseppe Attanasio, Flavio Giobergia, Andrea Pasini, Francesco Ventura, Elena Baralis, Luca Cagliero, Paolo Garza, Daniele Apiletti, Tania Cerquitelli, Silvia Chiusano. 133-142 [doi]
- Algorithmic Support for Personalized Course Selection and SchedulingTyler Morrow, Ali R. Hurson, Sahra Sedigh Sarvestani. 143-152 [doi]
- A Short-Term Course of STEAM Education through IoT Exercises for High School StudentsKoki Ota, Tsuyoshi Nakajima, Hiroki Suda. 153-157 [doi]
- Experimental Didactic Proposal using VISIR Remote Laboratory to Learn Diode-Based CircuitsManuel Blázquez-Merino, Clara M. Perez-Molina, Manuel Castro, Félix García Loro, Elio San Cristóbal, Edmundo Tovar, Sergio Martín Gutierrez. 158-164 [doi]
- A Comparative Study of the Academic Programs between Informatics/BioInformatics and Data Science in the U.SIsmail Bile Hassan, Jigang Liu. 165-171 [doi]
- Heart Rate Estimation from Face Videos for Student Assessment: Experiments on edBBJavier Hernandez-Ortega, Roberto Daza, Aythami Morales, Julian Fiérrez, Rubén Tolosana. 172-177 [doi]
- Using Fine-Grained Test Cases for Improving Novice Program Fault LocalizationZheng Li, Deli Yu, Yonghao Wu, Yong Liu. 178-183 [doi]
- Digital Privacy Detectives: An Interactive Game for ClassroomsCaroline D. Hardin, Jen Dalsen. 184-189 [doi]
- Teaching Mathematics in Scientific Bachelor Degrees Using a Blended ApproachMarina Marchisio, Sara Remogna, Fabio Roman, Matteo Sacchet. 190-195 [doi]
- Developing Predictors for Student Involvement in Generic Competency Development Activities in Smart Learning EnvironmentJoseph C. H. So, Ho Wai Tung, Ada Chan, Simon Wong, Adam Wong, Henry Chan. 196-200 [doi]
- Automatic Formative Assessment in Computer Science: Guidance to Model-Driven DesignMarina Marchisio, Tiziana Margaria, Matteo Sacchet. 201-206 [doi]
- TTED-PU: A Transferable Tax Evasion Detection Method Based on Positive and Unlabeled LearningFa Zhang, Bin Shi, Bo Dong, Qinghua Zheng, Xiangting Ji. 207-216 [doi]
- Transfer Learning from Planar to Spherical ImagesTakafumi Takeda, Kenichi Yoshida. 217-224 [doi]
- A Novel Dynamic Data-Driven Algorithmic Trading Strategy Using Joint Forecasts of Volatility and Stock PriceYou Liang, Aerambamoorthy Thavaneswaran, Alexander Paseka, Zimo Zhu, Ruppa K. Thulasiram. 225-234 [doi]
- A Novel Tax Evasion Detection Framework via Fused Transaction Network RepresentationYingchao Wu, Bo Dong, Qinghua Zheng, Rongzhe Wei, Zhiwen Wang, Xuanya Li. 235-244 [doi]
- Simulating the Printed Circuit Board Assembly Process for Image GenerationJohannes Nau, Johannes Richter, Detlef Streitferdt, Michael Kirchhoff. 245-254 [doi]
- Collaborative Filtering Recommendation Based on Multi-Domain Semantic FusionXiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou. 255-261 [doi]
- Data Linking as a Service: An Infrastructure for Generating and Publishing Linked Data on the WebIvan Luiz Salvadori, Alexis Huf, Frank Siqueira. 262-271 [doi]
- Unified Target-based Sentiment Analysis by Dual-pointer Tagging SchemeXibo Zhou, Tianxin Liang, Bingqian Wang. 272-276 [doi]
- NEUD-TRI: Network Embedding Based on Upstream and Downstream for Transaction Risk IdentificationJingyi An, Qinghua Zheng, Rongzhe Wei, Bo Dong, Xuanya Li. 277-286 [doi]
- An Information Theoretic Learning for Causal Direction IdentificationHang Wu, May D. Wang. 287-294 [doi]
- Training Confidence-Calibrated Classifier via Distributionally Robust LearningHang Wu, May D. Wang. 295-304 [doi]
- Fault Diagnosis of Rolling Bearing Based on Grey Correlation VIKOR with Triangular Ordered Fuzzy NumbersXingang Wang, Xin Wang, Chengwen Zhuang, Tongyu Zhao. 305-310 [doi]
- Research on Network Awareness of Enterprise Evaluation System IndicatorsMing Zhu, Pengyu Wan, Xiangyang Feng, Zhengyu Wang, Wenpei Shao. 311-315 [doi]
- AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital TransformationChan Naseeb. 316-321 [doi]
- ReRe: A Lightweight Real-Time Ready-to-Go Anomaly Detection Approach for Time SeriesMing-Chang Lee, Jia-Chun Lin, Ernst Gunner Gan. 322-327 [doi]
- Human Gait Recognition Based on Integrated Gait Features using Kinect Depth CamerasWonjin Kim, Yanggon Kim, Ki Yong Lee. 328-333 [doi]
- RVAE-ABFA : Robust Anomaly Detection for HighDimensional Data Using Variational AutoencoderYuda Gao, Bin Shi, Bo Dong, Yan Chen, Lingyun Mi, Zhiping Huang, Yuanyuan Shi. 334-339 [doi]
- Bayesian Neural Network Based Path Prediction Model Toward the Realization of Patent ValuationWeidong Liu, Wenbo Qiao, Xin Liu. 340-344 [doi]
- Cinematographic Shot Classification through Deep LearningBartolomeo Vacchetti, Tania Cerquitelli, Riccardo Antonino. 345-350 [doi]
- Evaluation of Parameter Update Effects in Deep Semi-Supervised Learning AlgorithmsElie Neghawi, Yan Liu. 351-360 [doi]
- A Step Closer to Becoming Symbiotic with AI through EEG: A Review of Recent BCI TechnologySarthak Dabas, Piyush Saxena, Natalie Nordlund, Sheikh Iqbal Ahamed. 361-368 [doi]
- Secure IoT Data Management in a Private Ethereum BlockchainVinay Kumar Calastry Ramesh, Yoohwan Kim, Ju-Yeon Jo. 369-375 [doi]
- G-IDS: Generative Adversarial Networks Assisted Intrusion Detection SystemMd Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr.. 376-385 [doi]
- Managing Massive Amounts of Small Files in All-Flash StorageRize Jin, Joon-Young Paik, Jianming Wang, Yenewondim Biadgie, Yunbo Rao, Tae-Sun Chung. 386-393 [doi]
- Dual Adversarial Networks for Land-Cover ClassificationJingyi An, Rongzhe Wei, Zhichao Zha, Bo Dong. 394-399 [doi]
- Machine Learning Applied to Support Medical Decision in Transthoracic Echocardiogram Exams: A Systematic ReviewVilson Soares de Siqueira, Diego de Castro Rodrigues, Colandy Nunes Dourado, Moisés Marcos Borges, Rogério Gomes Furtado, Higor Pereira Delfino, Diego Stelle, Rommel Melgaço Barbosa, Ronaldo Martins da Costa. 400-407 [doi]
- Finding Emotion from Multi-lingual Voice DataNazia Hossain, Mahmuda Naznin. 408-417 [doi]
- Cue-Pin-Select, a Secure Mental Password ManagerEnka Blanchard, Ted Selker, Levi Gabasova, Eli Sennesh. 418-428 [doi]
- Towards Identifying the Optimal Timing for Near Real-Time Smoking Interventions Using Commercial Wearable DevicesTheodore Weber, Matthew Ferrin, Forest Sweeney, Shameem Ahmed, Moushumi Sharmin. 429-438 [doi]
- InterViewR: A Mixed-Reality Based Interview Training Simulation Platform for Individuals with AutismShameem Ahmed, Wesley Deneke, Victor Mai, Alexander Veneruso, Matthew Stepita, Anais Dawson, Bradley Hoefel, Garrett Claeys, Nicholas Lam, Moushumi Sharmin. 439-448 [doi]
- IDEAL: An Interactive De-Anonymization Learning SystemNa Li, Rajkumar Murugesan, Lin Li, Hao Zheng. 449-454 [doi]
- Applying a Gamification Approach to Knowledge Management in Higher Education InstitutionsNouf Almujally, Mike Joy. 455-459 [doi]
- Productivity Evaluation Indicators Based on LEAN and their Application to Compare Agile and Waterfall ProjectsKumi Jinzenji, Akio Jin, Tatsuya Muramoto. 460-466 [doi]
- Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2Anju Thomas, Harikrishnan P. M., P. Palanisamy, Varun P. Gopi. 467-472 [doi]
- WTC^2: Impact-Aware Threat Analysis for Water Treatment CentersAmarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar. 473-482 [doi]
- A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over BlockchainRussell Harkanson, Carter Chiu, Yoohwan Kim, Ju-Yeon Jo. 483-488 [doi]
- A Systematic Literature Review of Practical Virtual and Augmented Reality Solutions in SurgeryJonas Roessel, Moritz Knoell, Jannic Hofmann, Ricardo Buettner. 489-498 [doi]
- An ISO-Compliant Test Procedure for Technical Risk Analyses of IoT Systems Based on STRIDEPeter Danielis, Moritz Beckmann, Jan Skodzik. 499-504 [doi]
- A Modular Edge-/Cloud-Solution for Automated Error Detection of Industrial Hairpin Weldings using Convolutional Neural NetworksJohannes Vater, Pascal Schlaak, Alois C. Knoll. 505-510 [doi]
- A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw TypesPeter Mell, Assane Gueye. 511-516 [doi]
- A Systematic Literature Review of Research in the Surgical Field of Medical RoboticsRicardo Buettner, Alena Renner, Anna Boos. 517-522 [doi]
- Blockchain: Future Facilitator of Asset Information Modelling and Management?Azzam Raslan, Georgios Kapogiannis, Ali Cheshmehzangi, Walid Tizani, Dave Towey. 523-528 [doi]
- A Framework for Assembling Asset Information Models (AIMs) through Permissioned BlockchainAzzam Raslan, Georgios Kapogiannis, Ali Cheshmehzangi, Walid Tizani, Dave Towey. 529-534 [doi]
- A WiFi Assisted Pedestrian Heading Estimation Method Using GyroscopeYankan Yang, Baoqi Huang, Zhendong Xu, Runze Yang. 535-544 [doi]
- Estimating Sleep Duration from Temporal Factors, Daily Activities, and Smartphone UseChih-You Chen, Sudip Vhaduri, Christian Poellabauer. 545-554 [doi]
- Design Issues in Running a Web Server on Bare PC Multi-Core ArchitectureNirmala Soundararajan, Ramesh K. Karne, Alexander L. Wijesinha, Navid Ordouie, Hojin Chang. 555-564 [doi]
- Rapid Container Scheduling for Reactive Relocation of Individual HTTP RequestsRyosuke Matsumoto, Uchio Kondo. 565-574 [doi]
- Adaptive Topology for Scalability and Immediacy in Distributed Publish/Subscribe MessagingRyohei Banno, Kazuyuki Shudo. 575-583 [doi]
- Proposal of an Efficient Blind Search Utilizing the Rendezvous of Random Walk AgentsFumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki. 584-591 [doi]
- Spatio-Temporal Volume Data Aggregation for Crowdsensing in VDTNYuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai. 592-600 [doi]
- An Empirical Study of Tightest Network Calculus Analyses for Networks with Multicast FlowsBruno Cattelan, Steffen Bondorf, Alberto E. Schaeffer Filho. 601-606 [doi]
- A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FITHiroki Kashiwazaki, Hiroki Takakura, Shinji Shimojo. 607-612 [doi]
- On the Effectiveness of Random Node Sampling in Influence Maximization on Unknown GraphYuki Wakisaka, Kazuyuki Yamashita, Sho Tsugawa, Hiroyuki Ohsaki. 613-618 [doi]
- On Estimating Network Topology from Observed Flow Sets at Measurement NodesKeita Kitaura, Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki. 619-624 [doi]
- Detection of Freezing of Gait in People with Parkinson's Disease using SmartphonesLuigi Borzì, Gabriella Olmo, Carlo Alberto Artusi, Leonardo Lopiano. 625-635 [doi]
- ThermoCam: Smart Baby Monitoring AssistantM. Eren Akbiyik, Cagan S. Coban, Elif Aygun, Huseyin Ziya Imamoglu, Doga Gurgunoglu, Duygu Ider. 636-643 [doi]
- What Happens in Peer-Support, Stays in Peer-Support: Software Architecture for Peer-Sourcing in Mental HealthMahsa Honary, Jaejoon Lee, Christopher Bull 0001, Jiangtao Wang, Sumi Helal. 644-653 [doi]
- Smart Algorithm for Unhealthy Behavior Detection in Health ParametersLeonardo Ferreira da Costa, Rodrigo Teixeira de Melo, Lucas Vieira Alves, Cleilton Lima Rocha, Eriko Werbet de Oliveira Araujo, Gustavo Augusto Lima de Campos, Jerffeson Teixeira de Souza, Andreas Triantafyllidis, Anastasios Alexiadis, Konstantinos Votis, Dimitrios Tzovaras. 654-663 [doi]
- Regularization of Deep Neural Networks for EEG Seizure Detection to Mitigate OverfittingMohammed Saqib, Yuanda Zhu, May D. Wang, Brett Beaulieu-Jones. 664-673 [doi]
- An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood ObesityLucas Vieira Alves, Rodrigo Teixeira de Melo, Leonardo Ferreira da Costa, Cleilton Lima Rocha, Eriko W. de O. Araujo, Gustavo A. L. de Campos, Jerffeson Teixeira de Souza. 674-683 [doi]
- Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced DatasetMohammad Masum, Hossain Shahriar, Hisham Haddad. 684-692 [doi]
- Mobile Sensor-Based Fall Detection FrameworkMd Saiful Islam, Hossain Shahriar, Sweta Sneha, Chi Zhang, Sheikh Iqbal Ahamed. 693-698 [doi]
- Toward a Non-Intrusive, Affordable Platform for Elderly Assistance and Health MonitoringGuillaume Gingras, Mehdi Adda, Abdenour Bouzouane. 699-704 [doi]
- Using IoT in AAL Platforms for Older Adults: A Systematic MappingPaulo A. de S. Duarte, Emanuel Ferreira Coutinho, Jérôme Boudy, Mossaab Hariz, Windson Viana. 705-710 [doi]
- Effects of Social Media Use on Health and Academic Performance Among Students at the University of SharjahSyed Azizur Rahman, Amina Al-Marzouqi, Swetha Variyath, Shristee Rahman, Masud Rabbani, Sheikh Iqbal Ahamed. 711-716 [doi]
- Deep Learning Utilization in Beamforming Enhancement for Medical UltrasoundMariam M. Fouad, Yousef Metwally, Georg Schmitz, Michael Huebner, Mohamed A. Abd El ghany. 717-722 [doi]
- Generating Region of Interests for Invasive Breast Cancer in Histopathological Whole-Slide-ImageShreyas Malakarjun Patil, Li Tong, May D. Wang. 723-728 [doi]
- A Systematic Literature Review of Computer Support for Surgical InterventionsRicardo Buettner, Kai Wannenwetsch, Daniel Loskan. 729-734 [doi]
- A Systematic Literature Review of Medical Chatbot Research from a Behavior Change PerspectiveTobias Gentner, Timon Neitzel, Jacob Schulze, Ricardo Buettner. 735-740 [doi]
- Mobile for Health: A Digital Intervention to Reduce Smoking in the United Arab EmiratesSyed Azizur Rahman, Nabeel Al-Yateem, Amina Al-Marzouqi, Sheikh Iqbal Ahamed, Mohammad AlShabi. 741-745 [doi]
- Towards Developing A Mobile-Based Care for Children with Autism Spectrum Disorder (mCARE) in low and Middle-Income Countries (LMICs) Like BangladeshMunirul M. Haque, Dipranjan Das Dipal, Masud Rabbani, Md Ishrak Islam Zarif, Anik Iqbal, Shaheen Akhter, Shahana Parveen, Mohammad Rasel, Basana Rani Muhuri, Tanjir Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal Ahamed. 746-753 [doi]
- Graph Convolutional Neural Networks to Classify Whole Slide ImagesRoshan Konda, Hang Wu, May D. Wang. 754-758 [doi]
- An Early Warning System for Hemodialysis Complications Utilizing Transfer Learning from HD IoT DatasetChihhsiong Shih, Lai Youchen, Cheng-hsu Chen, William Cheng-Chung Chu. 759-767 [doi]
- Detecting Malicious Web Requests Using an Enhanced TextCNNLian Yu, Lihao Chen, Jingtao Dong, Mengyuan Li, Lijun Liu, Bai Zhao, Chen Zhang. 768-777 [doi]
- Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FASarah Marie Peck, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Emil N. Coman, Theodore Jensen, Yusuf Albayram. 778-789 [doi]
- Improving Intrusion Detection Systems using Zero-Shot Recognition via Graph EmbeddingsSaber Zerhoudi, Michael Granitzer, Mathieu Garchery. 790-797 [doi]
- Dagbase: A Decentralized Database Platform Using DAG-Based ConsensusYepeng Ding, Hiroyuki Sato. 798-807 [doi]
- CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD DrivesMordechai Guri. 808-816 [doi]
- Improving Attack Detection Performance in NIDS Using GANDongyang Li, Daisuke Kotani, Yasuo Okabe. 817-825 [doi]
- Cardinality Analysis to Classify Malicious Domain NamesKenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya. 826-832 [doi]
- Transparent IDS Offloading for Split-Memory Virtual MachinesKouki Yamato, Kenichi Kourai, Tarek N. Saadawi. 833-838 [doi]
- Detection of Change of Users in SNS by Two Dimensional CNNHiroshi Matsushita, Ryuya Uda. 839-844 [doi]
- A Verifiable Secret Sharing Scheme without Using Multi-Party ComputationsTakumi Makino, Yoko Kamidoi, Shin'ichi Wakabayashi. 845-850 [doi]
- vSwitchGuard: Defending OpenFlow Switches Against Saturation AttacksSamer Khamaiseh, Edoardo Serra, Dianxiang Xu. 851-860 [doi]
- CUDAsmith: A Fuzzer for CUDA CompilersBo Jiang, Xiaoyan Wang, Wing Kwong Chan, T. H. Tse, Na Li, Yongfeng Yin, Zhenyu Zhang 0004. 861-871 [doi]
- How Much Support Can API Recommendation Methods Provide for Component-Based Synthesis?Jiaxin Liu, Binbin Liu, Wei Dong 0006, Yating Zhang, Daiyan Wang. 872-881 [doi]
- A Drift Propensity Detection Technique to Improve the Performance for Cross-Version Software Defect PredictionMd. Alamgir Kabir, Jacky W. Keung, Kwabena Ebo Bennin, Miao Zhang. 882-891 [doi]
- Smart Contracts Vulnerability Auditing with Multi-semanticsZhen Yang, Jacky Keung, Miao Zhang, Yan Xiao, Yangyang Huang, Tik Hui. 892-901 [doi]
- Blocking Bug Prediction Based on XGBoost with Enhanced FeaturesXiaoyun Cheng, Naming Liu, Lin Guo, Zhou Xu, Tao Zhang. 902-911 [doi]
- Order in Chaos: Prioritizing Mobile App Reviews using Consensus AlgorithmsLayan Etaiwi, Sylvie Hamel, Yann-Gaël Guéhéneuc, William Flageol, Rodrigo Morales. 912-920 [doi]
- An Empirical Investigation into the Effects of Code Comments on Issue ResolutionQiwei Song, Xianglong Kong, Lulu Wang 0001, Bixin Li. 921-930 [doi]
- Code Inspection Support for Recurring Changes with Deep Learning in Evolving SoftwareKrishna Teja Ayinala, Kwok Sun Cheng, Kwangsung Oh, Teukseob Song, Myoungkyu Song. 931-942 [doi]
- MCFL: Improving Fault Localization by Differentiating Missing Code and Other FaultsZijie Li, Long Zhang, Zhenyu Zhang 0004, Bo Jiang 0001. 943-952 [doi]
- A Tool for Non-Intrusive and Privacy-Preserving Developers' Programming Activity Data CollectionYue Cao, Liang Wang 0006, Zhiwen Zheng, XianPing Tao. 953-962 [doi]
- Accuracy Improvement for Neural Program Synthesis via Attention Mechanism and Program SlicingYating Zhang, Wei Dong, Daiyan Wang, Binbin Liu, Jiaxin Liu. 963-972 [doi]
- CNN-Based Model for Chinese Information Processing and Its Application in Large-Scale Book PurchasingChi Guo, Peilin Yu, Wenfei Guo, Xiaxian Wang. 973-978 [doi]
- Software Product Line Configuration and Traceability: An Empirical Study on SMarty Class and Component DiagramsThais S. Nepomuceno, Edson OliveiraJr, Ricardo T. Geraldi, Andreia Malucelli, Sheila S. Reinehr, Marco Aurélio Graciotto Silva. 979-984 [doi]
- Recovering Software Product Line Architecture of Product Variants Developed with the Clone-and-Own ApproachJihyun Lee, Taeyoung Kim, Sungwon Kang. 985-990 [doi]
- IRBFL: An Information Retrieval Based Fault Localization ApproachZheng Li, Xue Bai, Haifeng Wang, Yong Liu. 991-996 [doi]
- A Dynamic Resource Allocation Framework for Apache Spark ApplicationsKewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen. 997-1004 [doi]
- Boot Log Anomaly Detection with K-Seen-BeforeJohan Garcia, Tobias Vehkajarvi. 1005-1010 [doi]
- Mining Timing Constraints from Event Logs for Process ModelZhenyu Zhang 0009, Chunhui Guo, Shangping Ren. 1011-1016 [doi]
- Model Checking Software in Cyberphysical SystemsMarjan Sirjani, Edward A. Lee, Ehsan Khamespanah. 1017-1026 [doi]
- Developing Safe Smart ContractsSajjad Rezaei, Ehsan Khamespanah, Marjan Sirjani, Ali Sedaghatbaf, Siamak Mohammadi. 1027-1035 [doi]
- Application of Blockchain for Trusted Coordination in Collaborative Software DevelopmentStephen S. Yau, Jinal S. Patel. 1036-1040 [doi]
- Smart-Power: A Smart Cyber-Physical System to Detect IoT Security Threat through Behavioral Power ProfilingA. K. M. Jahangir Majumder, Jared D. Miller, Charles B. Veilleux, Amir A. Asif. 1041-1049 [doi]
- A Smart Cyber-Human System to Support Mental Well-Being through Social EngagementA. K. M. Jahangir Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif. 1050-1058 [doi]
- WoTnectivity: A Communication Pattern for Different Web of Things Connection ProtocolsManel Mena, Javier Criado, Luis Iribarne, Antonio Leopoldo Corral Liria. 1059-1064 [doi]
- A Smart IoT Security System for Smart-Home Using Motion Detection and Facial RecognitionA. K. M. Jahangir Majumder, Joshua Aaron Izaguirre. 1065-1071 [doi]
- Blockchain in the Internet of Things: Architectures and ImplementationOscar Delgado-Mohatar, Rubén Tolosana, Julian Fiérrez, Aythami Morales. 1072-1077 [doi]
- On Semantic Organization and Fusion of Trajectory DataZhenhu Chen, Xingang Wang, Heng Li, Hu Wang. 1078-1081 [doi]
- Usable Everlasting Encryption using the Pornography Infrastructure (Fast Abstract)Enka Blanchard, Siargey Kachanovich. 1082-1083 [doi]
- Using the PerFECt Framework to Establish an Onlife Community for Theatre in Mathematics to Teach Principles of ComputingNektarios Moumoutzis, Desislava Paneva-Marinova, Chara Xanthaki, Polyxeni Arapi, Nikos Pappas, Stavros Christodoulakis. 1084-1085 [doi]
- Mobile Technology to Improve Physical Activity Among School-Aged Children in the United Arab EmiratesAmina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman, Sheikh Iqbal Ahamed, Mohammad AlShabi. 1086-1088 [doi]
- Analysing Privacy-Preserving Constraints in Microservices ArchitectureInna Vistbakka, Elena Troubitsyna. 1089-1090 [doi]
- Abuse of the Cloud as an Attack PlatformMoitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones. 1091-1092 [doi]
- Compliance Requirements Checking in Variable EnvironmentsSara Sartoli, Sepideh Ghanavati, Akbar Siami Namin. 1093-1094 [doi]
- Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on LabwareHossain Shahriar, Kai Qian, Atef Shalan, Fan Wu. 1095-1096 [doi]
- Google Scholar vs. Dblp vs. Microsoft Academic Search: An Indexing Comparison for Software Engineering LiteratureRubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001. 1097-1098 [doi]
- The Use of Grey Literature and Google Scholar in Software Engineering Systematic Literature ReviewsRubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001. 1099-1100 [doi]
- Attacks and Mitigation Techniques for Iris-Based Authentication SystemsLaeticia Etienne, Hossain Shahriar. 1101-1102 [doi]
- Does This Code Change Affect Program Behavior? Identifying Nonbehavioral Changes with BytecodeAoi Maejima, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto. 1103-1104 [doi]
- The Effect of Cognitive Load in Code Reading on Non-Programming Specific EnvironmentHideaki Azuma, Shinsuke Matsumoto, Hidetake Uwano, Shinji Kusumoto. 1105-1106 [doi]
- A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBRKanon Sasaki, Saneyasu Yamaguchi. 1107-1108 [doi]
- Toward Ordering the Set of Modifications to Solve a Maintenance RequestGustavo Villavicencio. 1109-1110 [doi]
- A Real-Time and Low-Cost Flash Flood Monitoring System to Support Transportation InfrastructureHaroon Malik, Wael Zatar. 1111-1112 [doi]
- Smart SE: Smart Systems and Services Innovative Professional Education ProgramHironori Washizaki, Kenji Tei, Kazunori Ueda, Hayato Yamana, Yoshiaki Fukazawa, Shinichi Honiden, Shoichi Okazaki, Nobukazu Yoshioka, Naoshi Uchihira. 1113-1114 [doi]
- Towards Fast Data-Driven Smooth Path Planning with Fair CurvesVictor Parque, Tomoyuki Miyashita. 1115-1116 [doi]
- Towards Software Value Co-Creation with AIHironori Washizaki. 1117-1118 [doi]
- Value Driven Process Towards Software Engineering for Business and Society (SE4BS)Hironori Washizaki, Junzo Hagimoto, Kazuo Hamai, Mitsunori Seki, Takeshi Inoue, Shinya Taniguchi, Hiroshi Kobayashi, Kenji Hiranabe, Eiichi Hanyuda. 1119-1120 [doi]
- Binary Similarity Analysis for Vulnerability DetectionZeming Tai, Hironori Washizaki, Yoshiaki Fukazawa, Yurie Fujimatsu, Jun Kanai. 1121-1122 [doi]
- Cache-Sharing Distributed Service Registry for Highly Dynamic V2X EnvironmentsHyeongCheol Moon, Kyeong-Deok Baek, In-Young Ko. 1123-1124 [doi]
- Using Recurrent Neural Network for Intelligent Prediction of Water Level in ReservoirsJuntao Zhang, Ziyue Zhang, Ying Weng, Simon Gosling, Hui Yang, Chenggang Yang, Wenjie Li, Qun Ma. 1125-1126 [doi]
- Towards a Modular and Customisable Model-Based Architecture for Autonomous DronesMatheus Ladeira, Yassine Ouhammou, Emmanuel Grolleau. 1127-1128 [doi]
- VRvisu++: A Tool for Virtual Reality-Based Visualization of MRI ImagesSandeep Reddivari, Jason Smith. 1129-1130 [doi]
- Learning Environment Containerization of Machine Leaning for CybersecurityHossain Shahriar, Kai Qian, Hao Zhang. 1131-1132 [doi]
- On Delay Bounds and Measurements: A COTS Testbed for Network Performance ExperimentationBruno Cattelan, Steffen Bondorf. 1133-1138 [doi]
- Mechanism of Cyclic Performance Fluctuation of TCP BBR and CUBIC TCP CommunicationsKouto Miyazawa, Saneyasu Yamaguchi, Aki Kobayashi. 1139-1144 [doi]
- Cache Management with Fadvise Based on LFUNaomichi Fukuda, Taisei Miura, Kenichi Kourai, Saneyasu Yamaguchi. 1145-1150 [doi]
- On the Optimal Cache Allocation in Information-Centric NetworkingJo Hagikura, Ryo Nakamura, Hiroyuki Ohsaki. 1151-1156 [doi]
- On the Performance of End-to-End Routing in Complex Networks with Intermittent LinksMichika Ohnishi, Chuta Minamiguchi, Hiroyuki Ohsaki. 1157-1162 [doi]
- MECPerf: An Application-Level Tool for Estimating the Network Performance in Edge Computing EnvironmentsChiara Caiazza, Leonardo Bernardi, Marco Bevilacqua, Alessandro Cabras, Claudio Cicconetti, Valerio Luconi, Gabriele Sciurti, Elisabetta Senore, Emilio Vallati, Alessio Vecchio. 1163-1168 [doi]
- Routing and Capacity Optimization Based on Estimated Latent OD Traffic DemandTakumi Uchida, Keisuke Ishibashi, Kensuke Fukuda. 1169-1175 [doi]
- Adaptive OS Switching for Improving Availability During Web Traffic Surges: A Feasibility StudyKatsuya Matsubara, Yuhei Takagawa. 1176-1182 [doi]
- Using Blockchain Technologies to Improve Security in Federated Learning SystemsAndrew Ronald Short, Helen C. Leligou, Michael Papoutsidakis, Efstathios Theocharis. 1183-1188 [doi]
- An Empirical Study on Algorithmic BiasSajib Sen, Dipankar Dasgupta, Kishor Datta Gupta. 1189-1194 [doi]
- Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital ImagesAkemi Gálvez, Andrés Iglesias 0001, Eneko Osaba, Javier Del Ser. 1195-1200 [doi]
- Unification of Machine Learning FeaturesJayesh Patel. 1201-1205 [doi]
- Transtracer: Socket-Based Tracing of Network Dependencies Among Processes in Distributed ApplicationsYuuki Tsubouchi, Masahiro Furukawa, Ryosuke Matsumoto. 1206-1211 [doi]
- Discrimination of Sugarcane Varieties by Remote Sensing: A Review of LiteraturePriscila M. Kai, Ronaldo Martins da Costa, Bruna M. de Oliveira, Deborah S. A. Fernandes, Juliana Paula Felix, Fabrízzio Alphonsus A. M. N. Soares. 1212-1217 [doi]
- Few-Shot Ontology Alignment Model with Attribute AttentionsJingyu Sun, Susumu Takeuchi, Ikuo Yamasaki. 1218-1222 [doi]
- Proposal of a Logical Sensor Architecture using WoT-Based Edge MicroservicesKazuki Miyagoshi, Yuuichi Teranishi, Tomoya Kawakami, Tomoki Yoshihisa, Shinji Shimojo. 1223-1228 [doi]
- SLA+: Narrowing the Difference between Data Sets in Heterogenous Cross-Project Defection PredictionJie Wu, Yingbo Wu, Min Zhou, Xiaoling Jiang. 1229-1234 [doi]
- TRUSTD: Combat Fake Content using Blockchain and Collective Signature TechnologiesZakwan Jaroucheh, Mohamad Alissa, William J. Buchanan, Xiaodong Liu. 1235-1240 [doi]
- Reconstructing Compound Affective States using Physiological Sensor DataPiyush Saxena, Sarthak Dabas, Devansh Saxena, Nithin Ramachandran, Sheikh Iqbal Ahamed. 1241-1249 [doi]
- Towards Aggregation Based I/O Optimization for Scaling Bioinformatics ApplicationsJack Stratton, Michael Albert, Quentin Jensen, Max Ismailov, Filip Jagodzinski, Tanzima Islam. 1250-1255 [doi]
- Deep Learning for Visual Segmentation: A ReviewJiaxing Sun, Yujie Li 0001, Huimin Lu, Tohru Kamiya, Seiichi Serikawa. 1256-1260 [doi]
- Data Analytics for the COVID-19 EpidemicRanran Wang, Gang Hu, Chi Jiang, Huimin Lu, Yin Zhang 0002. 1261-1266 [doi]
- Kiwifruit Leaf Disease Identification Using Improved Deep Convolutional Neural NetworksBin Liu 0023, Zefeng Ding, Yun Zhang, Dongjian He, Jinrong He. 1267-1272 [doi]
- Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User AuthenticationAlejandro Acien, Aythami Morales, Rubén Vera-Rodríguez, Julian Fiérrez. 1273-1278 [doi]
- Remote Assessing Children's Handwriting Spelling on Mobile DevicesJaline Mombach, Fábio Diniz Rossi, Juliana Paula Félix, Fabrízzio Alphonsus A. M. N. Soares. 1279-1284 [doi]
- Estimation of Grasp States in Prosthetic Hands using Deep LearningVictor Parque, Tomoyuki Miyashita. 1285-1289 [doi]
- An Approach to Improving the Effectiveness of Data Augmentation for Deep Neural NetworksSeunghui Jang, Ki Yong Lee, Yanggon Kim. 1290-1295 [doi]
- Data-Driven Adaptive Regularized Risk ForecastingYou Liang, Aerambamoorthy Thavaneswaran, Zimo Zhu, Ruppa K. Thulasiram, Md. Erfanul Hoque. 1296-1301 [doi]
- Modeling of Short-Term Electricity Demand and Comparison of Machine Learning Approaches for Load ForecastingBehrouz Banitalebi, Srimantoorao S. Appadoo, Aerambamoorthy Thavaneswaran, Md. Erfanul Hoque. 1302-1307 [doi]
- Portfolio Optimization Using a Novel Data-Driven EWMA Covariance Model with Big DataZimo Zhu, Aerambamoorthy Thavaneswaran, Alexander Paseka, Julieta Frank, Ruppa K. Thulasiram. 1308-1313 [doi]
- Dynamic Data Science Applications in Optimal Profit Algorithmic TradingYou Liang, Aerambamoorthy Thavaneswaran, Na Yu, Md. Erfanul Hoque, Ruppa K. Thulasiram. 1314-1319 [doi]
- Ensemble Learning for Detecting Fake ReviewsLuis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears. 1320-1325 [doi]
- Ensemble Random Forests Classifier for Detecting Coincidentally Correct Test CasesShuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin. 1326-1331 [doi]
- Seq2Image: Sequence Analysis using Visualization and Deep Convolutional Neural NetworkNeda Tavakoli. 1332-1337 [doi]
- Intelligent Application Switch and Key-Value Store Accelerated by Dynamic CachingTomoaki Kanaya, Akihiro Nakao, Shu Yamamoto, Masato Oguchi, Saneyasu Yamaguchi. 1338-1343 [doi]
- Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and ExperiencesAlfredo Cuzzocrea, Vincenzo De Maio, Edoardo Fadda. 1344-1350 [doi]
- Towards Efficient and Secure Analysis of Large DatasetsStelvio Cimato, Stefano Nicolò. 1351-1356 [doi]
- A Framework for Fast MapReduce Processing Considering Sensitive Data on Hybrid CloudsShun Kawamoto, Yoko Kamidoi, Shin'ichi Wakabayashi. 1357-1362 [doi]
- A Case for Semantic Annotation Of EHRSreeninvasan M, Anu Chacko. 1363-1367 [doi]
- An Evaluation of Reverse Image Search Performance of GoogleYiltan Bitirim, Selin Bitirim, Duygu Çelik Ertugrul, Önsen Toygar. 1368-1372 [doi]
- Capturing Causal Knowledge from Authoritative Medical OntologiesHengyi Hu, Larry Kerschberg. 1373-1378 [doi]
- Modeling an AR Serious Game to Increase Attention of ADHD PatientsSaad Alqithami. 1379-1384 [doi]
- Remote Heart Rate and Heart Rate Variability Detection and Monitoring from Face Video with Minimum ResourcesKazi Shafiul Alam, Lin He, Jiachen Ma, Dipranjan Das, Mike Yap, Boris Kerjner, Siam Rezwan, Anik Iqbal, Sheikh Iqbal Ahamed. 1385-1390 [doi]
- Impacts of Size and History Length on Energetic Community Load Forecasting: A Case StudyMickaël Tits, Benjamin Bernaud, Amel Achour, Maher Badri, Lotfi Guedria. 1391-1397 [doi]
- Optimization of Large-Scale Commercial Electric Vehicles Fleet Charging Location Schedule Under the Distributed wind Power SupplyTeng Long, Qing-Shan Jia. 1398-1404 [doi]
- GAMES: A General-Purpose Architectural Model for Multi-energy System Engineering ApplicationsLuca Barbierato, Daniele Salvatore Schiera, Edoardo Patti, Enrico Macii, Enrico Pons, Ettore Francesco Bompard, Andrea Lanzini, Romano Borchiellini, Lorenzo Bottaccioli. 1405-1410 [doi]
- Optimal Configuration and Placement of PV Systems in Building Roofs with Cost AnalysisMatteo Orlando, Lorenzo Bottaccioli, Edoardo Patti, Enrico Macii, Sara Vinco, Massimo Poncino. 1411-1416 [doi]
- A Resource-Saving Approach for Adding Redundancy to a Network-on-Chip SystemAndriy Osadchuk, Bernd Däne, Wolfgang Fengler 0001. 1417-1422 [doi]
- Anomaly Detection for Automotive Diagnostic Applications Based on N-GramsMarcel Rumez, Jinghua Lin, Thomas Fuchß, Reiner Kriesten, Eric Sax. 1423-1429 [doi]
- Techniques and Equipment for Automated Pupillometry and its Application to Aid in the Diagnosis of Diseases: A Literature ReviewHigor Pereira Delfino, Ronaldo Martins da Costa, Juliana Paula Felix, João Gabriel Junqueira da Silva, Hedenir Monteiro Pinheiro, Vilson Soares de Siqueira, Eduardo Nery Rossi Camilo, Deborah Silva Alves Fernandes, Fabrízzio Alphonsus A. M. N. Soares. 1430-1433 [doi]
- EmCARE Applications in Managing the Emotional Skills of Children and Adolescents in the United Arab EmiratesNabeel Al-Yateem, Syed Azizur Rahman, Amina Al-Marzouqi, Sheikh Iqbal Ahamed, Mohammad AlShabi. 1434-1437 [doi]
- A Comparative Evaluation of Heart Rate Estimation Methods using Face VideosJavier Hernandez-Ortega, Julian Fiérrez, Aythami Morales, David Diaz. 1438-1443 [doi]
- A Two-Step Password Authentication System for Alzheimer PatientsJamesa Hogges, Hossain Shahriar, Sweta Sneha, Sheikh Iqbal Ahamed. 1444-1448 [doi]
- Automatic Orientation Identification of Pediatric Chest X-RaysAfonso U. Fonseca, Gabriel da Silva Vieira, Juliana Paula Felix, Paulo Freire Sobrinho, Áurea Valéria Pereira Silva, Fabrízzio Alphonsus A. M. N. Soares. 1449-1454 [doi]
- Exploiting Ensemble Classification Schemes to Improve Prognosis Process for Large for Gestational Age Fetus ClassificationFaheem Akhtar, JianQiang Li, Pei Yan, Azhar Imran, Gul Muhammad Shaikh, Chun Xu. 1455-1459 [doi]
- CHOCSLAT: Chinese Healthcare-Oriented Computerised Speech & Language Assessment ToolsDave Towey, Lixian Jin, Hua Zhu, Jiaye Zhu, Kangming Feng, Huili Geng, Jing Lu, Tianyi Yu, Yu Wang. 1460-1465 [doi]
- Multi-frame Dimensionality-Reduction Difference Method for Extracting Key Frames of VideoShuaipeng Cai, Qinyan Zhang, Qing Wang 0003, Yi Lei, Ji-Jiang Yang. 1466-1470 [doi]
- Scalable Impact Range Detection against Newly Added Rules for Smart Network VerificationYutaka Takita, Masatake Miyabe, Hiroshi Tomonaga, Naoki Oguchi. 1471-1476 [doi]
- Dynamic Fault Management in Service Function ChainingShih-Ying Song, Fuchun Joseph Lin. 1477-1482 [doi]
- Message-Passing Based Communication via Synchronous Execution (Channels)Nayef H. Alshammari. 1483-1489 [doi]
- Divider: Delay-Time Based Sender Identification in Automotive NetworksShuji Ohira, Araya Kibrom Desta, Tomoya Kitagawa, Ismail Arai, Kazutoshi Fujikawa. 1490-1497 [doi]
- Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-FiSheng Gong, Hideya Ochiai, Hiroshi Esaki. 1498-1503 [doi]
- Anomalous IP Address Detection on Traffic Logs Using Novel Word EmbeddingSatoru Koda, Yusuke Kambara, Takanori Oikawa, Kazuyoshi Furukawa, Yuki Unno, Masahiko Murakami. 1504-1509 [doi]
- Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL InjectionKotomi Kuroki, Yo Kanemoto, Kazufumi Aoki, Yasuhiro Noguchi, Masakatsu Nishigaki. 1510-1515 [doi]
- The Development of Emerging Technological Applications for Not-for-Profit Organizations in Capstone Projects: A Case in Scout Association of Hong KongCheuk Hang Au, Richard Wing Cheung Lui. 1516-1521 [doi]
- Model-Driven-Design of NREn Bridging Application: Case Study AfgRENSalim Saay, Tiziana Margaria. 1522-1527 [doi]
- A Virtual Reality OER Platform to Deliver Phobia-Motivated ExperiencesDenis Stepanov, Dave Towey, Tsong Yueh Chen, Zhi Quan Zhou. 1528-1533 [doi]
- Refactoring Software in the Automotive Domain for Execution on Heterogeneous PlatformsHugo Sica de Andrade, Ivica Crnkovic, Jan Bosch. 1534-1541 [doi]
- Comprehensive Review of Collaborative Network Attacks in MANETOlufemi Fasunlade, Shikun Zhou, David Sanders. 1542-1545 [doi]
- An Intelligent Health Analysis Approach to Detecting Potential Threats with Health Data ReuseFengbao Ma, Hongji Yang, William C. Chu, Qinyun Liu. 1546-1551 [doi]
- SoCeR: A New Source Code Recommendation Technique for Code ReuseMd Mazharul Islam, Razib Iqbal. 1552-1557 [doi]
- Cloud: A Platform to Launch Stealth AttacksMoitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones. 1558-1563 [doi]
- Advanced, Privacy-Preserving and Approximate Big Data Management and Analytics in Distributed Environments: What is Now and What is NextAlfredo Cuzzocrea. 1564-1568 [doi]
- Smart Contract MicroservitizationSiyuan Wang, Xuehan Zhang, Wei Yu, Kai Hu, Jian Zhu. 1569-1574 [doi]
- Smart Computing Applications Using BLE and Mobile Intercloud TechnologiesYik Him Ho, Yerkezhan Sartayeva, Chak Pang Chiu, Henry C. B. Chan. 1575-1580 [doi]
- Making More Extensive and Efficient Typo-Tolerant Password CheckersEnka Blanchard. 1581-1588 [doi]
- Handwritten Signature Authentication Using Smartwatch Motion SensorsGen Li, Hiroyuki Sato. 1589-1596 [doi]
- Centralized Control of Account Migration at Single Sign-On in ShibbolethSatsuki Nishioka, Yasuo Okabe. 1597-1603 [doi]
- Keystroke Biometrics in Response to Fake News Propagation in a Global PandemicAythami Morales, Alejandro Acien, Julian Fiérrez, John V. Monaco, Rubén Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia. 1604-1609 [doi]
- Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving FlatnessMuhammad Ali Fauzi, Bian Yang, Edlira Martiri. 1610-1615 [doi]
- Identity Management and Access Control for the GNSS Community within a European Research InfrastructureJosé Manteigueiro, Paul Crocker, Carlos Barrico. 1616-1621 [doi]
- A Proposal for Edge Application Framework for Smart FactoryMasaki Sakai, Tsuyoshi Nakajima, Kazuya Takahashi. 1622-1627 [doi]
- Performance Modeling of Publish/Subscribe Middleware ComponentsAleksandar Antonic, Martina Antonic. 1628-1633 [doi]
- A Neural Network for Interpolating Light-SourcesSimon Colreavy-Donnelly, Stefan Kuhn, Fabio Caraffini, Stuart O'Connor, Zacharias A. Anastassi, Simon Coupland. 1634-1640 [doi]
- A NIS Directive Compliant Cybersecurity Maturity Assessment FrameworkGeorge Drivas, Argyro Chatzopoulou, Leandros A. Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke. 1641-1646 [doi]
- Analysing Petri Nets in a Calculus of Context-Aware AmbientsFrançois Siewe, Vasileios Germanos, Wen Zeng. 1647-1652 [doi]
- MRFS: A Multi-resource Fair Scheduling Algorithm in Heterogeneous Cloud ComputingHamed Hamzeh, Sofia Meacham, Kashaf Khan, Keith Phalp, Angelos Stefanidis. 1653-1660 [doi]
- Interaction with Smartwatches Using Gesture Recognition: A Systematic Literature ReviewThamer Horbylon Nascimento, Cristiane B. R. Ferreira, Wellington Galvão Rodrigues, Fabrízzio Alphonsus A. M. N. Soares. 1661-1666 [doi]
- LESAR: Localization System for Environmental Sensors using Augmented RealityAtsushi Tagami, Zhishu Shen. 1667-1672 [doi]
- A Systematic Literature Review of Machine Learning-Based Disease Profiling and Personalized TreatmentRicardo Buettner, Florian Klenk, Marc Ebert. 1673-1678 [doi]
- Optimizing MAC Layer Performance for Wireless Sensor Networks in eHealthAnwar Ahmed Khan, Shama Siddiqui, Sayeed Ghani. 1679-1682 [doi]
- GSP for Virtual Sensors in eHealth ApplicationsMehmet Ali Ertürk, Luca Vollero. 1683-1688 [doi]
- Understanding Veterans Expression of Anger Using Social Media AnalysisNadiyah Johnson, Joseph Coelho, Md Fitrat Hossain, Thomas Kissane, Wylie Frydrychowicz, Praveen Madiraju, Zeno Franco, Katinka Hooyer, Priyanka Annapureddy, Sheikh Iqbal Ahamed. 1689-1694 [doi]
- Differentially Private Generation of Social Networks via Exponential Random Graph ModelsFang Liu, Evercita Eugenio, Ick-Hoon Jin, Claire Bowen. 1695-1700 [doi]
- Visualization for Analyzing Usage Status from Dialogue SystemsYosuke Seki. 1701-1706 [doi]
- Predicting the Political Polarity of Tweets Using Supervised Machine LearningMichelle Voong, Keerthana Gunda, Swapna S. Gokhale. 1707-1712 [doi]
- Blockchain-Based Transaction Management in Smart Logistics: A Sawtooth FrameworkGuido Perboli, Vittorio Capocasale, Danilo Gotta. 1713-1718 [doi]
- Taxi Demand Prediction using an LSTM-Based Deep Sequence Model and Points of InterestBahman Askari, Tai Le Quy, Eirini Ntoutsi. 1719-1724 [doi]
- The European Concept of Smart City: A Taxonomic AnalysisGuido Perboli, Stanislav Fedorov, Mariangela Rosano. 1725-1730 [doi]
- Estimating e-Consumers' Attitude Towards Parcel Locker UsageIonut Alexandru Mitrea, Giovanni Zenezini, Alberto De Marco, Filippo Maria Ottaviani, Tiziana Delmastro, Cristiana Botta. 1731-1736 [doi]
- A Blockchain Token Economy Model for Financing a Decentralized Electric Vehicle Charging PlatformVladislav Aistov, Benedikt Kirpes, Micha Roon. 1737-1742 [doi]
- Testing Convolutional Neural Network using Adversarial Attacks on Potential Critical PixelsBo-Ching Lin, Hwai-jung Hsu, Shih-Kun Huang. 1743-1748 [doi]
- A Hybrid Algorithms Construction of Hyper-Heuristic for Test Case PrioritizationZheng Li, Yanzhao Xi, Ruilian Zhao. 1749-1754 [doi]
- A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression TestingYu Adachi, Haruto Tanno, Yu Yoshimura. 1755-1760 [doi]
- sshr: An SSH Proxy Server Responsive to System Changes without Forcing Clients to ChangeHirofumi Tsuruta, Ryosuke Matsumoto. 1761-1766 [doi]
- Security and Privacy Analysis of Wearable Health DeviceChi Zhang, Hossain Shahriar, A. B. M. Kamrul Riad. 1767-1772 [doi]
- Understanding Social Engineers Strategies from the Perspective of Sun-Tzu PhilosophyAffan Yasin, Rubia Fatima, Lin Liu 0001, Jianmin Wang 0001, Raian Ali. 1773-1776 [doi]
- Hands-on Lab on Smart City Vulnerability ExploitationAndrew Gomez, Hossain Shahriar, Victor Clincy, Atef Shalan. 1777-1782 [doi]
- A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each DepartmentTakafumi Komoto, Kokichi Futatsugi, Nobukazu Yoshioka. 1783-1788 [doi]
- An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital WatermarkingZhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita. 1789-1794 [doi]
- Evolutionary Algorithms for Vulnerability CoverageShuvalaxmi Dass, Akbar Siami Namin. 1795-1801 [doi]
- A Formal Analysis of Moving Target DefenseMuhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer. 1802-1807 [doi]
- A Novel Gesture Detection Technique to Increase Security in NFC Contactless SmartcardsDaniel Pérez Asensio, Antonio Pérez Yuste. 1808-1813 [doi]