


default search action
48th COMPSAC 2024: Osaka, Japan
- Hossain Shahriar, Hiroyuki Ohsaki, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:
48th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2024, Osaka, Japan, July 2-4, 2024. IEEE 2024, ISBN 979-8-3503-7696-8 - Sorel Reisman:
Committee. liv-lvi - A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang:
Message from the Workshop Chairs; COMPSAC 2024. lx-lxi - Junyang Wang:
Trans3-Vision: Transfer Learning Based Transformer for Transparent Object Segmentation with Grounded-ID2. 1-10 - Yusuke Miyake, Ryuji Watanabe, Tsunenori Mine:
Online Nonstationary and Nonlinear Bandits with Recursive Weighted Gaussian Process. 11-20 - Geeta Mahala, Aditya Ghose, Hoa Khanh Dam, Angela Consoli:
Verifying Multi -Agent Coordination Correctness for BDI Agents. 21-26 - Ricardo Cerrud, Shinji Kotani, Hiromi Watanabe:
Development of Quality Control Systems for an Autonomous Cherry Sorting Prototype. 27-32 - Azeem Ahmad, Dimistris Rentas, Daniel Hasselqvist, Pontus Sandberg, Kristian Sandahl, Aneta Vulgarakis:
Test Case Selection in Continuous Regression Testing Using Machine Learning: An Industrial Case Study. 33-38 - Mohammad Zaeed, Tanzima Z. Islam, Vladimir Indic:
Characterize and Compare the Performance of Deep Learning Optimizers in Recurrent Neural Network Architectures. 39-44 - Yishu Li, Jacky Keung
, Xiaoxue Ma, Chun Yong Chong, Jingyu Zhang
, Yihan Liao
:
LLM-Based Class Diagram Derivation from User Stories with Chain-of-Thought Promptings. 45-50 - Ziqing Su, Wei Lin, Huibiao Zhu:
Formalization and Verification of OpenStack Swift Using CSP. 51-60 - Mohammed Aristide Foughali
, Marius Mikucionis
, Maryline Zhang:
Scalable Computation of Inter-Core Bounds Through Exact Abstractions. 61-70 - Myke Morais de Oliveira, Douglas Augusto de Paula
, Ellen Francine Barbosa:
Towards Multilevel Logistic Regression and Cluster Analysis for Academic Performance Examination and Prediction. 71-80 - Luca Cagliero
, Laura Farinetti, Jacopo Fior, Andrea Ignazio Manenti:
ChatGPT, be my Teaching Assistant! Automatic Correction of SQL Exercises. 81-87 - Nils Rys-Recker, Qiang Hao
:
Early Identification of Struggling Students in Large Computer Science Courses: A Replication Study. 88-93 - Han Wan, Wenhao Nie, Shiyang Yue, Xiaoyan Luo:
Fault Localization for Novice Programs Combining Static Analysis and Dynamic Detection. 94-102 - Marina Marchisio Conte, Fabio Roman
, Matteo Sacchet, Enrico Spinello, Daniela Voicu, Magdalena Rykala
, Linko Nikolov:
Development of Digital Competencies in Education Through Staff Training Events and International Schools. 103-108 - Antoni Martínez-Ballesté, Edgar Batista, Elena Figueroa, Gabriela Fretes Torruella, Cèlia Llurba, José Quiles-Rodríguez
, Oihane Unciti, Ramon Palau
:
A Proposal for the Smart Classroom Infrastructure Using IoT and Artificial Intelligence. 109-114 - Linjing Sun
, Boon-Giin Lee
, David Chieng
, Sen Yang:
Exploring Collaborative Immersive Virtual Reality Serious Games for Enhancing Learning Motivation in Physics Education. 115-120 - Michael Sheinman Orenstrakh, Oscar Karnalim, Carlos Aníbal Suárez
, Michael Liut
:
Detecting LLM-Generated Text in Computing Education: Comparative Study for ChatGPT Cases. 121-126 - Colton Walker, Sahra Sedigh Sarvestani, Ali R. Hurson:
Learning from the Past: Using Peer Data to Improve Course Recommendations in Personalized Education. 127-137 - Yifan Zhang
, Dave Towey
, Matthew Pike
, Zhi Quan Zhou, Tsong Yueh Chen
:
Enhancing ADS Testing: An Open Educational Resource for Metamorphic Testing. 138-147 - Henry C. B. Chan:
Hybrid Teaching Based on a 4C Model-Based Framework. 148-152 - Eliza Janel L. Tan, Keith Alexandre L. Ramos, Maria Elisha Kaye B. Nazario, Steven Vincent D. Lim, Shirley B. Chu:
AI to the Test: Measuring ChatGPT's Objective Accuracy in the SATs in Comparison to Human Performance. 153-158 - Vani Sancheti, Lini T. Thomas, Vikram Pudi:
PMCS: Partition-Based Maximal Frequent Subgraph Mining Using MCS. 159-168 - Yashodha Karunarathna, Caslon Chua
:
From Data to Forecast: A Comparative Evaluation of Machine Learning and Deep Learning Models for Rainfall Prediction in Australia. 169-178 - Mark Edward M. Gonzales
, Hans Oswald A. Ibrahim, Elyssia Barrie H. Ong, Ann Franchesca B. Laguna:
Designing a Lightweight Convolutional Neural Network for Camouflaged Object Detection. 179-187 - Banooqa H. Banday
, Tanzima Z. Islam, Aniruddha Marathe:
PERFGEN: A Synthesis and Evaluation Framework for Performance Data using Generative AI. 188-197 - Junchao Chen, Jian-tao Zhou, Xinyu Hao:
A Time-Efficient Distributed Constant Conditional Functional Dependency Discovery Algorithm for Data Consistency. 198-203 - You Liang, Aerambamoorthy Thavaneswaran, Juan Liyau, Areebah Muhammad, Thimani Ranathungage, Ruppa K. Thulasiram:
A Cryptocurrency Multiple Trading Strategy with Kalman Filter Innovation Volatility Interval Forecasts. 204-209 - Md. Erfanul Hoque
, Sulalitha Bowala, Avanthi Saumyamala, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram:
Novel Resilient Model Risk Forecasts Based on Neuro Volatility Models. 210-219 - Fenglin Bi, Sijia Zhao, Wei Wang, Songlin Wu:
Assessing Maintainability Risks in the Open Source Software Supply Chain: An Empirical Quality Approach. 220-231 - Phuong-Nam Nguyen:
Quantum DNA Encoder: A Case-Study in gRNA Analysis. 232-239 - Chase Phelps
, Ankur Lahiry, Tanzima Z. Islam, Line C. Pouchard:
Reimagine Application Performance as a Graph: Novel Graph-Based Method for Performance Anomaly Classification in High-Performance Computing. 240-245 - Peiji Yu, Tianxing Wu, Dongjing Wang, Dengwei Xu:
Sequential Recommendation with Temporal Influence Based on Hawkes Process. 246-253 - Xiaochen Sun, Wei Wang, Tao Huang:
How to Fit the SCC Algorithm Efficiently into Distributed Graph Iterative Computation. 254-263 - Louis Puech, Ambre Dupuis
, Camélia Dadouchi
, Robert Pellerin
:
Applied Data Analytics Approach for Defect Root Causes Analysis in Manufacturing: The Case of Multi-Product Assembly Lines. 264-272 - Federico Moiraghi, Matteo Palmonari, Davide Allavena, Federico Morando:
Zero-Shot Hierarchical Classification on the Common Procurement Vocabulary Taxonomy. 273-278 - Devis Bianchini, Massimiliano Garda
:
An Empirical Approach for Clustering-Based Time Series Summarisation Assessment. 279-284 - Chia-Chun Hsu, Po-Han Lu, Jyun-Siyan Chu, Ya-Ning Chang
:
Sentiment-Driven LSTM Analysis of Bitcoin Price: Uncovering Insights from Tweets and Macroeconomics Data. 285-290 - Saneyasu Yamaguchi
, Fuma Hirabayashi, Atsuki Tamekuri:
Improvement of Deep Learning Models by Excluding Inappropriate Data Based on Interpretability. 291-296 - Yuning Huang, Jingchen Zou, Lanxi Meng, Xin Yue, Qing Zhao, Jianqiang Li, Changwei Song, Gabriel Jimenez, Shaowu Li, Guanghui Fu:
Comparative Analysis of ImageNet Pre-Trained Deep Learning Models and DINOv2 in Medical Imaging Classification. 297-305 - Xiaochen Sun, Wei Wang, Tao Huang:
Efficient Multi-network Community Search Method for Distributed Graph Iterative Computation. 306-311 - Paramita Basak Upama, Parama Sridevi, Masud Rabbani, Kazi Shafiul Alam, Munirul Haque, Sheikh Iqbal Ahamed:
Natural Language Processing for Recognizing Bangla Speech with Regular and Regional Dialects: A Survey of Algorithms and Approaches. 312-319 - Priyanka Bhyregowda, Mohammad Masum, Lohuwa Mamudu, Mohammed Chowdhury, Sai Chandra Kosaraiu, Hossain Shahriar:
ActivePCA: A Novel Framework Integrating PCA and Active Machine Learning for Efficient Dimension Reduction. 320-325 - Bohua Tian, Yan Wang:
Research on Deep Clustering Based Trajectory Frequent Pattern Mining. 326-331 - Faten Abbassi, Yousra Bendaly Hlaoui:
An Ontology Alignment Validation Approach Based on Supervised Machine Learning Algorithms and Automatic Schema Matching Approach. 332-341 - Ren Inayoshi, Han Nay Aung, Hiroyuki Ohsaki:
BloomWalk and CuckooWalk: Fast Random Walks Utilizing Probabilistic Data Structure. 342-349 - Abdul Mutakabbir
, Chung-Horng Lung, Samuel A. Ajila, Kshirasagar Naik, Marzia Zaman, Richard Purcell
, Srinivas Sampalli, Thambirajah Ravichandran:
A Federated Learning Framework Based on Spatio-Temporal Agnostic Subsampling (STAS) for Forest Fire Prediction. 350-359 - Davide Napolitano
, Lorenzo Vaiani
, Luca Cagliero
:
On Leveraging Multi-Page Element Relations in Visually-Rich Documents. 360-365 - Pierre Dardouillet, Kavé Salamatian, Hervé Verjus, Faiza Loukil, David Telisson, Olivier Le Van
:
Strategic Integration of Context for Fine-Tuning Topic Model Performance. 366-375 - Tien Nguyen, Faranak Abri
, Akbar Siami Namin, Keith S. Jones:
Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data. 376-381 - Placido Falqueto, Alberto Sanfeliu, Luigi Palopoli, Daniele Fontanelli
:
Learning Priors of Human Motion With Vision Transformers. 382-389 - Sheng Yun, Haoran Xue, Xueqing Zhang, Junkai Zhang, Yijun Zhao:
Enhancing Crime Investigation: Attention-Based GAN for Sketch-to-Portrait Conversion. 390-395 - Thimani Ranathungage, Aerambamoorthy Thavaneswaran, You Liang, Ruppa K. Thulasiram, Alex Paseka:
Novel Data-Driven Dynamic Network Science Application in Algorithmic Trading. 396-401 - Hayato Tomisu, Hideto Yano, Naoto Kai, Tomoki Yoshihisa:
A Multimodal Personalized Architecture for Irregular Bicycle Riding Form Detection. 402-410 - Amarpreet S. Gill
, Derek S. Irwin
, Dave Towey
, Yanhui Zhang:
Mobile Microlearning to Scaffold Project-Based Learning Using ARCS Model: A Preliminary Study. 411-420 - Han Nay Aung, Hiroyuki Ohsaki:
On the Impact of Network Topology on Distributed Online Kernel Learning. 421-428 - Chi-Yu Chiu, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu:
Effective Compression of Language Models by Combining Pruning and Knowledge Distillation. 429-438 - Mouhamed Amine Bouchiha
, Quentin Telnoff, Souhail Bakkali, Ronan Champagnat, Mourad Rabah, Mickaël Coustaty, Yacine Ghamri-Doudane:
LLMChain: Blockchain-Based Reputation System for Sharing and Evaluating Large Language Models. 439-448 - Francesco Maria Turno, Aleksejs Vesjolijs
, Jelena Kijonoka, Irina Yatskiv:
Context-Aware Personalized Route Recommendations for Bicycle Users Using Large-Scale Mobility Data. 449-454 - Md. Zarif Hossain, Ahmed Imteaj
, Abdur Rahman Bin Shahid:
FedAVO: Improving Communication Efficiency in Federated Learning with African Vultures Optimizer. 455-462 - Yuxiao Zhou, Zhishan Guo
, Zheng Dong, Kecheng Yang:
Multi-Accelerator Neural Network Inference via TensorRT in Heterogeneous Embedded Systems. 463-472 - Anakhi Hazarika, Nikumani Choudhury, Soumyajit Poddar:
Approximate Vedic Multiplier Architecture for Efficient CNN Acceleration on Embedded Devices. 473-482 - Andreas Kouloumpris, Georgios L. Stavrinides, Maria K. Michael, Theocharis Theocharides:
Optimal Multi-Constrained Workflow Scheduling for Cyber-Physical Systems in the Edge-Cloud Continuum. 483-492 - Zehui Yuan, Xue Zeng, Libo Feng, Xian Deng, Zhixing Zhang, Peng Wu, Fake Fang, Jiale Xie:
Trusted Off-Chain Machine Learning Scheme Based on ZK -SNARK and Oracle. 493-498 - Liming Xu, Dave Towey
, Andrew P. French, Steve Benford:
Uncovering the Metaverse within Everyday Environments: A Coarse-to-Fine ApproachBehaviors. 499-509 - Saika Zaman, Sajedul Talukder, Md. Zarif Hossain, Sai Puppala, Ahmed Imteaj
:
Towards Communication-Efficient Federated Learning Through Particle Swarm Optimization and Knowledge Distillation. 510-518 - Jingchen Zou, Jianqiang Li, Xi Xu, Yuning Huang, Jing Tang, Changwei Song, Linna Zhao, Wenxiu Cheng, Chujie Zhu, Suqin Liu:
Progressive Sign Language Video Translation Model for Real-World Complex Background Environments. 519-524 - Jie Wang, Huiqun Yu, Guisheng Fan, Jiayin Zhang:
Response Time and Energy-Aware Optimization for Co-Locating Microservices and Offline Tasks. 525-530 - Rong Gu, Teodor Barbuceanu, Ning Xiong, Tiberiu Seceleanu:
Experiences in Building a Digital Twin Framework: Challenges and Possible Solutions. 531-536 - Han Nay Aung, Hiroyuki Ohsaki:
Node Embedding Accelerates Randoms Walk on a Graph. 537-545 - Yerkezhan Sartayeva
, Henry C. B. Chan:
Dynamic Positioning Vectors for Collaborative UWB- Based Positioning. 546-555 - Hongyi Zhang, Jan Bosch, Helena Holmström Olsson:
EdgeFL: A Lightweight Decentralized Federated Learning Framework. 556-561 - Jinqian Jiang, Xiaohua Wu, Zirui Wang, Jun Cheng, Tao Meng:
BFSA: Blockchain-Enhanced Flexible Storage Architecture for Smart Building IoT Applications. 562-567 - Arafat Mahmood, Parama Sridevi, Padmapriya Velupillai Meikandan, Sheikh Iqbal Ahamed:
Survey on Objective Measurement and Sensor-Based Detection of Physical and Social Activities. 568-577 - Manabu Okada, Barbara Gallina:
Safety of the Intended Functionality of External Human Interfaces: Gaps and Research Agenda. 578-583 - Mustapha Kamal Benramdane
, Elena Kornyshova:
Reinforcement Learning to Personalize User eXperience within Digital Business Ecosystems. 584-593 - Md Jahangir Alam, Sultan Ahmed, Ismail Hossain, Sai Puppala, Zahidur Talukder, Sajedul Talukder:
SocialGuard: Bangla Text-Based Gender Identification for Enhancing Integrity in Social Networks. 594-604 - Sean Brzoska, Wesley Deneke:
Dynamic Behavior Variation in Virtual Human Agents Driven by a Model of Needs and Personality. 605-610 - Huimin Tang
, Boon-Giin Lee
, Dave Towey
, Kaiyi Chen
, Yichu Fang
, Runzhou Zhang
, Matthew Pike
:
The Audience Effect: Do Observations Change Outcomes in HCI Studies? 611-620 - Renzhi Han, Boon-Giin Lee
, Dave Towey
, Yuan Yao
, Matthew Pike
:
Exploring Emotional Responses with Dynamic Difficulty Adjustment Adaptation in Immersive Virtual Reality Exergaming. 621-627 - Ahmed Salem
, Kaoru Sumi
:
A Comparative Human-Robot Interaction Study between Face-Display and an Advanced Social Robot. 628-633 - Hieu Nguyen, Swapna S. Gokhale:
Identifying Key Players and Themes in Michigan Protests Through Social Network Analysis. 634-639 - Taufik Akbar Sitompul, Johan Harju:
Evaluating Graphical User Interfaces for Improving Depth Perception with Remote Crane Operators. 640-649 - Felix-Marcel Petermann
:
Interaction Between Unmanned Systems and Humans: An Example of a Smart Passenger Access Gate for Autonomous Urban Passenger Ferries. 650-655 - Louis Nisiotis
, Anna Anikina, Marios Raspopoulos:
Exploring Gaming Technologies, Digital Twins, and VR to Visualise Wireless Propagation Simulations. 656-661 - Shamima Afrin, Fumio Machida:
Exploiting Transformer Models in Three-Version Image Classification Systems. 662-669 - Yuya Sasaki
, Hironori Washizaki, Jialong Li, Dominik Sander, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Systematic Literature Review of Prompt Engineering Patterns in Software Engineering. 670-675 - Nico Surantha
, Edward Yose, Sani Muhamad Isa:
Low-Resolution Face Recognition for CCTV and Edge-Powered Smart Attendance Systems. 676-681 - Yishu Li
, Jacky Keung
, Kwabena Ebo Bennin
, Xiaoxue Ma
, Jingyu Zhang
, Zhen Yang
:
Agile Requirements Engineering in a Distributed Environment: Experiences from the Software Industry During Unprecedented Global Challenges. 682-691 - Tatsuki Ito, Shinji Kotani, Hiromi Watanabe:
Detection of Lesion Candidates and Extraction of Diagnostically Inconclusive Images in Capsule Endoscopy Using YOLOv5. 692-700 - Emanuele Antonio Napoli
, Fadi Barbàra, Valentina Gatteschi, Claudio Schifanella:
Leveraging Large Language Models for Automatic Smart Contract Generation. 701-710 - Carlos Eduardo Ramos Nunes
, Afshin Ashofteh
:
A Review of Big Data and Machine Learning Operations in Official Statistics: MLOps and Feature Store Adoption. 711-718 - Xin Zhao, Hao Huang, Yue Wang, Hongyong Fu:
Automatic Generation of Selective Disassembly Sequences for Augmented Reality-Guided Maintenance. 719-724 - Shinobu Saito
, Yukako Iimura:
Discovering Implicit Operational Knowledge by Identifying Business Processes that Involve Multiple Organizational Entities. 725-730 - Chen Su, Yong Li, Xiali Li, Yandong Chen, Xiaoyu Fan:
A Nested Three-Stage Game Algorithm Based on Chess Shape Evaluation for Tibetan Jiu Chess. 731-736 - Junqiang Zhou, Yan Wang, JieFeng Lil:
Data Center Energy Consumption Prediction Model Based on Deep Neural Network BiLSTM. 737-745 - Yuan-Cheng Yu, Yen-Chieh Ouyang, Ling-Wei Wu, Chun-An Lin
, Kuo-Yu Tsai:
Multivariate Time-Series Anomaly Detection in IoT with a Bi-Dual GM GRU Autoencoder. 746-754 - Yijun Guo, Zhenyu Liu, Yintan Ai, Hua Li:
SPV: Formal Verification of Stateful Parallel SFC Correctness. 755-764 - Rempei Sawada, Haruto Takano, Kosuke Mori, Fumio Teraoka:
MECM2M: An MEC Based M2M System Considering Mobile Nodes as Compute Servers. 765-775 - Zhibo Zhang, Huiqiang Wang, Hongwu Lv, Jiayu Sun:
E-LDAC: A High-Accuracy Method for Predicting Bursty Latency in 5G Networks. 776-783 - Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:
A Real-Time Background Replacement Method Based on Machine Learning for AR Applications. 784-793 - Isaac Ampratwum, Amiya Nayak:
Optimizing WDM Network Restoration with Deep Reinforcement Learning and Graph Neural Networks Integration. 794-800 - Sai Puppala, Ismail Hossain, Md Jahangir Alam, Zahidur Talukder, Syed Bahauddin, Sajedul Talukder:
SCALE: Self-Regulated Clustered FederAted LEarning in a Homogeneous Environment. 801-806 - Shota Inoue, Ryo Nakamura, Hiroyuki Ohsaki:
Fluid-Based Modeling of TCP BBR Congestion Control Mechanism. 807-816 - Shota Inoue, Tomoka Yamasaki, Ryo Nakamura, Hiroyuki Ohsaki:
FLNET: Fluid-Based Large-Scale Network Simulator. 817-826 - Arafat Mahmood, Parama Sridevi, Masud Rabbani, Padmapriya Velupillai Meikandan
, Mohammad Syam, Syeda Shefa, William C. Chu, Sheikh Iqbal Ahamed:
CFSCare: ML-Based Activity Monitoring System for Chronic Fatigue Syndrome Patients Using Smartphone and Wrist Sensor. 827-832 - Jiawei Wu, Priyanka Annapureddy, Praveen Madiraju, Sheikh Iqbal Ahamed, Jennifer Hernandez-Meier, Constance Kostelac, Julia Dickson-Gomez:
Analysis and Prediction of In- Hospital Risks Among COVID-19 Patients with Substance Use Disorder (SUD). 833-842 - Parama Sridevi, Padmapriya Velupillai Meikandan
, Paramita Basak Upama, Masud Rabbani, Kazi Shafiul Alam, Dipranjan Das, Sheikh Iqbal Ahamed:
ML-Based Chronic Kidney Disease and Diabetes Prediction with Feature Effect Analysis Using SHAP. 843-850 - Dmitriy Bogush, Connor Costello, Emma Fong, Moushumi Sharmin, Shameem Ahmed:
Emotion Recognition Technology for People with Autism: A Systematic Literature Review. 851-861 - Adib Ahmed Anik, Paramita Basak Upama, Masud Rabbani, Shiyu Tian, Min Sook Park, Sheikh Iqbal Ahamed, Jake Luo, Hyunkyoung Oh
:
Identifying Medical Concepts and Semantic Types in Lay Vocabularies of Health Consumers Who are Concerned with Diabetes on Social Media Using the UMLS and NLP. 862-869 - Alaa Aldin Ghazal, S. G. Ganpule:
An Affordable Real-Time Wearable Monitoring System for Head Impact Detection. 870-876 - Abu Sayed Md. Latiful Hoque, Md Raihan Mia, Mohammad Sajid Abdullah, Md. Jahedul Islam, Bipul Chandra Dev Nath, Muhammad Rahman, Sheikh Iqbal Ahamed:
BlockPRLS: Blockchain-Based Patient Record Linkage System for Big Data Analytics. 877-886 - Moushumi Sharmin, Jordan Archer, Adrian Heffelman, Eli Graves, Yasmine N. Elglaly, Shameem Ahmed:
Towards Understanding the Challenges, Needs, and Opportunities Pertaining to Assessment Techniques for Autistic College Students in Computing. 887-893 - Jin Zhang, Jiangjie Huang, Long Peng, Xiaodong Liu, Jie Yu, Wenzhu Wang:
A Learning-Based and Network-Aware Power Management for Mobile Devices. 894-899 - Hassan Sartaj
, Shaukat Ali, Julie Marie Gjøby:
Digital Twins Environment Simulation for Testing Healthcare IoT Applications. 900-901 - Tanisha Rana, Soumen Sinha, Rahul Roy:
A Novel Cascade Classifier Framework for Open-World Medicinal Plant Classification. 902-907 - Hyunju Kim, Heesuk Son, Dongman Lee:
Causality-Aware Pattern Mining Scheme for Group Activity Recognition. 908-917 - Gabriele Morabito
, Armando Ruggeri, Antonio Celesti, Massimo Villari, Maria Fazio:
Intent-Based Pseudonymization for Healthcare Workflows on Intra-Hospital Data Space Domain. 918-927 - Hiromi Watanabe, Mariko Kono, Shinji Kotani:
Evaluation of Gaze Input in 3D Space for a Person with Multiple Physical Disabilities Using a Robot and Drones. 928-933 - Ting-Chia Yao, Kai-Wen Lin, Chih-Kuo Lee, Po-Hsuan Tseng
, Che-Rung Lee:
Training Sequential CAG Segmentation Models Without Labeled CAG Video Data. 934-940 - Sayeda Farzana Aktar, Paramita Basak Upama, Sheikh Iqbal Ahamed:
Leveraging Technology to Address Women's Health Challenges: A Comprehensive Survey. 941-949 - Masud Rabbani, Subarna Alam, Md Raihan Mia, Anubhav Parida, Iysa Iqbal, Hansika Kolli, Parama Sridevi, Kazi Shafiul Alam, Paramita Basak Upama, Rumi Ahmed Khan, Sheikh Iqbal Ahamed:
Listening to the Brain: A Novel Approach to Understanding Cerebral Dynamics through Blood Flow Sounds. 950-957 - Bin Weng, Yunru Wang, Juan Wang, Mengda Yang, Ziang Li, Fei Li:
CCall: Recovering Indirect Call Targets from Binaries With Cross-Domain Fine-Tuning. 958-969 - Toshiki Shibahara, Takayuki Miura, Masanobu Kii, Atsunori Ichikawa:
Efficiently Calculating Stronger Lower Bound for Differentially Private SGD in Black-Box Setting. 970-975 - Mordechai Guri:
PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via 'Singing Pixels'. 976-987 - Junwei Yu, Jieyu Zhou, Yepeng Ding, Lingfeng Zhang, Yuheng Guo
, Hiroyuki Sato:
Textual Differential Privacy for Context-Aware Reasoning with Large Language Model. 988-997 - Ahmed Mounsf Rafik Bendada, Mouhamed Amine Bouchiha
, Mourad Rabah, Yacine Ghamri-Doudane:
RollupTheCrowd: Leveraging ZkRollups for a Scalable and Privacy-Preserving Reputation-Based Crowdsourcing Platform. 998-1006 - Rui Tanabe, Yuta Inoue, Daigo Ichikawa, Takahiro Kasama, Daisuke Inoue, Katsunari Yoshioka, Tsutomu Matsumoto:
Customized Malware: Identifying Target Systems Using Personally Identifiable Information. 1007-1012 - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning Attack. 1013-1022 - Ran Ran, Qi Liu, Nuo Xu, Ning Sui, Wujie Wen
:
Ants: Attacking Spatial Temporal Graph Learning Networks Structurally. 1023-1028 - Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, Satoshi Yazawa, Kozo Okano, Takao Okubo, Hironori Washizaki:
Comparison of Methods for Automatically Predicting CVSS Base Vector. 1029-1034 - Yu Li, Yixiao Yang, Yong Guan, Zhiping Shi, Rui Wang:
SQLPass: A Semantic Effective Fuzzing Method for DBMS. 1035-1044 - Andreas Plesner, Tobias Vontobel, Roger Wattenhofer:
Breaking reCAPTCHAv2. 1047-1056 - Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu:
Uncovering the Interpretation of Large Language Models. 1057-1066 - Md. Abdur Rahman
, Mst. Shapna Akter, Emily Miller
, Bogdan Timofti, Hossain Shahriar, Mohammad Masum, Fan Wu:
Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers. 1067-1072 - Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu:
Quantum Adversarial Attacks: Developing Quantum FGSM Algorithm. 1073-1079 - Hiroki Kawamura, Satoshi Shiina, Han Nay Aung, Hiroyuki Ohsaki:
Robustness of Random Walk on a Graph against Adversary Attacks. 1080-1088 - Bo Cui, Zhenyu Zhang, Wenhan Hou:
EGAGN: Generative Adversarial Graph Networks for Ethereum Phishing Scams Detection. 1089-1094 - Jingyu Zhang
, Jacky Keung
, Xiaoxue Ma
, Xiangyu Li, Yan Xiao, Yishu Li
, Wing Kwong Chan:
Enhancing Valid Test Input Generation with Distribution Awareness for Deep Neural Networks. 1095-1100 - Mohammad Farhad, Gourab Saha, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Partha Protim Paul, Mohammed Raihan Ullah, Md Sadek Ferdous:
Secure Backup and Recovery of SSI Wallets using Solid Pod Technology. 1101-1111 - Md Hasebul Hasan, Md Shariful Islam Khan, Md Shafayatul Haque, Ajmain Yasar Ahmed, Muhammad Abdullah Adnan:
GuardFL: Detection and Removal of Malicious Clients Through Majority Consensus. 1112-1117 - Jiakun Sun, Xiaotian Zhang, Yabo Wang, Shuyuan Jin:
CoMDet: A Contrastive Multimodal Pre-Training Approach to Encrypted Malicious Traffic Detection. 1118-1125 - Eric Lesiuta
, Victor Bandur, Mark Lawford:
SLIMECRAFT: State Learning for Client-Server Regression Analysis and Fault Testing. 1126-1137 - Srikanth Narayanan, Chaoquan Cai, Dan Lin:
GeoGRCNN: Synthetic Trajectory Generation for Location Privacy Protection. 1138-1147 - Ruixin Xue:
Differential Private Histogram Publication with Background Knowledge. 1148-1156 - Amit Kumar, Ethari Hrishikesh
, Yugandhar Deasi, Sonali Agarwal:
Prevalence and Prediction of Unseen Co-Changes: A Graph-Based Approach. 1157-1167 - Wei Wang, Huilong Ning, Shuo Qian, Gaowei Zhang, Yi Wang:
Characterizing Developers' Behaviors in LLM -Supported Software Development. 1168-1177 - Yicheng Sun
, Jacky Keung
, Jingyu Zhang
, Hi Kuen Yu
, Wenqiang Luo
, Shuo Liu
:
Unveiling Hidden Anomalies: Leveraging SMAC-LSTM for Enhanced Software Log Analysis. 1178-1183 - Zhihao Ying
, Dave Towey
, Tsong Yueh Chen
, Zhi Quan Zhou:
MT-PART: Metamorphic-Testing-Based Adaptive Random Testing Through Partitioning. 1184-1193 - Minh-Tri Nguyen
, An Ngoc Lam
, Phu Hong Nguyen, Hong-Linh Truong
:
Security Orchestration with Explainability for Digital Twins-Based Smart Systems. 1194-1203 - Zicong Zhuang, Pingjian Zhang:
Enhancing Representations Based on Inherent Information. 1204-1207 - Mengyuan Zhang, Shunhui Ji, Hanbo Cai, Hai Dong
, Pengcheng Zhang, Yunhe Li:
Audio Steganography Based Backdoor Attack for Speech Recognition Software. 1208-1217 - Yamin Hu, Hao Jiang:
Predicting Change-Proneness with a Deep Learning Model: Incorporating Structural Dependencies. 1218-1229 - Ziqiang Yin, Wentian Zhao
, Tian Song:
Boundary-Guided Black-Box Fairness Testing. 1230-1239 - Shunhui Ji, Yunhe Li, Hai Dong
, Mingxuan Xiao, Pengcheng Zhang, Mengyuan Zhang:
Gradient-Guided Test Case Generation for Image Classification Software. 1240-1249 - Hang Yang, Liang Xiao, Rujun Zhu, Ziji Liu, Jianxia Chen:
Interlinking Clinical Guidelines via Mining Medical Literature Knowledge for Multi-Morbidity Decision-Making. 1250-1255 - Anas Dakkak, Jan Bosch, Helena Holmström Olsson:
Towards Continuous Deployment at Scale in Software-Intensive Embedded Systems: A Maturity Model from the Telecommunications Domain. 1256-1267 - Yiming Liu, Zhuanzhuan Liu, Xueyong Tan, Jing Liu:
FOQL: Software Aging Determination and Rejuvenation Strategy Generation for Docker. 1268-1273 - Bin Du, Baolong Han, Hengyuan Liu
, Zexing Chang, Yong Liu, Xiang Chen:
Neural-MBFL: Improving Mutation-Based Fault Localization by Neural Mutation. 1274-1283 - Jin Zhang, Maoqi Peng, Yang Zhang:
Empirical Study on GitHub Issue Report Templates. 1284-1289 - Shengnan Zhang, Shuiyan Li, Rongzhi Qi, Xiaofeng Zhou:
CodeFuse: Multimodal Code Search Model with Fine-Grained Attention Alignment. 1290-1299 - Jialong Li, Christos Tsigkanos, Nianyu Li, Kenji Tei:
Instrumenting Runtime Goal Monitoring for F' Flight Software. 1300-1309 - Junxia Guo, Bowen Yu, Li Liu, Weiwei Wang:
Multi-Objective Test Case Generation for Web Applications with Limited Resources. 1310-1315 - Hasan Sözer:
Towards a Unified Approach for Software Architecture Recovery. 1316-1317 - Alan Colman, Quoc Bao Vo, Anton V. Uzunov, Saad Sajid Hashmi, Hoa Khanh Dam, Mohan Baruwal Chhetri
:
Microcompositions for Goal-Driven Self-Adaptation. 1318-1323 - Zexian Zhang
, Shuang Yin, Wenliu Wei, Xiaoxue Ma, Jacky Wai Keung
, Fuyang Li, Wenhua Hu:
Practitioners' Expectations on Code Smell Detection. 1324-1333 - Honghao Huang, Ya Pan, Lan Luo, Yinfeng Wang:
MTSA: Multi-Granularity Metamorphic Testing for Sentiment Analysis Systems. 1334-1343 - Xinglu Pan, Chenxiao Liu, Yanzhen Zou, Xianlin Zhao, Bing Xie:
Context-Focused Prompt Tuning Pre-Trained Code Models to Improve Code Summarization. 1344-1349 - Taeyoung Kim, Jihyun Lee, Sungwon Kang:
Cloned Code Clustering for the Software Product Line Engineering Approach to Developing a Family of Products. 1350-1355 - Carlos D. Q. Lima, Everton L. G. Alves, Wilkerson de L. Andrade:
A Systematic Literature Review on MBT Test Cases Maintenance. 1356-1365 - Jin Zhang, Xingjin Wu, Yang Zhang, Shunyu Xu, Maoqi Peng:
Enhancing Collaborative Software Development: A Deep Learning Approach for Bot Recommendation. 1366-1375 - Shuaicai Ren, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Combining Prompts with Examples to Enhance LLM-Based Requirement Elicitation. 1376-1381 - Zhuanzhuan Liu, Yiming Liu, Xueyong Tan, Jing Liu:
Determine When and How to Perform Edge Rejuvenation Effectively for Cloud-Edge Collaborative System. 1382-1387 - Xinxin Cai, Xin Chen, Dongjing Yu, Xinjiang Ye, Fanrong Lv:
VulDet-BC: Binary Software Vulnerability Detection Based on BiGRU and CNN. 1388-1397 - Qingyang Zhang, Fumio Machida, Ermeson C. Andrade:
Performability Modeling and Analysis for Real-Time Object Detection on UAV Systems. 1398-1405 - Rochishnu Banerjee, Ethan Han, Longze Li, Haoxiang Yu, Md. Osman Gani, Vaskar Raychoudhury
, Roger O. Smith:
FedAccess: Federated Learning-Based Built Surface Recognition for Wheelchair Routing. 1406-1415 - Chun-Hao Yang, Hei Man Fung, Meng-Hsun Tsai:
Design and Implementation of an Agile Microservices-Based Intelligent Surveillance Platform with Kubernetes. 1416-1421 - Awatif Yasmin, Tarek Mahmud, Minakshi Debnath, Anne H. H. Ngu:
An Empirical Study on AI-Powered Edge Computing Architectures for Real-Time IoT Applications. 1422-1431 - Kate Narain, Yulei Pang:
Identifying Which Clients Will Cancel Their Insurance Policy Machine Learning Methods. 1432-1435 - Jeongpil Park, Eun-Sun Cho:
WeBMO: WebAssembly Memory Bitwise Operation Obfuscation. 1436-1439 - Shuvo Bardhan:
A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ. 1440-1443 - Wangyuhao Li, Hideaki Miyaji, Hiroshi Yamamoto:
Fitness Monitoring System Based on Multimodal Perception and Rotation Strategy. 1444-1447 - Massinissa Lakhdar Friha, Hideaki Miyaji, Hiroshi Yamamoto:
Trajectory-Aware Framework for Dynamic MEC Server Selection in 5G Networks. 1448-1451 - Masashi Kobayashi, Hideaki Miyaji, Hiroshi Yamamoto:
Proximity Verification Function of Real World Data Sources Based on Similarity Analysis on Environmental Information. 1452-1455 - Papon Choonhaklai, Kohei Ichikawa
, Hajimu Iida:
An Evaluation of Time-Sliced GPU Sharing with KubeRay for Machine Learning Workloads. 1456-1459 - Tokiteru Ino, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:
An AR Visualization System of Near-Future Information to Avoid Dangerous Situations. 1460-1463 - Tomoya Matoba, Ryotaro Matsuo, Ryo Nakamura:
A Study on the Applicability of Graph Reduction to Evaluating the Robustness of Complex Networks. 1464-1467 - Ayumu Narita, Teppei Shibata, Akira Fujii, Takanori Sato, Eduardo Carabez:
Machine Learning for the Recognition of Defects on the Surface of Film Capacitors. 1468-1471 - Zhuoyuan Li, Danjie Bao, Xiaodong Xu, Feng Zhang, Gang Xu:
Opportunistic Network Routing Strategy Based On Node Sleep Mechanism. 1472-1475 - Mao Kubota, Hideaki Miyaji, Hiroshi Yamamoto:
Wide-Range Sensor Network System by Limited Sensors Based on Various Image Analysis Method. 1476-1479 - Hiroo Hayashi, Marie Katsurai:
Fine-Grained Classification of Researcher-Related Web Pages Using String and Contextual Features. 1480-1483 - Li Zhenghan, Hideaki Miyaji, Hiroshi Yamamoto:
Health Monitoring System for Desk Workers Using Non-Contact Multi-Sensors. 1484-1487 - Xin Yu Liao, Pin Hsuan Wang, I-Chiu Chang:
Exploring the Impact of a ChatGPT-Based Interactive System on Enhancing the Knowledge and Attitudes Towards Advance Care Planning in Older Adults. 1488-1489 - Jedsada Phengsuwan, Kamron Aroonrua, Krit Punpreuk, Naiyana Sahavechaphan:
Enhancing Dengue Awareness: A Comprehensive System for Filtering Thai Social Media Posts. 1490-1491 - Quan-Bin Zhang, Po-Yang Chi, Shang-Ze Lin, Chia-Xsuan Wu, Yi-Zeng Hsieh:
Blurred Facial Recognition Based on AdaFace. 1492-1493 - Michael Schesny, Nico Lutz, Thomas Jägle, Felix Gerschner, Marco Klaiber, Andreas Theissler:
Enhancing Website Fraud Detection: A ChatGPT-Based Approach to Phishing Detection. 1494-1495 - Syed Mhamudul Hasan, Alaa M. Alotaibi, Sajedul Talukder, Abdur Rahman Bin Shahid:
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach. 1496-1497 - Redouane Blal, Abderrahmane Leshob, Hafedh Mili:
A Method to Design SOA-Based Software Architecture and Goal Models from BPMN Models. 1498-1499 - Tomohiko Takagi, Rikuto Otake, Sho Matsumoto:
EPNATOP: an Operational Profile for Verifying Software Designs Based on EPNAT. 1500-1501 - Chase Lamkin, Mst. Shapna Akter, Hossain Shahriar, Guillermo Francia III:
Architecture Design and Implementation of a Security Threat Data Sharing Platform. 1502-1503 - Mst. Shapna Akter, Md. Abdur Rahman
, Md. Mostafizur Rahman, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Fan Wu, Muhammad Rahman:
Authentic Learning Approach for Data Poisoning Vulnerability in LLMs. 1504-1505 - Gan Xu, Xiali Li, Yanyin Zhang:
Online Gaming Platform for Tibetan Jiu Chess: AI-vs-AI and Human-vs-Human. 1506-1507 - Hye Young An, Woojin Park, Soochang Park:
Detecting Video Surveillance Systems in Real-Time Through Wireless Traffic Analysis. 1508-1509 - Motoyuki Ohmori:
Transforming Security Policies in Firewalls Using the Shortest Editing Script Algorithm. 1510-1511 - Takeru Inada, Sho Tsugawa, Akiko Manada, Kohei Watabe:
Effect of Retraining Graph Generative Models with Generated Graphs. 1512-1513 - MinWoo Chun, Sanghun Kim, Seunghyeon Park, Taekwon Chung, Kiwoong Kwon:
AI-based Occupancy Prediction using WiFi CSI. 1514-1515 - Atsuo Hazeyama:
Survey of Technical and Soft Skills Learners Acquired in a Software Engineering Project Course. 1516-1517 - Ngoc Tien Nguyen
, Van Duong Nguyen, Duc Hai Nguyen, Ngoc Son Dinh, Thi Quynh Hoa Hoang, Cong Dan Pham:
Enhanced client-side internal load balancing for in 5G Online Charging System. 1518-1519 - Yimeng Wang, Derek S. Irwin
, Dave Towey
, Jing Xie:
Creativity Using Generative AI vs. Physical Modeling: A Case Study of Architecture Workshops in a SfHEI. 1520-1521 - Yuyan Zhou
, Dave Towey
, Matthew Pike
:
FROM Syntax to Semantics: An OER-Powered SQL Learning and Visualisation Tool. 1522-1523 - Yihan Zhang, Qian Zhang, Dave Towey
:
Size-Insensitive Network for Visible-Infrared Image Fusion Model. 1524-1525 - Thamila E. H. Abeywickrama, Sho Tsugawa, Akiko Manada, Kohei Watabe:
Evaluation of Transformer-Based Encoder on Conditional Graph Generation. 1526-1527 - Aria Ghora Prabono, Yang Fan Goh, Mei Kobayashi:
FLEDGY: Federated Learning for Edge Devices Accommodating GPU Diversity. 1528-1529 - Hyeongchang Jeon, Seoksu Lee, Eun-Sun Cho:
Dynamic Opaque Predicate Detection with a Recursive Matching Method. 1530-1531 - Young Woo Kim, Seon Been Bak, Byung Wook Lee, Seung Wook Hong, Ki WookKim, Sun-Dong Park, Won Yung Lee:
Comprehensive Analysis of the Therapeutic Effects and Mechanisms of Herbal Medicine Through Network-Based Methods. 1532-1533 - Zhen-Yang Guo, Zi-Long You, Shuo-Han Chen, Shiang-Jiun Chen, Chuan-Ming Liu:
An Automation Tool Converting Test Steps into Keywords for Automated Test Development. 1534-1535 - Hung-Yu Chien, Kuang-Yu Chao:
Design and Evaluation of YOLOv7-Based License-Plate Recognition for Mobile Vehicles Using Notebook-Raspberry-PI. 1536-1537 - Taekwon Chung, Seunghyeon Park, Sanghun Kim, Kiwoong Kwon:
Minimizing FPS Degradation in Multi-Streaming Processing with YOLO. 1538-1539 - Malithi Wanniarachchi Kankanamge, Syed Mhamudul Hasan, Abdur Rahman Bin Shahid, Ning Yang:
Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture. 1540-1541 - Naiyana Sahavechaphan, Manot Rattananen, Jukkrapong Ponharn, Tanapon Yotanak, Krit Punpreuk, Kamron Aroonrua:
Tackling Front-End Challenges: Strategies for Time-Series Data Retrieval and Visualization. 1542-1543 - Naiyana Sahavechaphan, Tanapon Yotanak, Manot Rattananen, Jukkrapong Ponharn, Asamaporn Chatrattikorn:
Rethinking UX for Diverse Digital Proficiency. 1544-1545 - Jong-Yih Kuo, Ti-Feng Hsieh, Yu-Hong Chen:
The Study of Student Program Analysis and Feedback System. 1546-1547 - Fusu Zhang, Yoko Kamidoi, Shin'ichi Wakabayashi:
Enhancing Security of Generalization Methods Based on m-Invariance for Dynamic Data Publication. 1548-1549 - Yu-Da Lin, Jun-Han Lin, Chiung-Wen Hsu, Sin-Hua Moi:
A machine learning based on arithmetic optimization algorithm select the significant genes. 1550-1551 - Jin Byeong Park, Myeongju Kim, Joseph Kyu-Hyung Park, Yujin Myung:
A Deep Learning Approach for Assessment of Breast Aesthetic Score and Keypoint Localization. 1552-1553 - Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai:
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture. 1554-1555 - Minjung Kim, Daejin Park:
Implementation of Dynamic Round Robin Scheduling on Bare-Metal Shallow Multi-OS for Lightweighted Microcontrollers. 1556-1557 - Iulia Mihalache:
Ethical Analysis of AI-Enhanced Audiovisual Translation Tools. 1558-1559 - Seunghyeon Park, Yongho Kim, Kiwoong Kwon:
Day-Ahead Scheduling Optimization for Energy Saving in Microgrid with PV-ESS. 1560-1561 - Abid Hussain, Lester Allan Lasrado:
Privacy by Design: Proposing a Generic Framework for Privacy Compliant Experiment Repository Tool. 1562-1563 - Xianhao Zhang, Zhiyuan Wei, Jing Sun, Zijian Zhang, Zixiao Zhao:
Validating Smart Contracts Using GPT Assistant. 1564-1565 - Eduardo Carabez, Takanori Sato, Isao Nambu:
Raw and Artificially Generated Data to Improve the Development of Brain-Computer Interfaces: Proof of Concept. 1566-1567 - Elena Troubitsyna:
Goal-Oriented Modeling in Fault Tolerant Service-Oriented Multi-Agent Systems. 1568-1569 - Chih-Chiang Fang, Chin-Yu Huang:
An Innovative Method for Efficient Coverage Data Reduction in Multiple Fault Localization. 1570-1571 - Yue Su, Yang Xiang, Kien Nguyen, Hiroo Sekiya:
An Evaluation of Sharding Protocol with Uneven Nodes Settings. 1572-1573 - Michael Zastrozhin
, Danika Gupta
, Nisha Talagala, Jason Akram, Roman Grachev, Allan Gobbs
, Nasreen Karaf, Alex Timoshenko:
Advanced ML Approaches to PGx Recommendations in Precision Medicine. 1574-1575 - Sin-Hua Moi, Yu-Da Lin, Yi-Ling Chen, Chao-Ming Hung, Shin-Jiun Tsai, Wei-Hong Cheng:
Driver Gene Expression Clustering Model for Prognostic Risk Estimation Using Cancer Genomic Data. 1576-1577 - Wen-Tin Lee, Ming-Kai Tsai:
Implementing a PHP API Gateway Based on Microservices Architecture. 1578-1579 - Ting-Yu Su, Mei-Ling Chiang, Sih-Bei Chen, Yun-Han Hsu, Hsiao-Tung Yang, Run-An Yeh:
A Web-based Visualization System for Operating System Resource Management. 1580-1585 - Koichi Owaki, Matsuki Yamamoto, Nattaon Techasarntikul, Yuichi Ohsita, Hideyuki Shimonishi, Kouki Higashioka, Yoshihisa Toshima, Takanori Ogura, Shinji Shimojo:
Proposal of a Scalable Building Operating System Architecture and Data Model Toward Software-Defined Building. 1586-1591 - Shin Hitomi, Ismail Arai, Arata Endo, Masatoshi Kakiuchi, Kazutoshi Fujikawa:
Assessing Initial Attacks and Defense with Retry Function in MQTT Over QUIC. 1592-1597 - Adil Bin Bhutto, Ryota Kawashima, Yuzo Taenaka, Youki Kadobayashi:
Meeting Latency and Jitter Demands of Beyond 5G Networking Era: Are CNFs Up to the Challenge? 1598-1605 - Wannita Takerngsaksiri, Cleshan Warusavitarne, Christian Yaacoub, Matthew Hee Keng Hou, Chakkrit Tantithamthavorn:
Students' Perspectives on AI Code Completion: Benefits and Challenges. 1606-1611 - Atsuya Kobayashi, Saneyasu Yamaguchi:
Extraction of Subjective Information from Large Language Models. 1612-1617 - Pawan Chinnari, Soumen Sinha, Budonkayala Ishaa, Neha Bharill, Om Prakash Patel:
Semantic Segmentation in Aerial Imagery: A Novel Approach for Urban Planning and Development. 1618-1623 - Tori Bukit, Bernardo Nugroho Yahya, Seok-Lyong Lee:
LiCAFeL-STC: A Lightweight Cluster-Based Federated Learning Framework for Sensor-Based Human Activity Recognition Using Unlabeled Data in Heterogeneous Wearable Devices. 1624-1629 - Parama Sridevi, Kazi Zawad Arefin, Dipranjan Das, Rumi Ahmed Khan, Sheikh Iqbal Ahamed:
Noninvasive ML-Based BUN Prediction from Ten-Second Fingertip Video Using Generative AI. 1630-1635 - Soumen Sinha, Rajen Kumar Sinha:
ALRA: Adaptive Low-Rank Approximations for Neural Network Pruning. 1636-1641 - Akemi Gálvez, Sara Pérez-Carabaza, Andrés Iglesias:
Bat Algorithm for Attractor Reconstruction of Low-Dimensional Chaotic Maps from Time Series. 1642-1647 - Johnny Chan, Yuming Li:
Enhancing Team Diversity with Generative AI: A Novel Project Management Framework. 1648-1652 - Rohan Arunkumar, Atul Dubey
:
FireSense: Integrating Deep Learning with ESP32 Microcontrollers for Enhanced Forest Fire Surveillance. 1653-1658 - Aylin Yamac, Dilan Genc, Esra Zaman, Felix Gerschner, Marco Klaiber, Andreas Theissler:
Open-Source Text-to-Image Models: Evaluation using Metrics and Human Perception. 1659-1664 - Ignatius Iwan
, Tori Bukit, Bernardo Nugroho Yahya, Seok-Lyong Lee:
Federated Learning Framework for Collaborative Time Series Anomaly Detection on Distributed Machines. 1665-1670 - Mohammad Fardad, Elham Mohammadzadeh Mianji, Gabriel-Miro Muntean, Irina Tal:
Hybrid Consensus Networks for Scalable and Secure Internet of Vehicles. 1671-1676 - Dimitar Kyosev, Alis Grave Nil:
Distributed Ledger Technology as a Tool for Voluntary Standardization Compliance in Emerging Technologies: A Legal View. 1677-1680 - Ramin Ranjbarzadeh
, Ayse Keles, Martin Crane, Shokofeh Anari
, Malika Bendechache
:
Secure and Decentralized Collaboration in Oncology: A Blockchain Approach to Tumor Segmentation. 1681-1686 - Ruochen Qi, Dong-Hyu Kim:
Geopolitical Manoeuvring in Blockchain Standardization: A Comparative Analysis of the EU and U.S. Approaches. 1687-1692 - Chandranil Chakraborttii, Mohammad Maminur Islam:
MemFlex: A Hybrid Memory System to Boost Cost of Ownership in Data Centers. 1693-1698 - Haruki Mochizuki, Ryozo Kiyohara:
Stationary Human Detection Method Using 2D LiDAR. 1699-1704 - Murilo Santos de Castro, Pedro Gomes, Fabrízzio Soares, Luciana Cardoso, Renan V. Aranha
, Thamer Horbylon Nascimento
:
Interaction in Virtual Environments Using Smartwatches: A Comparative Usability Study Between Continuous Gesture Recognition and MDDTW. 1705-1710 - Ahmed Imteaj
, Tanveer Rahman, Saika Zaman, Md. Zarif Hossain, Abdur Rahman Bin Shahid:
Enhancing Road Safety Through Cost-Effective, Real-Time Monitoring of Driver Awareness with Resource-Constrained IoT Devices. 1711-1720 - Yugo Tagami, Takako Kojima, Saneyasu Yamaguchi
:
Computer-Assisted English Presentation Learning System Based on Word Stress in Pronunciation. 1721-1725 - Hiroshi Tei, Tomoya Kawakami, Yoshimi Kawamoto:
A Safe Vehicle Routing System based on Road Characteristics from Telematics Data. 1726-1731 - Kazuki Iehira, Hiroyuki Inoue:
Feasibility Assessment of Denial-of-Service Attacks by Analyzing SOME/IP-SD State Transition Models. 1732-1738 - Denish Omondi Otieno, Faranak Abri
, Sima Siami-Namini, Akbar Siami Namin:
The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models. 1739-1746 - Rong-Terng Juang, Tong-Wen Wang, Jun-Xiang Cao, Hsin-Piao Lin, Ding-Bing Lin:
Deep Learning Empowered High Accuracy and Low Complexity Indoor Channel Prediction for Wireless Communication Systems. 1747-1751 - Sulalitha Bowala, Md. Erfanul Hoque
, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Srimantoorao Semischetty Appadoo:
Neural Network Fuzzy Electricity Demand Forecasts Based on Fuzzy Inputs. 1752-1757 - Thimani Ranathungage, Sulalitha Bowala, Md. Erfanul Hoque
, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram:
Application of a Novel Fuzzy Pattern Mining Algorithm for Sequence Data. 1758-1763 - Arunavo Dey, Aakash Dhakal, Tanzima Z. Islam, Jae-Seung Yeom
, Tapasya Patki
, Daniel Nichols, Alexander Movsesyan, Abhinav Bhatele:
Relative Performance Prediction Using Few-Shot Learning. 1764-1769 - Juan-Wei Xu, Yi-Ren Yeh:
Audio Classification with Semi-Supervised Contrastive Loss and Consistency Regularization. 1770-1775 - Yuto Nakamitsu, Sho Tsugawa, Keiichiro Tsukamoto, Shintaro Igari:
Analyzing the Characteristics of Ego-Network Structures of Influential Twitter Users. 1776-1781 - Zhengji Wang, Fumio Machida:
Maintaining Performance of a Machine Learning System Against Imperfect Retraining. 1782-1787 - Chang Geng, Griffin LaFreniere, Huy Khanh Le, Carson K. Leung, Quinn Chao Wong, Alfredo Cuzzocrea:
A Location Analytics Algorithm to Analyze Geographic and Demographic Data for Restaurant Analytics. 1788-1793 - Jahanzeb Shahid, Stelvio Cimato, Muhammad Zia
:
A Sharded Blockchain Architecture for Healthcare Data. 1794-1799 - Garik Avagyan, Juan C. Armijos, Carson K. Leung, Jasmine J. Tabuzo, Aivee F. Teodocio, Alfredo Cuzzocrea:
An Environmental Data Science Solution for Data Analytics Exploration of Traffic Interaction on Air Quality. 1800-1805 - Ashish Lakhmani
, Ruppa K. Thulasiram, Parimala Thulasiraman:
Synchronous Set-Based Particle Swarm Optimization: Heuristics for Portfolio Optimization. 1806-1812 - Avanthi Saumyamala, Sulalitha Bowala, You Liang, Shanika Basnayake, Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram:
Novel Non-linear Adaptive Fuzzy Adjacency Matrices for Financial Volatility Network Models. 1813-1818 - Vinicius Chrisosthemos Teixeira, Gabriel Fonseca Silva, Isabel H. Manssour, Soraia H. Musse, Márcio Sarroglia Pinho:
Visualization of Crowd Contamination Simulations Using Immersive Virtual Reality. 1819-1824 - Sergey Skorik, Aram Avetisyan, Ekaterina Diatlinko, Renata Mindiiarova, Yury Markin
:
Transferring Knowledge from 12-Lead to 1-Lead ECGs via Contrastive Learning. 1825-1830 - Anastasia A. Kobelyatskaya, Zulfiya G. Guvatova, Olga N. Tkacheva, Fedor I. Isaev, Anastasiia L. Kungurtseva
, Alisa V. Vitebskaya, Ekaterina V. Plokhova, Lubov V. Machekhina
, Irina D. Strazhesko, Alexey A. Moskalev:
Using Echocardiography and AI to Predict Cardiac Biological Age. 1831-1834 - Paramita Basak Upama, Parama Sridevi, Masud Rabbani, Mohammad Syam, Abul Hasan Muhammad Bashar, Md. Rubaiyat H. Mondal, Rumi Ahmed Khan, Sheikh Iqbal Ahamed:
A Comparative Study of Classical and Quantum Algorithms for Heart Disease Prediction Using Patients' Vital Signs. 1835-1840 - Sainath Veerla, Anbu Valluvan Devadasan, Mohammad Masum, Mohammed Chowdhury, Hossain Shahriar:
E-SMOTE: Entropy Based Minority Oversampling for Heart Failure and AIDS Clinical Trails Analysis. 1841-1846 - Mikhail Ivanchenko, Elena Kondakova, Igor I. Yusipov, Alena I. Kalyakulina:
Cardiac Age Estimation Using Genetic and Sphygmographic Data. 1847-1849 - Shahane Tigranyan
, Arman Martirosyan:
Breaking Barriers in Stress Detection: An Inter-Subject Approach Using ECG Signals. 1850-1855 - Swapna S. Gokhale, Viswadeep Lebakula, Alina Peluso
:
Explaining Health Risk Behaviors in the U.S. with Social Deprivation at Local and Regional Levels. 1856-1864 - Natalia Kuznetsova, Alexander Suvorov, Petr Chomakhidze, Philippe Kopylov:
A Screening Method for Left Ventricular Systolic Dysfunction by Single-Channel Electrocardiogram Using Machine Learning Algorithms. 1865-1867 - Helena Godunova, Sergei P. Prokhorov
:
Application of Artificial Intelligence Technology to Prevent Sudden Cardiac Death. 1868-1871 - Syed Azizur Rahman, Khaled Obaideen
, Mohammad AlShabi, Nabeel Al-Yateem:
Enhancing Mental Health Care with the Kalman Filter: Predictions, Monitoring, and Personalization. 1872-1876 - Manalbint Abdullah Aladaili, Richard Mottershead
:
Exploring New Digital Health-Care Frontiers: Ingenuity and Vision from Saudi Arabia in Establishing a National Military Health Control and Command Centre. 1880-1882 - Amina Al-Marzouqi, Anissa Bettayeb, Syed Azizur Rahman, Said A. Salloum, Nabeel Al-Yateem:
Exploring New Horizons in Dental Education: Leveraging AI and the Metaverse for Innovative Learning Strategies. 1881-1886 - Ahmed A. Harby, Eyad ElKhodary, Ronan Almeida, Drishti Sharma, Farhana H. Zulkernine, Furkan Alaca, Khalid Elgazzar, Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman:
Revolutionizing Healthcare Management: Architecture of a Web-based Medical Triage Service. 1887-1894 - Al Ounoud Al Marzouqi:
Optimization of Electronic Health Record Through Local & International Standards: A Case from United Arab Emirates. 1895-1900 - Yuhao Chen, Jiahao Cai, Siyu Chen, Farhana H. Zulkernine, Nauman Jaffar, Amina Al-Marzouqi, Nabeel Al-Yateem, Syed Azizur Rahman:
Assist-Bot: A Voice-Enabled Assistant for Seniors. 1901-1906 - Mohammad Aminul Islam
, Ahmed Hossain
, Syed Azizur Rahman:
Factors Influencing Public Trust in Emergency Health Helplines in Bangladesh. 1907-1912 - Muhammad Arsyad Subu, Aan Sutandi
, Nabeel Al-Yateem, Zakiyah Zakiyah
, Aliana Dewi, Richard Mottershead
, Erika Lubis, Mohammad Al-Shabi, Maryuni Maryuni, Sari Narulita, Fatma Refaat Ahmed, Henny Suzana Mediani, Syed Azizur Rahman, Mochamad Robby Fajar Cahya:
Implementing Electronic Medical Record (EMR) Technology in Hospital Setting: A Qualitative Study. 1913-1919 - Muhammad Arsyad Subu, Jacqueline Maria Dias, Fatma Refaat Ahmed, Widanarti Setyaningsih, Richard Mottershead
, Syed Azizur Rahman, Sari Narulita, Mohammad AlShabi, Aliana Dewi, Aan Sutandi
, Zakiyah Zakiyah
, Henny Suzana Mediani, Maryuni Maryuni, Ulfah Nuraeni Karim, Nabeel Al-Yateem:
An Exploration of E-Puskesmas Technology Application in Indonesian Public Health Centers: A Qualitative Study. 1920-1926 - Fatma Refaat Ahmed, Nabeel Al-Yateem, Esraa Rushdan, Ahmad Rajeh Saifan, Syed Azizur Rahman, Richard Mottershead
, Heba Hesham Hijazi, Muhammad Arsyad Subu, Wegdan Bani-Issa, Jacqueline Maria Dias, Mohannad Eid AbuRuz:
Health Sciences students and educators experience with using ChatGPT. 1926-1928 - Ahmed Hossain
, Mohammad Zakir Hossain, Mohammad Anwar Hossain, Syed Azizur Rahman, Heba Hesham Hijazi, Mohamad Alameddine, Amina Al-Marzouqi:
Assessing the Efficacy of Telephone Telemedicine in Enhancing Follow-up Visits for Non-Adherence Hypertensive Patients: A Cross-Sectional Study in Northern Bangladesh. 1929-1933 - Md Jahangir Alam, Ismail Hossain, Sai Puppala, Sajedul Talukder:
Advancements in Multimodal Social Media Post Summarization: Integrating GPT-4 for Enhanced Understanding. 1934-1940 - Siswani Marianna, Yoanita Hijriyati, Handayani Handayani, Muhammad Arsyad Subu, Mochamad Robby Fajar Cahya, Widanarti Setyaningsih, Nabeel Al-Yateem, Maryuni Maryuni, Ananda Tio Panggabean, Richard Mottershead
, Fatma Refaat Ahmed, Sari Narulita, Agung Setiadi, Syed Azizur Rahman, Mohammad Al-Shabi:
Nurses' Perceptions about Champs Tool Trials In The Pediatric Ward. 1941-1944 - Sai Puppala, Ismail Hossain, Md Jahangir Alam, Sajedul Talukder:
SCAN: A HealthCare Personalized ChatBot with Federated Learning Based GPT. 1945-1951 - Mizuho Nishio, Hidetoshi Matsuo, Takaaki Matsunaga:
Automatic Structuring of Radiology Reports of Chest X-Ray Images Using Large Language Model. 1952-1954 - Kenta Tanaka, Tomoyuki Sugimoto
:
On the Use of Gaussian Process Regression and Multiple Imputation in Cox Regression Models with Time-Dependent Covariates. 1955-1960 - Onishi Tatsuki, Casanova Carlos:
Research on the Efficiency of Operating Room Management Through Numerical Optimization and Matters to be Considered in the Process. 1961-1964 - Alisher Ibragimov, Sofya Senotrusova, Arsenii Litvinov, Egor Ushakov, Evgeny Karpulevich
, Yury Markin
:
MamT4: Multi-View Attention Networks for Mammography Cancer Classification. 1965-1970 - Izumi Ogura, Chisako Muramatsu:
Similar Mask Retrieval with Contrastive Learning for Single Domain Generalization in Medical Imaging. 1971-1974 - Naoki Ishizuka:
Statistical Review of Regulatory Requirements for AI Diagnosis. 1975-1976 - Carlos Falcão de Azevedo Gomes, Adriel Silva de Araújo, Sunna Imtiaz Ahmad, Maurício Cecílio Magnaguagno, Vinicius Crisosthemos Teixeira, Anushri Singh Rajapuri, Quinn Roederer, Dalvan Griebler
, Vinicius Dutra, Hakan Turkkahraman, Márcio Sarroglia Pinho:
Multiview Machine Learning Classification of Tooth Extraction in Orthodontics Using Intraoral Scans. 1977-1982 - Yu Liu, Lihui Duo
, Jonathan D. Hirst, Jianfeng Ren, Bencan Tang
, Dave Towey
:
Three-Branch Molecular Representation Learning Framework for Predicting Molecular Properties in Drug Discovery. 1983-1989 - Rohan Kaushikan:
Early Recurrence Detection of Invasive Ductal Carcinoma Utilizing High-Dimensional Genomic Data. 1990-1995 - Hiroyasu Matsushima
, Yusuke Tajima, Xiao-Nan Lu
, Masakazu Jimbo:
Efficient Pooling Designs and Screening Performance in Group Testing for Two Types of Defectives. 1996-2000 - Sriteja Kataru, Kathleen King, Lachin Fernando:
Machine Learning-Based Early Detection and Intervention for Mental Health Issues in Children. 2001-2007 - Kiet Ha, Lucas Stowe, Chandranil Chakraborttii:
Improving Insurance Fraud Detection With Generated Data. 2008-2013 - Kaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita, Sumiko Miyata:
A Blind Color Image Watermarking for Grayscale Watermark Based on Tensor Decomposition. 2014-2019 - Oihane Gómez-Carmona
, Diego Casado-Mansilla
, Diego López-de-Ipiña, Javier García-Zubía
:
Employee Perceptions of Privacy and Data Control in Workplace Wellness e- Health Programs. 2020-2025 - Silvio Meneguzzo, Stefano Bergia, Alfredo Favenza, Claudio Schifanella, Alessandro Mozzato, Valentina Gatteschi:
Shaping the Future of Energy Markets: Federated Systems and Blockchain Synergy. 2026-2031 - Tao Gu, Zhichao Zhu, Qing Zhao:
Based on Stacked Attention Network for Chinese Medical Named Entity Recognition. 2032-2037 - Savar Toteja, Pallavi Bajpai:
Leveraging Machine Learning to Identify Effective Teaching Strategies for Children With Autism Spectrum Disorder. 2038-2043 - Cymon Radjh Nadela, Irah Faye Oliva, Christopher Josh Quinzon, Merlin Teodosia C. Suarez:
GetEmotion: A Data Collection Tool for Building an Affective Haptic Dataset. 2044-2053 - Yusuke Sato, Ahmed Salem
, Kaoru Sumi
:
Physiological Correlates While Playing Tetris: A Comparative Study Between Males and Females. 2054-2059 - Tetsunari Inamura, Reiko Gotoh, Madoka Matsumoto:
Development of a Virtual Travel System to Enhance the Discovery of Aspiration and Pleasure. 2060-2064 - Shun Furuichi, Kaoru Sumi
:
Experiential Learning System with Generative Art Using Virtual Spaces. 2065-2070 - Akihiro Nagai, Yasuyuki Sumi:
Analysis of Verbal and Nonverbal Behaviors in Online Bibliobattle Focusing on Listener Responses. 2071-2076 - Allison Bayro, Heejin Jeong:
Advancing Arousal and Valence Prediction in Virtual Reality Through Sentiment Analysis Integration. 2077-2082 - Ahmed Salem
, Kaoru Sumi
:
Psychophysiological Correlates of Embarrassment Emotion: A Comparative Study Between Shy Males and Females. 2083-2088 - Kei Hyodo, Tomonori Kubota, Satoshi Sato, Kohei Ogawa:
Self-Instructional Training Interface Using a Speech Bubble That Facilitates Users to Internalize the Automatically Generated Texts. 2089-2094 - Yoshifuru Nakayama, Kaoru Sumi
:
The Impact of Anonymity on Communication in the Metaverse. 2095-2100 - Pinkie Anggia
, Kaoru Sumi
:
Enhancing Persuasion Through Emotional Elicitation in Digital Marketing: A Cross-Cultural Comparative Study. 2101-2106 - Nitchan Jianwattanapaisarn, Akira Utsumi, Takahiro Miyashita:
Evaluation of Cybernetic Avatar Operations in Three Different Types of Viewpoints for Optimizing Operator Usability and Comfort. 2107-2112 - Wenxiu Cheng, Jianqiang Li, Xi Xu, Haoran Peng, Linna Zhao, Suqin Liu, Chujie Zhu, Fujiu Xu:
Attention to Key Fundus Features: A Prior Knowledge-Guided Deep Learning Network for Pediatric High Myopia Detection. 2113-2118 - Renan Trévia, Vinicius Chrisosthemos Teixeira, Márcio Sarroglia Pinho:
Investigating Radiological Diagnosis Through Smartphone-Based Virtual Reality Applications: A User Study. 2119-2124 - Cheng-Yu Ye, Cheng-Kai Huang, Meng-Hua Yen:
Application of a Bacterial Image Analysis System for Antibiotic Susceptibility Test Detection. 2125-2130 - Xiaofei Wang, Yi Zhao, Tao Yu, Jie Ren, Huafeng Yan, Jian Song:
Research of AI Driven Light Health and Therapy. 2131-2134 - Yangliao Li, Qing Zhao, Jianqiang Li, Bing Xiang Yang, Ruiyu Xia, Hongzhi Qi:
MTL-DQA: Multi-Task Learning with Psychological Indicators for Enhanced Quality in Depression Community QA System. 2135-2140 - Chujie Zhu, Jianqiang Li, Ji-Jiang Yang, Wenxiu Cheng, Linna Zhao, Suqin Liu, Jingchen Zou, Shuhan Wang, Xi Xu:
How to Advance Eye Image Segmentation for Accurate Myasthenia Diagnosis? an Empirical Study of Boundary Loss. 2141-2146 - Lintao Song, Jianqiang Li, Xiaoling Liu, Yiming Liu, Tianbao Ma, Jun Bai, Linna Zhao, Qing Zhao, Xi Xu:
Research on Breast Lesion Localization and Diagnosis Based on Knowledge-Driven and Data-Driven Approach. 2147-2152 - Huina Wang, Jianqiang Li, Bo Liu, Jinshu Li, Junqi Long:
Similarity Calculation Model Between Patients with Chinese Electronic Medical Records Based on Multi-View Hierarchical Leaning Network. 2153-2158 - Jingxiang Xu, Jianqiang Li, Juan Li, Linna Zhao, Shujie Ding:
Covid-IRLNet: A COVID-19 Diagnostic Model For Extracting CT Image Features and CT Sequence Features. 2159-2164 - Atsushi Naito, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Self-Adaptive System Implementation Framework Considering Execution Time Uncertainty. 2165-2170 - Junfu Luo, Lili Xiao, Huibiao Zhu, Ziqing Su:
Trace and Algebraic Semantics for Partial Store Order Memory Model. 2171-2176 - Huiying Liu, Wenting Dong, Huibiao Zhu, Ziqing Su:
Formal Verification and Security Analysis of AMQP. 2177-2182 - Chenhui Wang, Ziqing Su, Huibiao Zhu:
Formalization and Verification of Percolator Using CSP. 2183-2188 - Abdur Rahman Bin Shahid, Syed Mhamudul Hasan, Malithi Wanniarachchi Kankanamge, Md. Zarif Hossain, Ahmed Imteaj
:
WatchOverGPT: A Framework for Real-Time Crime Detection and Response Using Wearable Camera and Large Language Model. 2189-2194 - Nobuo Aoki, Atsuko Takefusa, Yutaka Ishikawa, Yasushi Ono, Eisaku Sakane, Kento Aida:
ZT-OTA Update Framework for IoT Devices Toward Zero Trust IoT. 2195-2202 - Eilaf M. A Babai, Koji Okamura:
A Contextual Approach for Improving Anomalous Network Traffic Flows Prediction. 2203-2208 - Kazuki Takashima, Daisuke Kotani, Yasuo Okabe:
DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI. 2209-2214 - Maho Kajiura, Junya Nakamura:
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS. 2215-2221 - Ohud Abdullah Alasmari, Jeremy Singer, Mireilla Bikanga Ada:
Online Coding Tutorial Systems: A New Category of Programming Learning Platforms. 2222-2227 - Henry C. B. Chan, Tak-Lam Wong, Parkash Lohana, Simanta Mitra, Joseph C. H. So:
Top 10 Computer Science Open Educational Resources in MERLOT. 2228-2232 - Yi-Hsiu Tsai, Chin-Hung Chang, Yan-Heng Lin, Ta-Cheng Chen, Chu-Ling Chen, Hong-Jie Jhou, Wen Chien Huang, Fang-Ju Lin, Dann-Pyng Shih:
Using Convolutional Neural Network to Epilepsy Brainwave Recognition. 2233-2237 - Yi-Cyuan Tseng, Wei-En Hsu, Yu-An Chen, Yu-Wei Chan, Shih-Ting Ciou, Shun-Ping Wang
:
An Automated Detection and Classification System of Calcaneal Fracture with Deep Learning Techniques. 2238-2241 - Yi-Hung Liu, Yi-Fun Lin:
LASG: Streamlining Legal Adjudication with AI-Enabled Summary Generation. 2242-2247 - Han-Wei Wu, Shin-Jie Lee:
Can Large Language Model Aid in Generating Properties for UPPAAL Timed Automata? A Case Study. 2248-2253 - Tse-Chuan Hsu, Han-Sheng Lu:
Research on Security Enhancement Methods of Internet of Things Communication-Based on Whitelist and Encryption Key Exchange. 2254-2259 - Pei-Rong Huang, Chih-Hung Chang, Wen-Ching Chen, Che-Lun Hung, Po-Yu Liu, Ting-Kuang Yeh
, Hsiu-Wen Wang, Yu-Chun Yen, William Cheng-Chung Chu:
By Machine Learning Techniques Predicting Post-COVID-19 Condition. 2260-2265 - Jian Wen Chen, Meng-Shiun Tsai, Che-Lun Hung:
Enhancing Cutting Sound Quality in Tool Wear Monitoring via Hybrid Domain Loss UNet Network. 2266-2271 - Min-Kuan Chang, Chi-Sheng Yang, Yu-Fang Chang, Huan Chen, Kuo-Guan Wu:
An Accurate and Robust Matching Network for Full/Partial Point Cloud Registration. 2272-2277 - Tse-Chuan Hsu, Yu-Chia Cheng:
Experimental Study on the Accuracy and Precision of Object Size Measurement with Dual-Lens Imaging Systems. 2278-2283 - Pedro Gomes, Murilo Santos de Castro, Fabrízzio Soares, Luciana Cardoso, Renan V. Aranha
, Thamer Horbylon Nascimento
:
Exploring Drum Percussion Simulation with Gesture Recognition and Smartwatches for Interactive Duets. 2284-2289 - Yan-Cih Liang, Shang-Pin Ma, Chih-Ying Lin:
Chatbotification for Web Information Systems: A Pattern-Based Approach. 2290-2295 - Eng-Shen Tu
, Shin-Jie Lee:
A Clustering-Based Approach for Detecting Low-Contrast Texts on Web Pages at the Granular Character Level. 2296-2301 - Deepika Saxena, Ashutosh Kumar Singh, Volker Lindenstruth:
A Latency Aware and Dynamic Caching Model for Heterogeneous Datalake Environments. 2302-2307 - Chih-Wei Sung, Yu-Kai Lee, Yin-Te Tsai:
A New Pipeline for Generating Instruction Dataset via RAG and Self Fine-Tuning. 2308-2312 - Michael Bidollahkhani, Aasish Kumar Sharma, Julian M. Kunkel:
HOSHMAND: Accelerated AI-Driven Scheduler Emulating Conventional Task Distribution Techniques for Cloud Workloads. 2313-2320 - Sayako Shimizu, Hiroyuki Sato, Motonori Nakamura, Hukofumi Suzuki, Yasuo Okabe:
A Cross-Organizational Identity Proofing System for Seamless Online ID Re-Binding Leveraging Individual Number Cards. 2321-2326 - Magdalena Bertram, Maximilian Richter, Marian Margraf:
Achieving Third-party Deniability in Signature-based Credential Systems. 2327-2333 - Alfredo Cuzzocrea, Islam Belmerabet:
A SOLID-Based Framework for Supporting Privacy-Preserving Identity Management in Multi-Cloud Environments. 2334-2340 - Yunxiao Ma, Mingyue Li, Aliya Bao, Chengyuan Tian, Li Hua:
Standard-Driven Software Component Reuse and Agile Testing. 2341-2346 - Zixiao Zhao, Jing Sun, Cheng-Hao Cai, Zhiyuan Wei:
Code Generation Using Self-Interactive Assistant. 2347-2352 - Furkan Polat, Hasan Tuncer
, Armin Moin, Moharram Challenger
:
Model-Driven Engineering for Quantum Programming: A Case Study on Ground State Energy Calculation. 2353-2360 - Myeongjin Kang, Daejin Park:
Cloud Memory Enabled Code Generation via Online Computing for Seamless Edge AI Operation. 2361-2368 - Chisa Ito, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:
Communication Performance Evaluation Using Compression Processing for IoT Systems in Mobile Environments. 2369-2374 - Yuxing Liu, Jianying Chen, Jiamin Tang, Xiaoyi Tong, Liping Cai, Hengyuan Liu
:
An Empirical Study of Fault Localization on Novice Programs. 2375-2380 - Aaron Bramson, Masayoshi Mita:
Explicable Machine Learning Models Using Rich Geospatial Data. 2381-2386 - Zhen-Yang Guo, Yu-Siang Liao, Shuo-Han Chen, Chuan-Ming Liu:
Facilitating the Process Rate of Difference Determination within HTML after Web Page Events. 2387-2392 - Yifan Zhang
, Dave Towey
, Matthew Pike
:
Enabling Effective Metamorphic- Relation Generation by Novice Testers: A Pilot Study. 2393-2398 - Gabriele Gatti
, Marco Civera
, Cataldo Basile, Massimiliano Masi, Michele La Manna:
A Threat Analysis of Cooperative Intelligent Transport Systems: C-Roads Scenarios. 2399-2405 - Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi:
A Chat Application on a Bare Internet. 2406-2411 - Hasan Sözer:
Call Graph Delta Analysis and Security Vulnerability Assessment with Static Analysis. 2412-2417 - Md. Mostafizur Rahman, Abdul Barek, Mst. Shapna Akter, ABM Kamrul Islam Riad
, Md. Abdur Rahman
, Hossain Shahriar, Akond Rahman, Fan Wu:
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis. 2418-2423 - Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, ABM Kamrul Islam Riad
, Md. Abdur Rahman
, Hossain Shahriar, Akond Rahman, Fan Wu:
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module. 2424-2429 - ABM Kamrul Islam Riad
, Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, Tahia Islam, Md. Abdur Rahman
, Md Raihan Mia, Hossain Shahriar, Fan Wu, Sheikh Iqbal Ahamed:
Enhancing HIPAA Compliance in AI-driven mHealth Devices Security and Privacy. 2430-2435 - Hiroki Hanada, Keisuke Ishibashi:
Hexagon: Generating Asynchronous Microservices Benchmarks for the Evaluation of Anomaly Propagation Resistance. 2436-2441 - Saad El Jaouhari, Nouredine Tamani, Rohan Isaac Jacob:
Improving ML-based Solutions for Linking of CVE to MITRE ATT &CK Techniques. 2442-2447 - Sirine Ilahi, Adebayo Omotosho
, Christian Hammer:
Towards Anomaly Detection in Embedded Systems Application Using LLVM Passes. 2448-2453 - Misato Nakabayashi, Taro Sekiyama, Ichiro Hasuo, Yutaka Ishikawa:
Formal Support for Threat Modeling with Attack Decision Diagrams. 2454-2459 - Hui Li, Kexin Liu:
Privacy-Preserving HCV Data Outsourcing Scheme for Initial Diagnosis and Epidemiological Study. 2460-2465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.