


default search action
ASSE 2024: Tokyo, Japan
- Proceeding of the 5th Asia Service Sciences and Software Engineering Conference, ASSE 2024, Tokyo, Japan, September 11-13, 2024. ACM 2024, ISBN 979-8-4007-1754-3
- Rattasan Aekaukkharachawakit
, Taratip Suwannasart
:
Generating a Robot Framework Test Script for Web Application Based on Database Constraints. 1-12 - Na Zhao
, Dong Wang
, Sijia Chen
, Hua Wang
:
Time-Locked Free Trial Strategy Choice of Duopoly Software Vendors Considering Consumers' Personal Internal Preferences and Network Externalities. 13-26 - William P. Rey
, Kieth Wilhelm Jan Dugang Rey
:
Assessing Usability and User Experience in e-Pondo: A Path to Improved Interaction Design. 27-34 - Mohammad Taha Khan
, Mohamed Elhussiny
, William Tobin
, Muhammad Ali Gulzar
:
An Empirical Evaluation of Method Signature Similarity in Java Codebases. 35-42 - Zhidan Yuan
, Zhuangzhuang Wang
, Enze Wu
, Tao Huang
, Yingying Chen
:
Empirical Studies on Failure Prediction for Distributed Systems Based on Feature Selection. 43-52 - Fan Meng
, Bing Chen
, Xiu Zhang
, Shaohong Zhu
:
SelfALARM: An Active and Online Iterative Business Anomaly Discovery Method based on Self-growth Mechanism. 53-60 - Jerome B. Tamargo
, Justine Amiel T. Jonson
, Roseville Jeanne L. Evangelista
, Elcid A. Serrano
:
Kulayaan: An E-Commerce Platform Showcasing PDLs' Artworks with an Immersive Virtual Tour Feature. 61-65 - Chia-Chen Lin
, Enting Chu
, Yen-Heng Lin
:
Adaptive and Effective Data Hiding Scheme for AMBTC Compression Codes. 66-72 - Ya-Fen Chang
, Yi-Chun Liao
, Pei-Shih Chang
, Wei-Liang Tai
:
Comments on a lightweight authentication and key agreement framework for smart grids. 73-77 - Ziqing Li
, Sheng Lin
, Tianle Li
, Pengfei Zhao
:
A Privacy-Preserving Aggregation Method via Grouped Secure Multi-Party Computation. 78-84 - Fatin Nur Afiqah Ibrahim
, Nasreen Badruddin
, Kalavathy Ramasamy
:
Enhancing Cognitive Frailty Prediction Accuracy Using Conditional Generative Adversarial Networks (CGAN). 85-91 - William P. Rey
:
TechRay: Advanced IoT Ecosystem for Freshwater Stingray Management. 92-101 - Chia-Chen Lin
, Rong-Ze Chen
, Aristophane Nshimiyimana
, Chun-Jung Lin
:
Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation and Substitution. 102-109 - Dasong Yu
, Aekyeung Moon
:
Image-Based Predictive Model to Optimize Drying Endpoints in the Chili Pepper Drying Process. 110-117 - Jericho John O. Almoro
, Francis Dale P. Caon
, Bianca H. Goldman
, Micah Sophia Q. Tan
, John Angelo B. Yap
, Abraham Tan Magpantay
:
Composite Restoration using Image Recognition for Teeth Shade Matching using Deep Learning. 118-125 - Shih-Hsin Chen
, Ting-Yi Kao
, Yi-Hui Chen
:
Detecting Heart Valve Regurgitation in Medical Images - Using YOLOv7. 126-129 - Carmen L. DiMario
, Rio C. Bacha
, Brian K. Butka
:
Combatting Senior Scams Using a Large Language Model-Created Rubric: This paper explains a novel approach to reinforcement learning designed for the detection and prevention of scams aimed at senior citizens. 130-136 - Eric Busia Blancaflor
, Raphael M. Abaleta
, Luke Martin Achacoso
, Alden Christian Amper
, Pfrancis Isaiah R. Ampiloquio
:
Emerging Threat: The Use of AI Voice Cloning Software and Services to Deceive Victims Through Phone Conversations and its Potential Effects on the Filipino Population. 137-146 - Joel C. de Goma
, Jamie Beatrice L. Olivar
, Hobie L. Perez
, Sadie Catherine E. Velasco
, Alberto C. Villaluz
:
Art Authentication: A Comparative Analysis of Convolutional Neural Network (CNN) Architectures for Detecting AI-Generated and Human-made Digital Artworks. 147-152 - Ravipat Lapcharoensuk
, Chawisa Fhaykamta
, Watcharaporn Anurak
, Wasita Chadwut
:
Monitoring Pesticide Residue on Bok Choi using Convolution Neural Network with NIR spectral Data. 153-157 - Timur Jaganov
, Chukwualuka Leonard Nnadi
, Yutaka Watanobe
:
The Learning Labyrinth: Integrating Learning Theories in VR. 158-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.