


default search action
43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 1
- Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 - Cong Wang, Le Kang, Renwei Zhang, Weiliang Yin:
Statically-Directed Assertion Recommendation for C Programs. 1-10 - Zuxing Gu, Jiecheng Wu, Jiaxiang Liu
, Min Zhou, Ming Gu:
An Empirical Study on API-Misuse Bugs in Open-Source C Programs. 11-20 - Junxiao Han, Shuiguang Deng
, Xin Xia, Dongjing Wang
, Jianwei Yin:
Characterization and Prediction of Popular Projects on GitHub. 21-26 - Lei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu:
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation. 27-36 - Andrés Paz, Ghizlane El-Boussaidi:
Supporting Consistency in the Heterogeneous Design of Safety-Critical Software. 37-46 - Miao Zhang
, Jacky Keung
, Yan Xiao
, Md. Alamgir Kabir
, Shuo Feng
:
A Heuristic Approach to Break Cycles for the Class Integration Test Order Generation. 47-52 - Md. Alamgir Kabir
, Jacky W. Keung
, Kwabena Ebo Bennin, Miao Zhang
:
Assessing the Significant Impact of Concept Drift in Software Defect Prediction. 53-58 - Robert Ward, Carl K. Chang:
In Search of Scientific Agile. 59-65 - Yue Yuan, Han Anu, Wenchang Shi, Bin Liang, Bo Qin:
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components. 66-71 - Musaad Alzahrani, Saad Alqithami
, Austin Melton:
Using Client-Based Class Cohesion Metrics to Predict Class Maintainability. 72-80 - Chun Cao, Jing Deng, Ping Yu
, Zhiyong Duan, Xiaoxing Ma:
ParaAim: Testing Android Applications Parallel at Activity Granularity. 81-90 - Salim Ali Khan Mohammad, Sathvik Vamshi Valepe, Subhrakanta Panda
, B. S. A. S. Rajita:
A Comparative Study of the Effectiveness of Meta-Heuristic Techniques in Pairwise Testing. 91-96 - Yanru Peng, Yuting Chen, Beijun Shen:
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. 97-106 - Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong
, Xiaolei Hou, Sihan Xu, Jing Xu:
AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. 107-116 - Devansh Tiwari, Hironori Washizaki, Yoshiaki Fukazawa, Tomoyuki Fukuoka, Junji Tamaki, Nobuhiro Hosotani, Munetaka Kohama:
Metrics Driven Architectural Analysis using Dependency Graphs for C Language Projects. 117-122 - Irfan Alahi, Mubassher Islam, Anindya Iqbal, Amiangshu Bosu
:
Identifying the Challenges of the Blockchain Community from StackExchange Topics and Trends. 123-128 - Wesley N. M. Torres, Everton L. G. Alves, Patrícia D. L. Machado:
An Empirical Study on the Spreading of Fault Revealing Test Cases in Prioritized Suites. 129-138 - Willian Marques Freire, Carlos Vinícius Bindewald, Aline Maria Malachini Miotto Amaral, Thelma Elita Colanzi:
Supporting Decision Makers in Search-Based Product Line Architecture Design using Clustering. 139-148 - Yufei Yang, Wenbo Luo, Yu Pei
, Minxue Pan, Tian Zhang:
Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class Loading. 149-158 - Xing Hu, Rui Men, Ge Li, Zhi Jin:
Deep-AutoCoder: Learning to Complete Code Precisely with Induced Code Tokens. 159-168 - Biyun Zhu, Ruijie Meng, Zhenyu Zhang, W. K. Chan:
ConRS: A Requests Scheduling Framework for Increasing Concurrency Degree of Server Programs. 169-178 - Sushma Sakala, Vamshi Krishna Epuri, Samuel Sungmin Cho, Myoungkyu Song:
LAC: Locating and Applying Consistent and Repetitive Changes. 179-184 - Jiwei Xu, Yuewen Wu
, Zhigang Lu, Tao Wang:
Dockerfile TF Smell Detection Based on Dynamic and Static Analysis Methods. 185-190 - Partha Chakraborty
, Rifat Shahriyar, Anindya Iqbal:
Empirical Analysis of the Growth and Challenges of New Programming Languages. 191-196 - Tugkan Tuglular
, Mutlu Beyazit
, Dilek Öztürk
:
Featured Event Sequence Graphs for Model-Based Incremental Testing of Software Product Lines. 197-202 - Rumeng Shao, Hongyan Mao, Jinpeng Jiang:
Time-Aware and Location-Based Personalized Collaborative Recommendation for IoT Services. 203-208 - Sergio Segura, Dave Towey
, Zhi Quan Zhou
, Tsong Yueh Chen
:
An Extended Abstract of "Metamorphic Testing: Testing the Untestable". 209-210 - Carl K. Chang:
Agile, Continuous Integration, and DevOps. 211 - Djananjay Pandit, Ajay Bansal:
A Declarative Approach for an Adaptive Framework for Learning in Online Courses. 212-215 - Alice Barana
, Marina Marchisio
, Sergio Rabellino
:
Empowering Engagement through Automatic Formative Assessment. 216-225 - Luca Cagliero
, Lorenzo Canale, Laura Farinetti:
VISA: A Supervised Approach to Indexing Video Lectures with Semantic Annotations. 226-235 - Pedro Maroco, João Cambeiro, Vasco Amaral:
A Mobile System to Increase Efficiency of the Lecturers when Preventing Academic Dishonesty During Written Exams. 236-241 - Henry C. B. Chan
, Hong Va Leong, Grace Ngai:
Study TOUR for Computer Science Students. 242-251 - Kalika Suksomboon, Zhishu Shen
, Kazuaki Ueda, Atsushi Tagami:
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services. 252-257 - Yohei Hasegawa, Masato Uchida
:
Predicting Network Outages Based on Q-Drop in Optical Network. 258-263 - Yuuki Tsubouchi, Asato Wakisaka, Ken Hamada, Masayuki Matsuki, Hiroshi Abe, Ryosuke Matsumoto:
HeteroTSDB: An Extensible Time Series Database for Automatically Tiering on Heterogeneous Key-Value Stores. 264-269 - Ryosuke Matsumoto, Uchio Kondo, Kentaro Kuribayashi:
FastContainer: A Homeostatic System Architecture High-Speed Adapting Execution Environment Changes. 270-275 - Yuuichi Teranishi, Takashi Kimata, Eiji Kawai, Hiroaki Harai:
Hybrid Cellular-DTN for Vehicle Volume Data Collection in Rural Areas. 276-284 - Natsuko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
Modeling Restrained Epidemic Routing on Complex Networks. 285-290 - Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki:
Sparse Representation of Network Topology with K-SVD Algorithm. 291-298 - Ali R. Hurson
, Hiroyuki Sato, Toyokazu Akiyama, Dan Lin:
Message from EATA Symposium Chairs. 299 - Bruno Konzen Stahl, Leonardo Pavanatto Soares
, Vicenzo Abichequer Sangalli, Pedro Costa Klein, Rafael Neujahr Copstein, Márcio Sarroglia Pinho
:
DirectFlow: A Robust Method for Ocular Torsion Measurement. 300-305 - Ricardo Silveira Rodrigues, Marcia Pasin, Alice J. Kozakevicius, Vinicius Monego:
Pothole Detection in Asphalt: An Automated Approach to Threshold Computation Based on the Haar Wavelet Transform. 306-315 - Xin Dong, Tong Li, Zhiming Ding:
An Ontology Enhanced User Profiling Algorithm Based on Application Feedback. 316-325 - Shintaro Ishihara, Satoshi Tanita, Toyokazu Akiyama:
A Dataflow Application Deployment Strategy for Hierarchical Networks. 326-335 - Edna Dias Canedo
, Rhandy Rafhael de Carvalho, Heloise Acco Tives Leão, Pedro Henrique Teixeira Costa, Márcio Vinicius Okimoto:
How the Academics Qualification Influence the Students Learning Development. 336-345 - Bo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Söderström, Kazuya Okada, Yuji Sekiya, Akihiro Nakao
:
Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification. 346-351 - Jing Sun, Huiqun Zhao, Sanwen Mu, Zimu Li:
Purchasing Behavior Analysis Based on Customer's Data Portrait Model. 352-357 - Jiahui Ren, Xian Xu, Zhihuan Yao, Huiqun Yu:
Recommender Systems Based on Autoencoder and Differential Privacy. 358-363 - Yuan Li, Kedian Mu:
Matrix Factorization Model with Dual Preferences for Rating Prediction. 364-372 - Sreyasee Das Bhattacharjee, William J. Tolone, Ashish Mahabal, Mohammed Elshambakey, Isaac Cho, S. George Djorgovski:
View-Adaptive Weighted Deep Transfer Learning for Distributed Time-Series Classification. 373-381 - Hong Xia, Mingdao Zhao, Yanping Chen, Zhongmin Wang, Zhong Yu, Jingwei Yang:
Multi-Source Heterogeneous Core Data Acquisition Method in Edge Computing Nodes. 382-385 - Chengfang Ma, Ying Sha, Jianlong Tan, Li Guo, Huailiang Peng:
Chinese Social Media Entity Linking Based on Effective Context with Topic Semantics. 386-395 - Otgonpurev Mendsaikhan
, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model. 396-401 - Ivan Luiz Salvadori, Alexis Huf
, Frank Siqueira:
Semantic Data-Driven Microservices. 402-410 - Mohit Ved, Rizwanahmed B:
Big Data Analytics in Telecommunication using State-of-the-art Big Data Framework in a Distributed Computing Environment: A Case Study. 411-416 - Karl Severin, Swapna S. Gokhale, Aldo Dagnino:
Keyword-Based Semi-Supervised Text Classification. 417-422 - Ishtiyaque Ahmad, Md Anwar Parvez, Anindya Iqbal:
TypoWriter: A Tool to Prevent Typosquatting. 423-432 - Mingyang Jiang, Tianqi Zhao:
Vehicle Travel Time Estimation by Sparse Trajectories. 433-442 - Morgan Gallant, Haruna Isah
, Farhana H. Zulkernine, Shahzad Khan:
Xu: An Automated Query Expansion and Optimization Tool. 443-452 - Yongyi Xian, Chuanfei Xu, Sameh Elnikety, Yan Liu:
Parallel Discovery of Trajectory Companions from Heterogeneous Streaming Data. 453-462 - Daniele Facinelli, Matteo Larcher, Davide Brunelli, Daniele Fontanelli:
Cooperative UAVs Gas Monitoring using Distributed Consensus. 463-468 - Christopher-Eyk Hrabia
, Patrick Marvin Lehmann, Sahin Albayrak
:
Increasing Self-Adaptation in a Hybrid Decision-Making and Planning System with Reinforcement Learning. 469-478 - Jérôme Leudet, François Christophe
, Tommi Mikkonen
, Tomi Männistö
:
AILiveSim: An Extensible Virtual Environment for Training Autonomous Vehicles. 479-488 - Hassam Ullah Sheikh, Mina Razghandi, Ladislau Bölöni:
Learning Distributed Cooperative Policies for Security Games via Deep Reinforcement Learning. 489-494 - Lucas Leal, Andrea Ceccarelli
, Eliane Martins:
The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services Orchestrations. 495-500 - Yevgeniy Reznichenko, Enrico Prampolini, Abubakar Siddique, Henry Medeiros
, Francesca Odone:
Visual Tracking with Autoencoder-Based Maximum A Posteriori Data Fusion. 501-506 - Christian Meurisch, Zain Hamza, Bekir Bayrak, Max Mühlhäuser:
Enhanced Detection of Crisis-Related Microblogs by Spatiotemporal Feedback Loops. 507-512 - Christian Meurisch, Bekir Bayrak, Max Mühlhäuser:
AssistantGraph: An Approach for Reusable and Composable Data-Driven Assistant Components. 513-522 - Matthias Kern, Ferhat Erata
, Markus Iser
, Carsten Sinz, Frédéric Loiret, Stefan Otten, Eric Sax:
Integrating Static Code Analysis Toolchains. 523-528 - Sorath Asnani
, Maria Giulia Canu, Bartolomeo Montrucchio:
Producing Green Computing Images to Optimize Power Consumption in OLED-Based Displays. 529-534 - Brian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman
, Mohammad Hossein Manshaei:
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. 535-544 - Timothy R. Weil:
Risk Assessment Methods for Cloud Computing Platforms. 545-547 - Amir Dabirian:
Employer Branding in the IT Industry: An Employer view. 548 - Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman
, Mohammad Hossein Manshaei, Walid Saad:
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. 549-558 - Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu:
Information Exposure (IEX): A New Class in the Bugs Framework (BF). 559-564 - Md Arabin Islam Talukder
, Hossain Shahriar
, Kai Qian, Mohammad Ashiqur Rahman
, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. 565-569 - Mohammad Ghazivakili, Claudio Demartini, Mauro Guerrera, Bartolomeo Montrucchio:
Open Source Fog Architecture for Industrial IoT Automation Based on Industrial Protocols. 570-578 - Marjan Sirjani, Giorgio Forcina, Ali Jafari, Stephan Baumgart, Ehsan Khamespanah, Ali Sedaghatbaf
:
An Actor-Based Design Platform for System of Systems. 579-587 - Congmiao Li, Jean-Luc Gaudiot:
Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. 588-597 - Feng Ye, Songjie Zhu, Yuansheng Lou, Zihao Liu, Yong Chen, Qian Huang:
Research on Index Mechanism of HBase Based on Coprocessor for Sensor Data. 598-603 - Jakob Danielsson, Tiberiu Seceleanu
, Marcus Jägemar, Moris Behnam, Mikael Sjödin:
Testing Performance-Isolation in Multi-core Systems. 604-609 - Tokio Takahashi, Masato Uchida
:
Optimal Hand Sign Selection Using Information Theory for Custom Sign-Based Communication. 610-615 - Fulvio Corno
, Luigi De Russis
, Luisa Fernanda Barrera-León
:
Touch-Based Ontology Browsing on Tablets and Surfaces. 616-621 - Jun Wang, Eugene Yujun Fu
, Grace Ngai, Hong Va Leong:
Investigating Differences in Gaze and Typing Behavior Across Age Groups and Writing Genres. 622-629 - Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Alana McVey, Amy VanHecke, Sheikh Iqbal Ahamed:
Application of Reconstructed Phase Space in Autism Intervention. 630-637 - Joana Páris, João Cambeiro, Vasco Amaral, Armanda Rodrigues
:
Using Gamification to Motivate Occupants to Energy Efficiency in a Social Setting of a Building Automation System. 638-643 - Shameem Ahmed, M. Forhad Hossain, Kurt Price, Cody Pranger, Md Monsur Hossain, Moushumi Sharmin:
A Tale of the Social-Side of ASD. 644-652 - Riddhiman Adib
, Eyad Aldawod, Nathan Lang, Nina Lasswell, Shion Guha:
Analyzing Happiness: Investigation on Happy Moments using a Bag-of-Words Approach and Related Ethical Discussions. 653-662 - Labiblais Rahman
, Katsunori Oyama:
Long-Term Monitoring of NIRS Signals for Mental Health Assessment. 663-666 - Yuki Kurauchi, Naoto Abe, Hiroshi Konishi, Hitoshi Seshimo
:
Barrier Detection Using Sensor Data from Multiple Modes of Transportation with Data Augmentation. 667-675 - Yankan Yang, Baoqi Huang, Runze Yang
:
An Energy Efficient Pedestrian Heading Estimation Algorithm using Smartphones. 676-684 - Alfredo Cuzzocrea, Enzo Mumolo, Marco Tessarotto:
Towards An Effective and Efficient Machine-Learning-Based Framework for Supporting Event Detection in Complex Environments. 685-689 - Tanvir Roushan, Riddhiman Adib
, Nadiyah Johnson, Olawunmi George, Md Fitrat Hossain, Zeno Franco, Katinka Hooyer, Sheikh Iqbal Ahamed:
Towards Predicting Risky Behavior Among Veterans with PTSD by Analyzing Gesture Patterns. 690-695 - Li Tong, Ying Sha, May D. Wang
:
Improving Classification of Breast Cancer by Utilizing the Image Pyramids of Whole-Slide Imaging and Multi-scale Convolutional Neural Networks. 696-703 - Maryam Farhadi, Hisham Haddad, Hossain Shahriar
:
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements. 704-713 - Cleyton Rafael Gomes Silva, Cristhiane Gonçalves
, Joyce Siqueira
, Fabrízzio Alphonsus A. M. N. Soares
, Rodrigo Albernaz Bezerra, Hedenir Monteiro Pinheiro, Ronaldo Martins da Costa, Eduardo Nery Rossi Camilo, Augusto Paranhos Junior:
Computer Vision Based Systems for Human Pupillary Behavior Evaluation: A Systematic Review of the Literature. 714-719 - Chihhsiong Shih, William Cheng-Chung Chu, You-Wei Chang:
The Causes Analysis of Ischemic Stroke Transformation into Hemorrhagic Stroke using PLS (partial Least Square)-GA and Swarm Algorithm. 720-729 - Chuanbo Wang, Ye Guo, Wei Chen, Zeyun Yu:
Fully Automatic Intervertebral Disc Segmentation Using Multimodal 3D U-Net. 730-739 - Swapna S. Gokhale:
Comparing Health Outcomes in San Francisco and Boston Metro Areas. 740-745 - Ruichao Gao, Xuebin Ma:
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning. 746-752 - Jianjun Zheng, Akbar Siami Namin:
Enforcing Optimal Moving Target Defense Policies. 753-759 - Md. Rafidul Islam, Md. Saiful Islam, Zakaria Ahmed, Anindya Iqbal, Rifat Shahriyar:
Automatic Detection of NoSQL Injection Using Supervised Learning. 760-769 - Naoki Fukushi, Daiki Chiba
, Mitsuaki Akiyama, Masato Uchida
:
Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection. 770-775 - Fumihiro Kanei, Daiki Chiba
, Kunio Hato, Mitsuaki Akiyama:
Precise and Robust Detection of Advertising Fraud. 776-785 - Fadi Mohsen, Haadi Jafaarian:
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers. 786-794 - Yeong-Cheol Kim, Joon-Young Paik, Seokwoo Choi, Eun-Sun Cho:
Efficient SVM Based Packer Identification with Binary Diffing Measures. 795-800 - Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. 801-810 - Zeyad A. Al-Odat
, Samee Khan
:
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions. 811-816 - Juan Wang, Karim Lounis, Mohammad Zulkernine:
CSKES: A Context-Based Secure Keyless Entry System. 817-822 - Emmanuel Bello-Ogunu, Mohamed Shehab
, Md. Nazmus Sakib Miazi:
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management. 823-832 - Elena Lisova, Irfan Sljivo
, Aida Causevic:
Safety and Security Co-Analyses: A Systematic Literature Review. 833 - Matthew Pike
, Nasser Mustafa, Dave Towey
, Vladimir Brusic
:
Sensor Networks and Data Management in Healthcare: Emerging Technologies and New Challenges. 834-839 - Yanni Yang, Jiannong Cao, Xiulong Liu, Xuefeng Liu
:
Multi-Breath: Separate Respiration Monitoring for Multiple Persons with UWB Radar. 840-849 - A. K. M. Jahangir Alam Majumder, Tanner M. McWhorter, Yezhou Ni, Hanqing Nie, Jacob Iarve, Donald R. Ucci:
sEmoD: A Personalized Emotion Detection Using a Smart Holistic Embedded IoT System. 850-859 - Mathew L. Wymore, Daji Qiao:
RIVER-MAC: A Receiver-Initiated Asynchronously Duty-Cycled MAC Protocol for the Internet of Things. 860-869 - Nicolas Ferry, Phu Hong Nguyen
, Hui Song, Pierre-Emmanuel Novac, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
GeneSIS: Continuous Orchestration and Deployment of Smart IoT Systems. 870-875 - Renato Ferrero
, Filippo Gandino:
Degree Distribution of Wireless Networks for Mobile IoT Applications. 876-881 - Sangwoo Jung, Ki-Il Kim
:
Experimental Comparison of Pure Flooding and Its Variants on Raspberry Pi in Small Scale Ad Hoc Networks. 882-883 - Mohammed Hamdi, Rashmi Pethe, Annapoorani Sevugan Chetty, Dae-Kyoo Kim:
Threshold-Driven Class Decomposition. 884-887 - Robison Cris Brito, Nicollas Saque, Diego Addan Gonçalves
, Fábio Favarim, Eduardo Todt
:
Optimized Division of Exploration Areas in Multi-robot Systems Considering Static and Dynamic Charging Stations. 888-891 - Minami Uehara, Sho Tsugawa:
Analysis of the Evolution of the Influence of Central Nodes in a Twitter Social Network. 892-895 - Kenya Dan, Naoya Kitagawa, Shuji Sakuraba, Nariyoshi Yamai:
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log. 896-899 - Ryuji Asakura, Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata:
A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network Environment. 900-903 - Sooyeon Lee, Eun-Sun Cho:
A Modified Smart Contract Execution Enviroment for Safe Function Calls. 904-907 - Anmol Paudel, Jie Yang
, Satish Puri
:
Parallelization of Plane Sweep Based Voronoi Construction with Compiler Directives. 908-911 - Muhammad Alfian Amrizal, Luis Guillen
, Takuo Suganuma:
Toward an Optimal Anomaly Detection Pattern in Wireless Sensor Networks. 912-913 - Chao Gao, Junfeng Yao, Kaini Huang, Kai Qian:
Application and Research of Image-Based Modeling and 3D Printing Technology in Intangible Cultural Heritage Quanzhou Marionette Protection. 914-915 - Hanwu Luo, Xiubao Pan, Qingshun Wang, Shasha Ye, Ying Qian:
Logistic Regression and Random Forest for Effective Imbalanced Classification. 916-917 - Hao Zhang, Zhuolin Li, Hossain Shahriar
, Lixin Tao, Prabir Bhattacharya, Ying Qian:
Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets. 918-919 - Victor Clincy, Hossain Shahriar
:
IoT Malware Analysis. 920-921 - Victor Clincy, Hossain Shahriar
:
Blockchain Development Platform Comparison. 922-923 - Hao Zhang, Zhuolin Li, Hossain Shahriar
, Dan Lo, Fan Wu, Ying Qian:
Protecting Data in Android External Data Storage. 924-925 - Kaisei Hanayama, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Achievements Visualization in Programming Education. 926-927 - Kien Nguyen
, Zhetao Li, Hiroo Sekiya:
Virtualization for Flexibility and Network-Aware on 5G Mobile Devices. 928-929 - Sandeep Reddivari, Muhammad Salman Khan:
CloneTM: A Code Clone Detection Tool Based on Latent Dirichlet Allocation. 930-931 - Sandeep Reddivari, Muhammad Salman Khan:
VisioTM: A Tool for Visualizing Source Code Based on Topic Modeling. 932-933 - Ryosuke Yamauchi, Yoko Kamidoi, Shin'ichi Wakabayashi:
A Protocol for Preventing Transaction Commitment without Recipient's Authorization on Blockchain. 934-935 - Ziwei Zhang, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada:
Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network. 936-937 - Tomoki Yoshihisa, Satoru Matsumoto, Tomoya Kawakami, Yuuichi Teranishi:
Trust-Oriented Live Video Distribution Architecture. 938-939 - Priyanka Bharat Sakhare, Dae-Kyoo Kim, Mohammed Hamdi:
Detecting No-Sleep Bugs Using Sequential Reference Counts. 940-941 - Hyun-Il Lim:
A Linear Regression Approach to Modeling Software Characteristics for Classifying Similar Software. 942-943 - Sangwoo Jung, Ki-Il Kim
, Bongsoo Roh, Jae-Hyun Ham:
Load Balancing Algorithm for Multiple UAVs Relayed Tactical Ad Hoc Networks. 944-945 - Sai Mullangi, Thulasidhar Reddy Kattamreddy, Shanthan Ramadugu, Wook-Sung Yoo:
Garbage Weight Estimation System. 946-947 - Yingcheng Sun
, Kenneth A. Loparo:
Topic Shift Detection in Online Discussions using Structural Context. 948-949 - Yingcheng Sun
, Kenneth A. Loparo:
A Clicked-URL Feature for Transactional Query Identification. 950-951 - Yingcheng Sun
, Kenneth A. Loparo:
Context Aware Image Annotation in Active Learning with Batch Mode. 952-953 - Yingcheng Sun
, Kenneth A. Loparo:
Information Extraction from Free Text in Clinical Trials with Knowledge-Based Distant Supervision. 954-955 - Satoru Izumi, Masaki Shiraiwa, Goshi Sato, Sugang Xu, Takuo Suganuma:
Basic Concept of Emergency Optical Network Planning Using Multiagent-Based Flexible and Autonomous Network Control. 956-957 - Satoru Izumi, Hiroyuki Takahira, Kosuke Gotani, Misumi Hata, Luis Guillen
, Toru Abe, Takuo Suganuma:
Basic Design of Network Control Method Based on Disaster Risk of OpenFlow C/M-Plane. 958-959 - Adway S. Wadekar
:
Predicting Opioid Use Disorder (OUD) Using A Random Forest. 960-961

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.