


default search action
43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 2: COMPSAC 2019 Workshops
- Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4
ADMNET: Architecture, Design, Deployment & Management of Networks & Applications
- Wei-Han Chen, Fuchun Joseph Lin
:
Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2M. 1-6 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo
:
A Dynamic Intervals Determination Method Based on Transaction Rates for Real-Time IoT Applications. 7-12 - Mateus Coelho Silva
, Ricardo Oliveira
:
Analyzing the Effect of Increased Distribution on a Wearable Appliance. 13-18 - Natusko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
On the Effectiveness of Position-Based Routing in Delay/Disruption-Tolerant Networking. 19-23 - Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
On the Predictability of Network Robustness from Spectral Measures. 24-29 - Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of Anycast and GSLB. 30-35 - Hiroki Kashiwazaki, Shinnosuke Miura, Shinji Shimojo
:
A Proposal of SDN-FIT System to Evaluate Wide-Area Distributed Applications Based on Exhaustive FIT Scenario Generation. 36-41
AIML: Advances in AI and Machine Learning
- Zihao Dong, Ruixun Zhang, Xiuli Shao, Hongyu Zhou:
Multi-scale Discriminative Location-Aware Network for Few-Shot Semantic Segmentation. 42-47 - Hongjie Liu, Hongzhe Xu, Yu Yan, Wen Li:
Research on Evaluation Function of Clustering Algorithm Based on Duty Cycle. 48-54 - Mike McMahon, Dale Mumper, Mitsuko Ihaza, Dominic Farrar:
How Smart is your Manufacturing? Build Smarter with AI. 55-60 - Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Nazmus Sakib, Sheikh Iqbal Ahamed:
Feature Boosting in Natural Image Classification. 61-67 - Takeshi Morita, Naoya Takahashi, Mizuki Kosuda, Takahira Yamaguchi:
A Teaching Assistant Robot Design Tool Based on Knowledge Chunks Reuse. 68-73 - Jiawei Wu, Wenliang Hu, Joseph Coelho, Paromita Nitu, Hanna R. Paul, Praveen Madiraju, Roger O. Smith, Sheikh Iqbal Ahamed:
Identifying Buildings with Ramp Entrances Using Convolutional Neural Networks. 74-79 - Mehdi Nekouei, Sara Sartoli:
Modeling the Structured Porous Network Using Stacked Ensemble Learning. 80-84
SCA: Smart Computing & Applications
- Oluwaseun Bamgboye
, Xiaodong Liu, Peter Cruickshank:
Semantic Stream Management Framework for Data Consistency in Smart Spaces. 85-90 - Kincho H. Law, Siddarth Taduri, Jay P. Kesan, Ram Sriram:
Utilization of Bio-Ontologies for Enhancing Patent Information Retrieval. 91-96 - Shiraj Pokharel, Ying Zhu
, Satish Puri
:
Micro-Level Analysis and Visualization of Tennis Shot Patterns with Fractal Tables. 97-102 - Yan Zhu
, Yi Zhang, Jing Wang, Weijing Song, William Cheng-Chung Chu, Guowei Liu:
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era. 103-109 - Seungyo Ryu, Dongseung Kim:
Intelligent Highway Traffic Forecast Based on Deep Learning and Restructured Road Models. 110-114 - Fabian Burzlaff
, Maurice Ackel, Christian Bartelt:
A Mapping Language for IoT Device Descriptions. 115-120 - Yuxuan Deng, Henry C. B. Chan
:
Development of Mobile Intercloud Applications. 121-126 - Faisal Fahmi
, Pei-Shu Huang, Feng-Jian Wang:
Improving the Detection of Sequential Anomalies Associated with a Loop. 127-134 - Lijuan Diao, Huaduo Wang, Sultan Alsarra, I-Ling Yen, Farokh B. Bastani:
A Smart Role Mapping Recommendation System. 135-140
IEESD: Industrial Experience in Embedded Systems Design
- Johannes Richter
, Detlef Streitferdt:
Modern Architecture for Deep Learning-Based Automatic Optical Inspection. 141-145 - Yingjie Zhang, Yujie Gong, Daniel Morgan, Ying Zhang:
A Data-Driven Approach to Energy Cost Prediction Of Dwellings Based on Partitioned Parallel Modeling. 146-152 - Anton Urvantsev, Morgan E. Johansson, Nils Müllner, Tiberiu Seceleanu
:
Experiencing Technology Independence. 153-158 - Tamer Omar
, Olusegun Bamgbose, Ibrahim Naffaa, Omar Naffaa:
Embedded Control System for Decentralized Wastewater Treatment. 159-164 - Aida Causevic, Alessandro Vittorio Papadopoulos
, Marjan Sirjani:
Towards a Framework for Safe and Secure Adaptive Collaborative Systems. 165-170 - Maxi Weichenhain, Wolfgang Fengler, Detlef Streitferdt:
How to Bring Project Management of Embedded Systems to an Appropriate Level of Abstraction for a Discrete Event Model. 171-176
DADA: Deep Analysis of Data Driven Applications
- Olumide Kayode, Ali Saman Tosun:
LiRUL: A Lightweight LSTM Based Model for Remaining Useful Life Estimation at the Edge. 177-182 - Neda Tavakoli
:
Modeling Genome Data Using Bidirectional LSTM. 183-188 - Shihao Ge, Haruna Isah
, Farhana H. Zulkernine, Shahzad Khan:
A Scalable Framework for Multilevel Streaming Data Analytics using Deep Learning. 189-194 - Joseph Coelho, Dawson D'almeida, Scott Coyne, Nathan Gilkerson, Katelyn Mills, Praveen Madiraju:
Social Media and Forecasting Stock Price Change. 195-200 - Shatha Jaradat, Nima Dokoohaki
, Ummul Wara, Mallu Goswami, Kim Hammar, Mihhail Matskin:
TALS: A Framework for Text Analysis, Fine-Grained Annotation, Localisation and Semantic Segmentation. 201-206 - Hanxiang Du, Long Hoang Nguyen, Zhou Yang, Hashim Abu-gellban
, Xingyu Zhou, Wanli Xing, Guofeng Cao, Fang Jin
:
Twitter vs News: Concern Analysis of the 2018 California Wildfire Event. 207-212 - Yuta Shirasaki, Yuya Kobayashi, Mikio Aoyama:
A Speech Data-Driven Stakeholder Analysis Methodology Based on the Stakeholder Graph Models. 213-220 - Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Zimo Zhu, Mohammed Erfanul Hoque, Nalini Ravishanker:
Fuzzy Value-at-Risk Forecasts Using a Novel Data-Driven Neuro Volatility Predictive Model. 221-226 - Moitrayee Chatterjee
, Akbar Siami Namin:
Detecting Phishing Websites through Deep Reinforcement Learning. 227-232 - Hamid Mansoor
, Walter Gerych, Luke Buquicchio, Kavin Chandrasekaran, Emmanuel Agu, Elke A. Rundensteiner:
COMEX: Identifying Mislabeled Human Behavioral Context Data Using Visual Analytics. 233-238 - Tommy Dang, Ngan V. T. Nguyen
:
SpacePhaser: Phase Space Embedding Visual Analytics. 239-244
CDS: Consumer Devices & Systems
- Tsutomu Terada, Masahiko Tsukamoto:
A Pen-Grip Shaped Device for Estimating Writing Pressure and Altitude. 245-250 - Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Communication Robot for Elderly Based on Robotic Process Automation. 251-256 - Kazuki Someya, Masashi Saito, Ryozo Kiyohara:
Estimation Method of Traffic Volume in Provincial City Using Big-Data. 257-262 - Thamer Horbylon Nascimento
, Fabrízzio Alphonsus Alves de Melo Nunes Soares
, Marcos Alves Vieira, Juliana Paula Felix
, Jaline Gonçalves Mombach, Livia Mancine Coelho De Campos, Wellington Galvão Rodrigues, Wesley F. de Miranda, Ronaldo Martins da Costa:
Using Smartwatches as an Interactive Movie Controller: A Case Study with the Bandersnatch Movie. 263-268
ESAS: E-Health Systems & Web Technologies
- Ling Tong
, Jake Luo
, Ron A. Cisler, Michael Cantor:
Machine Learning-Based Modeling of Big Clinical Trials Data for Adverse Outcome Prediction: A Case Study of Death Events. 269-274 - Komal Minhas, Munazza Tabassam, Rida Rasheed, Assad Abbas
, Hasan Ali Khattak
, Samee U. Khan
:
A Framework for Dengue Surveillance and Data Collection in Pakistan. 275-280 - A. K. M. Jahangir Alam Majumder, Mohammed ElSaadany, Joshua Aaron Izaguirre, Donald R. Ucci:
A Real-Time Cardiac Monitoring using a Multisensory Smart IoT System. 281-287 - Daniel Scherer
, José George Dias de Souza:
Educational app Proposal to Support Pregnant Women. 288-293 - Saad El Jaouhari, Patrick Hardy, Guillaume Pasquier, Pierrick Guitter, Eric Poiseau, Cédric Moubri-Tournes, Stéphane Leduc, Sebastien Vincendeau, Laurent Bourgeois, Bernard Gibaud, Emmanuel Cordonnier:
World First Retransmission of Medical Images in an Operating Room via DICOM-RTV: Technical Details. 294-299
OER: Open Educational Resources
- Bahtijar Vogel, Bo Peterson, Blerim Emruli:
Prototyping for Internet of Things with Web Technologies: A Case on Project-Based Learning using Scrum. 300-305 - Lotfi Ben Othmane, Monica Lamm
:
Mindset for Software Architecture Students. 306-311 - Justin Wang, Dennis Brylow, Debbie Perouli:
Implementing Cybersecurity into the Wisconsin K-12 Classroom. 312-317 - Ahmed Alzaghoul
, Edmundo Tovar:
An Approach for Developing a Conceptual Quality Model by Changing the Learner Behavior with OER. 318-323
STA: Software Test Automation
- Nasser Mustafa, Yvan Labiche, Dave Towey
:
Mitigating Threats to Validity in Empirical Software Engineering: A Traceability Case Study. 324-329 - Juan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Liang Chen:
Short-Term Performance Metrics Forecasting for Virtual Machine to Support Anomaly Detection Using Hybrid ARIMA-WNN Model. 330-335 - Katerina Goseva-Popstojanova
, Mohammad Jamil Ahmad, Yasser Ali Alshehri
:
Software Fault Proneness Prediction with Group Lasso Regression: On Factors that Affect Classification Performance. 336-343 - Tugkan Tuglular
, Sercan Sensülün:
SPL-AT Gherkin: A Gherkin Extension for Feature Oriented Testing of Software Product Lines. 344-349 - Sai Chaithra Allala, Juan P. Sotomayor
, Dionny Santiago
, Tariq M. King
, Peter J. Clarke
:
Towards Transforming User Requirements to Test Cases Using MDE and NLP. 350-355 - Juan P. Sotomayor
, Sai Chaithra Allala, Patrick Alt, Justin Phillips, Tariq M. King, Peter J. Clarke
:
Comparison of Runtime Testing Tools for Microservices. 356-361
MediComp: Medical Computing
- Wenai Song, Ying Cao, Zhiqiang Qiao, Qing Wang, Ji-Jiang Yang:
An Improved Semi-Supervised Learning Method on Cataract Fundus Image Classification. 362-367 - Changshaui Huo, Faheem Akhtar
, Pengzhi Li:
A Novel Grading Method of Cataract Based on AWM. 368-373 - Weijing Wang, Chenkai Guo, Jing Xu, Ao Liu:
Bi-Dimensional Representation of Patients for Diagnosis Prediction. 374-379 - Siyuan Fang, Lixia Hu, Bin Du, Haoteng Zheng, Minhua Lu, Rui Mao:
Viscoelasticity Measurements of knee Muscles with Simulated Knee Osteoarthritis Treated by Novel Chinese Medicine: A Preliminary Study. 380-385 - Fitrat Hossain, Olawunmi George, Nadiyah Johnson, Praveen Madiraju, Mark Flower, Zeno Franco, Katinka Hooyer, Jose Lizarraga Mazaba, Lisa Rein, Sheikh Iqbal Ahamed:
Towards Clinical Decision Support for Veteran Mental Health Crisis Events using Tree Algorithm. 386-390 - Xin-Hong Jia, Wenai Song, Wei-Yan Li, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Semi-Automatic Construction Method of Chronic Obstructive Pulmonary Disease Knowledge Graph. 391-396 - Prosper Kandabongee Yeng, Bian Yang, Einar Snekkenes:
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices. 397-404 - Wei-liang Zhang, Qin-Yan Zhang, Ji-Jiang Yang, Qing Wang:
Multi-Scale Network with the Deeper and Wider Residual Block for MRI Motion Artifact Correction. 405-410 - Jing Gao, Huanqing Zhang, Ruifang Shen:
Classification of Pulmonary Nodules by using Improved Convolutional Neural Networks. 411-416 - Rehnuma Afrin, Hisham Haddad, Hossain Shahriar
:
Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data. 417-422 - Bo Liu, Mengmeng Huang, Kelu Yao, Lan Wei, Xiaolu Fei, Qing Wang:
Prediction and Study of the Applicability of Medical Gels to Patients. 423-428 - Wei-Yan Li, Wenai Song, Xin-Hong Jia, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Drug Specification Named Entity Recognition Base on BiLSTM-CRF Model. 429-433 - Chao Luo, Canghong Shi
, Xian Zhang, Jing Peng, Xiaojie Li, Yucheng Chen:
AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI Segmentation. 434-439 - Lori Kim, Hossain Shahriar
, Chi Zhang:
Non-Invasive Wi-Fi Sensors For Smart Healthcare. 440-445 - Prakhar Agrawal, Divya Bhargavi, Gokul Krishna G., Xiao Han, Neha Tevathia, Abbie M. Popa, Nicholas Ross, Diane Myung-kyung Woodbridge, Barbie Zimmerman-Bier, William Bosl:
A Scalable Automated Diagnostic Feature Extraction System for EEGs. 446-451 - Gracie Carter, Hossain Shahriar
, Sweta Sneha:
Blockchain-Based Interoperable Electronic Health Record Sharing Framework. 452-457
NETSAP: Network Technologies for Security, Administration & Protection
- Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Towards Enhancement of Fault Traceability Among Multiple Hazard Analyses in Cyber-Physical Systems. 458-464 - Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto:
Automatic Whitelist Generation for SQL Queries Using Web Application Tests. 465-470 - Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe:
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. 471-476
WISH: Integrated Smart Healthcare
- Austin Gentry, William M. Mongan
, Brent Lee, Owen C. Montgomery, Kapil R. Dandekar:
Activity Segmentation Using Wearable Sensors for DVT/PE Risk Detection. 477-483 - Aditi Sharma, Shivee Singh, Brian Wright, Alan Perry, Diane Myung-kyung Woodbridge, Abbie M. Popa:
Scalable Motor Movement Recognition from Electroencephalography using Machine Learning. 484-489 - Amit Kumar Saha, G. M. Tanimul Ahsan, Md. Osman Gani, Sheikh Iqbal Ahamed:
Personalized Pain Study Platform using Evidence-Based Continuous Learning Tool. 490-495 - Colin Willoughby, Ian Banatoski, Paul Roberts, Emmanuel Agu:
DrunkSelfie: Intoxication Detection from Smartphone Facial Images. 496-501
SAPSE: Security Aspects for Process & Services Engineering
- Ariel Rodríguez, Koji Okamura:
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining. 502-507 - Alfredo Cuzzocrea, Ernesto Damiani:
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms. 508-516
InfoFlow: Information Flow Oriented Approaches in Internet of Things and Cyber-Physical Systems
- Nuwan Jayawardene, Pumudu Fernando:
Hybrid Approach for Enabling Hierarchical Fog Networks in an IoT Deployment. 517-521 - Robison Cris Brito, Mainara Cristina Lorencena, José Felippe Loureiro, Fábio Favarim, Eduardo Todt
:
A Comparative Approach on the use of Unmanned Aerial Vehicles kind of Fixed-Wing and Rotative Wing Applied to the Precision Agriculture Scenario. 522-526 - Kosuke Gotani, Hiroyuki Takahira, Misumi Hata, Luis Guillen
, Satoru Izumi, Toru Abe:
OpenFlow Based Information Flow Control Considering Route Switching Cost. 527-530
MVDA: Workshop on Modeling and Verifying Distributed Applications
- Ryuichiro Maegawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
A Discrete Model of IEEE 1588-2008 Precision Time Protocol with Clock Servo using PI Controller. 531-536 - Robison Cris Brito, José Felippe Loureiro, André Guedes
, Eduardo Todt
:
Optimization System for Dynamic Flight Planning for Groups of Drones using Cooperation with Mobile Recharge Bases by Means of Multiagent System and Recursive Auctions. 537-542 - Kei Katayama, Hiroyuki Ohsaki:
Fluid-Based Modeling of Large-Scale IEEE 802.15.4 Wireless Sensor Networks. 543-548 - Salma Ayari, Yousra Bendaly Hlaoui, Leila Ben Ayed:
A Grammar Based Approach to BPMN Model Semantic Preservation using Refinement. 549-554 - Zhen-Tian Liu, Jing Liu:
Formal Verification of Blockchain Smart Contract Based on Colored Petri Net Models. 555-560 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Ben Ayed, Mayssa Bessifi:
From BPMN2 to Event B: A Specification and Verification Approach of Workflow Applications. 561-566
STPSA: Security, Trust & Privacy for Software Applications
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar
, Hongmei Chi:
STPSA 2019 Welcome Message. 567-568 - Lotfi Ben Othmane, Ameerah-Muhsina Jamil, Moataz AbdelKhalek:
Identification of the Impacts of Code Changes on the Security of Software. 569-574 - Sara Mccloskey, John Herbert:
User Behaviour-Based Access Control for Social Media with Qualitative Research and Bayesian Modelling. 575-579 - George O. M. Yee:
Designing Good Security Metrics. 580-585 - Seoksu Lee, Joon-Young Paik, Rize Jin, Eun-Sun Cho:
Toward Machine Learning Based Analyses on Compressed Firmware. 586-591 - Juan Wang, Karim Lounis, Mohammad Zulkernine:
Security Features for Proximity Verification. 592-597 - Shen Fu, Mathew L. Wymore, Ting-Wei Chang, Daji Qiao:
Continuous User Authentication Based on Context-Emphasized Behavior Profiling. 598-603 - Hossain Shahriar
, Md Arabin Islam Talukder
, Mohammad Ashiqur Rahman
, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu:
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. 604-609
QUORS: Quality Oriented Reuse of Software
- Cody Baker, Lin Deng
, Suranjan Chakraborty, Josh Dehlinger:
Automatic Multi-class Non-Functional Software Requirements Classification Using Neural Networks. 610-615 - Makoto Shiraishi, Hironori Washizaki, Yoshiaki Fukazawa, Joseph W. Yoder:
Mob Programming: A Systematic Literature Review. 616-621 - Ruiqiong Wu, Qing Duan, Fei Dai, Hongji Yang, Yi Zhang, Biseng Xie:
Research on the Realizability of Microservice Interaction Contract Based on CSP#. 622-627
DFM: Data Flow Models and Extreme-Scale Computing
- Sihan Zeng, Jose Manuel Monsalve Diaz, Siddhisanket Raskar:
Toward A High-Performance Emulation Platformfor Brain-Inspired Intelligent SystemsExploring Dataflow-Based Execution Model and Beyond. 628-633 - Gabriel da Silva Vieira
, Fabrízzio Alphonsus A. M. N. Soares
, Junio Cesar de Lima, Hugo A. D. do Nascimento
, Gustavo Teodoro Laureano, Ronaldo Martins da Costa, Júlio César Ferreira, Wellington Galvão Rodrigues:
A Disparity Computation Framework. 634-639 - Siddhisanket Raskar, Thomas Applencourt, Kalyan Kumaran, Guang Gao:
Position Paper: Extending Codelet Model for Dataflow Software Pipelining using Software-Hardware Co-Design. 640-645 - Christoph Kühbacher, Christian Mellwig, Florian Haas, Theo Ungerer:
A Functional Programming Model for Embedded Dataflow Applications. 646-651 - Alan Humphrey, Martin Berzins:
An Evaluation of An Asynchronous Task Based Dataflow Approach For Uintah. 652-657
BDCAA: The 1st IEEE International Workshop on Big Data Computation, Analysis, and Applications
- George O. Strawn:
Open Science, Business Analytics, and FAIR Digital Objects. 658-663 - Makoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi:
Job-Aware Optimization of File Placement in Hadoop. 664-669 - Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller:
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process. 670-675
SDIM: Secure Digital Identity Management
- Yong Jin, Masahiko Tomoishi:
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. 676-681 - Hiroyuki Sato, Sridhar Nikita:
An Interactive and Continuous Authorization Scheme by using Belnap Logic. 682-687 - Jacob Hendricks, Brandon Burke, Thoshitha T. Gamage:
Polysizemic Encryption: Towards a Variable-Length Output Symmetric-Key Cryptosystem. 688-693 - Gen Li
, Hiroyuki Sato:
A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain. 694-699

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.