default search action
43rd COMPSAC 2019: Milwaukee, WI, USA - Volume 2: COMPSAC 2019 Workshops
- Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4
ADMNET: Architecture, Design, Deployment & Management of Networks & Applications
- Wei-Han Chen, Fuchun Joseph Lin:
Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2M. 1-6 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
A Dynamic Intervals Determination Method Based on Transaction Rates for Real-Time IoT Applications. 7-12 - Mateus Coelho Silva, Ricardo Oliveira:
Analyzing the Effect of Increased Distribution on a Wearable Appliance. 13-18 - Natusko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
On the Effectiveness of Position-Based Routing in Delay/Disruption-Tolerant Networking. 19-23 - Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
On the Predictability of Network Robustness from Spectral Measures. 24-29 - Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of Anycast and GSLB. 30-35 - Hiroki Kashiwazaki, Shinnosuke Miura, Shinji Shimojo:
A Proposal of SDN-FIT System to Evaluate Wide-Area Distributed Applications Based on Exhaustive FIT Scenario Generation. 36-41
AIML: Advances in AI and Machine Learning
- Zihao Dong, Ruixun Zhang, Xiuli Shao, Hongyu Zhou:
Multi-scale Discriminative Location-Aware Network for Few-Shot Semantic Segmentation. 42-47 - Hongjie Liu, Hongzhe Xu, Yu Yan, Wen Li:
Research on Evaluation Function of Clustering Algorithm Based on Duty Cycle. 48-54 - Mike McMahon, Dale Mumper, Mitsuko Ihaza, Dominic Farrar:
How Smart is your Manufacturing? Build Smarter with AI. 55-60 - Piyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Nazmus Sakib, Sheikh Iqbal Ahamed:
Feature Boosting in Natural Image Classification. 61-67 - Takeshi Morita, Naoya Takahashi, Mizuki Kosuda, Takahira Yamaguchi:
A Teaching Assistant Robot Design Tool Based on Knowledge Chunks Reuse. 68-73 - Jiawei Wu, Wenliang Hu, Joseph Coelho, Paromita Nitu, Hanna R. Paul, Praveen Madiraju, Roger O. Smith, Sheikh Iqbal Ahamed:
Identifying Buildings with Ramp Entrances Using Convolutional Neural Networks. 74-79 - Mehdi Nekouei, Sara Sartoli:
Modeling the Structured Porous Network Using Stacked Ensemble Learning. 80-84
SCA: Smart Computing & Applications
- Oluwaseun Bamgboye, Xiaodong Liu, Peter Cruickshank:
Semantic Stream Management Framework for Data Consistency in Smart Spaces. 85-90 - Kincho H. Law, Siddarth Taduri, Jay P. Kesan, Ram Sriram:
Utilization of Bio-Ontologies for Enhancing Patent Information Retrieval. 91-96 - Shiraj Pokharel, Ying Zhu, Satish Puri:
Micro-Level Analysis and Visualization of Tennis Shot Patterns with Fractal Tables. 97-102 - Yan Zhu, Yi Zhang, Jing Wang, Weijing Song, William Cheng-Chung Chu, Guowei Liu:
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era. 103-109 - Seungyo Ryu, Dongseung Kim:
Intelligent Highway Traffic Forecast Based on Deep Learning and Restructured Road Models. 110-114 - Fabian Burzlaff, Maurice Ackel, Christian Bartelt:
A Mapping Language for IoT Device Descriptions. 115-120 - Yuxuan Deng, Henry C. B. Chan:
Development of Mobile Intercloud Applications. 121-126 - Faisal Fahmi, Pei-Shu Huang, Feng-Jian Wang:
Improving the Detection of Sequential Anomalies Associated with a Loop. 127-134 - Lijuan Diao, Huaduo Wang, Sultan Alsarra, I-Ling Yen, Farokh B. Bastani:
A Smart Role Mapping Recommendation System. 135-140
IEESD: Industrial Experience in Embedded Systems Design
- Johannes Richter, Detlef Streitferdt:
Modern Architecture for Deep Learning-Based Automatic Optical Inspection. 141-145 - Yingjie Zhang, Yujie Gong, Daniel Morgan, Ying Zhang:
A Data-Driven Approach to Energy Cost Prediction Of Dwellings Based on Partitioned Parallel Modeling. 146-152 - Anton Urvantsev, Morgan E. Johansson, Nils Müllner, Tiberiu Seceleanu:
Experiencing Technology Independence. 153-158 - Tamer Omar, Olusegun Bamgbose, Ibrahim Naffaa, Omar Naffaa:
Embedded Control System for Decentralized Wastewater Treatment. 159-164 - Aida Causevic, Alessandro Vittorio Papadopoulos, Marjan Sirjani:
Towards a Framework for Safe and Secure Adaptive Collaborative Systems. 165-170 - Maxi Weichenhain, Wolfgang Fengler, Detlef Streitferdt:
How to Bring Project Management of Embedded Systems to an Appropriate Level of Abstraction for a Discrete Event Model. 171-176
DADA: Deep Analysis of Data Driven Applications
- Olumide Kayode, Ali Saman Tosun:
LiRUL: A Lightweight LSTM Based Model for Remaining Useful Life Estimation at the Edge. 177-182 - Neda Tavakoli:
Modeling Genome Data Using Bidirectional LSTM. 183-188 - Shihao Ge, Haruna Isah, Farhana H. Zulkernine, Shahzad Khan:
A Scalable Framework for Multilevel Streaming Data Analytics using Deep Learning. 189-194 - Joseph Coelho, Dawson D'almeida, Scott Coyne, Nathan Gilkerson, Katelyn Mills, Praveen Madiraju:
Social Media and Forecasting Stock Price Change. 195-200 - Shatha Jaradat, Nima Dokoohaki, Ummul Wara, Mallu Goswami, Kim Hammar, Mihhail Matskin:
TALS: A Framework for Text Analysis, Fine-Grained Annotation, Localisation and Semantic Segmentation. 201-206 - Hanxiang Du, Long Hoang Nguyen, Zhou Yang, Hashim Abu-gellban, Xingyu Zhou, Wanli Xing, Guofeng Cao, Fang Jin:
Twitter vs News: Concern Analysis of the 2018 California Wildfire Event. 207-212 - Yuta Shirasaki, Yuya Kobayashi, Mikio Aoyama:
A Speech Data-Driven Stakeholder Analysis Methodology Based on the Stakeholder Graph Models. 213-220 - Aerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Zimo Zhu, Mohammed Erfanul Hoque, Nalini Ravishanker:
Fuzzy Value-at-Risk Forecasts Using a Novel Data-Driven Neuro Volatility Predictive Model. 221-226 - Moitrayee Chatterjee, Akbar Siami Namin:
Detecting Phishing Websites through Deep Reinforcement Learning. 227-232 - Hamid Mansoor, Walter Gerych, Luke Buquicchio, Kavin Chandrasekaran, Emmanuel Agu, Elke A. Rundensteiner:
COMEX: Identifying Mislabeled Human Behavioral Context Data Using Visual Analytics. 233-238 - Tommy Dang, Ngan V. T. Nguyen:
SpacePhaser: Phase Space Embedding Visual Analytics. 239-244
CDS: Consumer Devices & Systems
- Tsutomu Terada, Masahiko Tsukamoto:
A Pen-Grip Shaped Device for Estimating Writing Pressure and Altitude. 245-250 - Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Communication Robot for Elderly Based on Robotic Process Automation. 251-256 - Kazuki Someya, Masashi Saito, Ryozo Kiyohara:
Estimation Method of Traffic Volume in Provincial City Using Big-Data. 257-262 - Thamer Horbylon Nascimento, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Marcos Alves Vieira, Juliana Paula Felix, Jaline Gonçalves Mombach, Livia Mancine Coelho De Campos, Wellington Galvão Rodrigues, Wesley F. de Miranda, Ronaldo Martins da Costa:
Using Smartwatches as an Interactive Movie Controller: A Case Study with the Bandersnatch Movie. 263-268
ESAS: E-Health Systems & Web Technologies
- Ling Tong, Jake Luo, Ron A. Cisler, Michael Cantor:
Machine Learning-Based Modeling of Big Clinical Trials Data for Adverse Outcome Prediction: A Case Study of Death Events. 269-274 - Komal Minhas, Munazza Tabassam, Rida Rasheed, Assad Abbas, Hasan Ali Khattak, Samee U. Khan:
A Framework for Dengue Surveillance and Data Collection in Pakistan. 275-280 - A. K. M. Jahangir Alam Majumder, Mohammed ElSaadany, Joshua Aaron Izaguirre, Donald R. Ucci:
A Real-Time Cardiac Monitoring using a Multisensory Smart IoT System. 281-287 - Daniel Scherer, José George Dias de Souza:
Educational app Proposal to Support Pregnant Women. 288-293 - Saad El Jaouhari, Patrick Hardy, Guillaume Pasquier, Pierrick Guitter, Eric Poiseau, Cédric Moubri-Tournes, Stéphane Leduc, Sebastien Vincendeau, Laurent Bourgeois, Bernard Gibaud, Emmanuel Cordonnier:
World First Retransmission of Medical Images in an Operating Room via DICOM-RTV: Technical Details. 294-299
OER: Open Educational Resources
- Bahtijar Vogel, Bo Peterson, Blerim Emruli:
Prototyping for Internet of Things with Web Technologies: A Case on Project-Based Learning using Scrum. 300-305 - Lotfi Ben Othmane, Monica Lamm:
Mindset for Software Architecture Students. 306-311 - Justin Wang, Dennis Brylow, Debbie Perouli:
Implementing Cybersecurity into the Wisconsin K-12 Classroom. 312-317 - Ahmed Alzaghoul, Edmundo Tovar:
An Approach for Developing a Conceptual Quality Model by Changing the Learner Behavior with OER. 318-323
STA: Software Test Automation
- Nasser Mustafa, Yvan Labiche, Dave Towey:
Mitigating Threats to Validity in Empirical Software Engineering: A Traceability Case Study. 324-329 - Juan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Liang Chen:
Short-Term Performance Metrics Forecasting for Virtual Machine to Support Anomaly Detection Using Hybrid ARIMA-WNN Model. 330-335 - Katerina Goseva-Popstojanova, Mohammad Jamil Ahmad, Yasser Ali Alshehri:
Software Fault Proneness Prediction with Group Lasso Regression: On Factors that Affect Classification Performance. 336-343 - Tugkan Tuglular, Sercan Sensülün:
SPL-AT Gherkin: A Gherkin Extension for Feature Oriented Testing of Software Product Lines. 344-349 - Sai Chaithra Allala, Juan P. Sotomayor, Dionny Santiago, Tariq M. King, Peter J. Clarke:
Towards Transforming User Requirements to Test Cases Using MDE and NLP. 350-355 - Juan P. Sotomayor, Sai Chaithra Allala, Patrick Alt, Justin Phillips, Tariq M. King, Peter J. Clarke:
Comparison of Runtime Testing Tools for Microservices. 356-361
MediComp: Medical Computing
- Wenai Song, Ying Cao, Zhiqiang Qiao, Qing Wang, Ji-Jiang Yang:
An Improved Semi-Supervised Learning Method on Cataract Fundus Image Classification. 362-367 - Changshaui Huo, Faheem Akhtar, Pengzhi Li:
A Novel Grading Method of Cataract Based on AWM. 368-373 - Weijing Wang, Chenkai Guo, Jing Xu, Ao Liu:
Bi-Dimensional Representation of Patients for Diagnosis Prediction. 374-379 - Siyuan Fang, Lixia Hu, Bin Du, Haoteng Zheng, Minhua Lu, Rui Mao:
Viscoelasticity Measurements of knee Muscles with Simulated Knee Osteoarthritis Treated by Novel Chinese Medicine: A Preliminary Study. 380-385 - Fitrat Hossain, Olawunmi George, Nadiyah Johnson, Praveen Madiraju, Mark Flower, Zeno Franco, Katinka Hooyer, Jose Lizarraga Mazaba, Lisa Rein, Sheikh Iqbal Ahamed:
Towards Clinical Decision Support for Veteran Mental Health Crisis Events using Tree Algorithm. 386-390 - Xin-Hong Jia, Wenai Song, Wei-Yan Li, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Semi-Automatic Construction Method of Chronic Obstructive Pulmonary Disease Knowledge Graph. 391-396 - Prosper Kandabongee Yeng, Bian Yang, Einar Snekkenes:
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices. 397-404 - Wei-liang Zhang, Qin-Yan Zhang, Ji-Jiang Yang, Qing Wang:
Multi-Scale Network with the Deeper and Wider Residual Block for MRI Motion Artifact Correction. 405-410 - Jing Gao, Huanqing Zhang, Ruifang Shen:
Classification of Pulmonary Nodules by using Improved Convolutional Neural Networks. 411-416 - Rehnuma Afrin, Hisham Haddad, Hossain Shahriar:
Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data. 417-422 - Bo Liu, Mengmeng Huang, Kelu Yao, Lan Wei, Xiaolu Fei, Qing Wang:
Prediction and Study of the Applicability of Medical Gels to Patients. 423-428 - Wei-Yan Li, Wenai Song, Xin-Hong Jia, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang:
Drug Specification Named Entity Recognition Base on BiLSTM-CRF Model. 429-433 - Chao Luo, Canghong Shi, Xian Zhang, Jing Peng, Xiaojie Li, Yucheng Chen:
AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI Segmentation. 434-439 - Lori Kim, Hossain Shahriar, Chi Zhang:
Non-Invasive Wi-Fi Sensors For Smart Healthcare. 440-445 - Prakhar Agrawal, Divya Bhargavi, Gokul Krishna G., Xiao Han, Neha Tevathia, Abbie M. Popa, Nicholas Ross, Diane Myung-kyung Woodbridge, Barbie Zimmerman-Bier, William Bosl:
A Scalable Automated Diagnostic Feature Extraction System for EEGs. 446-451 - Gracie Carter, Hossain Shahriar, Sweta Sneha:
Blockchain-Based Interoperable Electronic Health Record Sharing Framework. 452-457
NETSAP: Network Technologies for Security, Administration & Protection
- Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Towards Enhancement of Fault Traceability Among Multiple Hazard Analyses in Cyber-Physical Systems. 458-464 - Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto:
Automatic Whitelist Generation for SQL Queries Using Web Application Tests. 465-470 - Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe:
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. 471-476
WISH: Integrated Smart Healthcare
- Austin Gentry, William M. Mongan, Brent Lee, Owen C. Montgomery, Kapil R. Dandekar:
Activity Segmentation Using Wearable Sensors for DVT/PE Risk Detection. 477-483 - Aditi Sharma, Shivee Singh, Brian Wright, Alan Perry, Diane Myung-kyung Woodbridge, Abbie M. Popa:
Scalable Motor Movement Recognition from Electroencephalography using Machine Learning. 484-489 - Amit Kumar Saha, G. M. Tanimul Ahsan, Md. Osman Gani, Sheikh Iqbal Ahamed:
Personalized Pain Study Platform using Evidence-Based Continuous Learning Tool. 490-495 - Colin Willoughby, Ian Banatoski, Paul Roberts, Emmanuel Agu:
DrunkSelfie: Intoxication Detection from Smartphone Facial Images. 496-501
SAPSE: Security Aspects for Process & Services Engineering
- Ariel Rodríguez, Koji Okamura:
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining. 502-507 - Alfredo Cuzzocrea, Ernesto Damiani:
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms. 508-516
InfoFlow: Information Flow Oriented Approaches in Internet of Things and Cyber-Physical Systems
- Nuwan Jayawardene, Pumudu Fernando:
Hybrid Approach for Enabling Hierarchical Fog Networks in an IoT Deployment. 517-521 - Robison Cris Brito, Mainara Cristina Lorencena, José Felippe Loureiro, Fábio Favarim, Eduardo Todt:
A Comparative Approach on the use of Unmanned Aerial Vehicles kind of Fixed-Wing and Rotative Wing Applied to the Precision Agriculture Scenario. 522-526 - Kosuke Gotani, Hiroyuki Takahira, Misumi Hata, Luis Guillen, Satoru Izumi, Toru Abe:
OpenFlow Based Information Flow Control Considering Route Switching Cost. 527-530
MVDA: Workshop on Modeling and Verifying Distributed Applications
- Ryuichiro Maegawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki:
A Discrete Model of IEEE 1588-2008 Precision Time Protocol with Clock Servo using PI Controller. 531-536 - Robison Cris Brito, José Felippe Loureiro, André Guedes, Eduardo Todt:
Optimization System for Dynamic Flight Planning for Groups of Drones using Cooperation with Mobile Recharge Bases by Means of Multiagent System and Recursive Auctions. 537-542 - Kei Katayama, Hiroyuki Ohsaki:
Fluid-Based Modeling of Large-Scale IEEE 802.15.4 Wireless Sensor Networks. 543-548 - Salma Ayari, Yousra Bendaly Hlaoui, Leila Ben Ayed:
A Grammar Based Approach to BPMN Model Semantic Preservation using Refinement. 549-554 - Zhen-Tian Liu, Jing Liu:
Formal Verification of Blockchain Smart Contract Based on Colored Petri Net Models. 555-560 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Ben Ayed, Mayssa Bessifi:
From BPMN2 to Event B: A Specification and Verification Approach of Workflow Applications. 561-566
STPSA: Security, Trust & Privacy for Software Applications
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi:
STPSA 2019 Welcome Message. 567-568 - Lotfi Ben Othmane, Ameerah-Muhsina Jamil, Moataz AbdelKhalek:
Identification of the Impacts of Code Changes on the Security of Software. 569-574 - Sara Mccloskey, John Herbert:
User Behaviour-Based Access Control for Social Media with Qualitative Research and Bayesian Modelling. 575-579 - George O. M. Yee:
Designing Good Security Metrics. 580-585 - Seoksu Lee, Joon-Young Paik, Rize Jin, Eun-Sun Cho:
Toward Machine Learning Based Analyses on Compressed Firmware. 586-591 - Juan Wang, Karim Lounis, Mohammad Zulkernine:
Security Features for Proximity Verification. 592-597 - Shen Fu, Mathew L. Wymore, Ting-Wei Chang, Daji Qiao:
Continuous User Authentication Based on Context-Emphasized Behavior Profiling. 598-603 - Hossain Shahriar, Md Arabin Islam Talukder, Mohammad Ashiqur Rahman, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu:
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. 604-609
QUORS: Quality Oriented Reuse of Software
- Cody Baker, Lin Deng, Suranjan Chakraborty, Josh Dehlinger:
Automatic Multi-class Non-Functional Software Requirements Classification Using Neural Networks. 610-615 - Makoto Shiraishi, Hironori Washizaki, Yoshiaki Fukazawa, Joseph W. Yoder:
Mob Programming: A Systematic Literature Review. 616-621 - Ruiqiong Wu, Qing Duan, Fei Dai, Hongji Yang, Yi Zhang, Biseng Xie:
Research on the Realizability of Microservice Interaction Contract Based on CSP#. 622-627
DFM: Data Flow Models and Extreme-Scale Computing
- Sihan Zeng, Jose Manuel Monsalve Diaz, Siddhisanket Raskar:
Toward A High-Performance Emulation Platformfor Brain-Inspired Intelligent SystemsExploring Dataflow-Based Execution Model and Beyond. 628-633 - Gabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares, Junio Cesar de Lima, Hugo A. D. do Nascimento, Gustavo Teodoro Laureano, Ronaldo Martins da Costa, Júlio César Ferreira, Wellington Galvão Rodrigues:
A Disparity Computation Framework. 634-639 - Siddhisanket Raskar, Thomas Applencourt, Kalyan Kumaran, Guang Gao:
Position Paper: Extending Codelet Model for Dataflow Software Pipelining using Software-Hardware Co-Design. 640-645 - Christoph Kühbacher, Christian Mellwig, Florian Haas, Theo Ungerer:
A Functional Programming Model for Embedded Dataflow Applications. 646-651 - Alan Humphrey, Martin Berzins:
An Evaluation of An Asynchronous Task Based Dataflow Approach For Uintah. 652-657
BDCAA: The 1st IEEE International Workshop on Big Data Computation, Analysis, and Applications
- George O. Strawn:
Open Science, Business Analytics, and FAIR Digital Objects. 658-663 - Makoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi:
Job-Aware Optimization of File Placement in Hadoop. 664-669 - Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller:
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process. 670-675
SDIM: Secure Digital Identity Management
- Yong Jin, Masahiko Tomoishi:
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. 676-681 - Hiroyuki Sato, Sridhar Nikita:
An Interactive and Continuous Authorization Scheme by using Belnap Logic. 682-687 - Jacob Hendricks, Brandon Burke, Thoshitha T. Gamage:
Polysizemic Encryption: Towards a Variable-Length Output Symmetric-Key Cryptosystem. 688-693 - Gen Li, Hiroyuki Sato:
A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain. 694-699
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.