default search action
46th COMPSAC 2022: Los Alamitos, CA, USA
- Hong Va Leong, Sahra Sedigh Sarvestani, Yuuichi Teranishi, Alfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey, Ji-Jiang Yang, Hossain Shahriar:
46th IEEE Annual Computers, Software, and Applications Conferenc, COMPSAC 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-8810-5 - Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the Standing Committee Vice Chairs. xl - Hong Va Leong, Sahra Sedigh Sarvestani, Yuuichi Teranishi:
Message from the 2022 Program Chairs-in-Chief. xl - Sorel Reisman:
Welcome - from Sorel Reisman COMPSAC Standing Committee Chair. xl - Yiwei Fang, Guan Wang, Ruilin Zeng, Xiaoyu Wang, Hai-Bao Chen:
Automatic Monitoring System for Engines Motion Attitude Based on Video Image Detection. 1-7 - Alfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey, Ji-Jiang Yang:
IEEE COMPSAC 2022 Co-Located Workshops Summary. 1-3 - Lili Xiao, Huibiao Zhu, Mengda He, Shengchao Qin:
Algebraic Semantics for C++11 Memory Model. 1-6 - Wook-Sung Yoo, Hwapyeong Song, Hyunduck Kim:
Collaborative Research on Rapid Periodontitis Test. 1-2 - Xiao Li, Xiao Chen, Dongfei Wang, Zhijun Guo, Kun Niu:
Deep Speaker Embedding with Multi-Part Information Aggregation in Frequency-Time Domain for ASV. 8-13 - Yuki Miyashita, Tomoki Yamauchi, Toshiharu Sugawara:
Distributed and Asynchronous Planning and Execution for Multi-agent Systems through Short-Sighted Conflict Resolution. 14-23 - Ji-Il Park, Minseong Choi, Seungho Han, YeongSeok Lee, Jinwoo Cho, Hyoseo Choi, Minsu Cho, Minyoung Lee, Kyung-Soo Kim:
Development of ROS-based Small Unmanned Platform for Acquiring Autonomous Driving Dataset in Various Places and Weather Conditions. 24-31 - Gusseppe Bravo Rocca, Peini Liu, Jordi Guitart, Ajay Dholakia, David Ellison, Miroslav Hodak:
Human-in-the-loop online multi-agent approach to increase trustworthiness in ML models through trust scores and data augmentation. 32-37 - Yu Wang, Fang Liu:
Efficient Reinforcement Learning from Demonstration Using Local Ensemble and Reparameterization with Split and Merge of Expert Policies. 38-47 - Carlo Vitucci, Daniel Sundmark, Marcus Jägemar, Jakob Danielsson, Alf Larsson, Thomas Nolte:
A Reliability-oriented Faults Taxonomy and a Recovery-oriented Methodological Approach for Systems Resilience. 48-55 - Yintan Ai, Yajun Cui, Zhenyu Liu, Xiaomin Zhang, Hua Li, Xianrong Wang:
Integrated Construction of Service Function Chain and Business System Based on Colored Petri Net. 56-61 - Francesco Terrosi, Andrea Ceccarelli, Andrea Bondavalli:
Failure modes and failure mitigation in GPGPUs: a reference model and its application. 62-72 - Holland Schutte, Chase Phelps, Aniruddha Marathe, Tanzima Z. Islam:
LIBNVCD: An Extendable and User-friendly Multi-GPU Performance Measurement Tool. 73-82 - Rim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Ahmed Ben Ali, Philippe Genestier:
Towards Model checking approach for Smart contract validation in the EIP-1559 Ethereum. 83-88 - Gabriele Capannini, Jan Carlson, Roger Mellander:
Reliable Visibility Algorithms for Emergency Stop Systems in Smart Industries. 89-94 - Nektarios Moumoutzis, Marios Christoulakis, Chara Xanthaki, Yiannis Maragkoudakis, Stavros Christodoulakis, Desislava Paneva-Marinova, Lilia Pavlova:
eShadow+: Mixed Reality Storytelling Inspired by Traditional Shadow Theatre. 95-100 - Jannatul Ferdause Tumpa, Riddhiman Adib, Dipranjan Das, Nathalie Abenoza, Andrew Zolot, Velinka Medic, Judy Kim, Jay Romant, Sheikh Iqbal Ahamed:
mTOCS: Mobile Teleophthalmology in Community Settings to improve Eye-health in Diabetic Population. 100-109 - Nearchos Paspallis, Nicos Kasenides, Andriani Piki:
A Software Architecture for Developing Distributed Games that Teach Coding and Algorithmic Thinking. 101-110 - Kang Yi, Siyu Yan, Lei Liu, Jingwen Zhu, Weiyun Liang, Jing Xu:
CCSS: An Effective Object Detection System for Classroom Crowd Statistics. 111-116 - Weifeng Xu, Lin Deng, Dianxiang Xu:
Towards Designing Shared Digital Forensics Instructional Materials. 117-122 - Rui Zhao, Harvey P. Siy, Chulwoo Pack, Leen-Kiat Soh, Myoungkyu Song:
An Intelligent Tutoring System for API Misuse Correction by Instant Quality Feedback. 123-128 - Lorenzo Canale, Laura Farinetti:
SQL Murder Mystery: a serious game to learn querying databases. 129-138 - Marina Marchisio, Fabio Roman, Matteo Sacchet, Enrico Spinello:
Teachers' perception of higher education in a transition scenario. 139-144 - Henry C. B. Chan, Yi Dou, Yue Jiang, Ping Li:
A 4C Model for Hyflex Classrooms. 145-150 - João Almeida, Vasco Amaral:
Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projects. 151-160 - Miguel Appleton Fernandes, Vasco Amaral:
A Simulation Framework for UML Education. 161-166 - Elisa Corino, Cecilia Fissore, Marina Marchisio:
Data Driven Learning activities within a Digital Learning Environment to study the specialized language of Mathematics. 167-176 - Alexander Schieweck, Rachel Murphy, Rafflesia Khan, Ciara Breathnach, Tiziana Margaria:
Evolution of the Historian Data Entry Application: Supporting Transcribathons in the Digital Humanities through MDD. 177-186 - Akshay Kumar Dileep, Ajay Bansal, James Cunningham:
Early Detection of At-Risk Students in a Calculus Course. 187-194 - Xin Xu, Nan Wang, Hu Jin, Yang Liu, Kun Li:
NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified Hawkes. 195-200 - Yorick Spenrath, Marwan Hassani, Boudewijn F. van Dongen:
BitBooster: Effective Approximation of Distance Metrics via Binary Operations. 201-210 - Le You, Han Jiang, Jinyong Hu, Chorng Hwa Chang, Lingxi Chen, Xintong Cui, Mengyang Zhao:
GPU-accelerated Faster Mean Shift with euclidean distance metrics. 211-216 - Panagiotis Monachelis, Panagiotis Kasnesis, Lazaros Toumanidis, Charalampos Z. Patrikakis, Pericles Papadopoulos:
Evaluation and Visualization of Trustworthiness in Social Media - EUNOMIA's approach. 217-222 - Yangyang Wang, Liping Hua, Hui Zhao, Lingfeng Yang:
Unsupervised Markdown Feature-Aware Keywords Extraction Towards Technology Blogs. 223-228 - Zhenjie Shao, Ying Qian, Liang Dou:
TBPM-DDIE: Transformer Based Pretrained Method for predicting Drug-Drug Interactions Events. 229-234 - Rahul Anilkumar, Benjamin Melone, Michael Patsula, Christophe Tran, Christopher Wang, Kevin Dick, Hoda Khalil, Gabriel A. Wainer:
Canadian Jobs amid a Pandemic: Examining the Relationship between Professional Industry and Salary to Regional Key Performance Indicators. 235-240 - Laura Colley, Andrew Dybka, Adam Gauthier, Jacob Laboissonniere, Alexandre Mougeot, Nayeeb Mowla, Kevin Dick, Hoda Khalil, Gabriel A. Wainer:
Elucidation of the Relationship Between a Song's Spotify Descriptive Metrics and its Popularity on Various Platforms. 241-249 - You Liang, Aerambamoorthy Thavaneswaran:
Long Term Interval Forecasts of Demand using Data-Driven Dynamic Regression Models. 250-259 - Dong Li, Yingying Xiao, Zhuanming Gao, Ningsi Li:
Graph Embedding Based on Feature Propagation for Community Detection. 260-265 - Dominik Raab, Eric Fezer, Johannes Breitenbach, Hermann Baumgartl, Daniel Sauter, Ricardo Buettner:
A Deep Learning-Based Model for Automated Quality Control in the Pharmaceutical Industry. 266-271 - Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng:
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*. 272-279 - Zhenyu Zhang, Junjie Zhu, Ryan Hildebrant, Nalini Venkatasubramanian, Shangping Ren:
Using Domain Knowledge to Assist Process Scenario Discoveries. 280-288 - Etienne Gael Tajeuna, Mohamed Bouguessa, Shengrui Wang:
A Longitudinal Study of Customer Electricity Load Profiles. 289-294 - Rongbo Chen, Kunpeng Xu, Jean-Marc Patenaude, Shengrui Wang:
Dynamic Cross-sectional Regime Identification for Financial Market Prediction. 295-300 - Fatima Zahra Errounda, Yan Liu:
A Mobility Forecasting Framework with Vertical Federated Learning. 301-310 - Yinan Li, Fang Liu:
Adaptive Noisy Data Augmentation for Regularized Estimation and Inference of Generalized Linear Models. 311-320 - Zishan Qin, Yimin Wu, Jiayan Pei, Jinwei Lu, Shizhao Huang, Liqun Liu:
Related Questions Retrieval Model in Stack Overflow based on Semantic Matching. 321-326 - Jiachen Ma, Lin He, Sheikh Iqbal Ahamed, Piyush Saxena:
An Autonomous Data Collection Pipeline for Online Time-Sync Comments. 327-336 - Ling Tong, Jake Luo, Jazzmyne Adams, Kristen Osinski, Xiaoyu Liu, David Friedland:
A Clustering-Aided Approach for Diagnosis Prediction: A Case Study of Elderly Fall. 337-342 - Junwei Lv, Xuegang Hu:
A Baseline for Early Classification of Time Series in An Open World. 343-351 - Jinjiang Li, Xianyu Zhu, Runchang Jia, Bin Liu, Cong Yu:
Apple-YOLO: A Novel Mobile Terminal Detector Based on YOLOv5 for Early Apple Leaf Diseases. 352-361 - Zicheng Wang, Bo Cui, Wenhan Hou:
A Dynamic Load Balancing Scheme Based on Network Sharding in Private Ethereum Blockchain. 362-367 - Mingyi Liu, Zhongjie Wang, Tianyu Jiang, Xiaofei Xu, Quan Z. Sheng, Stephan Reiff-Marganiec:
External Service Sensing in an Uncertain World. 368-373 - Hangli Ge, Lifeng Lin, Renhe Jiang, Takashi Michikata, Noboru Koshizuka:
Multi-weighted Graphs Learning for Passenger Count Prediction on Railway Network. 374-382 - Zekun Li, Baolong Guo, Chao Wang, Mengyan Guo:
A Fourier Descriptor for Bone Point Segmentation using inner distance in remote sensing images. 383-387 - Stefano Tata, Luca Cagliero:
A scalable approach to detect Contrasting Consecutive Patterns in time series data. 388-394 - Cristian Turetta, Florenc Demrozi, Graziano Pravadelli:
A freely available system for human activity recognition based on a low-cost body area network. 395-400 - Liming Xu, Dave Towey, Andrew P. French, Steve Benford:
Connecting Everyday Objects with the Metaverse: A Unified Recognition Framework. 401-406 - Nivedha Rajaram:
Online Identity Theft Index Scorer and Recommendation Service. 407-408 - Liang Ye, Shun Ding, Chenyun Liu, Wenhao Zhu:
Network Traffic Prediction Based on Double-Synchronized Periodic LSTM. 409-410 - Allison Hsu, Ying-Feng Hsu:
Computer Education of the Primary Years Programme Exhibition at International Baccalaureate Schools During the COVID-19 Pandemic. 411-412 - Mehmet Aktas, Tolga Ovatman:
UML Statechart Anti-Patterns. 413-414 - Irene Benedetto, Lorenzo Canale, Laura Farinetti, Luca Cagliero, Moreno La Quatra:
Leveraging summarization techniques in educational technology systems. 415-416 - Dipannoy Das Gupta, Pranta Biswas, Mahmuda Naznin:
CacheQueue: Efficient Cache Queue Usage in a NDN. 417-418 - Ahmad Rajeh Saifan, Nabeel Al-Yateem, Jacqueline Maria Dias, Fatma Refaat Ahmed, Muhammad Arsyad Subu, Syed Azizur Rahman, Amina Al-Marzouqi, Sheikh Iqbal Ahamed:
Technology as a Distracter for Providing Humanistic Care in Technology Dependent Care Units. 421-423 - Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. 424-425 - Eriko Segawa, Yusuke Sakumoto:
Preliminary Study for the Impact of Small Eigenvalues on Laplacian Anomaly Detection of Dynamic Networks. 426-427 - Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. 428-429 - Nanami Tsuji, Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki:
Spectral Formula for the Expected First Meeting Time of Diverse Random Walks on a Graph. 430-431 - Sandeep Reddivari:
An Agile Framework for Security Requirements: A Preliminary Investigation. 432-433 - Joseph Allen, Sandeep Reddivari:
Efficient Parallel Wikipedia Internal Link Extraction for NLP-Assisted Requirements Understanding. 434-435 - Sandeep Reddivari, Ahmed Moussa:
ReNego: A Requirements Negotiation Tool based on Voting of Social Choice Theory. 436-437 - Sandeep Reddivari, Jeffery Wolbert:
Calculating Requirements Similarity Using Word Embeddings. 438-439 - Prerit Datta, Moitrayee Chatterjee:
Finding Your Feet In Cybersecurity: A Reddit Text Mining Approach. 440-441 - Md. Jobair Hossain Faruk, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. 442-443 - Md. Jobair Hossain Faruk, Arleen Joy Patinga, Lorna Migiro, Hossain Shahriar, Sweta Sneha:
Leveraging Healthcare API to transform Interoperability: API Security and Privacy. 444-445 - Hironori Washizaki:
Software Engineering in Digital Transformation and Diversity: Preliminary Literature Review. 446-447 - Seungoh Han, Ah-Young Nho, Wei Teng Kwan, Benjamin Paglia, Jacob Visniski, Minji Lee, Eric T. Matson, Minsun Lee:
EHDNet: Enhanced Human Detection Network for Search and Rescue. 448-449 - Jagan Mohan Reddy, Muthukumaran K, Hossain Shahriar, Victor Clincy, Nazmus Sakib:
Comprehensive Feature Extraction for Cross-Project Software Defect Prediction. 450-451 - Md Abdullah Al Hafiz Khan, Hossain Shahriar:
MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises. 452-453 - Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. 454-455 - Jamalia Sultana, Mahmuda Naznin:
Breaking the Barrier with a Multi-Domain SER. 456-461 - Blake Gaines, Ethan Mann, Swapna S. Gokhale:
An Analysis of the Early Dialogue on Vaccine Passports on Twitter. 462-467 - Jean Marie Tshimula, Sharmistha Gray, Belkacem Chikhaoui, Shengrui Wang:
Emotion Detection in Law Enforcement Interviews. 468-475 - Yuqian Zhuang, Liang Wang, Zhiwen Zheng, Hao Hu, Haijun Wu, Xianping Tao:
Towards Emotion-awareness in Programming Education with Behavior-based Emotion Estimation. 476-485 - Maria Helena Franciscatto, Marcos Didonet Del Fabro, Celio Trois, Luis Carlos Erpen De Bona, Jordi Cabot, Leon Augusto Okida Gonçalves:
Talk to Your Data: a Chatbot System for Multidimensional Datasets. 486-495 - Tristin Cory, Razib Iqbal:
Multi-Scale Speaker Vectors for Zero-Shot Speech Synthesis. 496-501 - Masud Rabbani, Kazi Shafiul Alam, Lin He, Shiyu Tian, Mohammad Syam, Iysa Iqbal, Anushka Kolli, Hansika Kolli, Syeda Shefa, Bipasha Sobhani, Paramita Basak Upama, Sheikh Iqbal Ahamed:
Towards a Survey on Universal Human Vital Signs with prototype for Detection and Record Electronically Acceptable Medical-data (dDream). 502-511 - Masud Rabbani, Shiyu Tian, Adib Ahmed Anik, Jake Luo, Min Sook Park, Jeff Whittle, Sheikh Iqbal Ahamed, Hyunkyoung Oh:
Towards Developing a Voice-activated Self-monitoring Application (VoiS) for Adults with Diabetes and Hypertension. 512-519 - Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. 520-529 - Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? 530-538 - Dafina Jeaca, Nicu-Cosmin Ursache, Andrei Panu:
Towards a Commercial Pipeline for Field Crop Identification. 539-544 - Ricardo Buettner, Johannes Breitenbach, Kai Wannenwetsch, Isabel Ostermann, Rene Priel:
A Systematic Literature Review of Virtual and Augmented Reality Applications for Maintenance in Manufacturing. 545-552 - César Batista, Bruno Proença, Everton Cavalcante, Thaís Batista, Felipe de Morais, Henrique Medeiros:
Towards a Multi-Tenant Microservice Architecture: An Industrial Experience. 553-562 - Kyosuke Yamate, Masanari Kondo, Yutaro Kashiwa, Yasutaka Kamei, Naoyasu Ubayashi:
Hey APR! Integrate Our Fault Localization Skill: Toward Better Automated Program Repair. 563-568 - Tsukasa Nakamura, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi:
Evaluating Automated Program Repair Techniques using Introductory Programming Course Datasets. 569-574 - Chaoming Liu, Wenhao Zhu, Xiaoyu Zhang, Qiuhong Zhai:
Exploiting Syntactic Information to Boost the Fine-tuning of Pre-trained Models. 575-582 - Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota:
Identification of an IoT Device Model in the Home Domain Using IPFIX Records. 583-592 - Mengxi Zhou, Rajiv Ramnath:
A Structure-Focused Deep Learning Approach for Table Recognition from Document Images. 593-601 - Junfan Jin, Junxiang Chen, Jilin Zhang, Tao Li, Ruixiang Qian, Feng Liu, Li Zhou, Yongjian Ren:
Web table data integration based on smart campus scenarios to resolve name disambiguation of scientific research personnel. 602-607 - Natsumi Matsui, Ayumi Ohnishi, Tsutomu Terada, Masahiko Tsukamoto:
Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in AR. 608-613 - Elliott Wen, Jiaxing Shen:
DSPBooster: Offloading Unmodified Mobile Applications to DSPs for Power-performance Optimal Execution. 614-623 - Ajay Kattepur, Sushanth David:
Madelyn: Multi-Domain Multi-Agent Reinforcement Learning for Data-center Networks. 624-629 - Kuan-Wei Lu, Pangfeng Liu, Ding-Yong Hong, Jan-Jan Wu:
Efficient Dual Batch Size Deep Learning for Distributed Parameter Server Systems. 630-639 - Zhanguo Liu, Gang Xu, Ruijie Hang, Yuan Cheng, Baoqi Huang, Xiangyu Bai:
A Routing Algorithm based on Social Closeness and Spatio-Temporal Interaction Degree. 640-647 - Koki Makida, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi, Shinji Shimojo:
A Tree Construction Method for Distributed Video Collection and Composition on the Same World Broadcasting System. 648-657 - Soma Yamamoto, Ryo Nakamura, Hiroyuki Ohsaki:
Implementation and Evaluation of Flow-level Network Simulator for Large-scale ICN Networks. 658-663 - Zhengxin Li, Sikai Tao, Ruixun Zhang, Hongpeng Wang:
GSDNet: An Anti-interference Cochlea Segmentation Model Based on GAN. 664-669 - Xiali Li, Yandong Chen, Licheng Wu:
QSAR for anti-ERα compounds using sparrow search algorithm optimized BP neural network. 670-675 - Giovanni Mezzina, Daniela De Venuto:
Automatic Accuracy versus Complexity Characterization for Embedded Emotion-Sensing Platforms in Healthcare Applications. 676-683