


default search action
40th SAC 2025: Catania, Italy
- Jiman Hong, Sebastiano Battiato, Christian Esposito, Juw Won Park, Adam Przybylek:

Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, SAC 2025, Catania International Airport, Catania, Italy, 31 March 2025 - 4 April 2025. ACM 2025, ISBN 979-8-4007-0629-5
Theme: Information Systems: ADT - Accessible Devices and Technologies Track
- Lucie Pantera

, Thomas Hebert
, Ayoub Ben Dhiab
, Charles Hudin
, Sabrina A. Panëels
:
Feel the Wave: Using Waveguides as a Tactile Communication Interface for Deafblind People. 3-10 - Marija Nenadic

, Claudio Enrico Palazzi
, Andrea Zanella
:
Road Accessibility Mapping through Smartphone-Based Sensing. 11-18 - Jayr Pereira

, Francisco Rodrigues
, Jaylton Alencar Pereira, Cleber Zanchettin
, Robson N. Fidalgo
:
Enhancing Brazilian Portuguese Augmentative and Alternative Communication with Card Prediction and Colourful Semantics. 19-26 - Barry Bassi

, Giovanni Delnevo
, Mirko Franco
, Ombretta Gaggi
, Salvatore Gatto
, Silvia Mirri
, Kelvin Olaiya
:
Supporting Accessibility Auditing and HTML Validation using Large Language Models. 27-31
Theme: Artificial Intelligence and Agents: AIED - Artificial Intelligence for Education Track
- Bianca Raimondi

, Saverio Giallorenzo
, Maurizio Gabbrielli
:
Affordably Fine-tuned LLMs Provide Better Answers to Course-specific MCQs. 32-39 - Elisabetta Mazzullo

, Okan Bulut
, Cole Walsh
, Gill Sitarenios
, Alexander MacIntosh
:
Fine-Tuning GPT-3.5-Turbo for Automatic Feedback Generation. 40-47 - Sebastian Speiser

:
Assessing the Real-World Impact of Disagreement Between Human Graders and LLMs. 48-53 - Ville Heilala

, Roberto Araya
, Raija Hämäläinen
:
Beyond Text-to-Text: An Overview of Multimodal and Generative Artificial Intelligence for Education Using Topic Modeling. 54-63 - Sukrit Leelaluk

, Cheng Tang
, Valdemar Svábenský
, Atsushi Shimada
:
Knowledge Distillation in RNN-Attention Models for Early Prediction of Student Performance. 64-73 - Mika Setälä

, Ville Heilala
, Pieta Sikström
, Tommi Kärkkäinen
:
The Use of Generative Artificial Intelligence for Upper Secondary Mathematics Education Through the Lens of Technology Acceptance. 74-82 - Seokho Ahn

, Junhyung Park
, Ganghee Go
, Chulhui Kim
, Jiho Jung
, Myung Sun Shin
, Do-Guk Kim
, Young-Duk Seo
:
UKTA: Unified Korean Text Analyzer. 83-92 - Kaja Toomla

, Xiaojing Weng
, Eve Kikas
, Elina Malleus-Kotsegarov
, Kati Aus
, Roger Azevedo
, Danial Hooshyar
:
Measuring (meta)emotion, (meta)motivation, and (meta)cognition using digital trace data: A systematic review of K-12 self-regulated learning. 91-100 - Sachini Gunasekara

, Mirka Saarela
:
Quantitative Assessment of Explainability in Machine Learning Models : A Study on the OULA Dataset. 101-103 - Sine Zambach

:
AI-Enhanced Learning: Comparing Outcomes in Introductory and Advanced Programming Courses. 104-105 - Shira Michel

:
Generative AI in Rural High Schools: Challenges and Opportunities. 106-108 - Erica Raina

:
Student Research Abstract: A CSP-based approach to the generation of case studies for clinical guidelines. 109-113
Theme: Artificial Intelligence and Agents: AIFD - Artificial Intelligence for Financial Domain Track
- Vittorio Prodomo

, Roberto Gonzalez
, Marco Gramaglia
, Simon Pietro Romano
:
Privacy-Preserving Data Obfuscation for Credit Scoring. 114-121 - Yanqing Ma

, Carmine Ventre
, Renzo Tiranti
, Aiming Chen
:
Deep Generative Calibration on Stochastic Volatility Models with Applications in FX Barrier Options. 122-130 - Filippo Pallucchini

, Xulang Zhang
, Rui Mao
, Erik Cambria
:
Self-explanatory and Retrieval-augmented LLMs for Financial Sentiment Analysis. 131-137 - Cristina Herruzo-Lodeiro

, Francesc Rodríguez-Díaz
, Alicia Troncoso
, María Martínez-Ballesteros
:
Bioinspired evolutionary metaheuristic based on COVID spread for discovering numerical association rules. 138-144 - Felipe Cunha

, Mirko Perkusich
, Danyllo Albuquerque
, Kyller Costa Gorgônio
, Hyggo Oliveira de Almeida
, Angelo Perkusich
:
A Genetic Algorithm with Convex Combination Crossover for Software Team Formation: Integrating Technical and Collaboration Skills. 146-153 - Goshgar Can Ismayilov

:
[email protected]: Evolutionary Computation Meets Programmable Cryptography on Blockchain. 154-156 - Juan Julián Merelo

, Mario García Valdez
, Gustavo Romero López
:
Energy consumption of evolutionary algorithms implemented in low-level languages. 157-160
Theme: Artificial Intelligence and Agents: BINF - Bioinformatics Track
- Eleni Giovanoudi

, Dimitrios Rafailidis
:
RepAs: Iterative Refinement for Predicting Polyadenylation Site Usage. 161-168 - Jesús S. Aguilar-Ruiz

, Raúl Giráldez
, Roberto Ruiz
:
Tree-based biclustering of genomic time series. 169-175 - Piyush Borole

, Ajitha Rajan
:
MHCRule - Rule-based Model for Interpretable MHC Class I Binding Prediction. 176-185 - Shahzad Ali

, Muhammad Salman Khan
, Yu Rim Lee
, Soo Young Park
, Won Young Tak
, Soon Ki Jung
:
Efficient Medical Image Segmentation Using Probabilistic KNN Label Downsampling. 186-193 - Sara Khademioureh

, Irina Dinu
, Sergio Peignier
:
GSHAPA: Gene Set Analysis for Single-Cell RNAseq Using Random Forest and SHAP Values. 194-200
Theme: Distributed Systems: CC - Cloud Computing Track
- Taeshin Kang

, Heonchang Yu
:
Elastic Vertical Memory Management for Container-based Stateful Applications in Kubernetes. 201-208 - Armel Jeatsa

, Boris Teabe
:
CADiA: A CPU Cache Allocation System for Distributed Parallel Applications. 209-216 - Niila Siilasjoki

, Mikko Raatikainen
, Jukka K. Nurminen
:
A Design Framework for Cloud-HPC Integration in MLOps. 217-224 - Anderson Andrei Da Silva

, Yiannis Georgiou
, Michael Mercier
, Grégory Mounié
, Denis Trystram
:
FOA-Energy: A Multi-objective Energy-Aware Scheduling Policy for Serverless-based Edge-Cloud Continuum. 225-232 - Tomoyuki Ehira

, Daisuke Kotani
, Yasuo Okabe
:
Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane. 233-240 - Joonho Seo

, Jinmyeong Shin
, Geon-Woo Yoon
, Jae-Seok Kim
, Yoon-Ho Choi
:
Automated Cybersecurity Risk Assessment and Visualization Framework for Resilient Cloud IT Asset Management. 241-242 - Catherine Alessandra Torres Charles

, Dante D. Sánchez-Gallegos
, Diana Carrizales-Espinoza
, Jesús Carretero
, José Luis González Compeán
:
Xook-Flow: an abstract communication channel model for the data exchange in computing continuum. 243-244
Theme: System Software and Security: CPS - Cyber-Physical Systems Track
- Michael P. Heinl

, Adrian Reuter
, Sebastian N. Peters
, Markus Bever
:
Leveraging BRSKI to Protect the Hardware Supply Chain of Operational Technology: Opportunities and Challenges. 245-254 - Chen-Jui Tu

, Chun-Yi Kuo
, Shuo-Han Chen
:
Harnessing Sub-blocks Erase of NAND flash for Secure Deletion Performance Enhancement on CPS. 255-262 - Aitian Ma

, Mo Sha
:
WMN-CDA: Contrastive Domain Adaptation for Wireless Mesh Network Configuration. 263-270 - Irma Rrushi

, John Olijnyk
, Kawthar Badran
, Julian L. Rrushi
:
Relay Memory Analysis via Constraint Satisfaction Modeling for Malware Detection in the Electrical Power Grid. 271-278 - Hu Wan

, Yun Huang
, Shuhan Bai
, Xuan Sun
, Tei-Wei Kuo
, Chun Jason Xue
:
Rabbitail: A Tail Latency-Aware Scheduler for Deep Learning Recommendation Systems with Hierarchical Embedding Storage. 279-287 - Jae-Seok Kim

, Joonho Seo
, Minho Jang
, Yoon-Ho Choi
:
A2SC: Adaptive Speed and Sensorless Control System for Motor Controllers based on Deep-RL. 288-291
Theme: Distributed Systems: DADS - Dependable, Adaptive, and Secure Distributed Systems Track
- Matheus Alves Almeida

, Nelson Souto Rosa
:
Exploiting Fuzzy Controllers for Adapting Messaging Systems. 292-299 - Rui Braga

, José Pereira
, Fábio Coelho
:
Towards Adaptive Transactional Consistency for Georeplicated Datastores. 300-307 - Lorenzo Capra

:
Modelling Dependable Systems with Modular Rewritable Stochastic Petri Nets. 308-315 - Narges Mehran

, Zahra Najafabadi Samani
, Samira Afzal
, Radu Prodan
, Frank Pallas
, Peter Dorfinger
:
PreMatch: A Prediction-based Scheduler for Dataflow Asynchronous Processing on the Computing Continuum. 316-324 - Matteo Mordacchini

, Emanuele Carlini
, Patrizio Dazzi
:
A Decentralized Strategy for Unweighted Minimum Vertex Cover. 325-328
Theme: Distributed Systems: DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies Track
- Luca Olivieri

, Luca Negrini
, Vincenzo Arceri
, Pietro Ferrara
, Agostino Cortesi
:
Detection of Read-Write Issues in Hyperledger Fabric Smart Contracts. 329-337 - Luca Olivieri

, Luca Negrini
, Vincenzo Arceri
, Pietro Ferrara
, Agostino Cortesi
, Fausto Spoto
:
Static Detection of Untrusted Cross-Contract Invocations in Go Smart Contracts. 338-347 - Avik Banerjee

, Michael Sober
, Stefan Schulte
:
Towards Solidity Smart Contract Efficiency Optimization through Code Mining. 348-357 - Thanos Drossos

, Daniel Kirste
, Niclas Kannengießer
, Ali Sunyaev
:
Automated Market Makers: Toward More Profitable Liquidity Provisioning Strategies. 358-365 - Sanghyeon Park

, Jeonghyuk Lee
, Seunghwa Lee
, Jung Hyun Chun
, Hyeonmyeong Cho
, Mingi Kim
, Hyun Ki Cho
, Soo-Mook Moon
:
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. 366-374 - Martina Soleti

, Ankit Gangwal
, Mauro Conti
:
Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints. 376-385 - Jan Gorzny

:
Decentralized Finance Withdrawal Delays. 386-388 - Stefano Bistarelli

, Chiara Luchini
, Francesco Santini
:
Controlling VC disclosure with Terms of Use and ABAC in SSI. 389-390 - Francisco Cordoba Otalora

:
Student Research Abstract: Subculture-Driven Speculation: Meme pump dot fun metric on the Solana Blockchain. 391-395
Theme: Information Systems: DBDM - Databases and Big Data Management Track
- Jongsung Lee

, Sam Son
, Jonghyun Bae
, Yunho Jin
, Tae Jun Ham
, Jae W. Lee
:
SkipLSM: Fast Retrieval of Hot Key-Value Pairs on LSM Tree. 396-405 - Luna Wang

, Shuaihua Zhao
, Song Jiang
:
MAPLe: A B+-tree with Multi-Access Parallel Leaves to Improve Access Concurrency and Locality. 406-414 - Jiwon Son

, Dong-Hyuk Seo
, Junho Song
, Kyungsik Han
, Namhyuk Kim
, Sang-Wook Kim
:
A Novel Traffic Flow Prediction Model based on a Direct Spatio-Temporal Graph. 415-424 - Alexandros Spitalas

, Georgios Tsolas
, Kostas Tsichlas
:
Partition Strategies for Vertex-Centric Historical Graph Systems. 425-431 - Konstantinos Christopoulos, Evaggelos Daskalakis, Agorakis Bompotas, Konstantinos Tsichlas:

Triangle Counting in Large Historical Graphs. 432-439
Theme: Information Systems: DS - Data Streams Track
- Nilesh Verma

, Albert Bifet
, Bernhard Pfahringer
, Maroua Bahri
:
ASML-REG: Automated Machine Learning for Data Stream Regression. 440-447 - Aldo Marcelo Paim

, João Gama, Bruno Veloso
, Fabrício Enembreck
, Rita P. Ribeiro
:
Efficient Instance Selection in Tree-Based Models for Data Streams Classification. 448-455 - Rania Taleb

, Sylvain Hallé
, Roger Villemaire
, Sébastien Gaboury
, Hubert Kenfack Ngankam
:
Sanity Checks in Smart Home Sensor Streams. 456-464 - Ruirui Zhao

, Jianbin Sun
, João Gama, Jiang Jiang
:
Online Learning from Capricious Data streams with Flexible Hoeffding Tree. 465-469
Theme: Information Systems: DSTDS - Data Spaces and Trusted Data Sharing Track
- Jan Pennekamp

, Joseph Leisten
, Paul Weiler
, Markus Dahlmanns
, Marcel Fey
, Christian Brecher
, Sandra Geisler
, Klaus Wehrle
:
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps. 470-479 - Alessandro Palma

, Nikolaos Papadakis
, Georgios Bouloukakis
, Joaquín García-Alfaro
, Mattia Sospetti
, Kostas Magoutis
:
SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack Graphs. 480-489 - Anastasiia Belova

, Artem Revenko
, Viola Gallina
, Daniel Bachlechner
, Sulayman K. Sowe
:
Bringing the Digital Product Passport to Life: Requirements Analysis for a Carbon Footprint Tracking System using Knowledge Graphs and Data Spaces. 490-497 - An Ngoc Lam

, Phu Hong Nguyen
, Xiang Ma
:
Context-driven Edge-based Data Sharing for Industrial IoT Data Spaces. 498-505 - Kevin Röbert

, Dominik Kaaser
, Mathias Fischer
:
Unlinkable Data Sharing with Dynamic Access Control. 506-508 - Nikolaus Glombiewski

, Zeyd Boukhers
, Christian Beilschmidt
, Johannes Drönner
, Michael Mattig
, Artur Piet
, Robert Pietrzynski
, Mehrshad Jaberansary
, Macedo Maia
, Sebastian Beyvers
, Yeliz Üçer Yediel, Muhammad Hamza Akhtar
, Heiner Oberkampf
, Jonathan Hartman
, Bernhard Seeger
, Christoph Lange
:
From Theory to Practice: Demonstrators of FAIR Data Spaces Across Different Sectors. 509-513
Theme: System Software and Security: EMBS - Embedded Systems Track
- Muhammad Tanveer Ali Ahmad

, Jesús Puerta Pestana
, Michael Krisper
, Marcel Baunach
:
A Scalable Approach for Memory Optimization in AUTOSAR Schedule Tables. 514-523 - Donghui Lee

, Yongtae Kim
:
Exploiting Omega Network and Inexact Accumulative Parallel Counter to Enhance Energy Efficiency in Stochastic Computing. 524-531 - Ze-Wei Liou

, Ding-Yong Hong
:
Optimizing Compute Core Assignment for Dynamic Batch Inference in AI Inference Accelerator. 532-540 - Victor Gabriel Moyano

, Zain Alabedin Haj Hammadeh
, Selma Saidi
, Daniel Lüdtke
:
Efficient Scheduling of Weakly-Hard Real-Time Tasks with Sufficient Schedulability Condition. 541-550 - Tayyaba Zainab

, Laura Harms
, Jens Karstens
, Olaf Landsiedel
:
SeismicSense: Phase Picking of Seismic Events with Embedded Machine Learning. 551-559 - Sergi Vilardell

, Francesco Rossi
, Gabriele Giordana
, Isabel Serra
, Enrico Mezzetti
, Jaume Abella
, Francisco J. Cazorla
:
Probabilistic Timing Estimates in Scenarios Under Testing Constraints. 560-569 - Bernhard Fischer

, Daniel Dorfmeister
, Flavio Ferrarotti
, Manuel Penz
, Michael Kargl
, Martina Zeinzinger
, Florian Eibensteiner
:
Software-Hardware Binding for Protection of Sensitive Data in Embedded Software. 570-577 - Hongjoo Jin

, Jiwon Lee
, Taehun Kim
, Mu Yeol Sung
, Dong Hoon Lee
:
asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic. 578-587 - Roger Pujol

, Jaume Abella
, Mohamed Hassan
, Francisco J. Cazorla
:
On the Time Predictability of AXI4. 588-589 - Sungyoun Hwang

, Hyoju Seo
, Yongtae Kim
:
Can Less Accurate Be More Accurate? Surpassing Exact Multiplier with Approximate Design on NISQ Quantum Computers. 590-591 - Akila Niroshan, Suranga Seneviratne, Aruna Seneviratne:

State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play Store. 592-596
Theme: Information Systems: GIA - Geographic Information Analytics Track
- Thi Hai Yen Vu

, Thi-Bich-Hanh Dao
, Vincent Nguyen
, Christel Vrain
, Hugo Breuillard
:
Features Leverage in Graph Models for Mineral Prospectivity Mapping. 597-604 - Bayu Adhi Tama

, Sanjay Purushotham
, Vandana P. Janeja
:
MorphoLayerTrace (MLT): A Modified Automated Radio-Echo Sounding Englacial Layer-tracing Algorithm for Englacial Layer Annotation in Ice Penetrating Radar Data. 605-612 - Negin Zarbakhsh

, Srikanta Sannigrahi
, Anh Vu Vo
, Gavin McArdle
:
Mapillary Street Vegetation Scoring: End-to-End Process. 613-621
Theme: Artificial Intelligence and Agents: GMLR - Graph Models for Learning and Recognition Track
- Corrado Mio

, Jianyi Lin
, Ernesto Damiani
, Gabriele Gianini
:
Supervised Ensemble-based Causal DAG Selection. 622-629 - Andrés Tello

, Victoria Degeler
:
Contrasting Global and Local Representations for Human Activity Recognition using Graph Neural Networks. 630-637 - Francesco Agnelli

, Omar Ghezzi
, Giorgio Blandano
, Jacopo Burger
, Giuseppe Facchi
, Lia Schmid
:
Enhancing 3D Face Analysis Using Graph Convolutional Networks with Kernel-Attentive Filters. 638-644 - Nícolas Roque dos Santos

, Diego Minatel
, Alan Demétrius Baria Valejo, Alneu de Andrade Lopes
:
One-mode Projection of Bipartite Graphs for Text Classification using Graph Neural Networks. 645-647
Theme: Distributed Systems: IE - IoT and Edge Computing Track
- Namgyu Jung

, Taimoor Khan
, Pankoo Kim
, Chang Choi
:
An Attention-based Dual Stream Network for Efficient Electricity Price Forecasting. 648-654 - Ciro Rosa

, Nina S. T. Hirata
:
Knowledge Distillation for Reduced Footprint Semantic Segmentation with the U-Net. 655-662 - Antero Taivalsaari

, Tommi Mikkonen
:
Visualizing Streaming Data in Industrial Scale IoT Systems. 663-670 - Dewant Katare

, Mengying Zhou
, Yang Chen
, Marijn Janssen
, Aaron Yi Ding
:
Energy-Aware Vision Model Partitioning for Edge AI. 671-678 - Luca Serena

, Pietro Manzoni
, Moreno Marzolla
, Gabriele D'Angelo
, Stefano Ferretti
:
Incentivizing Crowdsensing in IoT through Micropayments: A Simulation Study. 679-686 - Inpyo Hong

, Youngwan Jo
, Hyojeong Lee
, Sunghyun Ahn
, Sanghyun Park
:
Advanced Knowledge Transfer: Refined Feature Distillation for Zero-Shot Quantization in Edge Computing. 687-694 - Franco Cirillo

, Christian Esposito
:
Efficient PUF-Based IoT Authentication Framework without Fuzzy Extractor. 695-704 - Julia Andersen

, Patrick Rathje
, Christian Imenkamp
, Agnes Koschmider
, Olaf Landsiedel
:
EdgeMiner: Distributed Process Mining at the Data Sources. 705-713 - Xavier Pacheco

, Pedro Vieira
, Hervé Paulino
:
Paprika: Replica Placement for Multi-Region Edge Publish-Subscribe Systems. 714-721 - Tarannum Ara

, Bivas Mitra
:
LonelyTracker: An IoT Solution with Multimodal Data and Split Computing for Secure Loneliness Detection. 722-729 - João A. Simioni, Eduardo Kugler Viegas

, Altair O. Santin
, Pedro Horchulhack
:
An Early Exit Deep Neural Network for Fast Inference Intrusion Detection. 730-737 - Taehyoung Kim

, Jiman Hong
:
Optimized Model Selection for Wind Farm Power Forecasting using Dynamic Time Warping. 738-745 - Heiko Bornholdt

, Kevin Röbert
, Stefan Schulte
, Janick Edinger
, Mathias Fischer
:
A Software-Defined Overlay Networking Middleware for a Simplified Deployment of Distributed Application at the Edge. 746-748 - Suhyeon Kim

, Haill An
, Jaejun Park
, Younhyun Jung:
A Lightweight and Accurate Localization Model for Anatomical Landmark in Medical Imaging Using Depth-Wise Separable Convolution. 749-750
Theme: Information Systems: IMFBS - Innovations in Multimedia Forensics and Biometric Security Track
- Andreas Vorderleitner

, Andreas Uhl
:
Finger Vein Spoof GANs: Issues in Presentation Attack Detector Training. 751-758 - Hyeongjun Choi

, Simon S. Woo
:
GAN or DM? In-depth Analysis and Evaluation of AI-generated Face Data for Generalizable Deepfake Detection. 759-766 - Chan Park

, Bohyun Moon
, Minsun Jeon
, Jee-weon Jung
, Simon S. Woo
:
X3A: Efficient Multimodal Deepfake Detection with Score-Level Fusion. 767-774 - Taiba Majid Wani

, Madleen Uecker
, Farooq Ahmad Wani
, Irene Amerini
:
HCN-TA: Hierarchical Capsule Network with Temporal Attention for a Generalizable Approach to Audio Deepfake Detection. 775-777
Theme: Distributed Systems: INTOP - Interoperability Track
- Jahoon Koo

, Yujun Kim
, Young-Gab Kim
:
BERT-based User Attribute Mapping Framework in Heterogeneous Systems. 778-786 - Yeongyu Lee

, Hongseok Oh
, Moon-Sun Yeom
, Myung-Min Oh
, Kyungchang Jeong
, Jaemin Jeong
, Euijong Lee
:
Enhancing Interoperability in Controlled Environment Agriculture Systems Using Plant Electrical Signals. 787-794 - Minhye Jeon

, Seokho Ahn
, Young-Duk Seo
:
Topic-Aware Knowledge Graph with Large Language Models for Interoperability in Recommender Systems. 795-802 - Emylle Varela

, Thaís Batista
, Everton Cavalcante
, André Almeida:
Pursuing Interoperability in Digital Twins: An Analysis of the Current Research Landscape. 803-810 - Kristián Kostál

, Dusan Morhác
, Juraj Mecir
:
Decentralized Bridge Between Polkadot and Cosmos. 811-814
Theme: Artificial Intelligence and Agents: IRMAS - Intelligent Robotics and Multi-Agent Systems Track
- Joonyeol Sim

, Seonghyeon Lim
, Changjoo Nam
:
ST-CBS: Spatio-Temporal Conflict Based Search in Continuous Space for Multi-Agent Pathfinding. 815-822 - James C. Ward

, Ryan McConville
, Edmund R. Hunt
:
Lightweight Decentralized Neural Network-Based Strategies for Multi-Robot Patrolling. 823-831 - Lucyanno Frota

, Rui P. Rocha
:
A Semantic Mapping Framework for Service Robots. 832-839 - Mario Andreu Villar

, Karen Yadira Lliguin León
, Jordi Arjona Aroca
, Arántzazu López-Larrainzar Salazar, Gerardo Minella
, José Manuel Bernabéu Aubán:
MARTES: Multi-Agent Reinforcement learning Training Environment for Scheduling. 840-849 - Lucas Naury

, Adam Gouguet
, Guillaume Lozenguez
, Luc Fabresse
:
Communication Isolation For Multi-Robot Systems Using ROS2. 850-858 - Jen-Wei Wang

, Daniel Nikovski
:
Learning Visual Servoing for Nonholonomic Mobile Robots with Uncalibrated Cameras. 859-861 - Alvin Gandois

, Abdel-Illah Mouaddib
, Simon Le Gloannec
, Ayman Alfalou
:
Exploration and Active Recognition Strategy using Meta-MDP. 862-865
Theme: Artificial Intelligence and Agents: ISDE - Intelligent Systems for Digital Era Track
- Paolo Grazieschi

, Massimo Vecchio
, Miguel Pincheira
, Fabio Antonelli
:
Soilcast: a Multitask Encoder-Decoder AI Model for Precision Agriculture. 866-873 - Michelle Jungmann

, Sanja Lazarova-Molnar
:
Fusing Expert Knowledge and Internet of Things Data for Digital Twin Models: Addressing Uncertainty in Expert Statements. 874-881 - Abdelfatah Kermali

, Kamaldeep Singh Oberoi
, Zeineb El Khalfi
, Yohan Dupuis
:
Deep Reinforcement Learning of Simulated Students Multimodal Mobility Behavior: Application to the City of Toulouse. 882-888 - Diego Minatel

, Antonio Rafael Sabino Parmezan
, Nícolas Roque dos Santos
, Mariana Curi
, Alneu de Andrade Lopes
:
A DIF-Driven Threshold Tuning Method for Improving Group Fairness. 890-898 - Sartaj Bhuvaji

, Prachitee Chouhan
, Madhuroopa Irukulla
, Jay Singhvi
, Wan D. Bae
, Shayma Alkobaisi
:
A Retrieval-Augmented Framework For Meeting Insight Extraction. 899-906 - Edoardo Allegrini

, Edoardo Di Paolo
, Marinella Petrocchi
, Angelo Spognardi
:
Deciphering Social Behaviour: a Novel Biological Approach For Social Users Classification. 907-914 - Bingxiang Chen

, John Tackman
, Manu Setälä
, Timo Poranen
, Zheying Zhang
:
Integrating Access Control with Retrieval-Augmented Generation: A Proof of Concept for Managing Sensitive Patient Profiles. 915-919
Theme: Artificial Intelligence and Agents: KNLP - Knowledge and Natural Language Processing Track
- Frederico Leite Richardson

, Aline Villavicencio
, Ronaldo Menezes
:
The Rephrased Reality: Analysing Sentiment Shifts in LLM-Rephrased Text. 920-927 - Samuele Colombo

, Simone D'Amico
, Lorenzo Malandri
, Fabio Mercorio
, Andrea Seveso
:
JobSet: Synthetic Job Advertisements Dataset for Labour Market Intelligence. 928-935 - Khoa Nguyen

, Sadia Jahan
, Rocky Slavin
:
A Comparison of the Effects of Model Adaptation Techniques on Large Language Models for Non-Linguistic and Linguistic Tasks. 936-944 - Mohammed Al-Maamari

, Mehdi Ben Amor
, Jelena Mitrovic
, Michael Granitzer
:
Mixture of Modular Experts: Distilling Knowledge from a Multilingual Teacher into Specialized Modular Language Models. 945-852 - Rory Ward

, Dhairya Dalal
, Paul Buitelaar
, John G. Breslin
:
RAGCol: RAG-Based Automatic Video Colorization Through Text Caption Generation and Knowledge Enrichment. 953-962 - Dohyeon Kim

, Taehoon Kim
, Jihoon Yang
:
Early Detection of Online Grooming with Language Models. 963-970 - Vamsi Krishna Pasam

, Sravani Pati
, Carlos Toxtli Hernandez
:
AI-Powered Comment Triage for Efficient Collaboration and Feedback Management. 971-979 - Paulo Viviurka Do Carmo

, Marcos Paulo Silva Gôlo
, Jonas Gwozdz
, Edgard Marx
, Ricardo Marcondes Marcacini
:
Improving Natural Product Knowledge Extraction from Academic Literature with Enhanced PDF Text Extraction and Large Language Models. 980-987 - Mariana Chaves

, Elena Cabrio
, Serena Villata
:
FALCON: A multi-label graph-based dataset for fallacy classification in the COVID-19 infodemic. 988-995 - Ibukun David Babatunde

, Obiabuchi Martin Nnanna
, Mark Klein
:
Moderating Large Scale Online Deliberative Processes with Large Language Models (LLMs): Enhancing Collective Decision-Making. 996-1003 - Duc Anh Vu

, Cong-Duy Nguyen
, Xiaobao Wu
, Nhat M. Hoang
, Mingzhe Du
, Thong Nguyen
, Anh Tuan Luu
:
Curriculum Demonstration Selection for In-Context Learning. 1004-1006 - Benjamin Molinet

, Elena Cabrio
, Serena Villata
:
Assessing Argument-based Natural Language Explanations in Medical Text. 1007-1008 - Yasuaki Sumita

, Koh Takeuchi
, Hisashi Kashima
:
Cognitive Biases in Large Language Models: A Survey and Mitigation Experiments. 1009-1011 - Annelen Brunner

, Anna Pohle
:
ChatGPT, what is a 'Glasanwalt'? - Linguistic strategies in a large language model's interpretation of novel compounds. 1012-1013 - Federico Ravenda

, Seyed Ali Bahrainian
, Noriko Kando
, Antonietta Mira
, Andrea Raballo
, Fabio Crestani
:
Tailoring Adaptive-Zero-Shot Retrieval and Probabilistic Modelling for Psychometric Data. 1014-1018
Theme: Information Systems: KRR - Knowledge Representation and Reasoning Track
- Francesco Kriegel

:
Beyond Optimal: Interactive Identification of Better-than-optimal Repairs. 1019-1026 - Jean-Guy Mailly

:
Reasoning with Plausibility in Incomplete Argumentation Frameworks. 1027-1034 - Andreas Plank

, Martina Seidl
, Manuel Kauers
:
Solution Counts of Some Prominent Quantified Boolean Formulas Families. 1035-1042 - Marcel Simader

, Adrian Rebola-Pardo
, Martina Seidl
:
FERAT: A New Expansion-Based Certification Framework for Quantified Boolean Formulas. 1043-1050 - Andrei Popescu

, Johannes P. Wallner
:
Dynamic Programming Algorithms for Probabilistic Bipolar Argumentation Frameworks. 1051-1052 - François Camelin, Samir Loudni

, Gilles Pesant
, Charlotte Truchet
:
Sampling Frequent and Diversified Patterns Through Compression. 1053-1054
Theme: Artificial Intelligence and Agents: MLA - Machine Learning and its Applications Track
- Joon Soo Yoo

, Baek Kyung Song
, Tae Min Ahn, Ji Won Heo, Ji Won Yoon:
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain. 1055-1064 - Seokhee Jo

, Jungmin So
:
Supervised Contrastive Learning with Importance-based CutOut for Few-shot Image Classification. 1065-1073 - Vincenzo Pasquadibisceglie

, Vito Recchia
, Annalisa Appice
, Donato Malerba
, Giuseppe Fiameni
:
GANDALF: A LLM-based approach to map bark beetle outbreaks in semantic stories of Sentinel-2 images. 1074-1081 - Jamie Todd

, Junqi Jiang
, Aaron Russo
, Steffen Winkler
, Stuart Sale
, Joseph McMillan
, Antonio Rago
:
Explainable Time Series Prediction of Tyre Energy in Formula One Race Strategy. 1082-1089 - Devin Thomas

, Junqi Jiang
, Avinash Kori
, Aaron Russo
, Steffen Winkler
, Stuart Sale
, Joseph McMillan
, Francesco Belardinelli
, Antonio Rago
:
Explainable Reinforcement Learning for Formula One Race Strategy. 1090-1097 - Wellison R. M. Santos

, Adalberto R. Sampaio
, Nelson S. Rosa
, George D. C. Cavalcanti
:
Univariate vs multivariate prediction for containerised applications auto-scaling: a comparative study. 1098-1105 - Yaejin Lee

, Junyeop Cha
, Eunil Park
:
Advancing Chronic Disease Prediction with Your First-Visit: Ensemble and Deep Learning Approaches. 1106-1113 - An Huang

, Junggab Son
, Zuobin Xiong
:
DDSNet: A Lightweight Dense Depthwise Separable Network for Tumor Classification. 1114-1121 - Min-Gyu Kang

, Keon Kim
, Yong Suk Choi
:
Bounded Editing: Multi-Object Image Manipulation with Region-Specific Control. 1122-1129 - Seong Hyun Jeon

, Keon Kim
, Yong Suk Choi
:
FEFM: Feature Extraction and Fusion Module for Enhanced Time Series Anomaly Detection. 1130-1137 - Hakjun Moon

, Dayeon Woo
, Simon S. Woo
:
High-Fidelity Face Age Transformation via Hierarchical Encoding and Contrastive Learning. 1138-1145 - Min-Jyun Wu

, Hsiang-Jui Lin
, Shih-Hao Hung
, Chi-Sheng Shih
:
Unsupervised Training Framework for 3D Point Cloud Object Detection Model. 1146-1155 - Elisa Mariani

, Nacéra Seghouani
, Yue Ma
:
A Hybrid Self-Correcting Approach for Embedding Ontology-based Knowledge Graphs. 1156-1163 - Pablo Melendez Abarca

, Clemens Havas
:
Spatial Information Integration in Small Language Models for Document Layout Generation and Classification. 1164-1171 - Muhammad Shaheryar

, Jong Taek Lee
, Soon Ki Jung
:
Unlearn and Protect: Selective Identity Removal in Diffusion Models for Privacy Preservation. 1172-1179 - Hyein Seo

, Yuna Jeong
, Yong Suk Choi
:
TAECE : T2I-Adapter with Enhanced Color Expression for Improving Conditional Text-to-Image Generation Capabilities. 1180-1187 - Pedro R. Pires

, Rafael T. Sereicikas
, Gregório F. Azevedo
, Tiago A. Almeida
:
Collaborative filtering through weighted similarities of user and item embeddings. 1188-1195 - Gustavo P. Torquette

, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena
:
Network-based instance hardness measures for classification problems. 1196-1203 - Ronaldo Inocêncio Júnior

, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena
:
Data Balancing for Mitigating Sampling Bias in Machine Learning. 1204-1212 - Marco Simoni

, Andrea Saracino
, Vinod P
, Mauro Conti
:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. 1213-1222 - Zhiyong Zhang

, Ruyu Liu
, Xiufeng Liu
, Yunrui Zhu
, Yanyan Yang
, Chaochao Wang
, Jianhua Zhang
:
PULLM: A Multimodal Framework for Enhanced 3D Point Cloud Upsampling Using Large Language Models. 1223-1230 - Dongjun Lee

, Donggeun Ko
, Jaekwang Kim
:
Hierarchical Contrastive Learning with Multiple Augmentations for Sequential Recommendation. 1231-1239 - Victor Ulisses Pugliese, Oseias Ferreira

, Fábio Augusto Faria
:
Hybrid Flow Shop Scheduling through Reinforcement Learning: A systematic literature review. 1240-1249 - Nicolò Malucelli

, Davide Domini
, Gianluca Aguzzi
, Mirko Viroli
:
Neighbor-Based Decentralized Training Strategies for Multi-Agent Reinforcement Learning. 1250-1257 - Arthur Ning

, Flavius Frasincar
, Tarmo Robal
:
SC-Block++: A Blocking Algorithm Based on Adaptive Flood Regularization. 1258-1266 - Francisco Igor de Lima Mendes

, Melquisedeque Carvalho Silva
, André Luiz Firmino Alves
, Eniedson Fabiano Pereira da Silva Júnior
, Mateus Queiroz Cunha
, Cláudio de Souza Baptista:
Comparative Study of Lexical and Semantic Approaches in Closed-domain Product Search. 1267-1274 - João V. R. de Andrade

, Agostinho Freire
, Guilherme Carvalho Pereira
, Cristian Millán-Arias
, Bruno J. T. Fernandes
, Carmelo J. A. Bastos Filho
, Jorge Tortato
, Luiz Da Rocha
, Alexandre M. A. Maciel
:
Towards Robust Facial Recognition: Gabor Filter-Based Feature Extraction for NIR-VIS Heterogeneous Face Recognition. 1275-1281 - Jimyeong Han

, Sangpil Kim
, Hogun Park
:
MELA: Multi-Event Localization Answering Framework for Video Question Answering. 1282-1289 - Donggeun Ko

, Dongjun Lee
, Namjun Park
, Wonkyeong Shim
, Jaekwang Kim
:
Debiasing Classifiers by Amplifying Bias with Latent Diffusion and Large Language Models. 1290-1292 - Jaewoong Kim

, Minseok Hur
, Moohong Min
:
From RAG to QA-RAG: Integrating Generative AI for Pharmaceutical Regulatory Compliance Process. 1293-1295 - José Medina, Amnir Hadachi

, Paul Honeine
, Abdelaziz Bensrhair
:
Mamba-PKD: A Framework for Efficient and Scalable Model Compression in Image Classification. 1296-1298 - Biagio Boi

, Ilaria Amelia Caggiano
, Christian Esposito
, Lucilla Gatt
:
On exploiting LLMs and Statistical Methods for testing Contractual Clarity in Legal Contracts. 1299-1300 - Debanjali Banerjee

, Chee-Hung Henry Chu
:
Information Flow in Deep Learning Classification Networks. 1301-1302 - Wonkyeong Shim

, Namjun Park
, Donggeun Ko
, San Kim
, Hyebin Gwag
, Youngjun Park
, Seungjung Park
, Jaekwang Kim
:
PacECG-Net: A Multi-modal Approach Integrating LLMs and ECG for LVSD Classification in Pacemaker Patients. 1303-1305 - Vasu Jindal

:
Student Research Abstract: Dynamic Adversarial Soil Modeling: A GAN-Confident Learning Approach for Precision Agriculture. 1306-1308 - Jayram Bhat Palamadai

:
Enhanced Cross-Task Learning Architecture for Boosted Decision Trees. 1309-1311 - Alison Wang

:
Student Research Abstract: Evaluating Dialogue Summarization Using LLMs. 1312-1314
Theme: Software Design and Development: MSC - Mobile and Smart Computing Track
- Gabriel A. Morales

, Rocky Slavin
:
What's in an Embedding? Harnessing Deep Learning to Fuse Multi-Sensor Embeddings for Room Identification. 1315-1324 - Gyusun Lee

, Jinyong Park
, Jae W. Lee
, Jinkyu Jeong
:
Transparent Smartphone Memory Expansion. 1325-1334 - Mariana Cunha

, Ricardo Mendes
, Yves-Alexandre de Montjoye
, João P. Vilela:
On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile Devices. 1335-1344
Theme: Distributed Systems: NET - Networking Track
- Erik Daniel

, Guillaume Michel
, Florian Tschorsch
:
Improving Kademlia Lookup Privacy through Query Obfuscation. 1345-1352 - Ramon A. Oliveira

, Denis Rosário, Eduardo Cerqueira
, Helder M. N. S. Oliveira:
Multiple Policy Approach for Efficient Resource Allocation in SDM-EONs. 1353-1360 - Solomon Fikadie Wassie

, Antonio Di Maio
, Torsten Braun
:
Deep Reinforcement Learning for Context-Aware Online Service Function Chain Deployment and Migration over 6G Networks. 1361-1370 - Elham Hasheminezhad

, Antonio Di Maio
, Torsten Braun
:
Data-Driven Orchestration for Distributed RAN Intelligent Controller Placement in 6G Networks. 1371-1373
Theme: System Software and Security: OSSP - Operating Systems and Software Platforms Track
- Juwon Kim

, Dongeon Kim
, Seung Won Yoo
, Myeongin Cheon
, Joontaek Oh
, Youjip Won
:
lwFSCK: Light-weight Filesystem Check. 1374-1382 - Kyungeun Oh

, Jeonghwan Oh
, Hangyeol Kim
, Seongmo An
, Junyoung Heo
, Jiman Hong
:
Efficient Kernel Source Code Management for BMC Optimization. 1383-1390 - Hangyul Kim

, Inho Song
, Sam H. Noh
:
CRAZNS: A Case for Conventional Namespace Support for RAID with ZNS SSDs. 1391-1398 - Hocine Mahni

, Stéphane Rubini
, Sebastien Gougeaud
, Philippe Deniel
, Jalil Boukhobza
:
Multicriteria File-Level Placement Policy for HPC Storage. 1399-1406 - Ki Cheol Park

, Jae Hoon An
, Young Hwan Kim
, Hangyeol Kim
:
Scalable Orchestration Design for Mixed-Critical Task Scheduling in SDI-based Mobility Systems. 1407-1411
Theme: System Software and Security: PL - Programming Languages Track
- Saverio Giallorenzo

, Francesco Goretti
:
Breadth-first Cycle Collection Reference Counting: Theory and a Rust Smart Pointer Implementation. 1412-1420 - Yong-Jun Shin

, Wilfrid Utz
:
A Platform-Independent Software-Intensive Workflow Modeling Language And An Open-Source Visual Programming Tool: A Bottom-Up Approach Using Ontology Integration Of Industrial Workflow Engines. 1421-1430 - Jordan Ischard

, Frédéric Dabrowski, Jules Chouquet
, Frédéric Loulergue
:
A Mechanized Formalization of an FRP Language with Effects. 1431-1439 - Mark Grechanik

:
Creating Scala-Embedded Domain-Specific Languages. 1440-1443
Theme: Software Design and Development: QSE - Quantum Software Engineering Track
- Arif Ali Khan

, Davide Taibi
, Cécile M. Perrault
, Muhammad Azeem Akbar
:
Advancing Quantum Software Engineering: A Vision of Hybrid Full-Stack Iterative Model. 1444-1448 - Duong Bui

, Kimmo Halunen
:
NISQ Quantum Algorithm for K-Means Clustering. 1449-1456 - Adriano H. O. Maia

, Marcus Freire
, Thiago Mello
, Roberto Rodrigues Filho
, Eduardo Santana de Almeida
, Cássio V. S. Prazeres, Gustavo Bittencourt Figueiredo
, Maycon Leone Maciel Peixoto
:
Q-Edge: Leveraging Quantum Computing for Enhanced Software Engineering in Vehicular Networks. 1457-1467 - Boshuai Ye

:
C2|Q>: Unifying Classical and Quantum Programming. 1468-1472
Theme: Software Design and Development: RE - Requirements Engineering Track
- María Isabel Limaylla Lunarejo

, Nelly Condori-Fernández
, Miguel Rodríguez Luaces
:
SimRE: A Requirements Similarity Tool for Software Product Lines. 1473-1480 - Luca Sabatucci

, Massimo Cossentino
, Claudia Di Napoli
, Angelo Susi
:
Enhancing Device-Goal-Norm Modeling for Ambient Assisted Living with Large Language Models. 1481-1488 - Ikram Darif

, Ghizlane El-Boussaidi
, Sègla Kpodjedo, Andrés Paz:
UTL: A Unified Language for Requirements Templates. 1489-1506 - Abimael Santos

, Quelita A. D. S. Ribeiro, Moniky Ribeiro
, Jaelson Castro
, Maria Lencastre
:
NFR4SUSTAIN: Catalog of Requirements for Software Sustainability. 1507-1508 - Tshepho Koboyatshwene

, Yirsaw Ayalew
:
Requirements Traceability: A Systematic Literature Review. 1509-1513
Theme: Artificial Intelligence and Agents: S2RAI - Safe, Secure and Robust AI Track
- Dennis Gross

, Helge Spieker
:
PCTL Model Checking for Temporal RL Policy Safety Explanations. 1514-1521 - Jayneel Vora

, Nader Bouacida
, Aditya Krishnan
, Prabhu R. V. Shankar
, Prasant Mohapatra
:
Identity-Focused Inference and Extraction Attacks on Diffusion Models. 1522-1530 - Yue Qiu

:
TSPTE: Text sentiment-aware privacy protection method based on truncated exponent. 1531-1538 - Salvatore Della Torca

, Valentina Casola
, Simone Izzo
:
N-Pixels: a Novel Grey-Box Adversarial Attack for Fooling Convolutional Neural Networks. 1539-1547 - Abraham Chan

, Arpan Gujarati
, Karthik Pattabiraman
, Sathish Gopalakrishnan
:
D-semble: Efficient Diversity-Guided Search for Resilient ML Ensembles. 1548-1559
Theme: Distributed Systems: SCCI - Smart Cities and Critical Infrastructures Track
- Alessandro Brighente

, Mauro Conti
, Savio Sciancalepore
, Harshul Vaishnav
:
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures. 1560-1569 - Yu Sheng

, Ali Ozbakir
, Clara Maathuis
, Deniz Iren
, Stefano Bromuri
:
Enhancing Room Occupancy Inference from Sparse PIR Sensor Data Using Transformer Models. 1570-1579 - Menno Bezema

, Alessandro Brighente
, Mauro Conti
, Luca Cosuti
:
BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior. 1580-1589 - You Xu

, Marwan Hassani
:
Leveraging Contrastive Learning and Spatial Encoding for Prediction in Traffic Networks with Expanding Infrastructure. 1590-1599 - Kaveh Khoshkhah

, Mozhgan Pourmoradnasseri
, Behzad Bamdad Mehrabani
, Sadok Ben Yahia
, Amnir Hadachi
:
Refining Urban Microscopic Traffic Simulations Accuracy Using a Customized Random Walk Model for Dynamic Stochastic Route Choice. 1600-1608 - Arun Kumar Kalakanti

, Shrisha Rao
:
Dynamic Pricing for Electric Vehicle Charging. 1609-1611 - Sultan Altarrazi

, Tomasz Szydlo
, Devki Nandan Jha, Rajiv Ranjan
:
Automating Data Quality Monitoring for Environmental Air Quality System. 1612-1616
Theme: Software Design and Development: SE - Software Engineering Track
- Haya Samaana

, Diego Elias Costa
, Emad Shihab
, Ahmad Abdellatif
:
A Machine Learning-Based Approach For Detecting Malicious PyPI Packages. 1617-1626 - Oebele Lijzenga

, Iman Hemati Moghadam
, Vadim Zaytsev
:
Leveraging Search-Based and Pre-Trained Code Language Models for Automated Program Repair. 1627-1636 - Arina Kudriavtseva

, Nisar Ahmad Hotak
, Olga Gadyatskaya
:
My Code Is Less Secure with Gen AI: Surveying Developers' Perceptions of the Impact of Code Generation Tools on Security. 1637-1646 - Marco Ehl

, Amir Shayan Ahmadian
, Katharina Großer
, Duaa Adel Ali Elsofi
, Marc Herrmann
, Alexander Specht
, Kurt Schneider
, Jan Jürjens
:
Supporting Software Engineers in IT Security and Privacy through Automated Knowledge Discovery. 1647-1656 - Feng Dai

, Shigeru Chiba
:
A Two-stage Approach for Structurally-similar Cross-language Code-pair Detection. 1657-1665 - Xiaokun Luan

, Yihao Zhang
, Meng Sun
:
MedTiny Code Generation for Enhancing RegLang Smart Contract Reliability. 1666-1673 - Hiba Awad

, Thomas Ledoux
, Hugo Bruneliere
, Jonathan Rivalan
:
VeriFogOps: Automated Deployment Tool Selection and CI/CD Pipeline Generation for Verifying Fog Systems at Deployment Time. 1674-1691 - Matthew Coyle

, Théo Le Calvar, Samir Loudni
, Massimo Tisi
:
Towards Enforcing Structural OCL Constraints using Constraint Programming. 1692-1701 - Si-Hyun Kim

, Jaewon Oh
:
Migrating Monolithic Web Applications to Microservice Architectures Considering Dependencies on Databases and Views. 1702-1711 - Md. Fazle Rabbi

, Arifa Islam Champa
, Minhaz Fahim Zibran
:
Claim vs. Capability: A Comparative Analysis of the SBOM Generation Tools for Rust Projects. 1712-1720 - Yuan Xia

, Aabha Shailesh Pingle, Deepayan Sur
, Jyotirmoy Deshmukh
, Mukund Raghothaman
, Srivatsan Ravi
:
LLM-guided Predicate Discovery and Data Augmentation for Learning Likely Program Invariants. 1721-1729 - Vladislav Indykov

, Rebekka Wohlrab
, Daniel Strüber:
Quality trade-offs in ML-enabled systems: a multiple-case study. 1730-1737 - Andrea Bombarda

, Giuseppe Ruscica
, Patrizia Scandurra
:
A self-managing IoT-Edge-Cloud architecture for improved robustness in environmental monitoring. 1738-1745 - Leon Fernandez

, Gunnar Karlsson
:
Measuring the Impact of Fuzzing Activity in Networking Software. 1746-1751 - Minh Khoi Nguyen

, Hanh Nhi Tran
, Ileana Ober
, Razan Abualsaud
:
An AI-augmented Framework for Automated and Intelligent Process Monitoring. 1752-1753 - Bassam Alsanousi

, Stephanie Ludi
, Hyunsook Do
:
Mobile App Quality Assessment: Leveraging LLM-Driven Data Augmentation for Enhanced User Reviews Analysis. 1754-1756 - Mívian M. Ferreira

, Diego Gonçalves
, Mariza Andrade da Silva Bigonha
, Kecia Aline M. Ferreira, Yuri Carvalhais
:
Detecting Co-change Using Categorized Commit Data. 1757-1758 - Flavio Corradini

, Alessandro Marcelletti
, Andrea Morichetta
, Andrea Polini
, Barbara Re
, Francesco Tiezzi
:
Looseness for Choreography-based Software Architectures on Blockchain. 1759-1761
Theme: System Software and Security: SEC - Computer Security Track
- Billy Bob Brumley

:
U Can Touch This! Microarchitectural Timing Attacks via Machine Clears. 1762-1771 - Christofer Fellicious

, Mehdi Ben Amor
, Johannes Garstenauer
, Jelena Mitrovic
, Hans P. Reiser
, Michael Granitzer
:
MemBERT: Foundation model for memory forensics. 1772-1779 - Ankit Gangwal

, P. Sahithi Reddy
, C. y. k. Sagar
:
Swiss Cheese CAPTCHA: A Novel Multi-barrier Mechanism for Bot Detection. 1780-1789 - Dustin Kern

, Christoph Krauß
, Matthias Hollick
:
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid. 1790-1799 - Viet Ha The

, Dustin Kern
, Phat Nguyen Tan
, Christoph Krauß
:
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks. 1800-1809 - Chih-Kai Hsu

, Yung-Chi Tseng
, Shih-Wei Li
, Yi-Hui Lin
, Wei-Cheng Tian
, Lap Chung Lam
, Yu-Chen Liu
:
Strengthening Application Security through Integrity Protection of System Call Usage. 1810-1819 - Chaejin Lim

, Beomjin Jin
, Hyoungshick Kim
:
Stealth Extension Exfiltration (SEE) Attacks: Stealing User Data without Permissions via Browser Extensions. 1820-1828 - Xingchao Bian

, Hyungmin Cho
:
Detecting Cache-based Side-Channel Attacks by Leveraging Mesh Interconnect Traffic Monitoring. 1829-1838 - Timm Lauser

, Maximilian Müller
, Ingmar Baumgart
, Christoph Krauß
:
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard. 1839-1848 - SeonJin Hwang

, Assem Utaliyeva
, Hye Ju Lee
, Dongwoon Yoo
, Yoon-Ho Choi
:
GUARD: Generic API De-obfuscation and Obfuscated Malware Unpacking with sIAT. 1849-1856 - Zhichao Zhou

, Hongyu Jin
, Panos Papadimitratos
:
Clogging DoS Resilient Bootstrapping of Efficient V2V Validation. 1857-1866 - Robert Flood

, Marco Casadio
, David Aspinall
, Ekaterina Komendantskaya
:
Formally Verifying Robustness and Generalisation of Network Intrusion Detection Models. 1867-1876 - Aditya Vardhan Padala

, Saurabh Bagchi
, Aravind Kumar Machiry
:
Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive Triaging. 1877-1885 - Ashton McEntarffer

, Linxi Zhang
, Yu Wei Liu
, Mert D. Pesé:
Towards a Comprehensive Evaluation of Voltage-Based Fingerprinting for the CAN Bus. 1886-1893 - Jonathan Brossard

:
Automatic Functions Annotations through Concrete Procedural Debugging and ELF Libification. 1894-1898
Theme: Information Systems: SONAMA - Social Network and Media Analysis Track
- Amir Hossein Mohsen Nezhad Baravati

, Martina Viganò
, Carlo Alberto Bono
, Barbara Pernici
:
Enhancing User Experience with Topic-Based Message Retrieval in Telegram. 1899-1906 - Harin Seo

, Hwanseong Joo
, Byungchul Tak
, Young-Kyoon Suh
:
HARIN: A Novel Metric for Hierarchical Topic Model Assessment. 1907-1916 - Yoshiyuki Maekawa

, Shuichiro Haruta
, Yuma Dose
, Takahiro Hara
:
A News Recommendation Framework Utilizing ChatGPT: Estimating Target Audience and News Categories. 1917-1926 - Annie Amorim

, Gabriel Assis
, Laura Ribeiro
, Daniel de Oliveira
, Aline Paes
:
Language Flavors in the Lusophone World: A BERT-Based Social Media Study of Portuguese in Brazil, Portugal, and Mozambique. 1927-1934 - Junho Yoon

, Kiho Lim
, Chang Choi
:
Robustly Optimized Multimedia Local and Global Context Analysis at Multi-modal Balance. 1935-1940 - Simone D'Amico

, Giancarlo Sperlì
, Anna Velyka
:
Enhancing user reliability using a contextual-based approach on heterogeneous graph. 1941-1942
Theme: Software Design and Development: ST - Semantic Technology Track
- Kwabena Adu-Duodu

, Stanly Wilson
, Yinhao Li
, Aanuoluwapo Oladimeji
, Talea Huraysi
, Masoud Barati
, Charith Perera
, Ellis Solaiman
, Omer F. Rana
, Rajiv Ranjan
, Tejal Shah
:
A Circular Construction Product Ontology for End-of-Life Decision-Making. 1943-1952 - Yang Lu

, Rabimba Karanjai
, Dana Alsagheer
, Keshav Kasichainula
, Lei Xu
, Weidong Shi
, Shou-Hsuan Stephen Huang
:
LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis. 1953-1960 - Simone D'Amico

, Alessia De Santo
, Mario Mezzanzanica
, Fabio Mercorio
:
Taxonomy Expansion through Collaborative LLM Mapping. 1961-1968 - Lorenzo Malandri

, Fabio Mercorio
, Antonio Serino
:
SkiLLMo: Normalized ESCO Skill Extraction through Transformer Models. 1969-1978 - Yang Lu

:
LogSage: Log Summarization Assistant with Guided Enhancement. 1979-1981
Theme: Software Design and Development: SVT - Software Verification and Testing Track
- Cécile Marcon

, Cyril Allignol
, Célia Picard
, Blair Archibald
, Michele Sevegnani
, Xavier Thirioux
:
BiCoq : Bigraphs Formalisation with Coq. 1982-1989 - Aleksandar S. Dimovski

:
Weakest Safe Context Synthesis by Symbolic Game Semantics and Logical Abduction. 1990-1997 - Étienne André

, Jean-Luc Béchennec
, Sudipta Chattopadhyay
, Sébastien Faucou
, Didier Lime
, Dylan Marinho
, Olivier H. Roux
, Jun Sun
:
Verifying Timed Properties of Programs in IoT nodes using Parametric Time Petri Nets. 1998-2006 - Vignesh Manjunath

, Tobias Scheipel
, Marcel Baunach
:
Formal Modeling and Verification of Low-Level AUTOSAR OS Specifications: Towards Portability and Correctness. 2007-2016
Theme: Distributed Systems: WCN - Wireless Communications and Networking Track
- Aditya Aryaman Das

, Gautam Srivastava
:
HyPoPE: A Hybrid Proof of Participation and Efficiency Protocol for Secure IoT Blockchain Networks. 2017-2023 - Tanish Patel

, Rutvij H. Jhaveri
, Dhavalkumar Thakker
, Sandeep Verma
, Palash Yuvraj Ingle
:
Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection. 2024-2031 - Attaullah Bolzano Buriro

, Flaminia Venice Luccio
, Muhammad Azfar Bolzano Yaqub
:
Balancing the Scales: Using GANs and Class Balance for Superior Malware Detection. 2032-2039 - Muhammad Ashar Tariq

, Mahnoor Ajmal
, Malik Muhammad Saad
, Ayesha Siddiqa
, Seri Park
, Dongkyun Kim
:
Towards Efficient Mobility Management in 5G-Advanced: A Predictive Model for Network Slice Availability. 2040-2047 - Manish Yadav

, Mohamed Elmahallawy
, Sanjay Madria
, Samuel Frimpong
:
Predicting Battery Levels of Sensor Nodes Using Reinforcement Learning in Harsh Underground Mining Environments. 2048-2057 - Anantha Raman Srikanthan

, Gautam Srivastava
:
Securing MQTT using Pseudo Random Number Generation. 2058-2061
Theme: Software Design and Development: WE - Web Engineering Track
- Thi-Hanh Le

, Padipat Sitkrongwong
, Panagiotis Andriotis
, Quang-Thuy Ha
, Atsuhiro Takasu
:
An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack. 2061-2068 - Luca Zampierin

, Flavius Frasincar
:
An Unsupervised Approach for Aspect-Based Sentiment Classification Using Attentional Neural Models. 2069-2077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














