dblp: SAC 2025 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


40th SAC 2025: Catania, Italy

jump to- Theme: Information Systems: ADT - Accessible Devices and Technologies Track
- Theme: Distributed Systems: CC - Cloud Computing Track
- Theme: Information Systems: DBDM - Databases and Big Data Management Track
- Theme: Information Systems: GIA - Geographic Information Analytics Track
- Theme: Distributed Systems: INTOP - Interoperability Track
- Theme: Information Systems: KRR - Knowledge Representation and Reasoning Track
- Theme: System Software and Security: OSSP - Operating Systems and Software Platforms Track
- Theme: Artificial Intelligence and Agents: S2RAI - Safe, Secure and Robust AI Track
- Theme: Information Systems: SONAMA - Social Network and Media Analysis Track
- Theme: Software Design and Development: WE - Web Engineering Track

- > Home > Conferences and Workshops > SAC
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Jiman Hong, Sebastiano Battiato, Christian Esposito, Juw Won Park, Adam Przybylek:
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, SAC 2025, Catania International Airport, Catania, Italy, 31 March 2025 - 4 April 2025. ACM 2025, ISBN 979-8-4007-0629-5
Theme: Information Systems: ADT - Accessible Devices and Technologies Track

Lucie Pantera
, Thomas Hebert
, Ayoub Ben Dhiab
, Charles Hudin
, Sabrina A. Panëels
:
Feel the Wave: Using Waveguides as a Tactile Communication Interface for Deafblind People. 3-10

Marija Nenadic
, Claudio Enrico Palazzi
, Andrea Zanella
:
Road Accessibility Mapping through Smartphone-Based Sensing. 11-18

Jayr Pereira
, Francisco Rodrigues
, Jaylton Alencar Pereira, Cleber Zanchettin
, Robson N. Fidalgo
:
Enhancing Brazilian Portuguese Augmentative and Alternative Communication with Card Prediction and Colourful Semantics. 19-26

Barry Bassi
, Giovanni Delnevo
, Mirko Franco
, Ombretta Gaggi
, Salvatore Gatto
, Silvia Mirri
, Kelvin Olaiya
:
Supporting Accessibility Auditing and HTML Validation using Large Language Models. 27-31
Theme: Artificial Intelligence and Agents: AIED - Artificial Intelligence for Education Track

Bianca Raimondi
, Saverio Giallorenzo
, Maurizio Gabbrielli
:
Affordably Fine-tuned LLMs Provide Better Answers to Course-specific MCQs. 32-39

Elisabetta Mazzullo
, Okan Bulut
, Cole Walsh
, Gill Sitarenios
, Alexander MacIntosh
:
Fine-Tuning GPT-3.5-Turbo for Automatic Feedback Generation. 40-47

Sebastian Speiser
:
Assessing the Real-World Impact of Disagreement Between Human Graders and LLMs. 48-53

Ville Heilala
, Roberto Araya
, Raija Hämäläinen
:
Beyond Text-to-Text: An Overview of Multimodal and Generative Artificial Intelligence for Education Using Topic Modeling. 54-63

Sukrit Leelaluk
, Cheng Tang
, Valdemar Svábenský
, Atsushi Shimada
:
Knowledge Distillation in RNN-Attention Models for Early Prediction of Student Performance. 64-73

Mika Setälä
, Ville Heilala
, Pieta Sikström
, Tommi Kärkkäinen
:
The Use of Generative Artificial Intelligence for Upper Secondary Mathematics Education Through the Lens of Technology Acceptance. 74-82

Seokho Ahn
, Junhyung Park
, Ganghee Go
, Chulhui Kim
, Jiho Jung
, Myung Sun Shin
, Do-Guk Kim
, Young-Duk Seo
:
UKTA: Unified Korean Text Analyzer. 83-92

Kaja Toomla
, Xiaojing Weng
, Eve Kikas
, Elina Malleus-Kotsegarov
, Kati Aus
, Roger Azevedo
, Danial Hooshyar
:
Measuring (meta)emotion, (meta)motivation, and (meta)cognition using digital trace data: A systematic review of K-12 self-regulated learning. 91-100

Sachini Gunasekara
, Mirka Saarela
:
Quantitative Assessment of Explainability in Machine Learning Models : A Study on the OULA Dataset. 101-103

Sine Zambach
:
AI-Enhanced Learning: Comparing Outcomes in Introductory and Advanced Programming Courses. 104-105

Shira Michel
:
Generative AI in Rural High Schools: Challenges and Opportunities. 106-108

Erica Raina
:
Student Research Abstract: A CSP-based approach to the generation of case studies for clinical guidelines. 109-113
Theme: Artificial Intelligence and Agents: AIFD - Artificial Intelligence for Financial Domain Track

Vittorio Prodomo
, Roberto Gonzalez
, Marco Gramaglia
, Simon Pietro Romano
:
Privacy-Preserving Data Obfuscation for Credit Scoring. 114-121

Yanqing Ma
, Carmine Ventre
, Renzo Tiranti
, Aiming Chen
:
Deep Generative Calibration on Stochastic Volatility Models with Applications in FX Barrier Options. 122-130

Filippo Pallucchini
, Xulang Zhang
, Rui Mao
, Erik Cambria
:
Self-explanatory and Retrieval-augmented LLMs for Financial Sentiment Analysis. 131-137

Cristina Herruzo-Lodeiro
, Francesc Rodríguez-Díaz
, Alicia Troncoso
, María Martínez-Ballesteros
:
Bioinspired evolutionary metaheuristic based on COVID spread for discovering numerical association rules. 138-144

Felipe Cunha
, Mirko Perkusich
, Danyllo Albuquerque
, Kyller Costa Gorgônio
, Hyggo Oliveira de Almeida
, Angelo Perkusich
:
A Genetic Algorithm with Convex Combination Crossover for Software Team Formation: Integrating Technical and Collaboration Skills. 146-153

Goshgar Can Ismayilov
:
[email protected]: Evolutionary Computation Meets Programmable Cryptography on Blockchain. 154-156

Juan Julián Merelo
, Mario García Valdez
, Gustavo Romero López
:
Energy consumption of evolutionary algorithms implemented in low-level languages. 157-160
Theme: Artificial Intelligence and Agents: BINF - Bioinformatics Track

Eleni Giovanoudi
, Dimitrios Rafailidis
:
RepAs: Iterative Refinement for Predicting Polyadenylation Site Usage. 161-168

Jesús S. Aguilar-Ruiz
, Raúl Giráldez
, Roberto Ruiz
:
Tree-based biclustering of genomic time series. 169-175

Piyush Borole
, Ajitha Rajan
:
MHCRule - Rule-based Model for Interpretable MHC Class I Binding Prediction. 176-185

Shahzad Ali
, Muhammad Salman Khan
, Yu Rim Lee
, Soo Young Park
, Won Young Tak
, Soon Ki Jung
:
Efficient Medical Image Segmentation Using Probabilistic KNN Label Downsampling. 186-193

Sara Khademioureh
, Irina Dinu
, Sergio Peignier
:
GSHAPA: Gene Set Analysis for Single-Cell RNAseq Using Random Forest and SHAP Values. 194-200
Theme: Distributed Systems: CC - Cloud Computing Track

Taeshin Kang
, Heonchang Yu
:
Elastic Vertical Memory Management for Container-based Stateful Applications in Kubernetes. 201-208

Armel Jeatsa
, Boris Teabe
:
CADiA: A CPU Cache Allocation System for Distributed Parallel Applications. 209-216

Niila Siilasjoki
, Mikko Raatikainen
, Jukka K. Nurminen
:
A Design Framework for Cloud-HPC Integration in MLOps. 217-224

Anderson Andrei Da Silva
, Yiannis Georgiou
, Michael Mercier
, Grégory Mounié
, Denis Trystram
:
FOA-Energy: A Multi-objective Energy-Aware Scheduling Policy for Serverless-based Edge-Cloud Continuum. 225-232

Tomoyuki Ehira
, Daisuke Kotani
, Yasuo Okabe
:
Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane. 233-240

Joonho Seo
, Jinmyeong Shin
, Geon-Woo Yoon
, Jae-Seok Kim
, Yoon-Ho Choi
:
Automated Cybersecurity Risk Assessment and Visualization Framework for Resilient Cloud IT Asset Management. 241-242

Catherine Alessandra Torres Charles
, Dante D. Sánchez-Gallegos
, Diana Carrizales-Espinoza
, Jesús Carretero
, José Luis González Compeán
:
Xook-Flow: an abstract communication channel model for the data exchange in computing continuum. 243-244
Theme: System Software and Security: CPS - Cyber-Physical Systems Track

Michael P. Heinl
, Adrian Reuter
, Sebastian N. Peters
, Markus Bever
:
Leveraging BRSKI to Protect the Hardware Supply Chain of Operational Technology: Opportunities and Challenges. 245-254

Chen-Jui Tu
, Chun-Yi Kuo
, Shuo-Han Chen
:
Harnessing Sub-blocks Erase of NAND flash for Secure Deletion Performance Enhancement on CPS. 255-262

Irma Rrushi
, John Olijnyk
, Kawthar Badran
, Julian L. Rrushi
:
Relay Memory Analysis via Constraint Satisfaction Modeling for Malware Detection in the Electrical Power Grid. 271-278

Hu Wan
, Yun Huang
, Shuhan Bai
, Xuan Sun
, Tei-Wei Kuo
, Chun Jason Xue
:
Rabbitail: A Tail Latency-Aware Scheduler for Deep Learning Recommendation Systems with Hierarchical Embedding Storage. 279-287

Jae-Seok Kim
, Joonho Seo
, Minho Jang
, Yoon-Ho Choi
:
A2SC: Adaptive Speed and Sensorless Control System for Motor Controllers based on Deep-RL. 288-291
Theme: Distributed Systems: DADS - Dependable, Adaptive, and Secure Distributed Systems Track

Matheus Alves Almeida
, Nelson Souto Rosa
:
Exploiting Fuzzy Controllers for Adapting Messaging Systems. 292-299

Rui Braga
, José Pereira
, Fábio Coelho
:
Towards Adaptive Transactional Consistency for Georeplicated Datastores. 300-307

Lorenzo Capra
:
Modelling Dependable Systems with Modular Rewritable Stochastic Petri Nets. 308-315

Narges Mehran
, Zahra Najafabadi Samani
, Samira Afzal
, Radu Prodan
, Frank Pallas
, Peter Dorfinger
:
PreMatch: A Prediction-based Scheduler for Dataflow Asynchronous Processing on the Computing Continuum. 316-324

Matteo Mordacchini
, Emanuele Carlini
, Patrizio Dazzi
:
A Decentralized Strategy for Unweighted Minimum Vertex Cover. 325-328
Theme: Distributed Systems: DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies Track

Luca Olivieri
, Luca Negrini
, Vincenzo Arceri
, Pietro Ferrara
, Agostino Cortesi
:
Detection of Read-Write Issues in Hyperledger Fabric Smart Contracts. 329-337

Luca Olivieri
, Luca Negrini
, Vincenzo Arceri
, Pietro Ferrara
, Agostino Cortesi
, Fausto Spoto
:
Static Detection of Untrusted Cross-Contract Invocations in Go Smart Contracts. 338-347

Avik Banerjee
, Michael Sober
, Stefan Schulte
:
Towards Solidity Smart Contract Efficiency Optimization through Code Mining. 348-357

Thanos Drossos
, Daniel Kirste
, Niclas Kannengießer
, Ali Sunyaev
:
Automated Market Makers: Toward More Profitable Liquidity Provisioning Strategies. 358-365

Sanghyeon Park
, Jeonghyuk Lee
, Seunghwa Lee
, Jung Hyun Chun
, Hyeonmyeong Cho
, Mingi Kim
, Hyun Ki Cho
, Soo-Mook Moon
:
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. 366-374

Martina Soleti
, Ankit Gangwal
, Mauro Conti
:
Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints. 376-385

Jan Gorzny
:
Decentralized Finance Withdrawal Delays. 386-388

Stefano Bistarelli
, Chiara Luchini
, Francesco Santini
:
Controlling VC disclosure with Terms of Use and ABAC in SSI. 389-390

Francisco Cordoba Otalora
:
Student Research Abstract: Subculture-Driven Speculation: Meme pump dot fun metric on the Solana Blockchain. 391-395
Theme: Information Systems: DBDM - Databases and Big Data Management Track

Jongsung Lee
, Sam Son
, Jonghyun Bae
, Yunho Jin
, Tae Jun Ham
, Jae W. Lee
:
SkipLSM: Fast Retrieval of Hot Key-Value Pairs on LSM Tree. 396-405

Luna Wang
, Shuaihua Zhao
, Song Jiang
:
MAPLe: A B+-tree with Multi-Access Parallel Leaves to Improve Access Concurrency and Locality. 406-414

Jiwon Son
, Dong-Hyuk Seo
, Junho Song
, Kyungsik Han
, Namhyuk Kim
, Sang-Wook Kim
:
A Novel Traffic Flow Prediction Model based on a Direct Spatio-Temporal Graph. 415-424

Alexandros Spitalas
, Georgios Tsolas
, Kostas Tsichlas
:
Partition Strategies for Vertex-Centric Historical Graph Systems. 425-431

Konstantinos Christopoulos, Evaggelos Daskalakis, Agorakis Bompotas, Konstantinos Tsichlas:
Triangle Counting in Large Historical Graphs. 432-439
Theme: Information Systems: DS - Data Streams Track

Nilesh Verma
, Albert Bifet
, Bernhard Pfahringer
, Maroua Bahri
:
ASML-REG: Automated Machine Learning for Data Stream Regression. 440-447

Aldo Marcelo Paim
, João Gama, Bruno Veloso
, Fabrício Enembreck
, Rita P. Ribeiro
:
Efficient Instance Selection in Tree-Based Models for Data Streams Classification. 448-455

Rania Taleb
, Sylvain Hallé
, Roger Villemaire
, Sébastien Gaboury
, Hubert Kenfack Ngankam
:
Sanity Checks in Smart Home Sensor Streams. 456-464

Ruirui Zhao
, Jianbin Sun
, João Gama, Jiang Jiang
:
Online Learning from Capricious Data streams with Flexible Hoeffding Tree. 465-469
Theme: Information Systems: DSTDS - Data Spaces and Trusted Data Sharing Track

Jan Pennekamp
, Joseph Leisten
, Paul Weiler
, Markus Dahlmanns
, Marcel Fey
, Christian Brecher
, Sandra Geisler
, Klaus Wehrle
:
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps. 470-479

Alessandro Palma
, Nikolaos Papadakis
, Georgios Bouloukakis
, Joaquín García-Alfaro
, Mattia Sospetti
, Kostas Magoutis
:
SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack Graphs. 480-489

Anastasiia Belova
, Artem Revenko
, Viola Gallina
, Daniel Bachlechner
, Sulayman K. Sowe
:
Bringing the Digital Product Passport to Life: Requirements Analysis for a Carbon Footprint Tracking System using Knowledge Graphs and Data Spaces. 490-497

An Ngoc Lam
, Phu Hong Nguyen
, Xiang Ma
:
Context-driven Edge-based Data Sharing for Industrial IoT Data Spaces. 498-505

Kevin Röbert
, Dominik Kaaser
, Mathias Fischer
:
Unlinkable Data Sharing with Dynamic Access Control. 506-508

Nikolaus Glombiewski
, Zeyd Boukhers
, Christian Beilschmidt
, Johannes Drönner
, Michael Mattig
, Artur Piet
, Robert Pietrzynski
, Mehrshad Jaberansary
, Macedo Maia
, Sebastian Beyvers
, Yeliz Üçer Yediel, Muhammad Hamza Akhtar
, Heiner Oberkampf
, Jonathan Hartman
, Bernhard Seeger
, Christoph Lange
:
From Theory to Practice: Demonstrators of FAIR Data Spaces Across Different Sectors. 509-513
Theme: System Software and Security: EMBS - Embedded Systems Track

Muhammad Tanveer Ali Ahmad
, Jesús Puerta Pestana
, Michael Krisper
, Marcel Baunach
:
A Scalable Approach for Memory Optimization in AUTOSAR Schedule Tables. 514-523

Donghui Lee
, Yongtae Kim
:
Exploiting Omega Network and Inexact Accumulative Parallel Counter to Enhance Energy Efficiency in Stochastic Computing. 524-531

Ze-Wei Liou
, Ding-Yong Hong
:
Optimizing Compute Core Assignment for Dynamic Batch Inference in AI Inference Accelerator. 532-540

Victor Gabriel Moyano
, Zain Alabedin Haj Hammadeh
, Selma Saidi
, Daniel Lüdtke
:
Efficient Scheduling of Weakly-Hard Real-Time Tasks with Sufficient Schedulability Condition. 541-550

Tayyaba Zainab
, Laura Harms
, Jens Karstens
, Olaf Landsiedel
:
SeismicSense: Phase Picking of Seismic Events with Embedded Machine Learning. 551-559

Sergi Vilardell
, Francesco Rossi
, Gabriele Giordana
, Isabel Serra
, Enrico Mezzetti
, Jaume Abella
, Francisco J. Cazorla
:
Probabilistic Timing Estimates in Scenarios Under Testing Constraints. 560-569

Bernhard Fischer
, Daniel Dorfmeister
, Flavio Ferrarotti
, Manuel Penz
, Michael Kargl
, Martina Zeinzinger
, Florian Eibensteiner
:
Software-Hardware Binding for Protection of Sensitive Data in Embedded Software. 570-577

Hongjoo Jin
, Jiwon Lee
, Taehun Kim
, Mu Yeol Sung
, Dong Hoon Lee
:
asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic. 578-587

Roger Pujol
, Jaume Abella
, Mohamed Hassan
, Francisco J. Cazorla
:
On the Time Predictability of AXI4. 588-589

Sungyoun Hwang
, Hyoju Seo
, Yongtae Kim
:
Can Less Accurate Be More Accurate? Surpassing Exact Multiplier with Approximate Design on NISQ Quantum Computers. 590-591

Akila Niroshan, Suranga Seneviratne, Aruna Seneviratne:
State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play Store. 592-596
Theme: Information Systems: GIA - Geographic Information Analytics Track
Theme: Artificial Intelligence and Agents: GMLR - Graph Models for Learning and Recognition Track

Corrado Mio
, Jianyi Lin
, Ernesto Damiani
, Gabriele Gianini
:
Supervised Ensemble-based Causal DAG Selection. 622-629

Andrés Tello
, Victoria Degeler
:
Contrasting Global and Local Representations for Human Activity Recognition using Graph Neural Networks. 630-637

Francesco Agnelli
, Omar Ghezzi
, Giorgio Blandano
, Jacopo Burger
, Giuseppe Facchi
, Lia Schmid
:
Enhancing 3D Face Analysis Using Graph Convolutional Networks with Kernel-Attentive Filters. 638-644

Nícolas Roque dos Santos
, Diego Minatel
, Alan Demétrius Baria Valejo, Alneu de Andrade Lopes
:
One-mode Projection of Bipartite Graphs for Text Classification using Graph Neural Networks. 645-647
Theme: Distributed Systems: IE - IoT and Edge Computing Track

Namgyu Jung
, Taimoor Khan
, Pankoo Kim
, Chang Choi
:
An Attention-based Dual Stream Network for Efficient Electricity Price Forecasting. 648-654

Ciro Rosa
, Nina S. T. Hirata
:
Knowledge Distillation for Reduced Footprint Semantic Segmentation with the U-Net. 655-662

Antero Taivalsaari
, Tommi Mikkonen
:
Visualizing Streaming Data in Industrial Scale IoT Systems. 663-670

Dewant Katare
, Mengying Zhou
, Yang Chen
, Marijn Janssen
, Aaron Yi Ding
:
Energy-Aware Vision Model Partitioning for Edge AI. 671-678

Luca Serena
, Pietro Manzoni
, Moreno Marzolla
, Gabriele D'Angelo
, Stefano Ferretti
:
Incentivizing Crowdsensing in IoT through Micropayments: A Simulation Study. 679-686

Inpyo Hong
, Youngwan Jo
, Hyojeong Lee
, Sunghyun Ahn
, Sanghyun Park
:
Advanced Knowledge Transfer: Refined Feature Distillation for Zero-Shot Quantization in Edge Computing. 687-694

Franco Cirillo
, Christian Esposito
:
Efficient PUF-Based IoT Authentication Framework without Fuzzy Extractor. 695-704

Julia Andersen
, Patrick Rathje
, Christian Imenkamp
, Agnes Koschmider
, Olaf Landsiedel
:
EdgeMiner: Distributed Process Mining at the Data Sources. 705-713

Xavier Pacheco
, Pedro Vieira
, Hervé Paulino
:
Paprika: Replica Placement for Multi-Region Edge Publish-Subscribe Systems. 714-721

Tarannum Ara
, Bivas Mitra
:
LonelyTracker: An IoT Solution with Multimodal Data and Split Computing for Secure Loneliness Detection. 722-729

João A. Simioni, Eduardo Kugler Viegas
, Altair O. Santin
, Pedro Horchulhack
:
An Early Exit Deep Neural Network for Fast Inference Intrusion Detection. 730-737

Taehyoung Kim
, Jiman Hong
:
Optimized Model Selection for Wind Farm Power Forecasting using Dynamic Time Warping. 738-745

Heiko Bornholdt
, Kevin Röbert
, Stefan Schulte
, Janick Edinger
, Mathias Fischer
:
A Software-Defined Overlay Networking Middleware for a Simplified Deployment of Distributed Application at the Edge. 746-748

Suhyeon Kim
, Haill An
, Jaejun Park
, Younhyun Jung:
A Lightweight and Accurate Localization Model for Anatomical Landmark in Medical Imaging Using Depth-Wise Separable Convolution. 749-750
Theme: Information Systems: IMFBS - Innovations in Multimedia Forensics and Biometric Security Track
Theme: Distributed Systems: INTOP - Interoperability Track

Jahoon Koo
, Yujun Kim
, Young-Gab Kim
:
BERT-based User Attribute Mapping Framework in Heterogeneous Systems. 778-786

Yeongyu Lee
, Hongseok Oh
, Moon-Sun Yeom
, Myung-Min Oh
, Kyungchang Jeong
, Jaemin Jeong
, Euijong Lee
:
Enhancing Interoperability in Controlled Environment Agriculture Systems Using Plant Electrical Signals. 787-794

Minhye Jeon
, Seokho Ahn
, Young-Duk Seo
:
Topic-Aware Knowledge Graph with Large Language Models for Interoperability in Recommender Systems. 795-802

Emylle Varela
, Thaís Batista
, Everton Cavalcante
, André Almeida:
Pursuing Interoperability in Digital Twins: An Analysis of the Current Research Landscape. 803-810

Kristián Kostál
, Dusan Morhác
, Juraj Mecir
:
Decentralized Bridge Between Polkadot and Cosmos. 811-814
Theme: Artificial Intelligence and Agents: IRMAS - Intelligent Robotics and Multi-Agent Systems Track

Joonyeol Sim
, Seonghyeon Lim
, Changjoo Nam
:
ST-CBS: Spatio-Temporal Conflict Based Search in Continuous Space for Multi-Agent Pathfinding. 815-822

James C. Ward
, Ryan McConville
, Edmund R. Hunt
:
Lightweight Decentralized Neural Network-Based Strategies for Multi-Robot Patrolling. 823-831

Lucyanno Frota
, Rui P. Rocha
:
A Semantic Mapping Framework for Service Robots. 832-839

Mario Andreu Villar
, Karen Yadira Lliguin León
, Jordi Arjona Aroca
, Arántzazu López-Larrainzar Salazar, Gerardo Minella
, José Manuel Bernabéu Aubán:
MARTES: Multi-Agent Reinforcement learning Training Environment for Scheduling. 840-849

Lucas Naury
, Adam Gouguet
, Guillaume Lozenguez
, Luc Fabresse
:
Communication Isolation For Multi-Robot Systems Using ROS2. 850-858

Jen-Wei Wang
, Daniel Nikovski
:
Learning Visual Servoing for Nonholonomic Mobile Robots with Uncalibrated Cameras. 859-861

Alvin Gandois
, Abdel-Illah Mouaddib
, Simon Le Gloannec
, Ayman Alfalou
:
Exploration and Active Recognition Strategy using Meta-MDP. 862-865
Theme: Artificial Intelligence and Agents: ISDE - Intelligent Systems for Digital Era Track

Paolo Grazieschi
, Massimo Vecchio
, Miguel Pincheira
, Fabio Antonelli
:
Soilcast: a Multitask Encoder-Decoder AI Model for Precision Agriculture. 866-873

Michelle Jungmann
, Sanja Lazarova-Molnar
:
Fusing Expert Knowledge and Internet of Things Data for Digital Twin Models: Addressing Uncertainty in Expert Statements. 874-881

Abdelfatah Kermali
, Kamaldeep Singh Oberoi
, Zeineb El Khalfi
, Yohan Dupuis
:
Deep Reinforcement Learning of Simulated Students Multimodal Mobility Behavior: Application to the City of Toulouse. 882-888

Diego Minatel
, Antonio Rafael Sabino Parmezan
, Nícolas Roque dos Santos
, Mariana Curi
, Alneu de Andrade Lopes
:
A DIF-Driven Threshold Tuning Method for Improving Group Fairness. 890-898

Sartaj Bhuvaji
, Prachitee Chouhan
, Madhuroopa Irukulla
, Jay Singhvi
, Wan D. Bae
, Shayma Alkobaisi
:
A Retrieval-Augmented Framework For Meeting Insight Extraction. 899-906

Edoardo Allegrini
, Edoardo Di Paolo
, Marinella Petrocchi
, Angelo Spognardi
:
Deciphering Social Behaviour: a Novel Biological Approach For Social Users Classification. 907-914

Bingxiang Chen
, John Tackman
, Manu Setälä
, Timo Poranen
, Zheying Zhang
:
Integrating Access Control with Retrieval-Augmented Generation: A Proof of Concept for Managing Sensitive Patient Profiles. 915-919
Theme: Artificial Intelligence and Agents: KNLP - Knowledge and Natural Language Processing Track

Frederico Leite Richardson
, Aline Villavicencio
, Ronaldo Menezes
:
The Rephrased Reality: Analysing Sentiment Shifts in LLM-Rephrased Text. 920-927

Samuele Colombo
, Simone D'Amico
, Lorenzo Malandri
, Fabio Mercorio
, Andrea Seveso
:
JobSet: Synthetic Job Advertisements Dataset for Labour Market Intelligence. 928-935

Khoa Nguyen
, Sadia Jahan
, Rocky Slavin
:
A Comparison of the Effects of Model Adaptation Techniques on Large Language Models for Non-Linguistic and Linguistic Tasks. 936-944

Mohammed Al-Maamari
, Mehdi Ben Amor
, Jelena Mitrovic
, Michael Granitzer
:
Mixture of Modular Experts: Distilling Knowledge from a Multilingual Teacher into Specialized Modular Language Models. 945-852

Rory Ward
, Dhairya Dalal
, Paul Buitelaar
, John G. Breslin
:
RAGCol: RAG-Based Automatic Video Colorization Through Text Caption Generation and Knowledge Enrichment. 953-962

Dohyeon Kim
, Taehoon Kim
, Jihoon Yang
:
Early Detection of Online Grooming with Language Models. 963-970

Vamsi Krishna Pasam
, Sravani Pati
, Carlos Toxtli Hernandez
:
AI-Powered Comment Triage for Efficient Collaboration and Feedback Management. 971-979

Paulo Viviurka Do Carmo
, Marcos Paulo Silva Gôlo
, Jonas Gwozdz
, Edgard Marx
, Ricardo Marcondes Marcacini
:
Improving Natural Product Knowledge Extraction from Academic Literature with Enhanced PDF Text Extraction and Large Language Models. 980-987

Mariana Chaves
, Elena Cabrio
, Serena Villata
:
FALCON: A multi-label graph-based dataset for fallacy classification in the COVID-19 infodemic. 988-995

Ibukun David Babatunde
, Obiabuchi Martin Nnanna
, Mark Klein
:
Moderating Large Scale Online Deliberative Processes with Large Language Models (LLMs): Enhancing Collective Decision-Making. 996-1003

Duc Anh Vu
, Cong-Duy Nguyen
, Xiaobao Wu
, Nhat M. Hoang
, Mingzhe Du
, Thong Nguyen
, Anh Tuan Luu
:
Curriculum Demonstration Selection for In-Context Learning. 1004-1006

Benjamin Molinet
, Elena Cabrio
, Serena Villata
:
Assessing Argument-based Natural Language Explanations in Medical Text. 1007-1008

Yasuaki Sumita
, Koh Takeuchi
, Hisashi Kashima
:
Cognitive Biases in Large Language Models: A Survey and Mitigation Experiments. 1009-1011

Annelen Brunner
, Anna Pohle
:
ChatGPT, what is a 'Glasanwalt'? - Linguistic strategies in a large language model's interpretation of novel compounds. 1012-1013

Federico Ravenda
, Seyed Ali Bahrainian
, Noriko Kando
, Antonietta Mira
, Andrea Raballo
, Fabio Crestani
:
Tailoring Adaptive-Zero-Shot Retrieval and Probabilistic Modelling for Psychometric Data. 1014-1018
Theme: Information Systems: KRR - Knowledge Representation and Reasoning Track
Theme: Artificial Intelligence and Agents: MLA - Machine Learning and its Applications Track

Joon Soo Yoo
, Baek Kyung Song
, Tae Min Ahn, Ji Won Heo, Ji Won Yoon:
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain. 1055-1064

Seokhee Jo
, Jungmin So
:
Supervised Contrastive Learning with Importance-based CutOut for Few-shot Image Classification. 1065-1073

Vincenzo Pasquadibisceglie
, Vito Recchia
, Annalisa Appice
, Donato Malerba
, Giuseppe Fiameni
:
GANDALF: A LLM-based approach to map bark beetle outbreaks in semantic stories of Sentinel-2 images. 1074-1081

Jamie Todd
, Junqi Jiang
, Aaron Russo
, Steffen Winkler
, Stuart Sale
, Joseph McMillan
, Antonio Rago
:
Explainable Time Series Prediction of Tyre Energy in Formula One Race Strategy. 1082-1089

Devin Thomas
, Junqi Jiang
, Avinash Kori
, Aaron Russo
, Steffen Winkler
, Stuart Sale
, Joseph McMillan
, Francesco Belardinelli
, Antonio Rago
:
Explainable Reinforcement Learning for Formula One Race Strategy. 1090-1097

Wellison R. M. Santos
, Adalberto R. Sampaio
, Nelson S. Rosa
, George D. C. Cavalcanti
:
Univariate vs multivariate prediction for containerised applications auto-scaling: a comparative study. 1098-1105

Yaejin Lee
, Junyeop Cha
, Eunil Park
:
Advancing Chronic Disease Prediction with Your First-Visit: Ensemble and Deep Learning Approaches. 1106-1113

An Huang
, Junggab Son
, Zuobin Xiong
:
DDSNet: A Lightweight Dense Depthwise Separable Network for Tumor Classification. 1114-1121

Min-Gyu Kang
, Keon Kim
, Yong Suk Choi
:
Bounded Editing: Multi-Object Image Manipulation with Region-Specific Control. 1122-1129

Seong Hyun Jeon
, Keon Kim
, Yong Suk Choi
:
FEFM: Feature Extraction and Fusion Module for Enhanced Time Series Anomaly Detection. 1130-1137

Hakjun Moon
, Dayeon Woo
, Simon S. Woo
:
High-Fidelity Face Age Transformation via Hierarchical Encoding and Contrastive Learning. 1138-1145

Min-Jyun Wu
, Hsiang-Jui Lin
, Shih-Hao Hung
, Chi-Sheng Shih
:
Unsupervised Training Framework for 3D Point Cloud Object Detection Model. 1146-1155

Elisa Mariani
, Nacéra Seghouani
, Yue Ma
:
A Hybrid Self-Correcting Approach for Embedding Ontology-based Knowledge Graphs. 1156-1163

Pablo Melendez Abarca
, Clemens Havas
:
Spatial Information Integration in Small Language Models for Document Layout Generation and Classification. 1164-1171

Muhammad Shaheryar
, Jong Taek Lee
, Soon Ki Jung
:
Unlearn and Protect: Selective Identity Removal in Diffusion Models for Privacy Preservation. 1172-1179

Hyein Seo
, Yuna Jeong
, Yong Suk Choi
:
TAECE : T2I-Adapter with Enhanced Color Expression for Improving Conditional Text-to-Image Generation Capabilities. 1180-1187

Pedro R. Pires
, Rafael T. Sereicikas
, Gregório F. Azevedo
, Tiago A. Almeida
:
Collaborative filtering through weighted similarities of user and item embeddings. 1188-1195

Gustavo P. Torquette
, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena
:
Network-based instance hardness measures for classification problems. 1196-1203

Ronaldo Inocêncio Júnior
, Márcio P. Basgalupp, Teresa Bernarda Ludermir, Ana Carolina Lorena
:
Data Balancing for Mitigating Sampling Bias in Machine Learning. 1204-1212

Marco Simoni
, Andrea Saracino
, Vinod P
, Mauro Conti
:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. 1213-1222

Zhiyong Zhang
, Ruyu Liu
, Xiufeng Liu
, Yunrui Zhu
, Yanyan Yang
, Chaochao Wang
, Jianhua Zhang
:
PULLM: A Multimodal Framework for Enhanced 3D Point Cloud Upsampling Using Large Language Models. 1223-1230

Dongjun Lee
, Donggeun Ko
, Jaekwang Kim
:
Hierarchical Contrastive Learning with Multiple Augmentations for Sequential Recommendation. 1231-1239

Victor Ulisses Pugliese, Oséias Faria de Arruda Ferreira
, Fábio Augusto Faria
:
Hybrid Flow Shop Scheduling through Reinforcement Learning: A systematic literature review. 1240-1249

Nicolò Malucelli
, Davide Domini
, Gianluca Aguzzi
, Mirko Viroli
:
Neighbor-Based Decentralized Training Strategies for Multi-Agent Reinforcement Learning. 1250-1257

Arthur Ning
, Flavius Frasincar
, Tarmo Robal
:
SC-Block++: A Blocking Algorithm Based on Adaptive Flood Regularization. 1258-1266

Francisco Igor de Lima Mendes
, Melquisedeque Carvalho Silva
, André Luiz Firmino Alves
, Eniedson Fabiano Pereira da Silva Júnior
, Mateus Queiroz Cunha
, Cláudio de Souza Baptista:
Comparative Study of Lexical and Semantic Approaches in Closed-domain Product Search. 1267-1274

João V. R. de Andrade
, Agostinho Freire
, Guilherme Carvalho Pereira
, Cristian Millán-Arias
, Bruno J. T. Fernandes
, Carmelo J. A. Bastos Filho
, Jorge Tortato
, Luiz Da Rocha
, Alexandre M. A. Maciel
:
Towards Robust Facial Recognition: Gabor Filter-Based Feature Extraction for NIR-VIS Heterogeneous Face Recognition. 1275-1281

Jimyeong Han
, Sangpil Kim
, Hogun Park
:
MELA: Multi-Event Localization Answering Framework for Video Question Answering. 1282-1289

Donggeun Ko
, Dongjun Lee
, Namjun Park
, Wonkyeong Shim
, Jaekwang Kim
:
Debiasing Classifiers by Amplifying Bias with Latent Diffusion and Large Language Models. 1290-1292

Jaewoong Kim
, Minseok Hur
, Moohong Min
:
From RAG to QA-RAG: Integrating Generative AI for Pharmaceutical Regulatory Compliance Process. 1293-1295

José Medina, Amnir Hadachi
, Paul Honeine
, Abdelaziz Bensrhair
:
Mamba-PKD: A Framework for Efficient and Scalable Model Compression in Image Classification. 1296-1298

Biagio Boi
, Ilaria Amelia Caggiano
, Christian Esposito
, Lucilla Gatt
:
On exploiting LLMs and Statistical Methods for testing Contractual Clarity in Legal Contracts. 1299-1300

Debanjali Banerjee
, Chee-Hung Henry Chu
:
Information Flow in Deep Learning Classification Networks. 1301-1302

Wonkyeong Shim
, Namjun Park
, Donggeun Ko
, San Kim
, Hyebin Gwag
, Youngjun Park
, Seungjung Park
, Jaekwang Kim
:
PacECG-Net: A Multi-modal Approach Integrating LLMs and ECG for LVSD Classification in Pacemaker Patients. 1303-1305

Vasu Jindal
:
Student Research Abstract: Dynamic Adversarial Soil Modeling: A GAN-Confident Learning Approach for Precision Agriculture. 1306-1308

Jayram Bhat Palamadai
:
Enhanced Cross-Task Learning Architecture for Boosted Decision Trees. 1309-1311

Alison Wang
:
Student Research Abstract: Evaluating Dialogue Summarization Using LLMs. 1312-1314
Theme: Software Design and Development: MSC - Mobile and Smart Computing Track
Theme: Distributed Systems: NET - Networking Track
Theme: System Software and Security: OSSP - Operating Systems and Software Platforms Track

Juwon Kim
, Dongeon Kim
, Seung Won Yoo
, Myeongin Cheon
, Joontaek Oh
, Youjip Won
:
lwFSCK: Light-weight Filesystem Check. 1374-1382

Kyungeun Oh
, Jeonghwan Oh
, Hangyeol Kim
, Seongmo An
, Junyoung Heo
, Jiman Hong
:
Efficient Kernel Source Code Management for BMC Optimization. 1383-1390

Hangyul Kim
, Inho Song
, Sam H. Noh
:
CRAZNS: A Case for Conventional Namespace Support for RAID with ZNS SSDs. 1391-1398

Hocine Mahni
, Stéphane Rubini
, Sebastien Gougeaud
, Philippe Deniel
, Jalil Boukhobza
:
Multicriteria File-Level Placement Policy for HPC Storage. 1399-1406

Ki Cheol Park
, Jae Hoon An
, Young Hwan Kim
, Hangyeol Kim
:
Scalable Orchestration Design for Mixed-Critical Task Scheduling in SDI-based Mobility Systems. 1407-1411
Theme: System Software and Security: PL - Programming Languages Track
Theme: Software Design and Development: QSE - Quantum Software Engineering Track

Arif Ali Khan
, Davide Taibi
, Cécile M. Perrault
, Muhammad Azeem Akbar
:
Advancing Quantum Software Engineering: A Vision of Hybrid Full-Stack Iterative Model. 1444-1448

Duong Bui
, Kimmo Halunen
:
NISQ Quantum Algorithm for K-Means Clustering. 1449-1456

Adriano H. O. Maia
, Marcus Freire
, Thiago Mello
, Roberto Rodrigues Filho
, Eduardo Santana de Almeida
, Cássio V. S. Prazeres, Gustavo Bittencourt Figueiredo
, Maycon Leone Maciel Peixoto
:
Q-Edge: Leveraging Quantum Computing for Enhanced Software Engineering in Vehicular Networks. 1457-1467

Boshuai Ye
:
C2|Q>: Unifying Classical and Quantum Programming. 1468-1472
Theme: Software Design and Development: RE - Requirements Engineering Track

María Isabel Limaylla Lunarejo
, Nelly Condori-Fernández
, Miguel Rodríguez Luaces
:
SimRE: A Requirements Similarity Tool for Software Product Lines. 1473-1480

Luca Sabatucci
, Massimo Cossentino
, Claudia Di Napoli
, Angelo Susi
:
Enhancing Device-Goal-Norm Modeling for Ambient Assisted Living with Large Language Models. 1481-1488

Ikram Darif
, Ghizlane El-Boussaidi
, Sègla Kpodjedo, Andrés Paz:
UTL: A Unified Language for Requirements Templates. 1489-1506

Abimael Santos
, Quelita A. D. S. Ribeiro, Moniky Ribeiro
, Jaelson Castro
, Maria Lencastre
:
NFR4SUSTAIN: Catalog of Requirements for Software Sustainability. 1507-1508

Tshepho Koboyatshwene
, Yirsaw Ayalew
:
Requirements Traceability: A Systematic Literature Review. 1509-1513
Theme: Artificial Intelligence and Agents: S2RAI - Safe, Secure and Robust AI Track

Dennis Gross
, Helge Spieker
:
PCTL Model Checking for Temporal RL Policy Safety Explanations. 1514-1521

Jayneel Vora
, Nader Bouacida
, Aditya Krishnan
, Prabhu R. V. Shankar
, Prasant Mohapatra
:
Identity-Focused Inference and Extraction Attacks on Diffusion Models. 1522-1530

Yue Qiu
:
TSPTE: Text sentiment-aware privacy protection method based on truncated exponent. 1531-1538

Salvatore Della Torca
, Valentina Casola
, Simone Izzo
:
N-Pixels: a Novel Grey-Box Adversarial Attack for Fooling Convolutional Neural Networks. 1539-1547

Abraham Chan
, Arpan Gujarati
, Karthik Pattabiraman
, Sathish Gopalakrishnan
:
D-semble: Efficient Diversity-Guided Search for Resilient ML Ensembles. 1548-1559
Theme: Distributed Systems: SCCI - Smart Cities and Critical Infrastructures Track

Alessandro Brighente
, Mauro Conti
, Savio Sciancalepore
, Harshul Vaishnav
:
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures. 1560-1569

Yu Sheng
, Ali Ozbakir
, Clara Maathuis
, Deniz Iren
, Stefano Bromuri
:
Enhancing Room Occupancy Inference from Sparse PIR Sensor Data Using Transformer Models. 1570-1579

Menno Bezema
, Alessandro Brighente
, Mauro Conti
, Luca Cosuti
:
BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior. 1580-1589

You Xu
, Marwan Hassani
:
Leveraging Contrastive Learning and Spatial Encoding for Prediction in Traffic Networks with Expanding Infrastructure. 1590-1599

Kaveh Khoshkhah
, Mozhgan Pourmoradnasseri
, Behzad Bamdad Mehrabani
, Sadok Ben Yahia
, Amnir Hadachi
:
Refining Urban Microscopic Traffic Simulations Accuracy Using a Customized Random Walk Model for Dynamic Stochastic Route Choice. 1600-1608

Arun Kumar Kalakanti
, Shrisha Rao
:
Dynamic Pricing for Electric Vehicle Charging. 1609-1611

Sultan Altarrazi
, Tomasz Szydlo
, Devki Nandan Jha, Rajiv Ranjan
:
Automating Data Quality Monitoring for Environmental Air Quality System. 1612-1616
Theme: Software Design and Development: SE - Software Engineering Track

Haya Samaana
, Diego Elias Costa
, Emad Shihab
, Ahmad Abdellatif
:
A Machine Learning-Based Approach For Detecting Malicious PyPI Packages. 1617-1626

Oebele Lijzenga
, Iman Hemati Moghadam
, Vadim Zaytsev
:
Leveraging Search-Based and Pre-Trained Code Language Models for Automated Program Repair. 1627-1636

Arina Kudriavtseva
, Nisar Ahmad Hotak
, Olga Gadyatskaya
:
My Code Is Less Secure with Gen AI: Surveying Developers' Perceptions of the Impact of Code Generation Tools on Security. 1637-1646

Marco Ehl
, Amir Shayan Ahmadian
, Katharina Großer
, Duaa Adel Ali Elsofi
, Marc Herrmann
, Alexander Specht
, Kurt Schneider
, Jan Jürjens
:
Supporting Software Engineers in IT Security and Privacy through Automated Knowledge Discovery. 1647-1656

Feng Dai
, Shigeru Chiba
:
A Two-stage Approach for Structurally-similar Cross-language Code-pair Detection. 1657-1665

Xiaokun Luan
, Yihao Zhang
, Meng Sun
:
MedTiny Code Generation for Enhancing RegLang Smart Contract Reliability. 1666-1673

Hiba Awad
, Thomas Ledoux
, Hugo Bruneliere
, Jonathan Rivalan
:
VeriFogOps: Automated Deployment Tool Selection and CI/CD Pipeline Generation for Verifying Fog Systems at Deployment Time. 1674-1691

Matthew Coyle
, Théo Le Calvar
, Samir Loudni
, Massimo Tisi
:
Towards Enforcing Structural OCL Constraints using Constraint Programming. 1692-1701

Si-Hyun Kim
, Jaewon Oh
:
Migrating Monolithic Web Applications to Microservice Architectures Considering Dependencies on Databases and Views. 1702-1711

Md. Fazle Rabbi
, Arifa Islam Champa
, Minhaz Fahim Zibran
:
Claim vs. Capability: A Comparative Analysis of the SBOM Generation Tools for Rust Projects. 1712-1720

Yuan Xia
, Aabha Shailesh Pingle, Deepayan Sur
, Jyotirmoy Deshmukh
, Mukund Raghothaman
, Srivatsan Ravi
:
LLM-guided Predicate Discovery and Data Augmentation for Learning Likely Program Invariants. 1721-1729

Vladislav Indykov
, Rebekka Wohlrab
, Daniel Strüber:
Quality trade-offs in ML-enabled systems: a multiple-case study. 1730-1737

Andrea Bombarda
, Giuseppe Ruscica
, Patrizia Scandurra
:
A self-managing IoT-Edge-Cloud architecture for improved robustness in environmental monitoring. 1738-1745

Leon Fernandez
, Gunnar Karlsson
:
Measuring the Impact of Fuzzing Activity in Networking Software. 1746-1751

Minh Khoi Nguyen
, Hanh Nhi Tran
, Ileana Ober
, Razan Abualsaud
:
An AI-augmented Framework for Automated and Intelligent Process Monitoring. 1752-1753

Bassam Alsanousi
, Stephanie Ludi
, Hyunsook Do
:
Mobile App Quality Assessment: Leveraging LLM-Driven Data Augmentation for Enhanced User Reviews Analysis. 1754-1756

Mívian M. Ferreira
, Diego Gonçalves
, Mariza Andrade da Silva Bigonha
, Kecia Aline M. Ferreira, Yuri Carvalhais
:
Detecting Co-change Using Categorized Commit Data. 1757-1758

Flavio Corradini
, Alessandro Marcelletti
, Andrea Morichetta
, Andrea Polini
, Barbara Re
, Francesco Tiezzi
:
Looseness for Choreography-based Software Architectures on Blockchain. 1759-1761
Theme: System Software and Security: SEC - Computer Security Track

Billy Bob Brumley
:
U Can Touch This! Microarchitectural Timing Attacks via Machine Clears. 1762-1771

Christofer Fellicious
, Mehdi Ben Amor
, Johannes Garstenauer
, Jelena Mitrovic
, Hans P. Reiser
, Michael Granitzer
:
MemBERT: Foundation model for memory forensics. 1772-1779

Ankit Gangwal
, P. Sahithi Reddy
, C. y. k. Sagar
:
Swiss Cheese CAPTCHA: A Novel Multi-barrier Mechanism for Bot Detection. 1780-1789

Dustin Kern
, Christoph Krauß
, Matthias Hollick
:
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid. 1790-1799

Viet Ha The
, Dustin Kern
, Phat Nguyen Tan
, Christoph Krauß
:
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks. 1800-1809

Chih-Kai Hsu
, Yung-Chi Tseng
, Shih-Wei Li
, Yi-Hui Lin
, Wei-Cheng Tian
, Lap Chung Lam
, Yu-Chen Liu
:
Strengthening Application Security through Integrity Protection of System Call Usage. 1810-1819

Chaejin Lim
, Beomjin Jin
, Hyoungshick Kim
:
Stealth Extension Exfiltration (SEE) Attacks: Stealing User Data without Permissions via Browser Extensions. 1820-1828

Xingchao Bian
, Hyungmin Cho
:
Detecting Cache-based Side-Channel Attacks by Leveraging Mesh Interconnect Traffic Monitoring. 1829-1838

Timm Lauser
, Maximilian Müller
, Ingmar Baumgart
, Christoph Krauß
:
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard. 1839-1848

SeonJin Hwang
, Assem Utaliyeva
, Hye Ju Lee
, Dongwoon Yoo
, Yoon-Ho Choi
:
GUARD: Generic API De-obfuscation and Obfuscated Malware Unpacking with sIAT. 1849-1856

Zhichao Zhou
, Hongyu Jin
, Panos Papadimitratos
:
Clogging DoS Resilient Bootstrapping of Efficient V2V Validation. 1857-1866

Robert Flood
, Marco Casadio
, David Aspinall
, Ekaterina Komendantskaya
:
Formally Verifying Robustness and Generalisation of Network Intrusion Detection Models. 1867-1876

Aditya Vardhan Padala
, Saurabh Bagchi
, Aravind Kumar Machiry
:
Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive Triaging. 1877-1885

Ashton McEntarffer
, Linxi Zhang
, Yu Wei Liu
, Mert D. Pesé:
Towards a Comprehensive Evaluation of Voltage-Based Fingerprinting for the CAN Bus. 1886-1893

Jonathan Brossard
:
Automatic Functions Annotations through Concrete Procedural Debugging and ELF Libification. 1894-1898
Theme: Information Systems: SONAMA - Social Network and Media Analysis Track

Amir Hossein Mohsen Nezhad Baravati
, Martina Viganò
, Carlo Alberto Bono
, Barbara Pernici
:
Enhancing User Experience with Topic-Based Message Retrieval in Telegram. 1899-1906

Harin Seo
, Hwanseong Joo
, Byungchul Tak
, Young-Kyoon Suh
:
HARIN: A Novel Metric for Hierarchical Topic Model Assessment. 1907-1916

Yoshiyuki Maekawa
, Shuichiro Haruta
, Yuma Dose
, Takahiro Hara
:
A News Recommendation Framework Utilizing ChatGPT: Estimating Target Audience and News Categories. 1917-1926

Annie Amorim
, Gabriel Assis
, Laura Ribeiro
, Daniel de Oliveira
, Aline Paes
:
Language Flavors in the Lusophone World: A BERT-Based Social Media Study of Portuguese in Brazil, Portugal, and Mozambique. 1927-1934

Junho Yoon
, Kiho Lim
, Chang Choi
:
Robustly Optimized Multimedia Local and Global Context Analysis at Multi-modal Balance. 1935-1940

Simone D'Amico
, Giancarlo Sperlì
, Anna Velyka
:
Enhancing user reliability using a contextual-based approach on heterogeneous graph. 1941-1942
Theme: Software Design and Development: ST - Semantic Technology Track

Kwabena Adu-Duodu
, Stanly Wilson
, Yinhao Li
, Aanuoluwapo Oladimeji
, Talea Huraysi
, Masoud Barati
, Charith Perera
, Ellis Solaiman
, Omer F. Rana
, Rajiv Ranjan
, Tejal Shah
:
A Circular Construction Product Ontology for End-of-Life Decision-Making. 1943-1952

Yang Lu
, Rabimba Karanjai
, Dana Alsagheer
, Keshav Kasichainula
, Lei Xu
, Weidong Shi
, Shou-Hsuan Stephen Huang
:
LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis. 1953-1960

Simone D'Amico
, Alessia De Santo
, Mario Mezzanzanica
, Fabio Mercorio
:
Taxonomy Expansion through Collaborative LLM Mapping. 1961-1968

Lorenzo Malandri
, Fabio Mercorio
, Antonio Serino
:
SkiLLMo: Normalized ESCO Skill Extraction through Transformer Models. 1969-1978

Yang Lu
:
LogSage: Log Summarization Assistant with Guided Enhancement. 1979-1981
Theme: Software Design and Development: SVT - Software Verification and Testing Track

Cécile Marcon
, Cyril Allignol
, Célia Picard
, Blair Archibald
, Michele Sevegnani
, Xavier Thirioux
:
BiCoq : Bigraphs Formalisation with Coq. 1982-1989

Aleksandar S. Dimovski
:
Weakest Safe Context Synthesis by Symbolic Game Semantics and Logical Abduction. 1990-1997

Étienne André
, Jean-Luc Béchennec
, Sudipta Chattopadhyay
, Sébastien Faucou
, Didier Lime
, Dylan Marinho
, Olivier H. Roux
, Jun Sun
:
Verifying Timed Properties of Programs in IoT nodes using Parametric Time Petri Nets. 1998-2006

Vignesh Manjunath
, Tobias Scheipel
, Marcel Baunach
:
Formal Modeling and Verification of Low-Level AUTOSAR OS Specifications: Towards Portability and Correctness. 2007-2016
Theme: Distributed Systems: WCN - Wireless Communications and Networking Track

Aditya Aryaman Das
, Gautam Srivastava
:
HyPoPE: A Hybrid Proof of Participation and Efficiency Protocol for Secure IoT Blockchain Networks. 2017-2023

Tanish Patel
, Rutvij H. Jhaveri
, Dhavalkumar Thakker
, Sandeep Verma
, Palash Yuvraj Ingle
:
Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection. 2024-2031

Attaullah Buriro
, Flaminia Venice Luccio
, Muhammad Azfar Bolzano Yaqub
:
Balancing the Scales: Using GANs and Class Balance for Superior Malware Detection. 2032-2039

Muhammad Ashar Tariq
, Mahnoor Ajmal
, Malik Muhammad Saad
, Ayesha Siddiqa
, Seri Park
, Dongkyun Kim
:
Towards Efficient Mobility Management in 5G-Advanced: A Predictive Model for Network Slice Availability. 2040-2047

Manish Yadav
, Mohamed Elmahallawy
, Sanjay Madria
, Samuel Frimpong
:
Predicting Battery Levels of Sensor Nodes Using Reinforcement Learning in Harsh Underground Mining Environments. 2048-2057

Anantha Raman Srikanthan
, Gautam Srivastava
:
Securing MQTT using Pseudo Random Number Generation. 2058-2061
Theme: Software Design and Development: WE - Web Engineering Track

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






