Default Cover Image

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)

July 13 2020 to July 17 2020

Madrid, Spain

ISSN: 0730-3157

ISBN: 978-1-7281-7303-0

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-36
Message from the Standing Committee ChairFreely available from IEEE.pp. 37-39
Message from the Standing Committee Vice ChairFreely available from IEEE.pp. 40-40
Message from the Program ChairsFreely available from IEEE.pp. 41-42
Message from COMPSAC 2020 Fast Abstract Co-ChairsFreely available from IEEE.pp. 43-43
Message from the Workshop ChairsFreely available from IEEE.pp. 44-45
Comparison of Collision Avoidance Algorithms for Autonomous Multi-agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Socially-Aware Multi-agent Velocity Obstacle Based Navigation for Nonholonomic VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 18-25
Deep Learning for Hardware-Constrained Driverless CarsFull-text access may be available. Sign in or learn about subscription options.pp. 26-29
A Comparative Analysis of Foraging Strategies for Swarm Robotics using ARGoS SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
Optimization of Parallel Applications Under CPU OvercommitmentFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Pre-Design Stage Cost Estimation for Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Towards an Architecture for Customizable DronesFull-text access may be available. Sign in or learn about subscription options.pp. 67-72
Mobi-PMFS: An Efficient and Durable In-Memory File System for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 73-78
Resource Depedency Analysis in Multi-Core SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 87-94
UNIFORM: Automatic Alignment of Open Learning DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Enhancing the Learning of Computing/IT Students with Open Educational ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
The Use of Metadata in Open Educational Resources Repositories: An Exploratory StudyFull-text access may be available. Sign in or learn about subscription options.pp. 123-132
Algorithmic Support for Personalized Course Selection and SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 143-152
A Short-Term Course of STEAM Education through IoT Exercises for High School StudentsFull-text access may be available. Sign in or learn about subscription options.pp. 153-157
A Comparative Study of the Academic Programs between Informatics/BioInformatics and Data Science in the U.S.Full-text access may be available. Sign in or learn about subscription options.pp. 165-171
Using Fine-Grained Test Cases for Improving Novice Program Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Digital Privacy Detectives: An Interactive Game for ClassroomsFull-text access may be available. Sign in or learn about subscription options.pp. 184-189
Teaching Mathematics in Scientific Bachelor Degrees Using a Blended ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Automatic Formative Assessment in Computer Science: Guidance to Model-Driven DesignFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
TTED-PU:A Transferable Tax Evasion Detection Method Based on Positive and Unlabeled LearningFull-text access may be available. Sign in or learn about subscription options.pp. 207-216
Transfer Learning from Planar to Spherical ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
A Novel Tax Evasion Detection Framework via Fused Transaction Network RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
Simulating the Printed Circuit Board Assembly Process for Image GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 245-254
Collaborative Filtering Recommendation Based on Multi-Domain Semantic FusionFull-text access may be available. Sign in or learn about subscription options.pp. 255-261
Data Linking as a Service: An Infrastructure for Generating and Publishing Linked Data on the WebFull-text access may be available. Sign in or learn about subscription options.pp. 262-271
Unified Target-based Sentiment Analysis by Dual-pointer Tagging SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 272-276
NEUD-TRI: Network Embedding Based on Upstream and Downstream for Transaction Risk IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 277-286
An Information Theoretic Learning for Causal Direction IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Training Confidence-Calibrated Classifier via Distributionally Robust LearningFull-text access may be available. Sign in or learn about subscription options.pp. 295-304
Research on Network Awareness of Enterprise Evaluation System IndicatorsFull-text access may be available. Sign in or learn about subscription options.pp. 311-315
AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
ReRe: A Lightweight Real-Time Ready-to-Go Anomaly Detection Approach for Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Human Gait Recognition Based on Integrated Gait Features using Kinect Depth CamerasFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
RVAE-ABFA : Robust Anomaly Detection for HighDimensional Data Using Variational AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Bayesian Neural Network Based Path Prediction Model Toward the Realization of Patent ValuationFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
Cinematographic Shot Classification through Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Evaluation of Parameter Update Effects in Deep Semi-Supervised Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 351-360
A Step Closer to Becoming Symbiotic with AI through EEG: A Review of Recent BCI TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 361-368
Secure IoT Data Management in a Private Ethereum BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 369-375
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 376-385
Managing Massive Amounts of Small Files in All-Flash StorageFull-text access may be available. Sign in or learn about subscription options.pp. 386-393
Dual Adversarial Networks for Land-Cover ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 394-399
Finding Emotion from Multi-lingual Voice DataFull-text access may be available. Sign in or learn about subscription options.pp. 408-417
Cue-Pin-Select, a Secure Mental Password ManagerFull-text access may be available. Sign in or learn about subscription options.pp. 418-428
IDEAL: An Interactive De-Anonymization Learning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 449-454
Applying a Gamification Approach to Knowledge Management in Higher Education InstitutionsFull-text access may be available. Sign in or learn about subscription options.pp. 455-459
Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2Full-text access may be available. Sign in or learn about subscription options.pp. 467-472
WTC^2: Impact-Aware Threat Analysis for Water Treatment CentersFull-text access may be available. Sign in or learn about subscription options.pp. 473-482
An ISO-Compliant Test Procedure for Technical Risk Analyses of IoT Systems Based on STRIDEFull-text access may be available. Sign in or learn about subscription options.pp. 499-504
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw TypesFull-text access may be available. Sign in or learn about subscription options.pp. 511-516
A Systematic Literature Review of Research in the Surgical Field of Medical RoboticsFull-text access may be available. Sign in or learn about subscription options.pp. 517-522
Blockchain: Future Facilitator of Asset Information Modelling and Management?Full-text access may be available. Sign in or learn about subscription options.pp. 523-528
A WiFi Assisted Pedestrian Heading Estimation Method Using GyroscopeFull-text access may be available. Sign in or learn about subscription options.pp. 535-544
Estimating Sleep Duration from Temporal Factors, Daily Activities, and Smartphone UseFull-text access may be available. Sign in or learn about subscription options.pp. 545-554
Design Issues in Running a Web Server on Bare PC Multi-Core ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 555-564
Rapid Container Scheduling for Reactive Relocation of Individual HTTP RequestsFull-text access may be available. Sign in or learn about subscription options.pp. 565-574
Adaptive Topology for Scalability and Immediacy in Distributed Publish/Subscribe MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 575-583
Proposal of an Efficient Blind Search Utilizing the Rendezvous of Random Walk AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 584-591
Spatio-Temporal Volume Data Aggregation for Crowdsensing in VDTNFull-text access may be available. Sign in or learn about subscription options.pp. 592-600
An Empirical Study of Tightest Network Calculus Analyses for Networks with Multicast FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 601-606
A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FITFull-text access may be available. Sign in or learn about subscription options.pp. 607-612
On the Effectiveness of Random Node Sampling in Influence Maximization on Unknown GraphFull-text access may be available. Sign in or learn about subscription options.pp. 613-618
On Estimating Network Topology from Observed Flow Sets at Measurement NodesFull-text access may be available. Sign in or learn about subscription options.pp. 619-624
Detection of Freezing of Gait in People with Parkinson’s Disease using SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 625-635
ThermoCam: Smart Baby Monitoring AssistantFull-text access may be available. Sign in or learn about subscription options.pp. 636-643
Regularization of Deep Neural Networks for EEG Seizure Detection to Mitigate OverfittingFull-text access may be available. Sign in or learn about subscription options.pp. 664-673
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 684-692
Mobile Sensor-Based Fall Detection FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 693-698
Toward a Non-Intrusive, Affordable Platform for Elderly Assistance and Health MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 699-704
Showing 100 out of 287