Default Cover Image

2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)

Sept. 12 2022 to Sept. 15 2022

Hagenberg / Linz, Austria

ISBN: 978-1-6654-6545-8

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-12
Message from the Program ChairsFreely available from IEEE.pp. 13-14
Chairs and Program CommitteeFreely available from IEEE.pp. 15-20
Invited SpeakersFreely available from IEEE.pp. 21-23
TutorialsFreely available from IEEE.pp. 24-28
Complex Network Analysis using Artificial Intelligence AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Implementation Techniques for Mathematical Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
What’s New In QBF Solving? : (Invited Talk)Full-text access may be available. Sign in or learn about subscription options.pp. 16-18
Homotopy Techniques for Analytic Combinatorics in Several VariablesFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
Balanced Dense Multivariate Multiplication: The General CaseFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
Detecting Implicit Indeterminates in Symbolic ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 43-50
F-polynomials & Newton polytopesFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Artificial Conflict Sampling for Real Satisfiability ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Algorithm for intersecting symbolic and approximate linear differential varietiesFull-text access may be available. Sign in or learn about subscription options.pp. 63-70
FERPModels: A Certification Framework for Expansion-Based QBF SolvingFull-text access may be available. Sign in or learn about subscription options.pp. 80-83
Deciding Whether two Codes Have the Same Ambiguities is in co-NPFull-text access may be available. Sign in or learn about subscription options.pp. 84-91
Fully-adaptive Model for Broadcasting with Universal ListsFull-text access may be available. Sign in or learn about subscription options.pp. 92-99
On the bases of Zn latticeFull-text access may be available. Sign in or learn about subscription options.pp. 100-107
Proof of Useful Work Based on Matrix ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 108-116
Quantitative Programming and Markov Decision ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Empirical evaluation of LZW-Compressed Multiple Pattern Matching AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Fact-checking with explanationsFull-text access may be available. Sign in or learn about subscription options.pp. 150-157
Unsupervised Extractive Summarization with BERTFull-text access may be available. Sign in or learn about subscription options.pp. 158-164
Evaluation of Class Activation Methods for Understanding Image Classification TasksFull-text access may be available. Sign in or learn about subscription options.pp. 165-172
Advantages of a neuro-symbolic solution for monitoring IT infrastructures alertsFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Using N-Gram Variations in Static Analysis for Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Authors and Collaborator Groups Ranking Analysis on SYNASC using Centrality MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 200-207
An Ant Colony Optimisation Approach to the Densest k-Subgraph Problem*Full-text access may be available. Sign in or learn about subscription options.pp. 208-211
Proof of Concept for a Roundtrip Engineering IS for the New Enterprise in the Industry 4.0 EraFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Building customized Named Entity Recognition models for specific process automation tasksFull-text access may be available. Sign in or learn about subscription options.pp. 216-219
Intelligent Agent for Food Recognition in a Smart FridgeFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Machine Learning Models to Predict Soil Moisture for Irrigation ScheduleFull-text access may be available. Sign in or learn about subscription options.pp. 226-232
Learning networks hyper-parameter using multi-objective optimization of statistical performance metricsFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
Eye Detection For Drivers Using Convolutional Neural Networks With Automatically Generated Ground Truth DataFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Pedestrian Trajectory Prediction Based on Tree Method using Graph Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
Motorage - Computer vision-based self-sufficient smart parking systemFull-text access may be available. Sign in or learn about subscription options.pp. 250-257
Semi-Supervised Pipeline for Human Sprites Neural RenderingFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
An Evaluation of Image Texture Descriptors and their Invariant PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 284-292
Organic Structures Emerging From Bio-Inspired Graph-Rewriting AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 293-296
Local Optimization Often is Ill-conditioned in Genetic Programming for Symbolic RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 304-310
Application of Symbolic Regression in Polymer ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 311-318
Comparison of OLS and NLS to fit Transformation-Interaction-Rational expressionsFull-text access may be available. Sign in or learn about subscription options.pp. 319-322
Symbolic Regression with augmented dataset using RuleFitFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
Steel Phase Kinetics Modeling using Symbolic RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
AlphaFold-based protein analysis pipelineFull-text access may be available. Sign in or learn about subscription options.pp. 338-341
Cerebral Metastases Segmentation using Transfer Gliomas Learning and GrabCutFull-text access may be available. Sign in or learn about subscription options.pp. 342-346
Obfuscation Techniques Based on Random Strings Used in Malicious VBA ScriptsFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Reducing Adversarial Vulnerability Using GANsFull-text access may be available. Sign in or learn about subscription options.pp. 353-358
One side class SVM training methods for malware detectionFull-text access may be available. Sign in or learn about subscription options.pp. 359-364
Evaluating the effort of building a Machine Learning model for malware detection from ground zeroFull-text access may be available. Sign in or learn about subscription options.pp. 365-370
On Measuring the Dissimilarity between Biological SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 371-374
Author IndexFreely available from IEEE.pp. 375-376
Showing 68 out of 68