CATA2024: Volume InformationProceedings of 39th International Conference on Computers and Their Applications20 articles•206 pages•Published: March 21, 2024 PapersEvaldo Costa and Gabriel Silva 1-14 | Henry Hexmoor and Ebrahim Maghsoudlou 15-24 | Alina Campan, Murtadha Almakki, Trang Do and Traian Marius Truta 25-35 | Nashwan Sebi, Narendra Kintali and Ka C Cheok 36-45 | Sabin Maharjan, Lucy Kerns, Xiangjia Min and Feng Yu 46-55 | Jindong Chen, Sraawya Chintala and Yijie Han 56-60 | Jennifer Schulte, Patrick Engebretson and Mark Spanier 61-68 | Indranil Roy, Reshmi Mitra, Swathi Kaluvakuri, Nick Rahimi and Bidyut Gupta 69-76 | Dylan Damiano, Isabella Mitchell Wynter and Emdad Ahmed 77-88 | Meilin Liu, Kirill Kultinov and Chongjun Wang 89-102 | Sindhuja Penchala, Saydul Akbar Murad, Indranil Roy, Bidyut Gupta and Nick Rahimi 103-115 | Shane Chiovarou, Madison Bland and Seung-yun Kim 116-128 | Jonathan Shields and Thitima Srivatanakul 129-139 | Narayan Debnath, Andrés Francisco Farías, Andrés Alejandro Farías, Ana Gabriela Garis, Daniel Riesco and Germán Antonio Montejano 140-149 | Collin Orner and Md. Chowdhury 150-158 | Cameron Wohlbach, Md Minhaz Chowdhury and Shadman Latif 159-168 | Narayan Debnath, Mario Gabriel Peralta, Carlos Humberto Salgado, Lorena Baigorria, Daniel Riesco and Germán Montejano 169-178 | Lena Wallwork, Uchechukwu Obinwanne and Wenying Feng 179-188 | Ajay Bandi and Hemanth Kagitha 189-199 | Mohammad Hossain and Vinayak Sharma 200-206 |
KeyphrasesAccessibility, AI, AI-based security systems, AI Model, Approximate Query Processing, Artificial Intelligence, Asymmetric Key, Bard of Prey, Bike sharing system, binary tree, birth-death process, Blockchain, Boolean function, bootstrap sampling, Chatbot2, ChatGPT3, Cloud, communication, Constant storage, Cyber-Physical Systems, Data Security, Deep Deterministic Policy Gradient, digital signature, document categorization, ECC, ECDH, Education, ElGamal, Elliptic Curve, Elliptic Curve Cryptography, embeddings, Encryption, error estimation, evaluating, Federated Learning, generator, Google Bard, GPT, graph, Homomorphic, human-centered design, interaction, Internet of Things, k-anonymity, key, Large Language Models (LLMs), Latency, LFSR, machine learning3, Malware, Markov Network, memoization, Natural Language Processing, Natural Language Processing (NLP), neural networks, NIST, non-linearity, OpenACC, OpenAI, Optimization, P2P networks, parallel programming, Petri nets, Phishing, Point Operations, polyhedron, private key, pTree, public key, rear-end collision, recursion, Reinforcement Learning, Residue class, robot navigation, RSA, Script Kiddie, Security, Sentiment Analysis, SHA, Shortest paths storing and retrieval, simulation, social networks, star network, Tabulation, text classification, text mining, Timed Petri nets, transformer, Twitter, user experience, Vector Database, Zero Trust Security framework. |
|