Computer Science – CACIC 2019: 25th Argentine Congress of Computer Science, CACIC 2019, Río Cuarto, Argentina, October 14–18, 2019, Revised Selected Papers
暂无分享,去创建一个
Krishna M. Sivalingam | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Xiaokang Yang | Raquel Oliveira Prates | Phoebe Chen | Xiaoyong Du | Orhun Kara | Dominik Ślęzak | Takashi Washio | Junsong Yuan | Marcelo Arroyo | Patricia Pesado | Ting Liu | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | R. Prates | Marcelo Arroyo | Patricia Pesado
[1] Kim Mens,et al. Implementation of a Feature-Based Context-Oriented Programming Language , 2019, COP@ECOOP.
[2] Silvia E. Gordillo,et al. Location-based mobile learning applications: A conceptual framework for co-design , 2017, 2017 Twelfth Latin American Conference on Learning Technologies (LACLO).
[3] Cha Zhang,et al. Ensemble Machine Learning: Methods and Applications , 2012 .
[4] Ian Horrocks,et al. BootOX: Practical Mapping of RDBs to OWL 2 , 2015, SEMWEB.
[5] Nadire Cavus,et al. Learning Management Systems Use in Science Education , 2014 .
[6] Kevin C. Almeroth,et al. An experimental study of multimedia traffic performance in mesh networks , 2005, WiTMeMo '05.
[7] Fernando Trinta,et al. A Model-Based Approach for Designing Location-Based Games , 2017, 2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames).
[8] Oliver Friedmann,et al. Solving Parity Games in Practice , 2009, ATVA.
[9] Luca Chittaro,et al. Assessing Knowledge Retention of an Immersive Serious Game vs. a Traditional Education Method in Aviation Safety , 2015, IEEE Transactions on Visualization and Computer Graphics.
[10] Patricia Pesado,et al. Development Frameworks for Mobile Devices: A Comparative Study about Energy Consumption , 2018, 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft).
[11] Pedro Casas,et al. Ensemble-learning Approaches for Network Security and Anomaly Detection , 2017, Big-DAMA@SIGCOMM.
[12] Jacob Cohen. A Coefficient of Agreement for Nominal Scales , 1960 .
[13] Michael Y. Hu,et al. Neural network forecasting of the British pound/US dol-lar exchange rate , 1998 .
[14] Rodrigo Paredes,et al. Graphs for Metric Space Searching , 2008 .
[15] Harold Abelson,et al. Measuring the usability and capability of App inventor to create mobile Applications , 2015, PROMOTO@SPLASH.
[16] Shuchi Grover,et al. Computational Thinking in K–12 , 2013 .
[17] Z. Meral Özsoyoglu,et al. Distance-based indexing for high-dimensional metric spaces , 1997, SIGMOD '97.
[18] Flavio D. Garcia,et al. Wirelessly lockpicking a smart card reader , 2014, International Journal of Information Security.
[19] Edgar Chávez,et al. Extreme Pivots for Faster Metric Indexes , 2013, SISAP.
[20] Thomas A. Henzinger,et al. Antichains: A New Algorithm for Checking Universality of Finite Automata , 2006, CAV.
[21] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[22] Detlev Marpe,et al. Comparative assessment of H.265/MPEG-HEVC, VP9, and H.264/MPEG-AVC encoders for low-delay video applications , 2014, Optics & Photonics - Optical Engineering + Applications.
[23] Claes Wohlin,et al. Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.
[24] Juan Manuel Dodero,et al. Block-Based Development of Mobile Learning Experiences for the Internet of Things , 2019, Sensors.
[25] R. Zurita,et al. Sistema de localización para robots móviles de bajo costo utilizando marcas de referencia artificiales en ambientes de interiores , 2019 .
[26] Ahmad A. Mazhar,et al. Comparative Study of Compression Techniques for Synthetic Videos , 2014 .
[27] Jürg Nievergelt,et al. The Grid File: An Adaptable, Symmetric Multikey File Structure , 1984, TODS.
[28] Mark Rouncefield,et al. Ontology and Model Alignment as a Means for Requirements Validation , 2010, 2010 IEEE Fourth International Conference on Semantic Computing.
[29] Dario G. Funez,et al. k-TVT: a flexible and effective method for early depression detection , 2019 .
[30] Kenneth D. Bailey,et al. A three-level measurement model , 1984 .
[31] Václav Snásel,et al. PM-tree: Pivoting Metric Tree for Similarity Search in Multimedia Databases , 2004, ADBIS.
[32] Michail N. Giannakos,et al. Enjoy and learn with educational games: Examining factors affecting learning performance , 2013, Comput. Educ..
[33] Peter Wentworth,et al. First year student performance in a test for computational thinking , 2013, SAICSIT '13.
[34] Aman Yadav,et al. Computational Thinking for All: Pedagogical Approaches to Embedding 21st Century Problem Solving in K-12 Classrooms , 2016 .
[35] Gonzalo Navarro,et al. Metric Spaces Library , 2008 .
[36] José Bernardo Carrasco,et al. Aprendo a investigar en educación , 2000 .
[37] Jovan Dj. Golic,et al. Cryptanalytic Attacks on MIFARE Classic Protocol , 2013, CT-RSA.
[38] Amparo García-Carbonell,et al. Perspectiva histórica de simulación y juego como estrategia docente: de la guerra al aula de lenguas para fines específicos , 2007 .
[39] Higinio Alberto Facchini,et al. Estudio experimental de tráfico de video en redes IPv6 multicast IEEE 802.11ac , 2019 .
[40] Rebecca Green,et al. Typologies and taxonomies: An introduction to classification techniques , 1996 .
[41] M. Becker,et al. A study of the DVD content scrambling system (CSS) algorithm , 2004, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004..
[42] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[43] Gianluca Bontempi,et al. Machine Learning Strategies for Time Series Forecasting , 2012, eBISS.
[44] Pavel Zezula,et al. M-tree: An Efficient Access Method for Similarity Search in Metric Spaces , 1997, VLDB.
[45] M. Román González,et al. COMPUTATIONAL THINKING TEST: DESIGN GUIDELINES AND CONTENT VALIDATION , 2015 .
[46] Fernando Asteasuain,et al. Specification Patterns: Formal and Easy , 2015, Int. J. Softw. Eng. Knowl. Eng..
[47] Fernando Asteasuain,et al. Aspect Oriented Behavioral Synthesis , 2019 .
[48] Shmuel Katz. Aspect Categories and Classes of Temporal Properties , 2006, LNCS Trans. Aspect Oriented Softw. Dev..
[49] Tomasz Janowski,et al. Universal and contextualized public services: Digital public service innovation framework , 2016, Gov. Inf. Q..
[50] Dalal Alrajeh,et al. Learning operational requirements from goal models , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[51] Curtis Busby-Earle,et al. Multi-perspective Machine Learning (MPML) — A Machine Learning Model for Multi-faceted Learning Problems , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).
[52] Ricardo A. Baeza-Yates,et al. Searching in metric spaces , 2001, CSUR.
[53] Martin J. Shepperd,et al. Comparing Software Prediction Techniques Using Simulation , 2001, IEEE Trans. Software Eng..
[54] Pegah Abed-Esfahani,et al. Transfer Learning for Depression: Early Detection and Severity Prediction from Social Media Postings , 2019, CLEF.
[55] Horst Bunke,et al. A graph distance metric based on the maximal common subgraph , 1998, Pattern Recognit. Lett..
[56] Edwin Olson,et al. AprilTag 2: Efficient and robust fiducial detection , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[57] Zoltan-Csaba Marton,et al. Evaluation and improvement of global pose estimation with multiple AprilTags for industrial manipulators , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[58] Keith Phalp,et al. An investigation of machine learning based prediction systems , 2000, J. Syst. Softw..
[59] Nils J. Nilsson,et al. Principles of Artificial Intelligence , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[60] Martin Hell,et al. Espresso: A stream cipher for 5G wireless communication systems , 2015, Cryptography and Communications.
[61] Kevin Driscoll. BeepBeep: Embedded Real-Time Encryption , 2002, FSE.
[62] Flavio D. Garcia,et al. Dismantling SecureMemory, CryptoMemory and CryptoRF , 2010, CCS '10.
[63] Robiah Yusof,et al. Cyber Threat Intelligence – Issue and Challenges , 2018 .
[64] Sebastián Uchitel,et al. Synthesizing nonanomalous event-based controllers for liveness goals , 2013, TSEM.
[65] Allan Hoi Kau Yuen,et al. Student continuance of learning management system use: A longitudinal exploration , 2018, Comput. Educ..
[66] Peter J. Denning,et al. Remaining trouble spots with computational thinking , 2017, Commun. ACM.
[67] Erik Tews,et al. Attacks on the DECT Authentication Mechanisms , 2009, CT-RSA.
[68] Gonzalo Navarro,et al. Fully dynamic metric access methods based on hyperplane partitioning , 2011, Inf. Syst..
[69] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[70] Philippe Pasquier,et al. Mova: Interactive Movement Analytics Platform , 2014, MOCO.
[71] Chao Li,et al. A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones , 2013, FSE.
[72] Sergio Alejandro Gómez,et al. A Framework for OBDA: Current State and Perspectives , 2019 .
[73] César A. Collazos,et al. CREANDO: Tool for creating pervasive games to increase the learning motivation in higher education students , 2019, Telematics Informatics.
[74] Patricia Pesado,et al. Multi-platform mobile application development analysis , 2015, 2015 IEEE 9th International Conference on Research Challenges in Information Science (RCIS).
[75] Ignac Lovrek,et al. Effort estimation model for software development projects based on use case reuse , 2018, J. Softw. Evol. Process..
[76] Thomas R. Gruber,et al. A Translation Approach to Portable Ontologies , 1993 .
[77] Gonzalo Navarro,et al. A compact space decomposition for effective metric indexing , 2005, Pattern Recognit. Lett..
[78] Patricia Silvana. Programar con Scratch en contextos educativos: ¿Asimilar directrices o co-construir Tecnologías para la Inclusión Social? , 2016 .
[79] Nora Reyes,et al. Faster Proximity Searching with the Distal SAT , 2014, SISAP.
[80] Victor Carneiro,et al. Analysis and Experiments on Early Detection of Depression , 2018, CLEF.
[81] Willi Meier,et al. The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption , 2005, CRYPTO.
[82] A. Collins,et al. Situated Cognition and the Culture of Learning , 1989 .
[83] Karina M. Cenci,et al. Herramientas para el desarrollo y la entrega de servicios públicos digitales de acción social para municipios bonaerenses , 2017 .
[84] Lars R. Knudsen,et al. Cryptanalysis of C2 , 2009, CRYPTO.
[85] Jorge Bernardino,et al. Progressive web apps: An alternative to the native mobile Apps , 2018, 2018 13th Iberian Conference on Information Systems and Technologies (CISTI).
[86] SANDRO MORASCA,et al. Software Measurement , 2015, Lecture Notes in Business Information Processing.
[87] Alejandra Cechich,et al. Taxonomy-Oriented Domain Analysis of GIS: A Case Study for Paleontological Software Systems , 2019, ISPRS Int. J. Geo Inf..
[88] Hang Li,et al. “ Tony ” DNN Embedding for “ Tony ” Selective Read for “ Tony ” ( a ) Attention-based Encoder-Decoder ( RNNSearch ) ( c ) State Update s 4 SourceVocabulary Softmax Prob , 2016 .
[89] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.
[90] Shieu-Hong Lin. Data mining for student retention management , 2012 .
[91] Le Gruenwald,et al. Parallel quadtree coding of large-scale raster geospatial data on GPGPUs , 2011, GIS.
[92] Eric Horvitz,et al. Social media as a measurement tool of depression in populations , 2013, WebSci.
[93] Felipe de Jesús Núñez Cárdenas,et al. Introducción a la Minería de Datos , 2011 .
[94] Ian Horrocks,et al. An Introduction to Description Logic , 2017 .
[95] John G. Apostolopoulos,et al. Video Streaming: Concepts, Algorithms, and Systems , 2002 .
[96] Marcelo Luis Errecalde,et al. UNSL's participation at eRisk 2018 Lab , 2018, CLEF.
[97] Christian Bonnet,et al. Survey, comparison and evaluation of cross platform mobile application development tools , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[98] Jean-François Raskin,et al. Improved Algorithms for the Automata-Based Approach to Model-Checking , 2007, TACAS.
[99] Jon Louis Bentley,et al. Quad trees a data structure for retrieval on composite keys , 1974, Acta Informatica.
[100] Edgar Chávez,et al. Solving All-k-Nearest Neighbor Problem without an Index , 2019 .
[101] Fabio Roli,et al. Ensemble learning for Intrusion Detection in Computer Networks , 2002 .
[102] Peter I. Corke,et al. Robotics, Vision and Control - Fundamental Algorithms in MATLAB® , 2011, Springer Tracts in Advanced Robotics.
[103] Megat F. Zuhairi,et al. Anomaly-based NIDS: A review of machine learning methods on malware detection , 2016, 2016 International Conference on Information and Communication Technology (ICICTM).
[104] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[105] Gunter Saake,et al. Feature-Oriented Software Product Lines , 2013, Springer Berlin Heidelberg.
[106] Nora Susana Reyes,et al. Heuristics for Computing k-Nearest Neighbors Graphs , 2019, CACIC.
[107] Bruce Schneier,et al. Cryptanalysis of the cellular message encryption algorithm , 1997 .
[108] Jürgen Jarosch,et al. Mobile Learning , 2014, HMD Praxis der Wirtschaftsinformatik.
[109] F. F. Pérez. Los modelos didácticos como instrumento de análisis y de intervención en la realidad educativa , 2000 .
[110] Peter Hubwieser,et al. Playing PISA with bebras , 2014, WiPSCE.
[111] Stelios Xinogalos,et al. A comparative analysis of cross-platform development approaches for mobile applications , 2013, BCI '13.
[112] E. Ruiz. An algorithm for finding nearest neighbours in (approximately) constant average time , 1986 .
[113] Paul Ozog,et al. Robust visual fiducials for skin-to-skin relative ship pose estimation , 2016, OCEANS 2016 MTS/IEEE Monterey.
[114] David H. Jonassen. El diseño de entornos constructivistas de aprendizaje , 2000 .
[115] Sean Bechhofer,et al. The OWL API: A Java API for OWL ontologies , 2011, Semantic Web.
[116] Jeannette M. Wing. Computational thinking and thinking about computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[117] Aidan Mooney,et al. Developing Computational Thinking Test Using Bebras Problems , 2018, CC-TEL/TACKLE@EC-TEL.
[118] Agustina Palacios Rizzo,et al. El modelo social de discapacidad: orígenes, caracterización y plasmación en la Convención Internacional sobre los Derechos de las Personas con Discapacidad. Serie: CERMI.es nº 36 , 2013 .
[119] Tor-Morten Grønli,et al. Progressive Web Apps for the Unified Development of Mobile Applications , 2017, WEBIST.
[120] Seok-Won Lee,et al. SQ^(2)E: An Approach to Requirements Validation with Scenario Question , 2010, 2010 Asia Pacific Software Engineering Conference.
[121] David Ball,et al. A global vision system for a robot soccer team , 2004 .
[122] Steven Burns,et al. Online Data Visualization of Multidimensional Databases Using the Hilbert Space-Filling Curve , 2006, VIEW.
[123] Michael Bell,et al. Service-Oriented Modeling: Service Analysis, Design, and Architecture , 2008 .
[124] Mykola Pechenizkiy,et al. Handbook of Educational Data Mining , 2010 .
[125] M. R. Brito,et al. Connectivity of the mutual k-nearest-neighbor graph in clustering and outlier detection , 1997 .
[126] Diego Calvanese,et al. Ontology-Based Data Access: A Survey , 2018, IJCAI.
[127] Ken C. K. Lee,et al. IR-Tree: An Efficient Index for Geographic Document Search , 2011, IEEE Trans. Knowl. Data Eng..
[128] Maya Cakmak,et al. Iterative Design of a System for Programming Socially Interactive Service Robots , 2016, ICSR.
[129] I. Witten,et al. CS Unplugged: An enrichment and extension programme for primary-aged students , 2015 .
[130] Nicolas Courtois,et al. Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards , 2008, IACR Cryptol. ePrint Arch..
[131] Habilidades de pensamiento computacional en docentes de primaria: evaluación usando Bebras , 2019 .
[132] M. D. Panizzi,et al. Perfiles de tesistas de la disciplina informática y su vinculación con los proyectos de investigación de la UM , 2019 .
[133] Peter Hubwieser,et al. Investigating the Psychometric Structure of Bebras Contest: Towards Mesuring Computational Thinking Skills , 2015, 2015 International Conference on Learning and Teaching in Computing and Engineering.
[134] Parul Arora,et al. Mining Twitter Data for Depression Detection , 2019, 2019 International Conference on Signal Processing and Communication (ICSC).
[135] Alejandra Cechich,et al. A Framework for Managing Requirements of Software Product Lines , 2018, CLEI Selected Papers.
[136] M. D. Panizzi,et al. Descubrimiento de las áreas de investigación seleccionadas por los tesistas de las carreras de informática de la UM mediante árboles de decisión , 2018 .
[137] Naciones Unidas. Convención sobre los derechos de las personas con discapacidad , 2016 .
[138] Pavel Zezula,et al. D-Index: Distance Searching Index for Metric Data Sets , 2003, Multimedia Tools and Applications.
[139] Jeannette M. Wing. An introduction to computer science for non-majors using principles of computation , 2007, SIGCSE.
[140] Agris Sostaks,et al. ViziQuer: A Web-Based Tool for Visual Diagrammatic Queries Over RDF Data , 2018, ESWC.
[141] David Barber,et al. Bayesian reasoning and machine learning , 2012 .
[142] Daniel Cohen-Or,et al. Motion overview of human actions , 2008, SIGGRAPH Asia '08.
[143] Sergio Alejandro Gómez,et al. Towards a Framework for Ontology-Based Data Access: Materialization of OWL Ontologies From Relational Databases , 2018 .
[144] Ana Casali,et al. Primary Level Teachers Training in Computer Science: Experience in the Argentine Context , 2019, CACIC.
[145] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[146] David Eppstein,et al. Iterated nearest neighbors and finding minimal polytopes , 1993, SODA '93.
[147] Shmuel Katz,et al. A closer look at aspect interference and cooperation , 2012, AOSD '12.
[148] Gonzalo Navarro. Searching in metric spaces by spatial approximation , 2002, The VLDB Journal.
[149] Marcelo Luis Errecalde,et al. UNSL at eRisk 2019: a Unified Approach for Anorexia, Self-harm and Depression Detection in Social Media , 2019, CLEF.
[150] Ricardo A. Baeza-Yates,et al. Query Clustering for Boosting Web Page Ranking , 2004, AWIC.
[151] Jiale Zhou,et al. An Observer-Based Technique with Trace Links for Requirements Validation in Embedded Real-Time Systems , 2014 .
[152] Richard E. Mayer,et al. Cognitive Theory of Multimedia Learning , 2021, The Cambridge Handbook of Multimedia Learning.
[153] Remco M. Dijkman,et al. Similarity of business process models: Metrics and evaluation , 2011, Inf. Syst..
[154] Dalton Serey Guerrero,et al. A systematic mapping study on assessing computational thinking abilities , 2016, 2016 IEEE Frontiers in Education Conference (FIE).
[155] Carsten Binnig,et al. RODI: Benchmarking relational-to-ontology mapping generation quality , 2017, Semantic Web.
[156] Alejandra Cechich,et al. Marine ecology service reuse through taxonomy-oriented SPL development , 2014, Comput. Geosci..
[157] S. Rao Kosaraju,et al. A decomposition of multidimensional point sets with applications to k-nearest-neighbors and n-body potential fields , 1995, JACM.
[158] Atul Luykx,et al. Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes , 2014, IACR Cryptol. ePrint Arch..
[159] Curtis Busby-Earle,et al. Multi-Perspective Machine Learning a Classifier Ensemble Method for Intrusion Detection , 2017, ICMLSC.
[160] Hamza Onoruoiza Salami,et al. UML Artifacts Reuse: State of the Art , 2014, ArXiv.
[161] Véronique Bruyère,et al. Acacia+, a Tool for LTL Synthesis , 2012, CAV.
[162] Zhongyang Xiong,et al. Fast text categorization using concise semantic analysis , 2011, Pattern Recognit. Lett..
[163] Valentina Dagiene,et al. Bebras - a Sustainable Community Building Model for the Concept Based Learning of Informatics and Computational Thinking , 2016, Informatics Educ..
[164] Adi Shamir,et al. A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony , 2010, Journal of Cryptology.
[165] A. Roli. Artificial Neural Networks , 2012, Lecture Notes in Computer Science.
[166] Alejandra Beatriz Lliteras,et al. MoLE: A web authoring tool for building mobile learning experiences , 2019 .
[167] Daniel Cohen-Or,et al. Action synopsis: pose selection and illustration , 2005, ACM Trans. Graph..
[168] William Millan,et al. Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.
[169] Roel Wieringa,et al. Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.
[170] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[171] Jerome Le Ny,et al. Autonomous Landing of a Multirotor Micro Air Vehicle on a High Velocity Ground Vehicle , 2016, ArXiv.
[173] Christos Faloutsos,et al. Slim-Trees: High Performance Metric Trees Minimizing Overlap Between Nodes , 2000, EDBT.
[174] Hamza Onoruoiza Salami,et al. A Framework for Class Diagram Retrieval Using Genetic Algorithm , 2012, SEKE.
[175] Marcin Jurdzinski,et al. Small Progress Measures for Solving Parity Games , 2000, STACS.
[176] Juan Manuel Dodero,et al. Authoring of educational mobile apps for the mathematics-learning analysis , 2018, TEEM.
[177] Jian Su,et al. Supervised and Traditional Term Weighting Methods for Automatic Text Categorization , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[178] Marcelo Luis Errecalde,et al. Temporal Variation of Terms as Concept Space for Early Risk Prediction , 2017, CLEF.
[179] Benno Stein,et al. A breakdown of quality flaws in Wikipedia , 2012, WebQuality '12.
[180] Jirí Vanícek,et al. Bebras Informatics Contest: Criteria for Good Tasks Revised , 2014, ISSEP.
[181] Raj Kiran Addu,et al. Effect of Codec Performance on Video QoE for videos encoded with Xvid, H.264 and WebM/VP8 , 2014 .
[182] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[183] Alejandro Dantiacq,et al. Experimental study of unicast and multicast video traffic using WAN test bed , 2016, 2016 IEEE Biennial Congress of Argentina (ARGENCON).
[184] Walter A. Burkhard,et al. Some approaches to best-match file searching , 1973, Commun. ACM.
[185] Mark Pegrum,et al. The What and Why of Mobile Learning Design , 2019, Mobile Lenses on Learning.
[186] Tomás Cerný,et al. Aspect-oriented challenges in system integration with microservices, SOA and IoT , 2019, Enterp. Inf. Syst..
[187] Véronique Hoste,et al. Emotion detection in suicide notes , 2013, Expert Syst. Appl..
[188] Matt Bower,et al. Relationship between computational thinking and a measure of intelligence as a general problem-solving ability , 2018, ITiCSE.
[189] Sunghyun Choi,et al. Empirical analysis of video multicast over WiFi , 2011, 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN).
[190] Tomasz Janowski,et al. Government information sharing: a framework for policy formulation , 2012 .
[191] Gonzalo Navarro,et al. Dynamic Spatial Approximation Trees for Massive Data , 2009, 2009 Second International Workshop on Similarity Search and Applications.
[192] Wan Mohd Nazmee Wan Zainon,et al. Multiview Similarity Assessment Technique of UML Diagrams , 2017 .
[193] Jan T. van der Veen,et al. The learning effects of computer simulations in science education , 2012, Comput. Educ..
[194] Hartmut Noltemeier,et al. Monotonous Bisector* Trees - A Tool for Efficient Partitioning of Complex Scenes of Geometric Objects , 1992, Data Structures and Efficient Algorithms.
[195] Eli Biham,et al. A Practical Attack on KeeLoq , 2008, Journal of Cryptology.
[196] Leonardo César Corbalán,et al. Development Approaches for Mobile Applications: Comparative Analysis of Features , 2018 .
[197] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[198] Israel Spiegler,et al. CM-tree: A dynamic clustered index for similarity search in metric databases , 2007, Data Knowl. Eng..
[199] Xu Zhong,et al. Design and recognition of artificial landmarks for reliable indoor self-localization of mobile robots , 2017 .
[200] Henny van der Meijden,et al. Effects of constructing versus playing an educational game on student motivation and deep learning strategy use , 2011, Comput. Educ..
[201] William Riggs,et al. How is mobile technology changing city planning? Developing a taxonomy for the future , 2017 .
[202] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[203] Hugo Jair Escalante,et al. Discriminative subprofile-specific representations for author profiling in social media , 2015, Knowl. Based Syst..
[204] Jakub Lokoc,et al. Clustered pivot tables for I/O-optimized similarity search , 2011, SISAP.
[205] Asunción Gómez-Pérez,et al. R2O, an extensible and semantically based database-to-ontology mapping language , 2004 .
[206] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[207] Jurandy Almeida,et al. BP-tree: an efficient index for similarity search in high-dimensional metric spaces , 2010, CIKM.
[208] Marcos R. Vieira,et al. DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data , 2010, J. Inf. Data Manag..
[209] Flavio D. Garcia,et al. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer , 2013, USENIX Security Symposium.
[210] G. V. Assche,et al. On the security of the keyed sponge construction , 2011 .
[211] William N. Robinson,et al. Finding reusable UML sequence diagrams automatically , 2004, IEEE Software.
[212] Bob Bates,et al. Game Design , 2004 .
[213] Peter N. Yianilos,et al. Data structures and algorithms for nearest neighbor search in general metric spaces , 1993, SODA '93.
[214] Bushra Anjum,et al. A QoS evaluation of video traffic models for H.264 AVC video , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).
[215] Norman W. Paton,et al. Structure inference for linked data sources using clustering , 2013, EDBT '13.
[216] Simon K. Warfield,et al. Spectral Clustering Algorithms for Ultrasound Image Segmentation , 2005, MICCAI.
[217] Patricia Pesado,et al. Approaches to mobile application development: Comparative performance analysis , 2017, 2017 Computing Conference.
[218] Tor-Morten Grønli,et al. A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development , 2018, ACM Comput. Surv..
[219] Shaoxiong Ji. Suicidal ideation detection in online social content , 2020 .
[220] Michael Zakharyaschev,et al. Ontology-Based Data Access with Databases: A Short Course , 2013, Reasoning Web.
[221] Iraj Kalantari,et al. A Data Structure and an Algorithm for the Nearest Point Problem , 1983, IEEE Transactions on Software Engineering.
[222] Ricardo A. Baeza-Yates,et al. Proximity Matching Using Fixed-Queries Trees , 1994, CPM.
[223] Fernando Asteasuain,et al. Declaratively building behavior by means of scenario clauses , 2015, Requirements Engineering.
[224] Serge Vaudenay,et al. Faster Correlation Attack on Bluetooth Keystream Generator E0 , 2004, CRYPTO.
[225] Alejandra Cechich,et al. Towards systematic software reuse of GIS: Insights from a case study , 2013, Comput. Geosci..
[226] Dong Kun Noh,et al. Cluster Ensemble with Link-Based Approach for Botnet Detection , 2017, Journal of Network and Systems Management.
[227] Mihaela Cocea,et al. Detection of Suicidal Twitter Posts , 2019, UKCI.
[228] Nuria Cortada de Kohan. Los sesgos cognitivos en la toma de decisiones , 2006 .
[229] Fernando Trinta,et al. LAGARTO: A LocAtion based Games AuthoRing TOol enhanced with augmented reality features , 2017, Entertain. Comput..
[230] Richard A. Harshman,et al. Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..
[231] Diego Calvanese,et al. The MASTRO system for ontology-based data access , 2011, Semantic Web.
[232] Rosana Satorre Cuerda,et al. Panorámica: serious games, gamification y mucho más , 2014 .
[233] Thomas Ledoux,et al. Aspect-Oriented Software Development , 2003 .
[234] Mehmet Aksit,et al. Software Architectures and Component Technology , 2001 .
[235] George S. Avrunin,et al. Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[236] Diego Garbervetsky,et al. Speeding Up Model Checking of Timed-Models by Combining Scenario Specialization and Live Component Analysis , 2009, FORMATS.
[237] Francisco Javier Rondan-Cataluña,et al. Moderating effect of learning styles on a learning management system's success , 2017, Telematics Informatics.
[238] Gonzalo Navarro,et al. An empirical evaluation of intrinsic dimension estimators , 2015, Inf. Syst..
[239] Benno Stein,et al. Overview of the 1th International Competition on Quality Flaw Prediction in Wikipedia , 2012, CLEF.
[240] Edwin Olson,et al. Flexible Layouts for Fiducial Tags , 2019, 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[241] Cecilia Verónica Sanz,et al. Los objetos de aprendizaje, un debate abierto y necesario , 2015 .
[242] Benno Stein,et al. Predicting quality flaws in user-generated content: the case of wikipedia , 2012, SIGIR '12.
[243] Aviad Rubinstein,et al. Hardness of approximate nearest neighbor search , 2018, STOC.
[244] Ming-Xing Wang,et al. Related Key Chosen IV Attack on Stream Cipher Espresso Variant , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[245] Belén Suárez Lantarón,et al. Descripción de una experiencia educativa inclusiva con alumnado universitario: Trabajando habilidades para el empleo , 2019, Tendencias Pedagógicas.
[246] Christof Paar,et al. Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards , 2012, 2012 IEEE Symposium on Security and Privacy.
[247] Jeffrey K. Uhlmann,et al. Satisfying General Proximity/Similarity Queries with Metric Trees , 1991, Inf. Process. Lett..
[248] Francisco Luis Gutiérrez Vela,et al. Geolympus - Cloud Platform for Supporting Location-Based Applications: A Pervasive Game Experience , 2019, WorldCIST.
[250] Christos Faloutsos,et al. The Omni-family of all-purpose access methods: a simple and effective way to make similarity search more efficient , 2007, The VLDB Journal.
[251] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[252] Sze Yee Lye,et al. Review on teaching and learning of computational thinking through programming: What is next for K-12? , 2014, Comput. Hum. Behav..
[253] Ralf-Philipp Weinmann,et al. Analysis of the DVB Common Scrambling Algorithm , 2004, Communications and Multimedia Security.
[254] Freddy Priyatna,et al. MIRROR: Automatic R2RML Mapping Generation from Relational Databases , 2015, ICWE.
[255] Huajun Chen,et al. The Semantic Web , 2011, Lecture Notes in Computer Science.
[256] Rob J Hyndman,et al. 25 years of time series forecasting , 2006 .
[257] Lior Rokach,et al. Ensemble-based classifiers , 2010, Artificial Intelligence Review.
[258] Roderick Bloem,et al. Debugging formal specifications using simple counterstrategies , 2009, 2009 Formal Methods in Computer-Aided Design.
[259] Robert J. Houghton,et al. Task Workflow Design and its impact on performance and volunteers' subjective preference in Virtual Citizen Science , 2017, Int. J. Hum. Comput. Stud..
[260] Jing Luan,et al. Data Mining and Its Applications in Higher Education , 2002 .
[261] Pietro Sabatino,et al. Ensemble based collaborative and distributed intrusion detection systems: A survey , 2016, J. Netw. Comput. Appl..
[262] Sergey Brin,et al. Near Neighbor Search in Large Metric Spaces , 1995, VLDB.
[263] Juan Fernández Sosa,et al. A Study of Non-functional Requirements in Apps for Mobile Devices , 2019, JCC&BD.
[264] Delfina Soares,et al. Mobile Applications in Central Government of Brazil and Portugal , 2019, ICEGOV.
[265] Alex Biryukov,et al. Cryptanalysis of the "Kindle" Cipher , 2012, Selected Areas in Cryptography.
[267] Valentina Dagiene,et al. Promoting Inclusive Informatics Education Through the Bebras Challenge to All K-12 Students , 2016, CompSysTech.
[268] Silvia E. Gordillo,et al. A Customizable Location-Based Mobile Learning Prototype: A Case of Study , 2018, 2018 XIII Latin American Conference on Learning Technologies (LACLO).
[269] Fabio Crestani,et al. A Test Collection for Research on Depression and Language Use , 2016, CLEF.
[270] Necati Demir,et al. Modified stacking ensemble approach to detect network intrusion , 2018, Turkish J. Electr. Eng. Comput. Sci..
[271] Achiya Bar-On,et al. A 2^70 Attack on the Full MISTY1 , 2016, CRYPTO.
[272] Daniel King,et al. Fetch & Freight : Standard Platforms for Service Robot Applications , 2016 .
[273] Bin Zhang,et al. Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF , 2011, ACNS.
[274] Aurora Vizcaíno,et al. Requirements Engineering Tools , 2011, IEEE Software.
[275] Santiago Cristobal Perez,et al. Experimental Study of Multicast and Unicast Video Traffic in WAN Links , 2017, IEEE Latin America Transactions.
[276] Gonzalo Navarro,et al. Practical Construction of k-Nearest Neighbor Graphs in Metric Spaces , 2006, WEA.
[277] Carsten S. Østerlund,et al. Coordinating Advanced Crowd Work: Extending Citizen Science , 2018, HICSS.
[278] Roland Mittermeir,et al. Perspectives and Visions of Computer Science Education in Primary and Secondary (K-12) Schools , 2014, TOCE.
[279] Lodewijk Bergmans. Towards Detection of Semantic Conflicts between Crosscutting Concerns , 2003 .
[280] Patricia Mabel Pesado,et al. PWA para unificar el desarrollo Desktop, Web y Mobile , 2019 .
[281] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[282] Jacob Krüger. Separation of concerns: experiences of the crowd , 2018, SAC.
[283] J. Martín. La discapacidad hoy , 2005 .
[284] Nora Reyes,et al. DSACL+-tree: A Dynamic Data Structure for Similarity Search in Secondary Memory , 2012, SISAP.
[285] David Novak,et al. Metric Index: An efficient and scalable solution for precise and approximate similarity search , 2011, Inf. Syst..
[286] Gregor Kiczales,et al. Aspect-oriented programming , 2001, ESEC/FSE-9.
[287] Luisa Micó,et al. A fast branch & bound nearest neighbour classifier in metric spaces , 1996, Pattern Recognit. Lett..
[288] Erik Tews,et al. Cryptanalysis of the DECT Standard Cipher , 2010, FSE.
[289] Evgeniy Gabrilovich,et al. Wikipedia-based Semantic Interpretation for Natural Language Processing , 2014, J. Artif. Intell. Res..
[290] Alfred V. Aho,et al. Computation and Computational Thinking , 2012, Comput. J..
[291] Silvia E. Gordillo,et al. Challenges in the Design of a Customized Location-Based Mobile Learning Application , 2018, 2018 XIII Latin American Conference on Learning Technologies (LACLO).