CATA2024: Volume Information

Proceedings of 39th International Conference on Computers and Their Applications

20 articles206 pagesPublished: March 21, 2024

Papers

Evaldo Costa and Gabriel Silva
1-14
Henry Hexmoor and Ebrahim Maghsoudlou
15-24
Alina Campan, Murtadha Almakki, Trang Do and Traian Marius Truta
25-35
Nashwan Sebi, Narendra Kintali and Ka C Cheok
36-45
Sabin Maharjan, Lucy Kerns, Xiangjia Min and Feng Yu
46-55
Jindong Chen, Sraawya Chintala and Yijie Han
56-60
Jennifer Schulte, Patrick Engebretson and Mark Spanier
61-68
Indranil Roy, Reshmi Mitra, Swathi Kaluvakuri, Nick Rahimi and Bidyut Gupta
69-76
Dylan Damiano, Isabella Mitchell Wynter and Emdad Ahmed
77-88
Meilin Liu, Kirill Kultinov and Chongjun Wang
89-102
Sindhuja Penchala, Saydul Akbar Murad, Indranil Roy, Bidyut Gupta and Nick Rahimi
103-115
Shane Chiovarou, Madison Bland and Seung-yun Kim
116-128
Jonathan Shields and Thitima Srivatanakul
129-139
Narayan Debnath, Andrés Francisco Farías, Andrés Alejandro Farías, Ana Gabriela Garis, Daniel Riesco and Germán Antonio Montejano
140-149
Collin Orner and Md. Chowdhury
150-158
Cameron Wohlbach, Md Minhaz Chowdhury and Shadman Latif
159-168
Narayan Debnath, Mario Gabriel Peralta, Carlos Humberto Salgado, Lorena Baigorria, Daniel Riesco and Germán Montejano
169-178
Lena Wallwork, Uchechukwu Obinwanne and Wenying Feng
179-188
Ajay Bandi and Hemanth Kagitha
189-199
Mohammad Hossain and Vinayak Sharma
200-206

Keyphrases

Accessibility, AI, AI-based security systems, AI Model, Approximate Query Processing, Artificial Intelligence, Asymmetric Key, Bard of Prey, Bike sharing system, binary tree, birth-death process, Blockchain, Boolean function, bootstrap sampling, Chatbot2, ChatGPT3, Cloud, communication, Constant storage, Cyber-Physical Systems, Data Security, Deep Deterministic Policy Gradient, digital signature, document categorization, ECC, ECDH, Education, ElGamal, Elliptic Curve, Elliptic Curve Cryptography, embeddings, Encryption, error estimation, evaluating, Federated Learning, generator, Google Bard, GPT, graph, Homomorphic, human-centered design, interaction, Internet of Things, k-anonymity, key, Large Language Models (LLMs), Latency, LFSR, machine learning3, Malware, Markov Network, memoization, Natural Language Processing, Natural Language Processing (NLP), neural networks, NIST, non-linearity, OpenACC, OpenAI, Optimization, P2P networks, parallel programming, Petri nets, Phishing, Point Operations, polyhedron, private key, pTree, public key, rear-end collision, recursion, Reinforcement Learning, Residue class, robot navigation, RSA, Script Kiddie, Security, Sentiment Analysis, SHA, Shortest paths storing and retrieval, simulation, social networks, star network, Tabulation, text classification, text mining, Timed Petri nets, transformer, Twitter, user experience, Vector Database, Zero Trust Security framework.