Proceedings of 39th International Conference on Computers and Their Applications20 articles•206 pages•Published: March 21, 2024 PapersPages 1-14 | Pages 15-24 | Pages 25-35 | Pages 36-45 | Pages 46-55 | Pages 56-60 | Pages 61-68 | Pages 69-76 | Pages 77-88 | Pages 89-102 | Pages 103-115 | Pages 116-128 | Pages 129-139 | Pages 140-149 | Pages 150-158 | Pages 159-168 | Pages 169-178 | Pages 179-188 | Pages 189-199 | Pages 200-206 |
KeyphrasesAccessibility, AI, AI Model, AI-based security systems, Approximate Query Processing, Artificial Intelligence, Asymmetric Key, Bard of Prey, Bike sharing system, binary tree, birth-death process, Blockchain, Boolean function, bootstrap sampling, Chatbot2, ChatGPT3, Cloud, communication, Constant storage, Cyber-Physical Systems, Data Security, Deep Deterministic Policy Gradient, digital signature, document categorization, ECC, ECDH, Education, ElGamal, Elliptic Curve, Elliptic Curve Cryptography, embeddings, Encryption, error estimation, evaluating, Federated Learning, generator, Google Bard, GPT, graph, Homomorphic, human-centered design, interaction, Internet of Things, k-anonymity, key, Large Language Models (LLMs), Latency, LFSR, machine learning3, Malware, Markov Network, memoization, Natural Language Processing, Natural Language Processing (NLP), neural networks, NIST, non-linearity, OpenACC, OpenAI, Optimization, P2P networks, parallel programming, Petri nets, Phishing, Point Operations, polyhedron, private key, pTree, public key, rear-end collision, recursion, Reinforcement Learning, Residue class, robot navigation, RSA, Script Kiddie, Security, Sentiment Analysis, SHA, Shortest paths storing and retrieval, simulation, social networks, star network, Tabulation, text classification, text mining, Timed Petri nets, transformer, Twitter, user experience, Vector Database, Zero Trust Security framework |
|