Day 1: June 24 |
09:00 | Opening |
| | Attila Kertész | Opening | |
| | | Live event on Webex (https://meetingsemea21.webex.com/meetingsemea21/j.php?MTID=mb64aa5912ba9b1a4ae35fa506c5c58fd) | |
| |
| |
09:20 | Session 1: Graphs |
| | session chair: Gábor Gosztolya |
09:20 | | Orsolya Kardos and Tamás Vinkó | Social network characteristics from the viewpoint of centrality measures | |
09:40 | | Ahmad T. Anaqreh, Boglárka G.-Tóth, and Tamás Vinkó | Symbolic Regression for Approximating Graph Geodetic Number: A preliminary study | |
10:00 | | Sándor Balázs Domonkos and Németh Tamás | Use data mining methods in quality measurement in the education systems | |
10:20 | | Viktor Homolya and Tamás Vinkó | Side road to axioms for two-dimensional centralities: Weighted signed network reconstruction from hub and authority values | |
| |
| 10:40Break |
11:00 | Session 2: Machine Learning |
| | session chair: Márk Jelasity |
11:00 | | Bence Bogdándy and Zsolt Tóth | Overview of Artificial Neural Network Abduction and Inversion Methods | |
11:20 | | Dávid Papp | Spectral Clustering based Active Zero-shot Learning | |
11:40 | | Mohammed Mohammed Amin and István Megyeri | Improving keyword spotting with limited training data using non-sequential data augmentation | |
| |
| 12:00Lunch Break |
13:00 | Session 3: Security |
| | session chair: Ákos Kiss |
13:00 | | Roland Nagy and Levente Buttyán | Towards Rootkit Detection on Embedded IoT Devices | |
13:20 | | Márton Juhász, Dorottya Papp, and Levente Buttyán | Towards Secure Remote Firmware Update on Embedded IoT Devices | |
13:40 | | Mohammed B. M. Kamel, Péter Ligeti, and Christoph Reich | Private/Public Resource Discovery for IoT: A Two-Layer Decentralized Model | |
14:00 | | László Viktor Jánoky, János Levendevoszky, and Péter Ekler | A Novel JWT Revocation Algorithm | |
| |
| 14:20Break |
14:30 | Session 4: Program Analysis |
| | session chair: István Siket |
14:30 | | Tamás Aladics, Judit Jász, and Rudolf Ferenc | Feature Extraction from JavaScript | |
14:50 | | Artúr Poór | Static Analysis Framework for Scala | |
15:10 | | Jenifer Tabita Ciuciu-Kiss, István Bozó, and Melinda Tóth | Towards Version Controlling in RefactorErl | |
| |
| 15:30Break |
15:40 | Session 5: Health Care |
| | session chair: Richárd Farkas |
15:40 | | José Vicente Egas-López and Gábor Gosztolya | Using the Fisher Vector Approach for Cold Identification | |
16:00 | | Hayder K. Fatlawi and Attila Kiss | Activity Recognition Model for Patients Data Stream using Adaptive Random Forest and Deep Learning Techniques | |
16:20 | | Zoltán Richárd Jánki and Vilmos Bilicki | Crosslayer Cache for Telemedicine | |
| |
|
Day 2: June 25 |
09:20 | Session 6: Simulation |
| | session chair: Zoltán Gingl |
09:20 | | Hamza Baniata | Fog-enhanced Blockchain Simulation | |
09:40 | | Dilshad Hassan Sallo and Gábor Kecskeméti | Parallel Simulation for The Event System of DISSECT-CF | |
10:00 | | Péter Hudoba and Attila Kovács | Toolset for supporting the number system research | |
10:20 | | András Márkus | Task allocation possibilities in simulated Fog environments | |
| |
| 10:40Break |
11:00 | Plenary Talk |
| | Tibor Gyimóthy | Software Maintenance and Evolution of Large Systems | |
| | | Video presentation (https://youtu.be/9OSZMb75Ufg) | |
| |
| 12:00Lunch Break |
13:00 | Session 7: Privacy |
| | session chair: András London |
13:00 | | Ádám Fodor, László Kopácsi, Zoltán Á. Milacski, and András Lőrincz | Speech de-identification with deep neural networks | |
13:20 | | Zoltán Szabó and Vilmos Bilicki | EHR Data Protection with Filtering of Sensitive Information in Native Cloud Systems | |
13:40 | | István Fábián and Gábor György Gulyás | On the Privacy Risks of Large-Scale Processing of Face Imprints | |
14:00 | | Yuping Yan and Péter Ligeti | A Combination of Attribute-Based Credentials with Attribute-Based Encryption for a Privacy-friendly Authentication | |
| |
| 14:20Break |
14:30 | Session 8: Computer Graphics I. |
| | session chair: Péter Balázs |
14:30 | | Gábor Karai and Péter Kardos | Distance-based Skeletonization on the BCC Grid | |
14:50 | | Papp György, Hoffmann Miklós, and Papp Ildikó | Embedding QR code onto triangulated meshes | |
15:10 | | Csaba Bálint | Iterative Operations on Footpoint Mappings | |
| |
| 15:30Break |
15:40 | Session 9: Bugs |
| | session chair: Árpád Beszédes |
15:40 | | Balázs Szűcs and Áron Ballagi | An Industrial Application of Autoencoders for Force-Displacement Measurement Monitoring | |
16:00 | | Gabriella Tóth and Máté Tejfel | Component-based error detection of P4 programs | |
16:20 | | Attila Szatmári | An Evaluation of Bug Taxonomy and Fault Localization Algorithms in JavaScript Programs | |
| |
|
Day 3: June 26 |
09:20 | Session 10: Computer Graphics II. |
| | session chair: Gábor Németh |
09:40 | | Tekla Tóth and Levente Hajder | Minimal solution for ellipse estimation from sphere projection using three contour points | |
10:00 | | Róbert Bán and Gábor Valasek | Geometric Distance Fields of Plane Curves | |
10:20 | | Mátyás Kiglics and Csaba Bálint | Quadric tracing: A geometric method for accelerated sphere tracing of implicit surfaces | |
| |
| 10:40Break |
11:00 | Plenary Talk |
| | Gábor Tardos | Fingerprinting Digital Documents | |
| | | Live event on Webex (https://meetingsemea21.webex.com/meetingsemea21/j.php?MTID=m7fc19219a516fe591a5cddb4c4ce68ba) | |
| | | Presentation slides | |
| |
| 12:00Lunch Break |
13:00 | Session 11: Distributed |
| | session chair: Tamás Vinkó |
13:00 | | Ali Al-Haboobi and Gábor Kecskeméti | Reducing Execution Time of An Existing Lambda based Scientific Workflow System | |
13:20 | | Ebenezer Komla Gavua and Gábor Kecskeméti | Improving MapReduce Speculative Executions with Globlal Snapshots | |
13:40 | | Biswajeeban Mishra and Biswaranjan Mishra | Evaluating and Analyzing MQTT Brokers with Stress-testing | |
14:00 | | Gábor Székely, Gergő Ládi, Tamás Holczer, and Levente Buttyán | Towards reverse engineering protocol state machines | |
14:20 | | Dániel Pásztor, Péter Ekler, and János Levendovszky | Energy-efficient routing in Wireless Sensor Networks | |
14:40 | | Dániel Balázs Rátai, Zoltán Horváth, Zoltán Porkoláb, and Melinda Tóth | Traquest model - a novel model for ACID concurrent computations | |
| |
| 15:00Break |
15:10 | Closing |
| | | |
| |
|