Proceedings of 39th International Conference on Computers and Their Applications

20 articles206 pagesPublished: March 21, 2024


Pages 1-14
Pages 15-24
Pages 25-35
Pages 36-45
Pages 46-55
Pages 56-60
Pages 61-68
Pages 69-76
Pages 77-88
Pages 89-102
Pages 103-115
Pages 116-128
Pages 129-139
Pages 140-149
Pages 150-158
Pages 159-168
Pages 169-178
Pages 179-188
Pages 189-199
Pages 200-206


Accessibility, AI, AI Model, AI-based security systems, Approximate Query Processing, Artificial Intelligence, Asymmetric Key, Bard of Prey, Bike sharing system, binary tree, birth-death process, Blockchain, Boolean function, bootstrap sampling, Chatbot2, ChatGPT3, Cloud, communication, Constant storage, Cyber-Physical Systems, Data Security, Deep Deterministic Policy Gradient, digital signature, document categorization, ECC, ECDH, Education, ElGamal, Elliptic Curve, Elliptic Curve Cryptography, embeddings, Encryption, error estimation, evaluating, Federated Learning, generator, Google Bard, GPT, graph, Homomorphic, human-centered design, interaction, Internet of Things, k-anonymity, key, Large Language Models (LLMs), Latency, LFSR, machine learning3, Malware, Markov Network, memoization, Natural Language Processing, Natural Language Processing (NLP), neural networks, NIST, non-linearity, OpenACC, OpenAI, Optimization, P2P networks, parallel programming, Petri nets, Phishing, Point Operations, polyhedron, private key, pTree, public key, rear-end collision, recursion, Reinforcement Learning, Residue class, robot navigation, RSA, Script Kiddie, Security, Sentiment Analysis, SHA, Shortest paths storing and retrieval, simulation, social networks, star network, Tabulation, text classification, text mining, Timed Petri nets, transformer, Twitter, user experience, Vector Database, Zero Trust Security framework