itcs 2022 accepted papers

Dave Touchette (Universit de Sherbrooke) The talks in the conference will not be recorded, and instead we will ask the authors of each paper to send us a 20-25 minute talk, which we will post on the website. If you would like to use a few slides please dowlowd them here. Rotem Oshman (Tel-Aviv Unviersity ) Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Technology and Computer Science. Maryam Aliakbarpour (Boston University/Northeastern University) Abhijeet Bhattacharya and Ahmed Doha, Sprott School of Management, Carleton University, Ottawa, Canada. Load additional information about publications from . The usage of information-theoretic tools and techniques in achieving other forms of security, including security against computationally-bounded and quantum attackers. Welcome to the ACM-SIAM Symposium on Discrete Algorithms (SODA 2023) submissions site. Sponsored by USENIX, the Advanced Computing Systems Association. All settings here will be stored as cookies with your web browser. 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques is organized by the International Association for Cryptologic Research (IACR). 11th Innovations in Theoretical Computer Science Conference, ITCS 2020, January 12-14, 2020, Seattle, Washington, USA. HotCRP.com signin Sign in using your HotCRP.com account. Although Ternay Content Addressable Memories (TCAMs) are faster in operation than Static Random Access Memories (SRAMs), TCAMs have disadvantages like high power consumption, low bit density, high cost and complex circuitry. The poster should be of size 4' by 4' and it can be printed LATA 2020 & 2021 will reserve significant room for young scholars at the beginning of their career. Franois Le Gall (Nagoya University) Augmented Reality, Gesture Recognition, Generic, Application, Technology, Accessibility. In your email, please include basic information (year or intended year of graduation, university, PhD advisor, thesis topic). On this basis, this survey intended to concentrate on students understanding level prediction on online learning through machine learning and learning analytics. There is high potential for IoT implementation and usage in developing countries, and major barriers must be addressed for IoT delivery. Kousha Etessami (University of Edinburgh) Abdelghani Boudjidj1 and Mohammed El Habib Souidi2, 1Ecole nationale Suprieure dInformatique (ESI), BP 68M, 16270, Oued-Smar Algiers, Algeria, ICOSI Lab University, Abbes Laghrour khenchela BP 1252 El Houria 40004 Khenchela, Algeria, 2University of Khenchela, Algeria, ICOSI Lab University, Abbes Laghrour khenchela BP 1252 El Houria 40004 Khenchela, Algeria. In addition, it is recommended that the paper contain, within the first 10 pages, a concise and clear presentation of the merits of the paper, including a discussion of its significance, innovations, and place within (or outside) of our field's scope and literature. ITCS 2022 Call for Papers is out. Based on the results, regression formula for consistency setting is identified such that delays are minimized, performance is maximized and strong data consistency is guaranteed. There will be 230 papers presented at the conference. Artificial Intelligence, Deep Learning, Inference, Neural Network Processor for Inference (NNP-I), ICE, DELPHI, DSP, SRAM, ICEBO, IFMs, OFMs, DPMO. Kena Vyas and PM Jat, DAIICT, Gandhinagar, Gujarat, India. The symptoms are lesion, mole color changes, redness, darkening of the skin or irregular border in skin mole. Participants should register using the following [registration link]. The 2022 USENIX Annual Technical Conference will be co-located with the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI '22) and take place on July 11-13, 2022, at the Omni La Costa Resort & Spa in Carlsbad, CA, USA. STOC 2021 Accepted Papers Discrepancy Minimization via a Self-Balancing Walk, Ryan Alweiss (Princeton University); Yang P. Liu (Stanford University); Mehtaab Sawhney (MIT) The Limits of Pan Privacy and Shuffle Privacy for Learning and Estimation, Albert Cheu, Jonathan Ullman (Northeastern University) ICDM 2022 is promoting open source and data sharing, as well as the reproducibility of the algorithms. that carries a strong conceptual message (e.g., introducing a new concept, model or understanding, opening a new line of inquiry within traditional The performance of the optimized Stacking model was verified to be better than that of other models through the experiments of single model comparison, optimization model comparison and dataset comparison. PC members will still be able to access author names in the reviewing process if they feel they need to; the intent of this procedure is to make it easier for PC members to remove unconscious biases. Program. Alexander Russell (University of Connecticut) 12th Innovations in Theoretical Computer Science Conference, ITCS 2021, January 6-8, 2021, Virtual Conference. Ruta Mehta (UIUC) Mar 17 2021 Call for papers page updated Mar 17 2021 Website launched ITCS seeks to promote research that carries a strong conceptual message (e.g., introducing a new concept, model or understanding, opening a new line of inquiry within traditional or . Breast cancer occurs in women rarely in men. Both will be held at The Royal Institution of Great Britain, 21 Albemarle Street, W1S 4BS London, UK. A Compilation Based Approach to Finding Centroids and Minimum Covering States in Planning. Copyright ITCS 2022 All Rights Reserved. Papers accepted to ITCS should not be submitted to any other archival conferences. Noga Ron-Zewi (University of Haifa) This paper recognized the students emotion through face expression detection and then followed the learning analytics in order to predict the understanding level of students and to take decisions on the online learning system. when coming from a more senior researcher to a less senior one. We present comprehensive comparison between different transformer-based models and conclude with mentioning key points and future research roadmap. Paul Goldberg (Oxford University ) Registration. (ISAAC 2016) Best Student Paper Award. January 15, 2022: Paper submissions due January 15, 2022 23:59 AoE23:59 AoE. Papers should be pre-registered by September 5. Multi-agent systems, Organizational models, Category theory, composition. You are free (and encouraged) to post your paper on your web page, the arXiv, etc. ICALP is the main conference and annual meeting of the European Association for Theoretical Computer Science (EATCS). All ITCS attendees are expected to behave accordingly. Paper accepted to USENIX Security 2023 February 21, 2023; 2 full papers accepted to WiSec 2023 January 28, 2023; Cybersecurity Program Led By Dr. Saxena Ranks Best! This paper explores the challenges that impact the adoption of IoT in developing countries based on the technical context. Augmented Reality (AR) is one of the most popular trends in, technology today. When the goal is to maximize the objective, approximation algorithms for probing problems are well-studied. (These are not the conference proceedings. You are free (and encouraged) to post your paper on your web page, the arXiv, etc. To protect your privacy, all features that rely on external API calls from your browser are turned off by default. http://safetoc.org/index.php/toc-advisors/, Fermi Ma (Simons Institute and UC Berkeley). This paper is mainly based on the idea of modeling the multi-agent organization AGR and YAMAM in a categorical way in order to obtain formal semantic models describing these organizations of MAS, then compose them using also the theory of categories which represents a very sophisticated mathematical toolbox based on composition. ITCS seeks to promote research that carries a strong conceptual message (e.g., introducing a new concept, model or understanding, opening a new line of inquiry within traditional or interdisciplinary areas, introducing new mathematical techniques and methodologies, or new applications of known techniques). This study aims to address this issue by utilising Named Entity Recognition (NER) to identify and extract various Construct entities and mentions found in research paper abstracts. Authors are asked to indicate COI with PC members as a part of the submission process. NoSQL, Cassandra, Consistency, Latency, YCSB, and Performance. As a result, many universities now employ online learning as a viable option. Rahul Santhanam (Oxford University ) Authors are required to submit a COI declaration upon submission. We would love it if you participated. As a result, many universities are currently grappling with the challenge of designing conventional (face-to-face), e-learning, or blended learning courses under limited circumstances that yet suit students requirements. Researchers, engineers, practitioners, and students, from industry, universities and government agencies are invited to present their latest work and to discuss research and applications for intelligent vehicles and . Frederic Magniez (CNRS Paris) Artificial Intelligence (AI) accelerators can be divided into two main buckets, one for training and another for inference over the trained models. A lot of data mining techniques for analyzing the data have been used so far. To accommodate the publishing traditions of different fields, authors of accepted papers can ask the PC chair to have only a one page abstract of the paper appear in the proceedings, along with a URL pointing to the PDF of the full paper on an online archive. Conference proceedings will be published by PMLR. To justify the functionality and performance of the design, a 64 x 32 SRAMbased efficient TCAM is successfully designed on Xilinx Field-Programmable Gate Array (FPGA) using Verilog HDL. Sebastien Bubeck (Microsoft Research), Christian Coester (University of Sheffield), Yuval Rabani (Hebrew University). Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Eurocrypt 2021 is the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques and will take place in Zagreb, Croatia on October 17-21 2021. The 63rd Annual Symposium on Foundations of Computer Science (FOCS 2022), sponsored by the IEEE Computer Society Technical Committee on Mathematical Foundations of Computing, will be held in Denver, Colorado October 31November 3, 2022. The appended accelerometer in the vehicle detects the slant of the vehicle and distinguishes mishap. and so on during the "Graduating bits" session. Innovations in Theoretical Computer Science, ITCS '13, Berkeley, CA, USA, January 9-12, 2013. The paper registration is here; CLOSED. A good paper will: Motivate a significant problem Propose an interesting and compelling solution Demonstrate the practicality and benefits of the solution Draw appropriate conclusions Clearly describe the paper's contributions ICAPS-2022 Accepted Papers. The font size should be at least 11 point and the paper should be single column. Authors should upload a PDF of the paper to the submission server using the following link: . Papers may be changed/removed, so do not use this list as permanent). Named Entity Recognition, Transformers, BERT, SCIBERT, Management Knowledge Discovery. As usual, ICALP will be preceded by a series of workshops, which will take place on 12 . Manipuri language has richer morphology, SOV structure and belongs to the Sino-Tibetan family. Elazar Goldenberg; Karthik C. S.. Hardness Amplification of Optimization Problems Orr Paradise. Papers accepted at IROS 2022 Conference Three SLMC papers accepted at IROS 2022 Three SLMC papers (one with IEEE-RAL option) have been accepted at the International Conference on Intelligent Robots and Systems (IROS2022) to be held in Kyoto, Japan. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Benjamin Rossman (Duke University ) In this paper, we firstly give an overview of the car security domain then we present the more referenced related works and finally we present our security solution which consists in defining a physical separation between two sets of embedded systems. ITCS 2023 Accepted Papers Rigidity for Monogamy-of-Entanglement Games Authors: Anne Broadbent, Eric Culf (University of Ottawa) Opponent Indifference in Rating Systems: A Theoretical Case for Sonas Authors: Greg Bodwin, Forest Zhang (University of Michigan) Online Learning and Bandits with Queried Hints ITCS welcomes both conceptual and technical contributions whose contents will advance and inspire the greater theory community. The 48th International Colloquium on Automata, Languages, and Programming (ICALP) will take place in Glasgow, Scotland, on 12-16 July 2021. when coming from a more senior researcher to a less senior one. ITCS is committed to an inclusive conference experience, respectful of all participants, and free from any discrimination or harassment, including unwelcome advances or propositions of an intimate nature, particularly Breast cancer is one of the diseases that make a high number of deaths every year. This is one of the important traditions of ITCS, and not to be missed! Proceedings. Mahsa Derakhshan (Princeton University) Report to Mark Braverman (ITCS'22 PC chair) or Ronitt Rubinfeld (ITCS Steering Committee chair). The submission should include proofs of all central claims. This approach aims to make the nearby clinical focus aware of the incident in order to provide early clinical guidance. Mark Braverman (Princeton University, chair) Proceedings will be available in an open-access format ahead of the conference start. 11 th International Conference on Information Technology Convergence and Services (ITCS 2022) November 12 ~ 13, 2022, Chennai, India. Rafael Pass (Cornell University ) The conference will be hosted by the Simons Institute and will be held online or in hybrid mode in January 2022 (exact dates TBD). List of accepted papers now available May 3 2021 Paper submissions are open Apr 26 2021 Paper submission page updated (with additional important information for authors!) Overview. In addition, the program committee may consult with journal editors and program chairs of other conferences about controversial issues The supervised learning algorithm, stock data mining, undergraduate admission scheme, breast lesion detection and performance analysis. Sophiya Mathews1 and Dr. D. John Aravindhar2, 1Assistant Professor, Department of Computer Science, SNMIMT, 2Professor, Department of CSE, HITS, Padur, Chennai. These systems offer more efficiency to the car and comfort to passengers. Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Sofya Raskhodnikova (Boston University ) Authors: Cynthia Rush (Columbia); Fiona Skerman (Uppsala University); Alexander S Wein (UC Davis); Dana Yang (Cornell). While in the traditional online model, an algorithm has no information about the request sequence, we assume that there is given some advice (e.g. Simultaneous submission to ITCS and to a journal is allowed. FOCS 2022 Accepted Papers Shortest Paths without a Map, but with an Entropic Regularizer. Justin Holmgren (NTT Research) Welcome to the 13th Innovations in Theoretical Computer Science Conference (ITCS 2022) submissions site. Accepted papers are published in two annual CSCW issues of the Proceedings of the ACM on Human Computer Interaction (PACM HCI). The font size should be at least 11 point and the paper should be single column. Guy Moshkovitz (CUNY) Here the Bengali script is used for developing the system. community. Hagit Attiya (Technion) Talya Eden (MIT and Boston University) when coming from a more senior researcher to a less senior one. There can be many errors which can occur during the Inference execution. So please proceed with care and consider checking the information given by OpenAlex. harassment or other unethical behavior at the conference, we encourage you to seek advice by contacting SafeToC advocates (http://safetoc.org/index.php/toc-advisors/). Jasper Lee (University of Wisconsin-Madison) ITCS 02.11.2021 Paper accepted at ITCS The Innovations in Theoretical Computer Science (ITCS) conference aims at highlighting novel research directions in the theory of computing and facilitate the dialog between its different subfields. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar. LIPIcs 215, Schloss Dagstuhl - Leibniz-Zentrum fr Informatik 2022, ISBN 978-3-95977-217-4. load references from crossref.org and opencitations.net. However, not all training institutions, particularly in low-resource developing nations, have the adequate facilities, resources, or experience to conduct online learning. Participants near to graduation (on either side) will be given an opportunity to present their results, research, plans, personality, January 25, 2023; EarSpy in Media January 25, 2023; Dr. Saxena is a Co-PI on Thematic AI Lab November 28, 2022; Paper accepted to ICISC 2022 November 28, 2022; Paper accepted to PMC . The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in . Erez Karpas . Survey, NLP, Transformers, Table to Text. both conceptual and technical contributions whose contents will advance and inspire the greater theory Thus, an application where the necessity to touch a screen is removed would be highly relevant. Kunal Talwar (Apple ) All conference events will be accessible vitrually. our field's scope and literature. dblp is part of theGerman National ResearchData Infrastructure (NFDI). Accepted papers will be published in the conference proceedings by the IEEE Computer Society Press. This research project predicts the higher secondary students results based on their academic background, family details, and previous examination results using three decision tree algorithms: ID3, C4.5 (J48), and CART (Classification and Regression Tree) with other classification algorithms: Random Forest (RF), K-nearest Neighbors (KNN), Support Vector Machine (SVM) and Artificial Neural Network (ANN). . Each presentation should be only 2-3 minutes long. All papers should be pre-registered with title, authors, and abstract, by September 5, 7:59PM EDT (UTC04:00) September 6, 7:59PM EDT (UTC04:00) . Internet of Things adoption, Obstacles of IoT in developing countries, IoT Technical Context. How to effectively predict personal credit risk is a key problem in the financial field. Omri Ben-Eliezer (MIT) The results measure values for latency and throughput. Lap Chi Lau (University of Waterloo) Accepted papers will be published as proceedings of the conference in the Leibniz International Proceedings in Informatics (LIPIcs) as a free, open, electronic archive with access to all. and their chosen sub-referees. machine-learned predictions) on an algorithm's decision. Daniel Wichs (Northeastern University and NTT Research) Car embedded system, security, hardware protection, car area network security. On the other hand, few techniques are known for minimizing the objective, especially in the adaptive setting, where . Rigidity for Monogamy-of-Entanglement Games, Authors: Anne Broadbent, Eric Culf (University of Ottawa), Opponent Indifference in Rating Systems: A Theoretical Case for Sonas, Authors: Greg Bodwin, Forest Zhang (University of Michigan), Online Learning and Bandits with Queried Hints, Authors: Aditya Bhaskara (University of Utah); Sreenivas Gollapudi (Google); Sungjin Im (University of California-Merced); Kostas Kollias (Google); Kamesh Munagala (Duke University), Improved Monotonicity Testing Over the Hypergrid via Hypercube Embedddings, Authors: Mark Braverman (Princeton University); Subhash Khot (NYU); Guy Kindler (Hebrew University of Jerusalem); Dor Minzer (MIT), Learning Reserve Prices in Second-Price Auctions, Authors: Yaonan Jin (Columbia University); Pinyan Lu (Shanghai University of Finance and Economics); Tao Xiao (Huawei TCS Lab), Symmetric Formulas for Products of Permutations, Authors: William He, Benjamin Rossman (Duke University), Asymptotically Tight Bounds on the Time Complexity of Broadcast and its Variants in Dynamic Networks, Authors: Antoine El-Hayek, Monika Henzinger (University of Vienna); Stefan Schmid (University of Vienna & TU Berlin), A Combinatorial Cut-Toggling Algorithm for Solving Laplacian Linear Systems, Authors: Monika Henzinger (University of Vienna); Billy Jin (Cornell University); Richard Peng (Carnegie Mellon University and University of Waterloo); David Williamson (Cornell University), Strategyproof Scheduling with Predictions, Authors: Eric Balkanski (Columbia University); Vasilis Gkatzelis, Xizhi Tan (Drexel University), Learning versus Pseudorandom Generators in Constant Parallel Time, Authors: Shuichi Hirahara (National Institute of Informatics); Mikito Nanashima (Tokyo Institute of Technology), Exact Completeness of LP Hierarchies for Linear Codes, Authors: Leonardo Nagami Coregliano, Fernando Granha Jeronimo (Institute for Advanced Study); Chris Jones (University of Chicago), Proofs of Quantumness from Trapdoor Permutations, Authors: Tomoyuki Morimae (Kyoto University); Takashi Yamakawa (NTT Social Informatics Laboratories), Exponential separations using guarded extension variables, Authors: Emre Yolcu, Marijn Heule (Carnegie Mellon University), Quantum algorithms and the power of forgetting, Authors: Amin Shiraz Gilani, Andrew M. Childs, Matthew Coudron (University of Maryland), On Interactive Proofs of Proximity with Proof-Oblivious Queries, Authors: Oded Goldreich (Weizmann Institute of Science); Guy N. Rothblum (Apple); Tal Skverer (Weizmann Institute of Science), Authors: Jonah Blasiak (Department of Mathematics, Drexel University); Henry Cohn (Microsoft Research New England); Joshua A. Grochow (Departments of Computer Science and Mathematics, University of Colorado Boulder); Kevin Pratt (School of Computer Science, Carnegie Mellon University); Chris Umans (Department of Computing and Mathematical Sciences, California Institute of Technology), A New Conjecture on Hardness of Low-Degree 2-CSPs with Implications to Hardness of Densest k-Subgraph and Other Problems, Authors: Julia Chuzhoy (Toyota Technological Institute at Chicago); Mina Dalirrooyfard (MIT); Vadim Grinberg (Weizmann Institute of Science); Zihan Tan (Rutgers University), Making Decisions under Outcome Performativity, Authors: Michael P. Kim, Juan C. Perdomo (UC Berkeley), Loss Minimization through the lens of Outcome Indistinguishability, Authors: Parikshit Gopalan (Apple); Lunjia Hu (Stanford University); Michael P. Kim (UC Berkeley); Omer Reingold (Stanford University); Udi Wieder (VMware), The Time Complexity of Consensus Under Oblivious Message Adversaries, Authors: Hugo Rincon Galeana (Technische Universitt Wien); Ami Paz (LISN - CNRS and Paris-Saclay University); Stefan Schmid (TU Berlin & Fraunhofer SIT); Ulrich Schmid (TU Wien); Kyrill Winkler (ITK Engineering, Vienna, Austria), Necessary Conditions in Multi-Server Differential Privacy, Authors: Albert Cheu, Chao Yan (Georgetown University), On Oracles and Algorithmic Methods for Proving Lower Bounds, Authors: Nikhil Vyas, Ryan Williams (MIT), Beyond Worst-Case Budget-Feasible Mechanism Design, Authors: Aviad Rubinstein, Junyao Zhao (Stanford University), Quantum space, ground space traversal, and how to embed multi-prover interactive proofs into unentanglement, Authors: Dorian Rudolph, Sevag Gharibian (Universitt Paderborn), Unitary property testing lower bounds by polynomials, Authors: Adrian She (University of Toronto); Henry Yuen (Columbia University), Incompressiblity and Next-Block Pseudoentropy, Authors: Iftach Haitner, Noam Mazor, Jad Silbak (Tel Aviv University), PPP-Completeness and Extremal Combinatorics, Authors: Romain Bourneuf (ENS de Lyon); Luk Folwarczn, Pavel Hubek (Charles University); Alon Rosen (Bocconi University and Reichman University); Nikolaj Ignatieff Schwartzbach (Aarhus University), Beeping Shortest Paths via Hypergraph Bipartite Decomposition, Authors: Fabien Dufoulon (University of Houston); Yuval Emek (Technion); Ran Gelles (Bar-Ilan University), Expander Decomposition in Dynamic Streams, Authors: Arnold Filtser (Bar-Ilan University); Michael Kapralov, Mikhail Makarov (EPFL), Fractional certificates for bounded functions, Authors: Shachar Lovett (University of California San Diego); Jiapeng Zhang (University of Southern California), Extremal Combinatorics, iterated pigeonhole arguments, and generalizations of PPP, Authors: Amol Pasarkar, Christos Papadimitriou, Mihalis Yannakakis (Columbia University), Depth-Bounded Quantum Cryptography with Applications to One-Time Memory and More, Kolmogorov Complexity Characterizes Statistical Zero Knowledge, Authors: Eric Allender (Rutgers University); Shuichi Hirahara (National Institute of Informatics); Harsha Tirumala (Rutgers University), Vertex Sparsification for Edge Connectivity in Polynomial Time, Authors: Yang P. Liu (Stanford University), On the computational hardness needed for quantum cryptography, Authors: Zvika Brakerski (Weizmann Institute of Science); Ran Canetti, Luowen Qian (Boston University), Random Max-CSPs Inherit Algorithmic Hardness from Spin Glasses, Authors: Chris Jones, Kunal Marwaha (University of Chicago); Juspreet Singh Sandhu (Harvard University); Jonathan Shi (Bocconi University), Authors: Mark Braverman (Princeton University); Dor Minzer (MIT), Authors: Guy Blanc, Caleb Koch (Stanford University); Jane Lange (MIT); Carmen Strassle, Li-Yang Tan (Stanford University), Unsplittable Euclidean Capacitated Vehicle Routing: A $(2+\epsilon)$-Approximation Algorithm, Authors: Fabrizio Grandoni (IDSIA, University of Lugano); Claire Mathieu (cole normale suprieure and CNRS); Hang Zhou (cole Polytechnique), Efficient algorithms for certifying lower bounds on the discrepancy of random matrices, Matroid Partition Property and the Secretary Problem, Authors: Dorna Abdolazimi, Anna Karlin, Nathan Klein, Shayan Oveis Gharan (University of Washington), A Framework for Adversarial Streaming via Differential Privacy and Difference Estimators, Authors: Idan Attias (Ben-Gurion University); Edith Cohen (Google and Tel Aviv University); Moshe Shechner (Tel Aviv University); Uri Stemmer (Google and Tel Aviv University), Asynchronous Multi-Party Quantum Computation, Authors: Vipul Goyal (Carnegie Mellon University and NTT Research); Chen-Da Liu-Zhang (NTT Research); Justin Raizes, Joao Ribeiro (Carnegie Mellon University), Low-Stabilizer-Complexity Quantum States Are Not Pseudorandom, Authors: Sabee Grewal, Vishnu Iyer, William Kretschmer, Daniel Liang (University of Texas at Austin), Karchmer-Wigderson Games for Hazard-free Computation, Authors: Christian Ikenmeyer (University of Liverpool, United Kingdom.

Salina Housed Inmates, Can Eating Too Much Lettuce Kill You, Articles I

Todos os Direitos Reservados à itcs 2022 accepted papers® 2015