Komminist Weldemariam

Orcid: 0000-0001-9100-0193

According to our database1, Komminist Weldemariam authored at least 95 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Framework for Emission Reduction in Scope 3 Climate Actions using Domain-adapted Foundation Model.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024

2023
AI for Environmental Intelligence in the Digital Economy.
Ubiquity, September, 2023

Foundation Models for Generalist Geospatial Artificial Intelligence.
CoRR, 2023

AI Foundation Models for Weather and Climate: Applications, Design, and Implementation.
CoRR, 2023

Encoding Seasonal Climate Predictions for Demand Forecasting with Modular Neural Network.
CoRR, 2023

Topological Augmentation for Class-Imbalanced Node Classification.
CoRR, 2023

Supply chain emission estimation using large language models.
CoRR, 2023

Domain-agnostic and Multi-level Evaluation of Generative Models.
CoRR, 2023

2022
Pattern detection in the activation space for identifying synthesized content.
Pattern Recognit. Lett., 2022

Climate Impact Modelling Framework.
CoRR, 2022

BON: An extended public domain dataset for human activity recognition.
CoRR, 2022

Deploying an Artificial Intelligence Application to Detect Flood from Sentinel 1 Data.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
BON - Egocentric Vision Dataset for Office Activity Recognition.
Dataset, July, 2021

DeepMI: Deep multi-lead ECG fusion for identifying myocardial infarction and its occurrence-time.
Artif. Intell. Medicine, 2021

Data-Driven Sequential Uptake Pattern Discovery for Family Planning Studies.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

2020
Privacy-Aware Human Activity Recognition From a Wearable Camera: Highlights From the IEEE Video And Image Processing Cup 2019 Student Competition [SP Competitions].
IEEE Signal Process. Mag., 2020

Prediction of neonatal mortality in Sub-Saharan African countries using data-level linkage of multiple surveys.
CoRR, 2020

ADW: Blockchain-enabled Small-scale Farm Digitization.
CoRR, 2020

Discriminant Knowledge Extraction from Electrocardiograms for Automated Diagnosis of Myocardial Infarction.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2020

Inspection of Blackbox Models for Evaluating Vulnerability in Maternal, Newborn, and Child Health.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Decision Platform for Pattern Discovery and Causal Effect Estimation in Contraceptive Discontinuation.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Platform for Disease Intervention Planning.
Proceedings of the 8th IEEE International Conference on Healthcare Informatics, 2020

AGWS: Blockchain-enabled Small-scale Farm Digitization.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Preservation of Anomalous Subgroups On Variational Autoencoder Transformed Data.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

A Spectral-longitudinal Model for Detection of Heart Attack from 12-lead Electrocardiogram Waveforms.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Multi-factor authentication for users of non-internet based applications of blockchain-based platforms.
Proceedings of the IEEE International Conference on Blockchain, 2020

Identifying Factors Associated with Neonatal Mortality in Sub-Saharan Africa using Machine Learning.
Proceedings of the AMIA 2020, 2020

2019
Preservation of Anomalous Subgroups On Machine Learning Transformed Data.
CoRR, 2019

Analyzing Bias in Sensitive Personal Information Used to Train Financial Models.
CoRR, 2019

Smooth Grad-CAM++: An Enhanced Inference Level Visualization Technique for Deep Convolutional Neural Network Models.
CoRR, 2019

Enabling Care Continuity using a Digital Health Wallet.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

Promoting Distributed Trust in Machine Learning and Computational Simulation.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

On Using Blockchain Based Workflows.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Evaluation of Bias in Sensitive Personal Information Used to Train Financial Models.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
Promoting Distributed Trust in Machine Learning and Computational Simulation via a Blockchain Network.
CoRR, 2018

Subset Scanning Over Neural Network Activations.
CoRR, 2018

2017
Extracting information from newspaper archives in Africa.
IBM J. Res. Dev., 2017

Modeling user behavior data in systems of engagement.
Future Gener. Comput. Syst., 2017

Studying engagement and performance with learning technology in an African classroom.
Proceedings of the Seventh International Learning Analytics & Knowledge Conference, 2017

Towards Blockchain-enabled School Information Hub.
Proceedings of the Ninth International Conference on Information and Communication Technologies and Development, 2017

Roaming Nairobi Roads: Instrumenting Roads under Resource Constraints.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Deploying Large Scale School Census Hub: An Experience Report.
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society Track, 2017

2016
Towards cooperative content downloading for resource-constrained mobile devices.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

2015
An Empirical Evaluation of Web-Based Fingerprinting.
IEEE Softw., 2015

Seamless blended learning using the Cognitive Learning Companion: A systemic view.
IBM J. Res. Dev., 2015

Towards Capturing Learners Sentiment and Context.
Proceedings of the Second ACM Conference on Learning @ Scale, 2015

Capturing Learner's Activity Events from a Mobile Learning System Using Adaptive Event Framework.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Low-power Low-cost Wireless Sensors for Real-time Plant Stress Detection.
Proceedings of the 2015 Annual Symposium on Computing for Development, 2015

FPGuard: Detection and Prevention of Browser Fingerprinting.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Effective detection of vulnerable and malicious browser extensions.
Comput. Secur., 2014

FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Dynamic Analysis of Web Objects.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Rethinking agribusiness models in Africa.
Proceedings of the Symposium on Applied Computing, 2014

Traffic 411: a traffic congestion routing and awareness platform for Nairobi.
Proceedings of the Symposium on Applied Computing, 2014

Monitoring water scarcity risk in Africa.
Proceedings of the Symposium on Applied Computing, 2014

Some Issues in Modeling User Behavior Data in Systems of Engagement.
Proceedings of the Model and Data Engineering - 4th International Conference, 2014

On evaluating and securing firefox for Android browser extensions.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

Twende-twende: a mobile application for traffic congestion awareness and routing.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

From Needs to Services: Delivering Personalized Water Assurance Services in Urban Africa.
Proceedings of the Conceptual Modeling - 33rd International Conference, 2014

TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

OSDC: adapting ODC for developing more secure software.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards a ranking framework for software components.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Protecting Web Browser Extensions from JavaScript Injection Attacks.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Leveraging Raspberry Pi for interactive education.
Proceedings of the Annual Symposium on Computing for Development, 2013

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages.
Proceedings of the Security and Privacy in Communication Networks, 2012

On the use of goal-oriented methodology for designing agriculture services in developing countries.
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012

Designing distributed agricultural information services for developing countries.
Proceedings of the ACM Annual Symposium on Computing for Development, 2012

Towards an Open Standard Vote Verification Framework in Electronic Voting Systems.
Proceedings of the Seventh International Conference on Availability, 2012

Understanding the Development Trends of Electronic Voting Systems.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Procedural security analysis: A methodological approach.
J. Syst. Softw., 2011

Formal analysis of an electronic voting system: An experience report.
J. Syst. Softw., 2011

Vote verification through open standard: A roadmap.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Malicious Website Detection: Effectiveness and Efficiency Issues.
Proceedings of the First SysSec Workshop 2011, 2011

Early Detection of Security Misconfiguration Vulnerabilities in Web Applications.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Using Formal Methods for Building more Reliable and Secure e-voting Systems.
PhD thesis, 2010

Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework.
Proceedings of the Fourth International Conference on Digital Society, 2010

ICT for Good: Opportunities, Challenges and the Way Forward.
Proceedings of the Fourth International Conference on Digital Society, 2010

Context Information Refinement for Pervasive Medical Systems.
Proceedings of the Fourth International Conference on Digital Society, 2010

A Survey: Electronic Voting Development and Trends.
Proceedings of the Electronic Voting 2010, 2010

Host-based anomaly detection for pervasive medical systems.
Proceedings of the CRiSIS 2010, 2010

Formal Specification and Analysis of an E-voting System.
Proceedings of the ARES 2010, 2010

2009
Development, formal verification, and evaluation of an E-voting system with VVPAT.
IEEE Trans. Inf. Forensics Secur., 2009

Managing Requirements for E-Voting Systems: Issues and Approaches.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Navigational Web-Interfaces from Formal Tropos Specification.
Proceedings of the Engineering Societies in the Agents World X, 2009

Experiments and data analysis of electronic voting system.
Proceedings of the CRiSIS 2009, 2009

Formal analysis of attacks for e-voting system.
Proceedings of the CRiSIS 2009, 2009

Supporting Public Administration with an Integrated BPR Environment.
Proceedings of the E-Infrastructures and E-Services on Developing Countries, 2009

2008
Modeling and Analysis of Procedural Security in (e)Voting: The Trentino's Approach and Experiences.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

A Methodology for Assessing Procedural Security: A Case Study in E-Voting.
Proceedings of the 3rd International Conference, 2008

Formal procedural security modeling and analysis.
Proceedings of the CRiSIS '08, 2008

2007
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach.
Proceedings of the E-Voting and Identity, First International Conference, 2007


  Loading...