{"id":301,"date":"2020-12-13T21:09:16","date_gmt":"2020-12-13T21:09:16","guid":{"rendered":"https:\/\/womencourage.acm.org\/2021\/?page_id=301"},"modified":"2021-09-23T15:16:59","modified_gmt":"2021-09-23T15:16:59","slug":"poster-presentations","status":"publish","type":"page","link":"https:\/\/womencourage.acm.org\/2021\/poster-presentations\/","title":{"rendered":"Poster Presentations"},"content":{"rendered":"\n<h1>Poster Presentations<\/h1>\n\n\n\n<p>Join poster presentations to learn about interesting research done by other students, researchers and practitioners from all around the world. Within the process, 38 posters submitted by the authors representing 26 countries from all continents except Antarctica were reviewed, with 27 posters accepted to the conference program.<\/p>\n\n\n\n<h3><strong>Session 1 &#8211; Security and AI<\/strong> \/ Wednesday, 22 September, 10:45-11:30 CEST<\/h3>\n\n\n\n<p><strong>Security<\/strong><\/p>\n\n\n\n<ul><li>#5 Investigation of a Secure Flow-Based Routing Model Using Information Security Risks&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: M. Yevdokymenko, A. Shapovalova, M. Shapoval<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/5_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/5_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#19 Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: T. Marjanov, M. Konstantinou, M. Jozwiak, D. Spagnuelo<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/19_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/19_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#27 The Impact of Release-based Training on Software Vulnerability Prediction Models<\/li><\/ul>\n\n\n\n<p>Authors: G. Sellitto, F. Ferrucci<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/27_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/27_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#87 Credential-based Trust Management in Self Sovereign Identity&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: R. Mukta, H. Paik, Q. Lu, S. Kanhere<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/87_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/87_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<p><strong>Artificial Intelligence<\/strong><\/p>\n\n\n\n<ul><li>#9 Thank you for your trust, I will now take over your vision&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: M. van Noordenne, E. Stolk<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/9_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/9_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#42 Explainable Artificial Intelligence: Human-centered Perspective&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: H. Kopecka<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/42_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/42_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#58 A case study of applying machine learning models to Drought Prediction&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: A. COROIU, A. C\u0102LIN<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/58_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/58_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#65 Unsupervised Online Memory-free Change-point Detection using an Ensemble of LSTM-Autoencoder-based Neural Networks<\/li><\/ul>\n\n\n\n<p>Authors: Z. Atashgahi, D. Mocanu, R. Veldhuis, M. Pechenizkiy<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/65_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/65_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#44 Using immersive VR to explore individual differences in visual processing styles&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: S. Savickaite, N. McDonnell, D. Simmons<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/44_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/44_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<h3><strong>Session 2 &#8211; Biomedical, Applied Computing, Education, Academia and Industry<\/strong> \/ Wednesday, 22 September, 11:45-12:30 CEST<\/h3>\n\n\n\n<p><strong>Biomedical<\/strong><\/p>\n\n\n\n<ul><li>#17 SeneCare. Supporting epidemiological surveillance with a digital system at Universidad de los Andes<\/li><\/ul>\n\n\n\n<p>Authors: A. Mojica-Hanke, M. Linares-V\u00e1squez, C. Jaller, G. Otalora-Gonzalez, A. Ostos<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/17_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/17_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#59 Decentralized distributed data structure for bioanalytical laboratory setups<\/li><\/ul>\n\n\n\n<p>Authors: K. Ashraf, Y. Le Moullec, T. Pardy<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/59_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/59_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#62 Decomposition Algorithms for the Dissection of Tissue Samples&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: M. Buchin, L. Selbach<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/62_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/62_poster.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Poster<\/a><\/p>\n\n\n\n<ul><li>#63 The BioVisualSpeech speech therapy games platform<\/li><\/ul>\n\n\n\n<p>Authors: S. Martins, S. Cavaco<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/63_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/63_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<p><strong>Applied Computing<\/strong>&nbsp;<\/p>\n\n\n\n<ul><li>#48 IoT-based system to impact the poor indoor air quality&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: K. Kerekes, A. Vasilescu<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/48_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/48_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<p><strong>Education, Academia &amp; Industry<\/strong><\/p>\n\n\n\n<ul><li>#91 How could second-level schools present a better image of STEM2D to their current students? How can the availability of STEM2D subjects be improved in second-level schools?&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: S. Carey, J. Doohan, B. Gherbezan, E. McWey, C. Sookarry<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/91_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/91_poster.pdf\" data-type=\"URL\" data-id=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/91_poster.pdf\">Poster<\/a><\/p>\n\n\n\n<ul><li>#12 Towards Managing and Organizing Research Activities<\/li><\/ul>\n\n\n\n<p>Authors: A. Kaplan, H. Hajiabadi, M. Mazkatli, L. Schmid, S. Singh, M. Rapp, S. Ananieva, R. Kuehn<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/12_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/12_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#33 A Marketplace for Industrial Case Studies in Software Engineering&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: K. Borowa, M. Wiese, D. Tamzalit, C. Allen, A. Singjai<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/33_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/33_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<h3><strong>Session 3 &#8211; Gender in STEM, HCI and others<\/strong> \/ Thursday, 23 September, 11:45-12:30 CEST<\/h3>\n\n\n\n<p><strong>Gender in STEM<\/strong><\/p>\n\n\n\n<ul><li>#32 Using databases to improve the visibility of women&#8217;s contributions in STEM fields&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: C. Botella-Mascarell, E. L\u00f3pez-I\u00f1esta, S. Rueda, A. Forte, E. de Ves, X. Benavent<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/32_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/32_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#83 Identifying the Prevalence of Gender Biases among the Computing Organizations&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: S. Sultana, L. Cavaletto, A. Bosu<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/83_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/83_poster.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Poster<\/a><\/p>\n\n\n\n<ul><li>#85 Gender differences in privacy awareness on social networking sites&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: L. Nemec Zlatolas, T. Welzer<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/85_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/85_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#90 WiSTEM2D Abstract&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: A. Manalo, C. Caffrey, E. Aliu, I. Kamil, J. Oo<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/90_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/90_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<p><strong>Human-Computer Interaction<\/strong><\/p>\n\n\n\n<ul><li>#7 Digital Technologies and Gendered Positioning. Tensions and attention in relation to bridging gender norms, education systems and pedagogical professions&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: A. Tyrrestrup, E. Penthien<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/7_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/7_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#29 Enriching user experience for in-car interactions using e-textiles&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: P. Khorsandi<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/29_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/29_poster.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Poster<\/a><\/p>\n\n\n\n<ul><li>#38 1001 Nights &#8211; An text-based open-domain narrative game enabled by GPT-2&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: Y. Sun<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/38_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/38_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<ul><li>#47 FeSTEM community platform: creating meaningful, mentoring relationships with experts in STEM&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: G. Pallaris, A. Parmaxi, I. Christou<br><a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/47_extendedabstract.pdf\" target=\"_blank\">Extended abstract<\/a> \/ <a rel=\"noreferrer noopener\" href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/47_poster.pdf\" target=\"_blank\">Poster<\/a><\/p>\n\n\n\n<p><strong>Others<\/strong><\/p>\n\n\n\n<ul><li>#16 Research and Development of Improved Routing Mechanism with Load Balancing in Communication Network&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: O. Lemeshko, A. Kruhlova, A. Zhuravlova, O. Yeremenko<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/16_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/16_poster.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Poster<\/a><\/p>\n\n\n\n<ul><li>#22 Affine automata verifiers&nbsp;<\/li><\/ul>\n\n\n\n<p>Authors: A. Khadieva, A. Yakaryilmaz<br><a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/22_extendedabstract.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Extended abstract<\/a> \/ <a href=\"https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/22_poster.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Poster<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Poster Presentations Join poster presentations to learn about interesting research done by other students, researchers and practitioners from all around the world. Within the process, 38 posters submitted by the authors representing 26 countries from all continents except Antarctica were reviewed, with 27 posters accepted to the conference program. Session 1 &#8211; Security and AI [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/pages\/301"}],"collection":[{"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":8,"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/pages\/301\/revisions"}],"predecessor-version":[{"id":1117,"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/pages\/301\/revisions\/1117"}],"wp:attachment":[{"href":"https:\/\/womencourage.acm.org\/2021\/wp-json\/wp\/v2\/media?parent=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}