default search action
DASC/PiCom/DataCom/CyberSciTech 2018: Athens, Greece
- 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August 12-15, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7518-2
3rd IEEE Cyber Science and Technology Congress (CyberSciTech)
CyberSciTech 2018 Regular Papers
- Xin Wang, Shuting Zuo, Meiling Zhang, Lei Zhang, Chen Yang, Zhiyu Han, Juan Shui:
A Fuzzy IBE Scheme with Attribute Timeliness. 1-6 - Jingjing Xu, Chun Ying, Shuhua Tan, Zhe Sun, Pan Wang, Zhixin Sun:
An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating. 7-14 - Linjing Wei, Wenke Dong, Hui Zhou, Yue Li, Xia Zhao:
Application of Fuzzy Analogy Preferred Ratio Based on Euclid Distance in Quantitative Decision of Turfgrass Introduction. 15-18 - Jihao Wang, Yangping Wang, Jianwu Dang, Linjing Wei:
Target Detection Based on Cascade Network and Densely Connected Network in Remote Sensing Image. 19-25 - Yen Tsan, Ao Guo, Jianhua Ma, Runhe Huang, Zhong Chen:
Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing Logs. 26-32 - Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
From User Models to the Cyber-I Model: Approaches, Progresses and Issues. 33-40 - Xuejiao Chen, Jiahui Yu, Feng Ye, Pan Wang:
A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways. 41-45 - Ruiying Cai, Ao Guo, Jianhua Ma, Runhe Huang, Ruiyun Yu, Chen Yang:
Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable Devices. 46-53 - Guofeng Lin, Chun Ying, Shuhua Tan, Yunhao Xia, Zhixin Sun:
ARP-CP-ABE: Toward Efficient, Secure and Flexible Access Control for Personal Health Record Systems. 54-61 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems. 62-69 - Pratiksha Dwivedi, Varsha Sharma, Ravindra Patel:
USB SPY: A Stratagem for Tracing USB Storage Devices. 70-77 - Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
A Security Framework for ICN Traffic Management. 78-85 - Yamini Konduru, Nishchol Mishra, Sanjeev Sharma:
Acquisition and Analysis of Forensic Data Artefacts of Some Popular Apps in Android Smartphone. 86-93 - Shan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng:
ID Hopping CAN Controller Design with Obfuscated Priority Assignment. 94-99 - Chaonian Guo, Hao Wang, Hong-Ning Dai, Shuhan Cheng, Tongsen Wang:
Fraud Risk Monitoring System for E-Banking Transactions. 100-105 - Shenglan Ma, Wang Hao, Hong-Ning Dai, Shuhan Cheng, Ruihua Yi, Tongsen Wang:
A Blockchain-Based Risk and Information System Control Framework. 106-113 - Fulong Chen, Hao Shen, Cheng Wang, Le Xie, Shoujun Zhou, Hesheng Wang:
The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot System. 114-120 - Puneet Bakshi, Neelakantan Subramanian, Sukumar Nandi:
Using Digital Tokens to Improve Amortized Performance of eSign. 121-128 - Xiaojun Yin, Kecheng Yang, Qi Zhang, Xiaohui Zhang:
Stencil Imaging and Defects Detection Using Artificial Neural Networks. 129-134 - Chunhua Chen, Junwei Yan:
HyTube: A Novel Middleware Layer for Smart Building Systems. 135-142 - Lai Tu, Jing Wen, Benxiong Huang, Dan Tan:
Multi-scale Trajectory Data Management and Query. 143-150 - Siyang Lu, Xiang Wei, Yandong Li, Liqiang Wang:
Detecting Anomaly in Big Data System Logs Using Convolutional Neural Network. 151-158 - Balaji Kalluri Mallikarjuna, Sekhar Kondepudi, Tham Kwok Wai, Kua Harn Wei, Andreas Kamilaris:
SMELs: A Data-Driven Middleware for Smart Miscellaneous Electrical Load Management in Buildings. 159-165 - Xiangyu Su, Wenrun Wang, Linjing Wei, Zhenghai Zhang:
Augmented Reality Registration Method Based on Improved LMeds. 166-172 - Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. 173-180 - Kehua Guo, Tao Xu, Yayuan Tang, Ruifang Zhang, Jianhua Ma:
An Incremental Collaborative Filtering Based Recommendation Framework for Personalized Websites. 181-186 - Chandra Mouli Madhav Kotteti, Xishuang Dong, Na Li, Lijun Qian:
Fake News Detection Enhancement with Data Imputation. 187-192 - Wenyuan Xue, Qingyong Li, Zhen Zhang, Yulei Zhao, Hao Wang:
Table Analysis and Information Extraction for Medical Laboratory Reports. 193-199 - Xin Liu, Qingchen Yu, Xiaokang Zhou, Qingguo Zhou:
OwlEye: An Advanced Detection System of Web Attacks Based on HMM. 200-207 - Lingchi Chen, Xiaoheng Deng, Hailan Shen, Congxu Zhu, Le Chang:
DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling. 208-215 - Weimin Li, Jun Mo, Yue Liu, Nobuyasu Ito, Yohsuke Murase, Jianwei Liu:
The Influence Maximization Problem in the Network Under Node Personalized Characteristics. 216-221 - Ying Liu, Dequan Zheng, Tongmao Lin, Xianqi Liu, Deshuai Wang, Frank Hopfgartner:
Smart Crib Control System Based on Sentiment Analysis. 222-229 - Yue Li, Yiqing Pan, Wensheng Liu, Xingming Zhang:
An Automated Evaluation System for App Inventor Apps. 230-235 - Savvas Zenonos, Andreas Tsirtsis, Nicolas Tsapatsoulis:
Twitter Influencers or Cheated Buyers? 236-242 - Joyjit Chatterjee, Vajja Mukesh, Hui-Huang Hsu, Garima Vyas, Zhen Liu:
Speech Emotion Recognition Using Cross-Correlation and Acoustic Features. 243-249 - Po Chun Lien, Qiangfu Zhao:
Product Surface Defect Detection Based on Deep Learning. 250-255 - Tsukasa Ueno, Qiangfu Zhao:
Interpretation of Deep Neural Networks Based on Decision Trees. 256-261 - Marc Prince, Fuhua Lin:
Hunting Algorithm Visualization and Performance Evaluation Through BDI Agent Simulation. 262-269 - Zhipu Xie, Weifeng Lv, Syed Muhammad Asim Ali, Bowen Du, Runhe Huang:
Anomaly Prediction in Passenger Flow with Knowledge Transfer Method. 270-277 - Wei Qiu, Andy Wai Hoong Khong, Wee Peng Tay:
Hidden Markov Model for Masquerade Detection Based on Sequence Alignment. 278-285 - Kiichi Tago, Kosuke Takagi, Kenichi Ito, Qun Jin:
Specifying Latent Factors with a Domain Model for Personal Data Analysis. 286-291 - Massimo Marchiori, Marco de Vecchi:
The Team Brain: Soccer Analysis and Battles of Minds. 292-299 - Yangping Wang, Chengwei Tang, Jingyu Yang, Linjing Wei:
Road Extraction from High-Resolution Remotely Sensed Image Based on Improved Ant Colony Optimization Method. 300-309
CyberSciTech 2018 Work-in-Progress Papers
- Peiying Tao, Chun Ying, Zhe Sun, Shuhua Tan, Pan Wang, Zhixin Sun:
The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load Balancing. 310-313 - Yafei Wang, Guanghui Yan, Qingqing Ma, Yu Wu, Meng Zhang:
Identifying Influential Nodes Based on Vital Communities. 314-317 - Dan Jin, Yu Wu, Guanghui Yan, Yafei Wang, Qingqing Ma, Juncheng Li:
A Community Detecting Algorithm Based on Modular Tensor in Temporal Network. 318-322 - Yuntao Wang, Zhou Su, Qichao Xu, Ning Zhang:
Contract Based Energy Blockchain for Secure Electric Vehicles Charging in Smart Community. 323-327 - Dallas Wright, Josh Stroschein:
A Malware Analysis and Artifact Capture Tool. 328-333 - Mengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang:
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks. 334-337 - Chih-Chieh Hung, Chun-Yu Kuo, Hui-Huang Hsu, Yian Chen:
Identifying Niche Singers in Online Music Streaming Services. 338-342 - Kuan-Hua Lai, Neil Y. Yen, Mu-Yen Chen:
Design of an AI-Empowered Recommender System for Travelling Support: Individual Traveler as an Instance. 343-346 - Bi Li, Bin-feng Jin:
Research on Dynamic Multi-objective FJSP Based on Genetic Algorithm. 347-352 - Luqi Yang, Zhiwei Zhao, Geyong Min:
User Verification Based On Customized Sentence Reading. 353-356 - Jingyu Yang, Zhengdong Ma, Jianwu Dang, Linjing Wei, Yangping Wang:
Improved Fast-ICA for Change Detection of Multi Temporal Remote Sensing Images. 357-361 - Stephan Mannhart, Bruno Rodrigues, Eder J. Scheid, Salil S. Kanhere, Burkhard Stiller:
Toward Mitigation-as-a-Service in Cooperative Network Defenses. 362-367 - Jung-Eun Park, Young-Hoon Park:
Efficient File-Share Reconstruction Scheme for Device Addition/Removal in Personal Area Network. 368-372
CyberSciTech 2018 Poster Papers
- Pedro Merino Laso, David Brosset, Marie-Annick Giraud:
Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control. 373-375 - Tony Jan:
Ensemble of Semi-Supervised Models for IoT Resource Scheduling and Sharing. 376-378 - Yingjie Zhang, Sheng Bi, Min Dong, Yunda Liu:
The Implementation of CNN-Based Object Detector on ARM Embedded Platforms. 379-382 - Cheche Xie, Sheng Bi, Min Dong, Zehao Jin:
Key Frame Extraction of Skeleton Joint Based on Kinect Sensor. 383-385 - Michael J. O'Grady, Olga Murdoch, Dominic Carr, Rem W. Collier, Gregory M. P. O'Hare:
The Cyber Sensor Network. 386-389 - Subash Luitel, Sangman Moh:
Channel-Aware MAC Protocol for Cognitive Radio Sensor Networks. 390-392 - Van Quan Nguyen, Linh Van Ma, Jin-Young Kim, Kwang-Ki Kim, Jinsul Kim:
Applications of Anomaly Detection Using Deep Learning on Time Series Data. 393-396 - Ming-Yang Su, Hong-Siou Wei, Xin-Yu Chen, Po-Wei Lin, Ding-You Qiu:
Identifying Ad Libraries by Their Network Behavior Patterns. 397-398
Special Session on Computing and Applications for Cyber Internet of Things (Cyber-IoT)
- Shu Fu, Lina Ma, Xiangyue Yang, Xin Jian:
Design and Implementation of the Background Management Platform of Nutrition Point Catering for the Elderly. 399-402 - Yu Su, Yan Zhang:
A Novel Solution to Improve Network Coverage and Capacity with EasyMacro. 403-407 - Tony Jan, A. S. M. Sajeev:
Boosted Probabilistic Neural Network for IoT Data Classification. 408-411
Special Session on Cyber Social Computing and Cyber-Enabled Applications (CSC&CEA)
- Luyan Ni, Jiulei Jiang, Xiaofeng Wang:
Improved Collaborative Filtering Algorithm Based on Multifactor Fusion and User Features Clustering. 412-417 - Weimin Li, Heng Zhu, Xiaokang Zhou, Shohei Shimizu, Mingjun Xin, Qun Jin:
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree. 418-422 - Shoujian Yu, Guohui Cai, Weimin Li, Jianyun Xie:
Top-K Frequent Spatial-Temporal Words Query Based on R-Tree. 423-428
Workshop on Emerging Dependable Computing System Technologies and Applications (EDCSTA)
- Tengku Adil Tengku Izhar, Bernady O. Apduhan, Torab Torabi:
Relationships and Rule-Based Organizational Goals Ontology: A Case of Library Goals. 429-434 - Tomoyuki Sueda, Naohiro Hayashibara:
Opportunistic Message Broadcasting with Pheromone-Based Caching. 435-440
Workshop on Healthcare with Intelligent Sensing, System and Data (HISSD)
- Charalampos Loukas, Francesco Fioranelli, Julien Le Kernec, Shufan Yang:
Activity Classification Using Raw Range and I & Q Radar Data with Long Short Term Memory Layers. 441-445 - Kahina Amara, Naeem Ramzan, Nouara Achour, Mahmoud Belhocine, Cherif Larbes, Nadia Zenati:
A New Method for Facial and Corporal Expression Recognition. 446-450 - Varuna De Silva, Jamie Roche, Xiyu Shi, Ahmet M. Kondoz:
IoT Driven Ambient Intelligence Architecture for Indoor Intelligent Mobility. 451-456 - Oussama Kerdjidj, Naeem Ramzan, Abbes Amira, Khalida Ghanem, Fatima Chouireb:
Design and Evaluation of Vivado HLS-Based Compressive Sensing for ECG Signal Analysis. 457-461 - Rao Naveed Bin Rais, Muhammad Sajjad Akbar, Mohammad Aazam:
Fog-Supported Internet of Things (IoTs) Architecture for Remote Patient Monitoring Systems Using Wireless Body Area Sensor Networks. 462-466 - Wenda Li, Bo Tan, Robert J. Piechocki:
Opportunistic Doppler-Only Indoor Localization Via Passive Radar. 467-473 - Alexandros Konios, Yanguo Jing, Mark Eastwood, Bo Tan:
Unifying and Analysing Activities of Daily Living in Extra Care Homes. 474-479
16th IEEE Int'l Conf. on Dependable, Autonomic & Secure Computing (DASC2018)
DASC 2018 Regular Papers
- Zhan Wang, Alain Lambert:
A Reliable and Low Cost Vehicle Localization Approach Using Interval Analysis. 480-487 - Masanori Misono, Kaito Yoshida, Juho Hwang, Takahiro Shinagawa:
Distributed Denial of Service Attack Prevention at Source Machines. 488-495 - Ali Dorri, Mahdi Abadi, Mahila Dadfarnia:
SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification. 496-503 - Jacek Kobusinski, Jerzy Brzezinski, Anna Kobusinska:
On Increasing Dependability of Web Services - an Approach to Design a Failure Detection Service. 504-511 - Khaled Alanezi, Shivakant Mishra:
A Privacy Negotiation Mechanism for the Internet of Things. 512-519 - Ana Nieto, Antonio Acien, Javier López:
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory. 520-527 - Karl Ott, Rabi N. Mahapatra:
Hardware Performance Counters for Embedded Software Anomaly Detection. 528-535 - Antonio Acien, Ana Nieto, Javier López:
Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach. 536-543 - Abdul Rafay Khatri, Ali Hayek, Josef Börcsök:
Validation of the Proposed Fault Injection, Test and Hardness Analysis for Combinational Data-Flow Verilog HDL Designs Under the RASP-FIT Tool. 544-551 - Nikolaos Totosis, Constantinos Patsakis:
Android Hooking Revisited. 552-559 - Jia Wan, Mohammad Zulkernine, Clifford Liem:
A Dynamic App Anti-Debugging Approach on Android ART Runtime. 560-567 - Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks. 568-575 - Kamal Taha, Paul D. Yoo:
A Forensic System for Identifying the Suspects of a Crime with No Solid Material Evidences. 576-583 - Quentin Bergougnoux, Julien Cartigny, Gilles Grimaud:
Porting the Pip Proto-Kernel's Model to Multi-core Environments. 584-591 - Zuhal Ozturk, Haluk Rahmi Topcuoglu, Sanem Arslan, Mahmut Taylan Kandemir:
Soft Error Characterization on Scientific Applications. 592-599 - Fatemeh Khodaparast, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli:
Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data. 600-607 - Saman A. Zonouz, Mingbo Zhang, Pengfei Sun, Luis Garcia, Xiruo Liu:
Dynamic Memory Protection via Intel SGX-Supported Heap Allocation. 608-617 - Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers:
Securing Web Applications with Secure Coding Practices and Integrity Verification. 618-625 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tao Peng:
Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures. 626-633 - David Jaeger, Feng Cheng, Christoph Meinel:
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform. 634-643 - Max Smith-Creasey, Fatema A. Albalooshi, Muttukrishnan Rajarajan:
Context Awareness for Improved Continuous Face Authentication on Mobile Devices. 644-652 - Tsozen Yeh, Yipin Wang:
Enhancing Hadoop System Dependability Through Autonomous Snapshot. 653-660 - Maria Katsaiti, Nicolas Sklavos:
Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach. 661-665 - Igor Leão dos Santos, Marcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires, Luci Pirmez, Wei Li, Albert Y. Zomaya, Samee U. Khan:
A System Architecture for Cloud of Sensors. 666-672 - Edren Dacaymat, Jun Zhang, Qi Wang, M. D. Alam Bhuiyan, Thaier Hayajneh:
Exploring Problems with Virtualization in Cloud Computing. 673-680 - Muhammad Arif, Guojun Wang, Shuhong Chen:
Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction. 681-688 - Ibnu Febry Kurniawan, Md. Arafatur Rahman, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan:
Performance Evaluation of History-Based and Priority-Based MAC for Traffic-Differentiated Intra-Vehicular Network. 689-694 - Naw Safrin Sattar, Shaikh Arifuzzaman:
Parallelizing Louvain Algorithm: Distributed Memory Challenges. 695-701 - Raja Khurram Shahzad:
Android Malware Detection Using Feature Fusion and Artificial Data. 702-709
DASC 2018 Work in Progress
- May Medhat, Samir Gaber, Nashwa Abdelbaki:
A New Static-Based Framework for Ransomware Detection. 710-715 - Tamsanqa Ngalo, Hannan Xiao, Bruce Christianson, Ying Zhang:
Threat Analysis of Software Agents in Online Banking and Payments. 716-723 - Keltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha:
WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. 724-729 - Konstantinos-Panagiotis Grammatikakis, Angela Ioannou, Stavros Shiaeles, Nicholas Kolokotronis:
WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. 730-735 - Maede Safari, Zahra Shirmohammadi, Nezam Rohbani, Hamed Farbeh:
WiP: Floating XY-YX: An Efficient Thermal Management Routing Algorithm for 3D NoCs. 736-741 - Abdulghani Ali Ahmed, Yee Wai Kit:
Collecting and Analyzing Digital Proof Material to Detect Cybercrimes. 742-747
DASC 2018 Posters
- Jason Gevargizian, Prasad Kulkarni:
MSRR: Measurement Framework For Remote Attestation. 748-753
16th IEEE Int'l Conf. on Pervasive Intelligence and Computing (PICom 2018)
PICom 2018 Regular Papers
- Qihang Yao, Xiaomao Fan, Yunpeng Cai, Ruxin Wang, Liyan Yin, Ye Li:
Time-Incremental Convolutional Neural Network for Arrhythmia Detection in Varied-Length Electrocardiogram. 754-761 - Yi-Ting Chen, Chia-Cheng Yen, Yu-Tai Lin, Jia-Shung Wang:
Cooperative Caching Plan of Popular Videos for Mobile Users by Grouping Preferences. 762-769 - Waleed Bin Qaim, Öznur Özkasap:
DRAW: Data Replication for Enhanced Data Availability in IoT-based Sensor Systems. 770-775 - Rodolfo Picoreti, Alexandre Pereira do Carmo, Felippe Mendonça de Queiroz, Anilton Salles Garcia, Raquel Frizera Vassallo, Dimitra Simeonidou:
Multilevel Observability in Cloud Orchestration. 776-784 - Corrado Santoro, Fabrizio Messina, Fabio D'Urso, Federico Fausto Santoro:
Wale: A Dockerfile-Based Approach to Deduplicate Shared Libraries in Docker Containers. 785-791 - Farzana Jabeen, Linmi Tao, Xinyue Wang, Shanshan Mei:
C-SAK: Chinese Scanning Ambiguous Keyboard for Parkinson's Disease Patients. 792-799 - Mabrook Al-Rakhami, Mohammed Abdullah Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino:
Cost Efficient Edge Intelligence Framework Using Docker Containers. 800-807 - Panagiotis Mysiris, Nikolaos Doulamis, Anastasios D. Doulamis, Vasilis Sourlas, Aggelos Amditis:
Pervasive 3D Reconstruction to Identify Hidden 3D Survival Spaces for Search and Rescue Management. 808-813 - Claudio Miceli de Farias, Luci Pirmez, Flávia Coimbra Delicato:
Density Based Multisensor Data Fusion for Multiapplication Wireless Sensor Networks. 814-821 - Fenyu Jiang, Yan Sun, Chris Phillips:
A Dual Sampling Cooperative Communication Method for Energy and Delay Reduction. 822-827 - Hong Zhang, Zixia Liu, Hai Huang, Liqiang Wang:
FTSGD: An Adaptive Stochastic Gradient Descent Algorithm for Spark MLlib. 828-835 - Enrico Ferrara, Antonio Liotta, Laura Erhan, Maryleen U. Ndubuaku, Daniele D. Giusto, Miles Richardson, David Sheffield, Kirsten McEwan:
A Pilot Study Mapping Citizens' Interaction with Urban Nature. 836-841 - Ali Khaleel, Hamed Saffa Al-Raweshidy:
Effective Routing Algorithm Based on Software Defined Networking for Big Data Applications in Data Centre Network. 842-848 - Chunqiu Xia, Wei Li, Xiaomin Chang, Flávia Coimbra Delicato, Ting Yang, Albert Y. Zomaya:
Edge-based Energy Management for Smart Homes. 849-856
PICom 2018 Work in Progress
- Iordanis Koutsopoulos:
Incentive Allocation to Sequential Decision-Making Sensors in Mobile Crowdsensing. 857-861 - Yifan Xia, Jianwen Lou, Junyu Dong, Gongfa Li, Hui Yu:
SDM-Based Means of Gradient for Eye Center Localization. 862-867 - Nikoloas Bakalos, Eftychios Protopapadakis, Anastasios D. Doulamis, Nikolaos Doulamis:
Dance Posture/Steps Classification Using 3D Joints from the Kinect Sensors. 868-873 - Massimo Marchiori:
Safe Cycle: Infrastructural Control for Bikers. 874-880
PICom 2018 Posters
- Chih-Shun Hsu, Wei-Chen Chen:
Joint Power Control and Channel Assignment for Green Device-to-Device Communication. 881-884 - Seongyoun Woo, Chulhee Lee:
Decision Boundary Formation of Deep Convolution Networks with ReLU. 885-888
4th IEEE Int'l Conf. on Big Data Intelligence and Computing (DataCom 2018)
DataCom 2018 Regular Papers
- Hsing-bung Chen, Qiang Guan, Song Fu:
UNS: A Portable, Mobile, and Exchangeable Namespace for Supporting Fetch-from-Anywhere Big Data Eco-Systems. 889-896 - Yuhan Hao, Bruce S. Kristal, D. Frank Hsu:
Predication of NCAA Bracket Using Recurrent Neural Network and Combinatorial Fusion. 897-903 - Zhi Qiao, Jacob Hochstetler, Shuwen Liang, Song Fu, Hsing-bung Chen, Bradley W. Settlemyer:
Incorporate Proactive Data Protection in ZFS Towards Reliable Storage Systems. 904-911 - Iordanis Koutsopoulos, Maria Halkidi:
Efficient and Fair Item Coverage in Recommender Systems. 912-918 - Saqib Ali, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell:
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors. 919-926 - Yupeng Yan, Xiaohui Huang, Anand Rangarajan, Sanjay Ranka:
Densely Labeling Large-Scale Satellite Images with Generative Adversarial Networks. 927-934 - Pierfrancesco Bellini, Stefano Bilotta, Paolo Nesi, Michela Paolucci, Mirco Soderi:
Real-Time Traffic Estimation of Unmonitored Roads. 935-942 - Zachary Johnson, Alex Varon, Justin A. Blanco, Ryan N. Rakvic, James Shey, Hau T. Ngo, Dane Brown, T. Owens Walker:
Classifying Solid State Drive Firmware via Side-Channel Current Draw Analysis. 943-948 - Shaohuai Shi, Qiang Wang, Xiaowen Chu:
Performance Modeling and Evaluation of Distributed Deep Learning Frameworks on GPUs. 949-957 - Massimo Marchiori, Enrico Bonetti Vieno:
The Battle for Information: Exposing Wikipedia. 958-965 - Teng Yung Lin, Howard Hao-Chun Chuang, Fang Yu:
Tracking Supply Chain Process Variability with Unsupervised Cluster Traversal. 966-973 - Beakal Gizachew Assefa, Öznur Özkasap:
MER-SDN: Machine Learning Framework for Traffic Aware Energy Efficient Routing in SDN. 974-980 - Ioannis Kontopoulos, Giannis Spiliopoulos, Dimitrios Zissis, Konstantinos Chatzikokolakis, Alexander Artikis:
Countering Real-Time Stream Poisoning: An Architecture for Detecting Vessel Spoofing in Streams of AIS Data. 981-986 - Leonidas Akritidis, Panayiotis Bozanis, Athanasios Fevgas:
Supervised Papers Classification on Large-Scale High-Dimensional Data with Apache Spark. 987-994 - Alaa Alsaig, Vangular Alagar, Olga Ormandjieva:
Foundational Issues on Big Data Science and Engineering. 995-1000 - Akshit V. Jain:
Network Traffic Identification with Convolutional Neural Networks. 1001-1007 - Ryo Ogitani, Kunitake Kaneko:
Activation Server for Bidirectional Limited Usages of Digital Objects. 1008-1015
DataCom 2018 Work in Progress
- Hanan Khaled, Ali A. El-Moursy, Salwa M. Nassar, Mohamed Taher, Fadi N. Sibai:
Parallel Study of 3-D Oil Reservoir Data Visualization Tool Using Hybrid Distributed/Shared-Memory Models. 1016-1021 - Dionisis Margaris, Costas Vassilakis:
Improving Collaborative Filtering's Rating Prediction Accuracy by Considering Users' Rating Variability. 1022-1027 - Mohammad A. R. Abdeen:
A Distributed Architecture and Design Challenges of an Astray Pilgrim Tracking System. 1028-1033 - Zhijun Wu, Shengyan Zhou, Meng Yue:
Research on SWIM Services Dynamic Migration Mechanism. 1034-1039 - Humayun Bakht, Samuel Eding:
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks. 1040-1045 - Jiaoman Du, Lei Li, Xiang Li:
Data-Driven Travel Itinerary with Branch and Bound Algorithm. 1046-1053 - Dionisis Margaris, Costas Vassilakis:
Improving Collaborative Filtering's Rating Prediction Coverage in Sparse Datasets by Exploiting User Dissimilarity. 1054-1059 - Souha Bejaoui, Christophe Cérin, Tarek Menouer, Walid Saad:
Towards a Two Layers Based Scheduling Schema for Data Aware Strategies. 1060-1067 - Yo-Ping Huang, Nontobeko Hlongwane, Li-Jen Kao:
Using Sentiment Analysis to Determine Users' Likes on Twitter. 1068-1073 - Yi-Ting Tsai, Yu-Ren Zeng, Yue-Shan Chang:
Air Pollution Forecasting Using RNN with LSTM. 1074-1079 - Katina Kralevska, Danilo Gligoroski:
An Explicit Construction of Systematic MDS Codes with Small Sub-Packetization for All-Node Repair. 1080-1084 - Alkharif Sarah, Kyungyong Lee, Hyeokman Kim:
LSTM Model to Forecast Time Series for EC2 Cloud Price. 1085-1088
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.