default search action
16th I-SPAN 2019: Naples, Italy
- Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo:
Pervasive Systems, Algorithms and Networks - 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings. Communications in Computer and Information Science 1080, Springer 2019, ISBN 978-3-030-30142-2
Big Data Analysis and Machine Learning
- Lisa Natswi Tafa
, Xin Su
, Jiman Hong
, Chang Choi
:
Automatic Maritime Traffic Synthetic Route: A Framework for Route Prediction. 3-14 - Antonio Coronato, Muddasar Naeem
:
A Reinforcement Learning Based Intelligent System for the Healthcare Treatment Assistance of Patients with Disabilities. 15-28 - Syeda Fouzia Noor, Mark Bell, Reinhard Klette
:
Saliency Guided Data Association Measure for Multiple-Object Tracking. 29-42 - Antonio M. Rinaldi:
A Document Visualization Strategy Based on Semantic Multimedia Big Data. 43-57 - Xiaoran Wang, James Ho-Shek, Dominik Ondusko, D. Frank Hsu:
Improving Portfolio Performance Using Attribute Selection and Combination. 58-70 - Daniela D'Auria, Mouzhi Ge, Fabio Persia:
Exploiting Recommender Systems in Collaborative Healthcare. 71-82 - Lucian Perju, Marius-Dorian Nicolaescu, Florin Pop, Ciprian Dobre
, Sanda Maiduc
:
Advanced Methods to Extract Value from Scientific Datasets. 83-95 - Antonio Galli, Michela Gravina
, Vincenzo Moscato, Antonio Picariello, Carlo Sansone
, Giancarlo Sperlì:
A Business Reputation Methodology Using Social Network Analysis. 96-106
Cyber Security
- Yiming Liu
, Xin Su
, Ning Xu
, Xiao Yao
:
Sensitive Data Encoding in Blockchain-Based P2P Trading System. 109-117 - Paolo D'Arco, Marco Nilo:
A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem. 118-132 - Kyungroul Lee
, Sun-Young Lee
, Kangbin Yim
:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. 133-139 - Zahra Ebadi Ansaroudi
, Saeid Pashazadeh:
Modeling and Formal Verification of the Ticket-Based Handoff Authentication Protocol for Wireless Mesh Networks. 140-154 - Daniele Casola, Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Clemente Galdi, Gianluca Roscigno
:
TRUST: TRust Unguarded Service Terminals. 155-169
Cloud Fog and Edge Computing
- Marek R. Ogiela, Lidia Ogiela:
Nature-Inspired Protocols for Cloud Computing and Security Systems. 173-177 - Tarek Menouer, Patrice Darmon:
Containers Scheduling Consolidation Approach for Cloud Computing. 178-192 - Tarek Menouer, Otman Manad, Christophe Cérin, Patrice Darmon:
Power Efficiency Containers Scheduling Approach Based on Machine Learning Technique for Cloud Computing Environment. 193-206 - Leila Shooshtarian, Dapeng Lan, Amir Taherkordi:
A Clustering-Based Approach to Efficient Resource Allocation in Fog Computing. 207-224
Communication Solutions
- Dongyao Wang, Sung-Hwan Kim, Xiaoqiang Zhu:
Enhanced Probability-Based Grant-Free Uplink Data Transmission in 5G mMTC. 227-239 - Chung-Ming Huang, Rung-Shiang Cheng, Yin-Ming Li:
The Registration-Based Collision Avoidance Mechanism for IEEE 802.11ah. 240-255 - Flavio Frattini, Marcello Cinque
, Christian Esposito
:
Accurate and Lightweight Range-Free Localization for Wireless Sensor Networks. 256-272
1st International Workshop on High Performance Computing and Applications (IW-HPCA 2019)
- Mei-Chen Li, Lokesh Sharma, Shih-Lin Wu:
Enhance Object Detection Capability with the Object Relation. 275-282 - Yin-Te Tsai, Hsing Cheng Wu, Shao Ming Zhu:
A Simple Algorithm for Oncidium Orchid Cut Flower Grading with Deep Learning. 283-288 - Che-Lun Hung, Chine-fu Hsin, Hsiao-Hsi Wang, Chuan Yi Tang:
Optimization of GPU Memory Usage for Training Deep Neural Networks. 289-293 - Ming-Yan Guo, Hui-Jun Cheng, Chun-Yuan Lin, Yen-Jen Lin, Ann-Shyn Chiang:
Computing Image Intersection and Union Regions for Drosophila Neurons Based on Multi-core CPUs. 294-303 - Halim Fathoni
, Chao-Tung Yang, Chih-Hung Chang
, Chin-Yin Huang
:
Performance Comparison of Lightweight Kubernetes in Edge Devices. 304-309
1st International Workshop on Consumer Cyber Security (IW-ConSec 2019)
- Andrea Bruno
, Giuseppe Cattaneo
:
Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes. 313-320 - Sime Lugovic, Leo Mrsic
, Ljiljana Zekanovic-Korona:
Public WiFi Security Network Protocol Practices in Tourist Destination. 321-332
1st International Workshop on Vehicular Technology (IWVT 2019)
- Xunyi Li, Jinju Shao, Guo Wei, Ruhong Hou:
AEB Control Strategy and Collision Analysis Considering the Human-Vehicle-Road Environment. 335-346 - Shihyang Lin, Jieqin Wan:
Context-Awareness Enhances 5G MEC Resource Allocation. 347-358 - Gang Shen, Jinju Shao, Derong Tan, Yaming Niu, Song Gao:
Optimal Hybrid Path Planning Considering Dynamic and Static Characteristics of Intelligent Vehicles. 359-370 - Xiaotian Ma, Xiaoqing Sang, Yehui Sun, Xiaotong Gong, Shanshang Gao, Yi Xu, Derong Tan:
Single-Binocular Vision Conversion Strategy for Obstacle Detection at Non-signalized Intersections. 371-380 - Yaming Niu, Di Tan, Jinju Shao, Gang Shen, Xunyi Li, Guo Wei:
The Research on Intelligent Vehicle Trajectory Tracking Based on Model Predictive Control. 381-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.