default search action
6th FiCloud 2018: Barcelona, Spain
- Irfan Awan, Muhammad Younas, Filipe Portela:
6th International Conference on Future Internet of Things and Cloud Workshops, FiCloud Workshops 2018, Barcelona, Spain, August 6-8, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7810-7
5th International Symposium on Intercloud and IoT (ICI 2018)
Session 1: Intercloud and IoT I
- Shohei Toyama, Masayuki Hirayama:
User Interface Design Method Considering UI Device in Internet of Things System. 1-6 - Sebastian Cruz-Duarte, Paulo A. Gaona-García
, Elvis E. Gaona-García
:
Cybersecurity In Microgrids. 7-12 - Amine Chemchem, François Alin, Michaël Krajecki
:
Deep Learning and Data Mining Classification through the Intelligent Agent Reasoning. 13-20 - Yen-Wen Chen, Yu-Hsuan Lin:
Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN. 21-27
Session 2: Intercloud and IoT II
- Sayed Chhattan Shah
, Sunil Kumar:
A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc Networks. 28-33 - Martina Marjanovic
, Aleksandar Antonic, Ivana Podnar Zarko
:
Autonomous Data Acquisition in the Hierarchical Edge-Based MCS Ecosystem. 34-41 - Wojciech Rzepecki, Lukasz Iwanecki, Piotr Ryba:
IEEE 802.15.4 Thread Mesh Network - Data Transmission in Harsh Environment. 42-47 - André Leon S. Gradvohl
:
Metrics and Tool for Evaluating Data Stream Processing Systems. 48-55
5th International Symposium on Big Data Research and Innovation (BigR&I 2018)
Session 1: Big Data Research and Innovation I
- Natalia G. Miloslavskaya
, Andrey Nikiforov, Vladimir Budzko:
Standardization of Ensuring Information Security for Big Data Technologies. 56-63 - Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima
, Hiroshi Matsuo:
Adaptive Control of Apache Spark's Data Caching Mechanism Based on Workload Characteristics. 64-69 - Kirill Plaksiy, Andrey Nikiforov, Natalia G. Miloslavskaya
:
Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism. 70-77
Session 2: Big Data Research and Innovation II
- Daichi Kawanami, Masanari Kamoshita, Ryota Kawashima
, Hiroshi Matsuo:
A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores. 78-83 - Vasiliy S. Kireev, Stanislav A. Filippov, Anna I. Guseva, Pyotr V. Bochkaryov
, Igor A. Kuznetsov, Vladimir Migalin, Sergey S. Filin:
Predictive Repair and Support of Engineering Systems Based on Distributed Data Processing Model within an IoT Concept. 84-89 - Vasiliy S. Kireev, Stanislav A. Filippov, Anna I. Guseva, Pyotr V. Bochkaryov
, Igor A. Kuznetsov, Vladimir Migalin:
Cloud Computing in Housing and Utility Services Monitoring Systems. 90-94
International Symposium on Social Networks and Applications (SoNet 2018)
- Junjie Huang, Tiejian Luo:
Computing Len for Exploring the Historical People's Social Network. 95-101 - Xiangyu Xiao, Nicholas Caporusso:
Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape. 102-107 - Ivan Del Pozo, Mauricio Iturralde
, Felipe Restrepo:
Social Engineering: Application of Psychology to Information Security. 108-114
5th International Workshop on Mobile Applications (MobiApps 2018)
Session 1: Mobile Applications I
- Maros Cavojsky
, Marek Uhlar, Marian Ivanis, Martin Molnar, Martin Drozda
:
User Trajectory Extraction Based on WiFi Scanning. 115-120 - Suat Kasap
:
Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in Kuwait. 121-128 - Mohammed Ghazal
, Yasmine Abu Haeyeh, Abdelrahman Abed, Sara Ghazal:
Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile Integration. 129-133 - Mohammed Ghazal
, Marah Talal Alhalabi
, Mansour Chabnari, Linda Ghazal, Luay Fraiwan
:
Design and Implementation of a Mobile Device for Blood Glucose Level Assessment. 134-139
Session 2: Mobile Applications II
- Sara Alromaihi, Wael Elmedany, Chitra Balakrishna
:
Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications. 140-145 - Aishah Khan, Ashraf Khalil
, Hassan Hajjdiab:
Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine Learning. 146-151 - Hassan Hajjdiab, Ayesha Anzer, Hadeel A. Tabaza, Wedad Ahmed:
A Food Wastage Reduction Mobile Application. 152-157
5th International Symposium on Advanced Web and Mobile Applications (AWMA 2018)/12th International Symposium on Performance Modeling and Evaluation of Computer and Telecommunication Networks in Cloud & IoT (PMECT 2018)/2nd International Workshop on Data Science for Intelligent Decision Support (DS4IDS 2018)
- Ahmed Darweesh, Ahmed Abouelfarag, Rania Kadry:
Real Time Adaptive Approach for Image Processing Using Mobile Nodes. 158-163 - Samal Abdreshova, Tatyana Golubeva
, Sergey Konshin, Shabden Bahtaev, Birlesbek Aliyarov
, Viktor Tailakov
:
A Mobile Data Transfer in Energy-Efficient Intelligent Systems for Wastewater Treatment of Thermal Power Plants. 164-169 - Yuriko Oda, Fumihito Ito, Ory Yoshifuji, Youichi Oda, Setsuko Kanai, Zong Shichun
, Hirotomo Ohuchi
:
Proposal of Analysis and Evaluation Method of Urban Area Space Utilizing of Wheelchair Probe Information. 170-175 - Adriano Maia, Filipe Portela
, Manuel Filipe Santos
:
Web Intelligence in Higher Education: A Study on the Usage of Business Intelligence Techniques in Education. 176-181
2nd International Workshop on Cyber Security (CSW 2018)
- Macdonald Chikapa, Anitta Patience Namanya:
Towards a Fast Off-Line Static Malware Analysis Framework. 182-187 - Hamad Al-Mohannadi, Irfan Awan, Jassim Al Hamar, Yousef Al Hamar, Mohammad Shah
, Ahmad Sanda Musa:
Understanding Awareness of Cyber Security Threat among IT Employees. 188-192 - Joelle Chamieh, Jassim Al Hamar, Hamad Al-Mohannadi, Mariam Al Hamar, Ahmad Al-Mutlaq, Ahmad Sanda Musa:
Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities. 193-197 - Ahmad Sanda Musa, Hamad Al-Mohannadi, Jassim Alhamar:
Malware Propagation Modelling in Peer-to-Peer Networks: A Review. 198-202
1st International Workshop on Cloud Gamification (WCG 2018)
- Balázs Barna, Szabina Fodor:
Gamification's Impact on Employee Engagement: Enhancing Employee Well-Being with a Cloud Based Gamified Team-Building Application. 203-208 - Justas Salkevicius, Lukas Navickas:
Battling the Fear of Public Speaking: Designing Software as a Service Solution for a Virtual Reality Therapy. 209-213 - Reza M. Parizi, Ali Dehghantanha:
On the Understanding of Gamification in Blockchain Systems. 214-219 - Jakub Swacha
, Artur Kulpa
:
A Cloud-Based Service for Gamification of eGuides. 220-224
5th International Workshop on Energy Management for Sustainable Internet-of-Things and Cloud Computing (EMSICC 2018)
- Nabila Djennane, Rachida Aoudjit, Samia Bouzefrane:
Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers. 225-230 - Christian Franck, Johann Großschädl, Yann Le Corre, Cyrille Lenou Tago:
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers. 231-236 - Sarra Mehamel, Khaled Slimani, Samia Bouzefrane, Mehammed Daoui:
Energy-Efficient Hardware Caching Decision Using Fuzzy Logic in Mobile Edge Computing. 237-242 - Amar Abane
, Paul Mühlethaler, Mehammed Daoui, Hossam Afifi:
A Down-to-Earth Integration of Named Data Networking in the Real-World IoT. 243-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.