default search action
35th AINA 2021: Toronto, ON, Canada
- Leonard Barolli, Isaac Woungang, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2. Lecture Notes in Networks and Systems 226, Springer 2021, ISBN 978-3-030-75074-9 - Bashar Chreim, Jad Nassar, Carol Habib:
RADAR - Regression Based Energy-Aware DAta Reduction in WSN: Application to Smart Grids. 1-14 - Tales Heimfarth, João Carlos Giacomin:
A Probabilistic Preamble Sampling Anycast Protocol for Low-Power IoT. 15-27 - Mateus Gonçalo do Nascimento, Regina M. M. Braga, José Maria N. David, Mário Antônio Ribeiro Dantas, Fernando Antonio Basile Colugnati:
Towards an IoT Architecture to Pervasive Environments Through Design Science. 28-39 - Gabriel Di Iorio Silva, Wagno Leão Sergio, Victor Ströele, Mario A. R. Dantas:
ASAP - Academic Support Aid Proposal for Student Recommendations. 40-53 - Eriko Shibamoto, Kosuke Takano:
A Method of Expanding Photo-Based User Preference Profile for the Recommendation of Sightseeing Places. 54-65 - Dharmendra Prasad Mahato, Van Huy Pham:
Antlion Optimizer Based Load-Balanced Transaction Scheduling for Maximizing Reliability. 66-79 - Omar Alqahtani, Tom Altman:
An Adaptive Large-Scale Trajectory Index for Cloud-Based Moving Object Applications. 80-94 - Emna Taktak, Mohamed Tounsi, Mohamed Mosbah, Ahmed Hadj Kacem:
High-Level Approach for the Reconfiguration of Distributed Algorithms in Wireless Sensor Networks. 95-106 - Paramvir Singh, Venkatesh Srinivasan, Alex Thomo:
Fast and Scalable Triangle Counting in Graph Streams: The Hybrid Approach. 107-119 - Himanshu Gupta, Tanmay Girish Kulkarni, Lov Kumar, Lalita Bhanu Murthy Neti, Aneesh Krishna:
An Empirical Study on Predictability of Software Code Smell Using Deep Learning Models. 120-132 - Isabelle M. Anderson-Grégoire, Kaitlyn A. Horner, Carson K. Leung, Delica S. Leboe-McGowan, Anifat M. Olawoyin, Beni Reydman, Alfredo Cuzzocrea:
A Big Data Science Solution for Analytics on Moving Objects. 133-145 - Chun Liu, Xin Li:
Mining Method Based on Semantic Trajectory Frequent Pattern. 146-159 - Aly Ahmed, Keanelek Enns, Alex Thomo:
Triangle Enumeration for Billion-Scale Graphs in RDBMS. 160-173 - Zakaria Maamar, Mohammed Al-Khafajiy, Murtada Dohan:
An IoT Application Business-Model on Top of Cloud and Fog Nodes. 174-186 - Masafumi Katoh, Tomonori Kubota, Akiko Yamada, Yuji Nomura, Yuji Kojima, Yuuichi Yamagishi:
Network Architecture for Agent Communication in Cyber Physical System. 187-199 - Euripides G. M. Petrakis, Ilias Kontochristos, Karina Rastsinskagia:
Fi-SWoT: Secure Federated Service Oriented Architecture for the Semantic Internet of Things. 200-214 - Mehdi Houichi, Faouzi Jaïdi, Adel Bouhoula:
A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques. 215-228 - Kentaro Hayashi, Hikaru Hamase, Yuki Tanaka, Takuya Fujihashi, Shunsuke Saruwatari, Takashi Watanabe:
Integration of Localization and Wireless Power Transfer Using Microwave. 229-239 - Frank Yeong-Sung Lin, Wen-Yao Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Hao-Jyun Yang:
A Usage-Based Insurance Policy Bidding and Support Platform Using Internet of Vehicles Infrastructure and Blockchain Technology. 240-249 - Ferdews Tlili, Rim Haddad, Ridha Bouallegue, Raed M. Shubair:
Shoulder and Trunk Posture Monitoring System Over Time for Seating Persons. 250-260 - Adil Chekati, Meriem Riahi, Faouzi Moussa:
Agent-Based Modelling Approach for Decision Making in an IoT Framework. 261-272 - Salma Saidani, Rim Haddad, Ridha Bouallegue, Raed M. Shubair:
A New Proposal of a Smart Insole for the Monitoring of Elderly Patients. 273-284 - Kawtar Lasri, Yann Ben Maissa, Loubna Echabbi, Oana Iova, Fabrice Valois:
A New Distributed and Probabilistic Approach for Traffic Control in LPWANs. 285-297 - Thiago G. Thomé, Victor Ströele, Hélady Pinheiro, Mario A. R. Dantas:
A Fog Computing Simulation Approach Adopting the Implementation Science and IoT Wearable Devices to Support Predictions in Healthcare Environments. 298-309 - Robert R. Chodorek, Agnieszka Chodorek, Krzysztof Wajda:
Benefits of Using WebRTC Technology for Building of Flying IoT Systems. 310-322 - Chayma Werghui, Amine Kchiche, Noureddine Ben Othman, Farouk Kamoun:
A Neural Network Model for Fuel Consumption Estimation. 323-332 - Sirojiddin Komolov, Youssef Youssry Ibrahim, Manuel Mazzara:
TeleML: Deploying Trained Machine Learning Models in Cross-Platform Applications. 333-344 - Ahmed Moustafa, Muhammad Asad, Saima Shaukat, Alexander Norta:
PPCSA: Partial Participation-Based Compressed and Secure Aggregation in Federated Learning. 345-357 - Anna Bryniarska:
Granulation of Technological Diagnosis in the Algebra of the n-Pythagorean Fuzzy Sets. 358-369 - Chiu-Han Hsiao, Ming-Chi Tsai, Frank Yeong-Sung Lin, Ping-Cherng Lin, Feng-Jung Yang, Shao-Yu Yang, Sung-Yi Wang, Pin-Ruei Liu, Yennun Huang:
Automatic Kidney Volume Estimation System Using Transfer Learning Techniques. 370-381 - Lukas Ehrmann, Marvin Stolle, Eric Klieme, Christian Tietz, Christoph Meinel:
Detecting Interaction Activities While Walking Using Smartphone Sensors. 382-393 - Anastasia Pustozerova, Andreas Rauber, Rudolf Mayer:
Training Effective Neural Networks on Structured Data with Federated Learning. 394-406 - Abir Masmoudi, Hatem Bellaaj, Mohamed Jmaiel:
A Multi-view Active Learning Approach for the Hierarchical Multi-label Classification of Research Papers. 407-420 - Piotr Milczarski, Michal Beczkowski, Norbert Borowski:
Blue-White Veil Classification of Dermoscopy Images Using Convolutional Neural Networks and Invariant Dataset Augmentation. 421-432 - Panagiotis Giannakopoulos, Euripides G. M. Petrakis:
Smilax: Statistical Machine Learning Autoscaler Agent for Apache FLINK. 433-444 - Tetsu Joh, Takayuki Warabino, Masaki Suzuki, Yusuke Suzuki, Tomohiro Otani:
Application Relocation Method for Distributed Cloud Environment Considering E2E Delay and Cost Variation. 445-457 - Muhammad I. H. Sukmana, Justus Cöster, Wenzel Pünter, Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems. 458-471 - Spyridon Chouliaras, Stelios Sotiriadis:
Detecting Performance Degradation in Cloud Systems Using LSTM Autoencoders. 472-481 - Wafa Hidri, Riadh Hadj M'tir, Narjès Bellamine Ben Saoud:
An Ontology for Composite Cloud Services Description. 482-494 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data. 495-508 - Wenchao Liu, Yingnan Zhang, Xu An Wang, Zhong Wang:
Improvement of the Matrix for Simple Matrix Encryption Scheme. 509-521 - Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi:
Lifestyle Authentication Using a Correlation Between Activity and GPS/Wi-Fi Data. 522-535 - Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman:
Identify Encrypted Packets to Detect Stepping-Stone Intrusion. 536-547 - Marek R. Ogiela, Lidia Ogiela:
Visual Paths in Creation of User-Oriented Security Protocols. 548-551 - Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota:
SeBeST: Security Behavior Stage Model and Its Application to OS Update. 552-566 - Bin Cheng, Tsubasa Kikuta, Yoshinao Toshimitsu, Takamichi Saito:
Investigation of Power Consumption Attack on Android Devices. 567-579 - Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei Simonov:
The Novel System of Attacks Detection in 5G. 580-591 - Wataru Taguchi, Kazumasa Omote:
Risk Analysis for Worthless Crypto Asset Networks. 592-602 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Human Centered Protocols in Transformative Computing. 603-607 - Diletta Cacciagrano, Flavio Corradini, Gianmarco Mazzante, Leonardo Mostarda, Davide Sestili:
Off-Chain Execution of IoT Smart Contracts. 608-619 - Ruixiao Li, Hayato Yamana:
Fast and Accurate Function Evaluation with LUT over Integer-Based Fully Homomorphic Encryption. 620-633 - Hiroaki Kikuchi:
Reidentification Risk from Pseudonymized Customer Payment History. 634-645 - Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Trust-Based Detection Strategy Against Replication Attacks in IoT. 646-656 - Harkeerat Kaur, Rohit Kumar, Isao Echizen:
Reinforcement Learning Based Smart Data Agent for Location Privacy. 657-671 - Radoslaw Bulat, Marek R. Ogiela:
Comparison of Personal Security Protocols. 672-678 - Yohei Watanabe, Naoto Yanai, Junji Shikata:
Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices. 679-690 - Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
An Efficient and Privacy-Preserving Billing Protocol for Smart Metering. 691-702 - Lucio Agostinho Rocha:
Intra Data Center MultiPath Optimization with Emulated Software Defined Networks. 703-714 - Rodrigo Moreira, Pedro Frosi Rosa, Rui Luis Andrade Aguiar, Flávio de Oliveira Silva:
Deploying Scalable and Stable XDP-Based Network Slices Through NASOR Framework for Low-Latency Applications. 715-726 - Oussama Soualah, Omar Houidi, Djamal Zeghlache:
A Monitoring Aware Strategy for 5G Core Slice Embedding. 727-744 - Houda Hassen, Soumaya Meherzi, Safya Belghith:
Performance Analysis of POX and OpenDayLight Controllers Based on QoS Parameters. 745-756 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa, Jacir Luiz Bordim, Eduardo Alchieri:
DoSSec: A Reputation-Based DoS Mitigation Mechanism on SDN. 757-770 - Hugo Gustavo Valin Oliveira da Cunha, Rodrigo Moreira, Flávio de Oliveira Silva:
A Comparative Study Between Containerization and Full-Virtualization of Virtualized Everything Functions in Edge Computing. 771-782 - Alisson O. Chaves, Pedro Frosi Rosa, Flávio Oliveira Silva:
A Proposal for Application-to-Application Network Addressing in Clean-Slate Architectures. 783-793
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.