default search action
14th BWCCA 2019: Antwerp, Belgium
- Leonard Barolli, Peter Hellinckx, Tomoya Enokido:
Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2019, Antwerp, Belgium, November 7-9, 2019. Lecture Notes in Networks and Systems 97, Springer 2020, ISBN 978-3-030-33505-2
The 14th International Conference on Broad-Band andd Wireless Computing, Communication and Applications (BWCCA-2019)
- Yi Liu, Kevin Bylykbashi, Leonard Barolli:
A Fuzzy-Based Decision System for Sightseeing Spots Considering Hot Spot Access as a New Parameter. 3-11 - Toshiyuki Haramaki, Hiroaki Nishino:
A Multi-sensor Based Physical Condition Estimator for Home Healthcare. 12-21 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs WMN-PSOHC System Considering Constriction and Linearly Decreasing Inertia Weight Replacement Methods. 22-31 - Miralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Simulation System for IoT Node Selection in Opportunistic Networks and Testbed Implementation. 32-43 - Tehreem Ashfaq, Muhammad Ahmed Younis, Shahzad Rizwan, Zahid Iqbal, Shahid Mehmood, Nadeem Javaid:
Consensus Based Mechanism Using Blockchain for Intensive Data of Vehicles. 44-55 - Hassan Farooq, Muhammad Usman Arshad, Muhammad Faraz Akhtar, Shahid Abbas, Bilal Zahid, Nadeem Javaid:
Block-VN: A Distributed Blockchain-Based Efficient Communication and Storage System. 56-66 - Omaji Samuel, Nadeem Javaid, Faisal Shehzad, Muhammad Sohaib Iftikhar, Muhammad Zohaib Iftikhar, Hassan Farooq, Muhammad Ramzan:
Electric Vehicles Privacy Preserving Using Blockchain in Smart Community. 67-80 - Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
A Nodes Selection Algorithm for Fault Recovery in the GTBFC Model. 81-92 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
A TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT. 93-104 - Evjola Spaho, Klodian Dhoska, Leonard Barolli, Vladi Kolici, Makoto Takizawa:
Enhancement of Binary Spray and Wait Routing Protocol for Improving Delivery Probability and Latency in a Delay Tolerant Network. 105-113 - Yinzhe Guo, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Data Exchange Algorithm at Aggregate Level in the TWTBFC Model. 114-124 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:
Trust-Based Game-Theoretical Decision Making for Food-Energy-Water Management. 125-136 - Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Purpose Ordering Scheduler. 137-149 - Hadil Abukwaik, Christian Groß, Markus Aleksy:
NFC-Based Commissioning of Adaptive Sensing Applications for the 5G IIoT. 150-161 - Wael Ayoub, Mohamad Mroué, Abed Ellatif Samhat, Fabienne Nouvel, Jean-Christophe Prévotet:
SCHC-Based Solution for Roaming in LoRaWAN. 162-172 - Atia Javaid, Maheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Nadeem Javaid:
Reputation System for IoT Data Monetization Using Blockchain. 173-184 - Maheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Atia Javaid, Nadeem Javaid:
Blockchain Based Balancing of Electricity Demand and Supply. 185-198 - Takeru Kurokawa, Naohiro Hayashibara:
Data Replication Based on Cuckoo Search in Mobile Ad-Hoc Networks. 199-209 - Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Trusted, Decentralized and Blockchain-Based M2M Application Service Provision. 210-221 - Natsuki Matsumoto, Tetsuya Shigeyasu:
A New Mobile Agent System for Sharing Disaster Information Under Unstable Network Conditions. 222-230 - Chunyan Zeng, Songnan Lv, Shangli Zhou, Zhifeng Wang:
A Deep Hybrid Collaborative Filtering Based on Multi-dimension Analysis. 231-240 - Christos Bouras, Georgios Diles, Rafail Kalogeropoulos:
An Energy Efficient Mechanism for Downlink and Uplink Decoupling in 5G Networks. 241-252 - Christos Bouras, Vasileios Kokkinos, Evangelos Michos:
Efficient 5G Network Decoupling Using Dynamic Modulation and Coding Scheme Selection. 253-265 - Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
A Probabilistic Offloading Approach in Mobile Edge Computing. 266-278 - Sanjay K. Dhurandher, Jagdeep Singh, Isaac Woungang, Makoto Takizawa, Geetanshu Gupta, Raghav Kumar:
Fuzzy Geocasting in Opportunistic Networks. 279-292 - Shinji Sugawara:
Digital Content Refinement by Collecting Partly Unreliable Attributes over a Network. 293-302 - Yoshihiro Okada:
Web Version of IntelligentBox (WebIB) and Its Extension for Web-Based VR Applications - WebIBVR. 303-314 - Tianhan Gao, Qingwei Mi:
Enemy Attack Management Algorithm for Action Role-Playing Games. 315-326 - Kuang-Yen Tai, Dai-Lun Chiang, Chun-Yen Chuang, Tzer-Shyong Chen, Frank Yeong-Sung Lin:
Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System. 327-337 - Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails. 338-351 - Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock. 352-362 - Adnan Sabovic, Carmen Delgado, Jan Bauwens, Eli De Poorter, Jeroen Famaey:
Accurate Online Energy Consumption Estimation of IoT Devices Using Energest. 363-373 - Christos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado, Vasileios Kokkinos:
Comparison of LoRa Simulation Environments. 374-385 - Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir, Abdulhalim Dandoush:
Proactive Network Slices Management Algorithm Based on Fuzzy Logic System and Support Vector Regression Model. 386-397 - Chen Yuan, Minoru Uehara:
An Optimal Route Recommendation Method for a Multi-purpose Travel Route Recommendation System. 398-408 - Zia Ullah, Mohamed R. Elkadeem, Shaorong Wang:
Artificial Intelligence Technique for Optimal Allocation of Renewable Energy Based DGs in Distribution Networks. 409-422 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Impact of Sharing Algorithms for Cloud Services Management. 423-427 - Marek R. Ogiela, Lidia Ogiela:
Application of Cognitive Protocols in Transformative Computing. 428-432 - Fabricio Landero Cristobal, Miguel A. Wister, Pablo Payró Campos:
Analyzing Mobile Cycling Applications for Monitoring Workouts. 433-444 - Yoshitaka Shibata, Goshi Sato, Noriki Uchida:
Road State Information Platform Based on Multi-sensors and Bigdata Analysis. 445-454 - Jin Zhu:
A New Discounting Approach to Conflict Information Fusion Using Multi-criteria of Reliability in Dempster-Shafer Evidence Theory. 455-467
The 21th International Symposium on Multimedia Network Systems and Applications (MNSA-2019)
- Takumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS System. 471-482 - Hazuki Ishii, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption Model. 483-493 - Kosuke Gima, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Parallel Data Transmission Protocols in the Mobile Fog Computing Model. 494-503 - Goshi Sato, Yoshitaka Shibata, Noriki Uchida:
Recovery of Fiber Networks C/M-Plane via an IoT-Based Narrow-Band Links System Based on LoRa Mesh Platform. 504-511 - Na Deng, Xu Chen, Caiquan Xiong:
Clustering Analysis and Visualization of TCM Patents Based on Deep Learning. 512-520 - Muhammad Zohaib Iftikhar, Muhammad Sohaib Iftikhar, Muhammad Jawad, Annas Chand, Zain Ahmad Khan, Abdul Basit Majeed Khan, Nadeem Javaid:
Efficient Resource Utilization Using Blockchain Network for IoT Devices in Smart City. 521-534 - Tianhan Gao, Lei Jiang, Xibao Wang:
Recommendation System Based on Deep Learning. 535-543 - Kazuma Ikenoue, Kazunori Ueda:
Routing Method Based on Data Transfer Path in DTN Environments. 544-552
The 12th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2019)
- Seiji Ohara, Heidi Durresi, Admir Barolli, Shinji Sakamoto, Leonard Barolli:
A Hybrid Intelligent Simulation System for Node Placement in WMNs Considering Load Balancing: A Comparison Study for Exponential and Normal Distribution of Mesh Clients. 555-569 - Nan Zhao, Menglin Fan, Chao Tian, Pengfei Fan, Xiao He:
Multi-dimensional Contract Incentive Design for Mobile Crowdsourcing Networks. 570-578 - Ningling Jiang, Elis Kulla:
Evaluation and Comparison of CO2 and Fuel Consumption for Different Car Following Models. 579-588 - Myoungsu Kim, Kangbin Yim:
Individually Separated Wireless Access Point to Protect User's Private Information. 589-596 - Hsing-Chung Chen, Mei-He Jiang, Tzu-Ya Chen:
Long-Term Care (LTC) Monitoring System for Caregivers Based on Wireless Sensing Technology. 597-605
The 10th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2019)
- Kazunori Uchida, Leonard Barolli:
Concatenated Path Domain for Dijkstra's Algorithm Based Ray Tracing to Enhance Computational Areas. 609-620 - Naoki Higashinaka, Hiroshi Maeda:
Routing of Optical Baseband Signal Depending on Wavelength in Periodic Structure. 621-629 - Nan Zhao, Pengfei Fan, Xiao He, Menglin Fan, Chao Tian:
Two-Stage Dynamic Contract Design Under Asymmetric Information in Cooperative Communication. 630-637 - Soushi Morita, Elis Kulla:
Minimizing Control Overhead of Routing Protocols in Wireless Multihop Networks: Simulation Evaluation. 638-645 - Kiyotaka Fujisaki, Yuki Yoshigai:
Effect of Parasitic Element on Communication Performance of 13.56 MHz RFID System. 646-654
The 10th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2019)
- Yanjing Hu, Xu An Wang:
Perception Mining of Network Protocol's Stealth Attack Behaviors. 657-669 - Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng, Ching-Cheng Liu:
Digital Image Anti-counterfeiting Technology. 670-677 - Wei-Sheng Chen, Fang-Yie Leu, Heru Susanto:
System Implementation of AUSF Fault Tolerance. 678-687 - Zhi-Qian Hong, Fang-Yie Leu, Heru Susanto:
News Collection and Analysis on Public Political Opinions. 688-697 - Ping-Jui Chiang, Heru Susanto, Fang-Yie Leu, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-Term Care. 698-707
The 8th International Workshop on Robot and Vehicle Interaction, Control, Communication and Cooperation (RVI3C-2019)
- Shogo Nakasaki, Makoto Ikeda, Leonard Barolli:
A Message Relaying Method with Enhanced Dynamic Timer Considering Decrease Rate of Neighboring Nodes for Vehicular-DTN. 711-720 - Keita Matsuo, Leonard Barolli:
Prediction of RSSI by Scikit-Learn for Improving Position Detecting System of Omnidirectional Wheelchair Tennis. 721-732 - Zain Abubaker, Muhammad Usman Gurmani, Tanzeela Sultana, Shahzad Rizwan, Muhammad Azeem Sarwar, Muhammad Zohaib Iftikhar, Nadeem Javaid:
Decentralized Mechanism for Hiring the Smart Autonomous Vehicles Using Blockchain. 733-746 - Ermioni Qafzezi, Kevin Bylykbashi, Evjola Spaho, Leonard Barolli:
An Intelligent Approach for Resource Management in SDN-VANETs Using Fuzzy Logic. 747-756 - Takahiro Uchiya, Kodai Shimano, Ichi Takumi:
Tutorial Educating Developer of Reinforcement Learning Agent Using IDEAL. 757-762
The 5th International Workshop on Advanced Techniques and Algorithms for Security and Privacy (ATASP-2019)
- Hafiza Syeda Zainab Kazmi, Faiza Nazeer, Sahrish Mubarak, Seemab Hameed, Aliza Basharat, Nadeem Javaid:
Trusted Remote Patient Monitoring Using Blockchain-Based Smart Contracts. 765-776 - Songyin Zhao, Xu An Wang:
A Survey of Malicious HID Devices. 777-786 - Zeyu Wang, Wei Zhang, Peng Ma, Xu An Wang:
Power Consumption Attack Based on Improved Principal Component Analysis. 787-799 - Takamichi Saito, Tsubasa Kikuta, Rikita Koshiba:
How Securely Are OAuth/OpenID Connect Implemented in Japan? 800-811
The 2nd International Workshop on Bio-Sensing, Processing, Application and Networking (BioSPAN-2019)
- Asad Ullah Khan, Affaf Shahid, Fatima Tariq, Abdul Ghaffar, Abid Jamal, Shahid Abbas, Nadeem Javaid:
Enhanced Decentralized Management of Patient-Driven Interoperability Based on Blockchain. 815-827 - Na Deng, Xu Chen, Caiquan Xiong:
Design and Construction of Intelligent Decision-Making System for Marine Protection and Law Enforcement. 828-837 - Xu Chen, Deliang Zhong, Yingzhou Zheng, Shudong Liu, Yipeng Li, Na Deng:
Data Authenticity Analysis for Online O2O Data: A Case Study of Second-Hand Houses Posting Data. 838-845 - Tianhan Gao, Hui An:
A Brief Survey: 3D Face Reconstruction. 846-854 - Linlin Zhang, Kin Fun Li:
A Feasibility Study on Wrist Rehabilitation Using the Leap Motion. 855-864 - Yuhan Jiang, Song Cai, Chunyan Zeng, Zhifeng Wang:
Classification of Cotton and Flax Fiber Images Based on Inductive Transfer Learning. 865-871
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.