


default search action
COINS 2019: Crete, Greece
- Farshad Firouzi, Krishnendu Chakrabarty, Bahar J. Farahani, Fangming Ye, Vasilis F. Pavlidis:
Proceedings of the International Conference on Omni-Layer Intelligent Systems, COINS 2019, Crete, Greece, May 5-7, 2019. ACM 2019, ISBN 978-1-4503-6640-3 - Gregory Falco
, Caleb Li, Pavel Fedorov, Carlos Caldera, Rahul Arora, Kelly Jackson:
NeuroMesh: IoT Security Enabled by a Blockchain Powered Botnet Vaccine. 1-6 - John Violos, Evangelos Psomakelis
, Konstantinos Tserpes
, Fotis Aisopos, Theodora A. Varvarigou:
Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource Utilization. 7-12 - Yohan Joo, Jongpil Jeong, Sangmin Bae:
Under Sampling Bagging Shapelet Transformation for Hydraulic System. 13-18 - Nawsher Khan, Arshi Naim
, Mohammad Rashid Hussain, Quadri Noorulhasan Naveed
, Naim Ahmad
, Shamimul Qamar
:
The 51 V's Of Big Data: Survey, Technologies, Characteristics, Opportunities, Issues and Challenges. 19-24 - Dávid Juhász
, Axel Jantsch
:
Dynamic Constraints for Mixed-Criticality Systems. 25-30 - Dominik Püllen, Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks. 31-37 - Pranav Nerurkar
, Madhav Chandane
, Sunil Bhirud:
Representation learning for social networks using Homophily based Latent Space Model. 38-43 - Nikolaos Zompakis
, Dimitrios Anagnostos, Konstantina Koliogeorgi, Georgios Zervakis, Kostas Siozios
:
A Design Flow Framework for Fully-Connected Neural Networks Rapid Prototyping. 44-49 - Christopher Hannon, Dong Jin:
Bitcoin Payment-Channels for Resource Limited IoT Devices. 50-57 - Alireza Izaddoost, Efemena Ogodo, Sandesh Prasai:
Enhanced Data Transmission Platform in Smart Farms. 58-61 - Yasser Alsouda, Sabri Pllana, Arianit Kurti:
IoT-based Urban Noise Identification Using Machine Learning: Performance of SVM, KNN, Bagging, and Random Forest. 62-67 - Mohammad R. Nakhkash, Tuan Nguyen Gia
, Iman Azimi
, Arman Anzanpour
, Amir M. Rahmani
, Pasi Liljeberg:
Analysis of Performance and Energy Consumption of Wearable Devices and Mobile Gateways in IoT Applications. 68-73 - Faraz Fatemi Moghaddam, Philipp Wieder
, Süleyman Berk Çemberci, Ramin Yahyapour
:
Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds. 74-79 - Oliver Klemp, Maher Fakih, Kim Grüttner, Ralf Stemmer, Wolfgang Nebel:
Experimental Evaluation of Scenario Aware Synchronous Data Flow based Power Management. 80-85 - Jan Cordes, Maher Fakih:
A Design-flow for implementing, validating and evaluating Machine-learning Classifiers on FPGAs. 86-91 - Ioannis Stratakos, Dimitrios Gourounas, Vasileios Tsoutsouras, Theodore L. Economopoulos, George K. Matsopoulos, Dimitrios Soudris:
Hardware Acceleration of Image Registration Algorithm on FPGA-based Systems on Chip. 92-97 - Janaki Joshi, Lakshmi Sirisha Chodisetty, Varsha Raveendran:
A Quality Attribute-based Evaluation of Time-series Databases for Edge-centric Architectures. 98-103 - Kim Grüttner, Maher Fakih, Mikel Azkarate-askatsua
, Peio Onaindia
, Roman Obermaisser:
SAFEPOWER: Application of Power Management Techniques in SoCs for Safety-Relevant Systems. 104-109 - Ioannis Galanis, Theodoros Marinakis, Iraklis Anagnostopoulos:
Workload-aware Management Targeting Multi-Gateway Internet-of-Things. 110-115 - Stefan Forsström, Ulf Jennehag:
An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous Agents. 116-121 - Georgios Tertytchny, Nicolas Nicolaou, Maria K. Michael:
Differentiating Attacks and Faults in Energy Aware Smart Home System using Supervised Machine Learning. 122-127 - Andreas Kouloumpris, Theocharis Theocharides, Maria K. Michael:
Metis: Optimal Task Allocation Framework for the Edge/Hub/Cloud Paradigm. 128-133 - Bahar J. Farahani
, Mojtaba Barzegari
, Fereidoon Shams Aliee:
Towards Collaborative Machine Learning Driven Healthcare Internet of Things. 134-140 - Rolf Schmedes, Philipp Ittershagen, Kim Grüttner:
Towards Distributed Runtime Monitoring with C++ Contracts. 141-145 - Andreas Aigner, Abdelmajid Khelil
:
Assessment of Model-based Methodologies to Architect Cyber-Physical Systems. 146-151 - Jawad Ali
, Toqeer Ali Syed
, Yazed Alsaawy, Ahmad Shahrafidz Khalid
, Shahrulniza Musa
:
Blockchain-based Smart-IoT Trust Zone Measurement Architecture. 152-157 - Alshihri Saad, Soo Young Park:
Decentralized Directed acyclic graph based DLT Network. 158-163 - Xinchi He, Sarra M. Alqahtani, Rose F. Gamble, Mauricio Papa
:
Securing Over-The-Air IoT Firmware Updates using Blockchain. 164-171 - Lydia Negka
, Georgios Gketsios, Nikolaos Athanasios Anagnostopoulos
, Georgios P. Spathoulas, Athanasios Kakarountas
, Stefan Katzenbeisser:
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection. 172-178 - Fereidoon Shams Aliee, Hanieh Kashfi, Bahar J. Farahani
:
The Evolving Enterprise Architecture: A Digital Transformation Perspective. 179-183 - Thomas K. Dasaklis
, Fran Casino
, Constantinos Patsakis:
Defining granularity levels for supply chain traceability based on IoT and blockchain. 184-190 - Michelle Lauer, Rupamathi Jaddivada, Marija Ilic:
Secure Blockchain-Enabled DyMonDS Design. 191-198 - Kun-Chih Jimmy Chen
, Ting-Yi George Wang, Yueh-Chi Andrew Yang:
Cycle-Accurate NoC-based Convolutional Neural Network Simulator. 199-204 - Esha Sarkar, Michail Maniatakos
:
On automating delayered IC analysis for hardware IP protection. 205-210 - Johann Knechtel, Satwik Patnaik
, Ozgur Sinanoglu
:
Protect Your Chip Design Intellectual Property: An Overview. 211-216 - Mohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song
, Krishnendu Chakrabarty
, Ramesh Karri
:
Security Assessment of Microfluidic Immunoassays. 217-222 - Hossein Ahmadi, Bahar J. Farahani
, Fereidoon Shams Aliee, Masoud Azizi Motlagh:
Cross-layer Enterprise Architecture Evaluation: An Approach to Improve the Evaluation of TO-BE Enterprise Architecture. 223-228 - Federico Reghenzani
, Giuseppe Massari, William Fornaciari
, Andrea Galimberti
:
Probabilistic-WCET Reliability: On the experimental validation of EVT hypotheses. 229-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.