default search action
iThings/GreenCom/CPSCom/SmartData 2018: Halifax, NS, Canada
- IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE 2018, ISBN 978-1-5386-7975-3
iThings-2018: The 11th IEEE International Conference on Internet of Things
of Things IoT Systems and Applications I
- A. H. El Fawal, Ali Mansour, Mohamad Najem, Frédéric Le Roy, Denis Le Jeune:
CTMC Modeling for M2M/H2H Coexistence in a NB-IoT Adaptive eNodeB. 1-8 - Roberto Girau, Enrico Ferrara, Maura Pintor, Mariella Sole, Daniele D. Giusto:
Be Right Beach: A Social IoT System for Sustainable Tourism Based on Beach Overcrowding Avoidance. 9-14
IoT Systems and Applications II
- Bilhanan Silverajan, Mert Ocak, Benjamin Nagel:
Cybersecurity Attacks and Defences for Unmanned Smart Ships. 15-20 - Tina Mirfakhraie, Giuliano Vitor, Ken Grogan:
Applicable Protocol for Updating Firmware of Automotive HVAC Electronic Control Units (ECUs) Over the Air. 21-26
IoT Systems and Applications III
- Golnar Kalantar, Arash Mohammadi, S. Nima Sadrieh:
Analyzing the Effect of Bluetooth Low Energy (BLE) with Randomized MAC Addresses in IoT Applications. 27-34 - Hamdi Amroun, Yacine Benziani, M'hamed Hamy Temkit, Mehdi Ammi:
Advanced Statistical Models for Modeling Hot Water Consumption Using a Connected Boiler. 35-42 - Jing Bi, Shoulin Yin:
A New Graph Semi-Supervised Learning Method for Medical Image Automatic Annotation. 43-46 - Shoulin Yin, Jing Bi:
Medical Image Annotation Based on Deep Transfer Learning. 47-49
IoT Services and Intelligence I
- Attlee M. Gamundani, Amelia Phillips, Hippolyte N. Muyingi:
An Overview of Potential Authentication Threats and Attacks on Internet of Things(IoT): A Focus on Smart Home Applications. 50-57 - Jinyang Huang, Bin Liu, Hongxin Jin, Zhiqiang Liu:
WiAnti: an Anti-Interference Activity Recognition System Based on WiFi CSI. 58-65 - Marco E. Pérez Hernández, Badraddin Alturki, Stephan Reiff-Marganiec:
FABIoT: A Flexible Agent-Based Simulation Model for IoT Environments. 66-73
IoT Services and Intelligence II
- Jason M. McGinthy, Alan J. Michaels:
Lightweight Internet of Things Encryption Using Galois Extension Field Arithmetic. 74-80 - Yiyun Zhou, Meng Han, Liyuan Liu, Yan Wang, Yi Liang, Ling Tian:
Improving IoT Services in Smart-Home Using Blockchain Smart Contract. 81-87 - Desiree I. Cendana, Neriza V. Bustillo, Thelma D. Palaoag, Mark Anthony Marcial, Arjay E. Perreras:
Harnessing Energy Consumption in a Smarthome IoT Framework. 88-96
IoT Services and Intelligence III
- Luciano Baresi, Mersedeh Sadeghi, Massimo Valla:
TDeX: A Description Model for Heterogeneous Smart Devices and GUI Generation. 97-104 - Yue Xu, Pengfei Hu, Huansheng Ning:
An Ontology-Based Domain Modeling and Device Search in Smart Home. 105-111 - Antti Kolehmainen:
Secure Firmware Updates for IoT: A Survey. 112-117
IoT Services and Intelligence IV
- Xiong Luo, Zhijie He, Long Wang, Weiping Wang, Huansheng Ning, Jenq-Haur Wang, Wenbing Zhao:
An Efficient Jaya Algorithm for Resource Allocation in the Cognitive-Radio-Networks-Aided Internet of Things. 118-125 - Guohua Liu, Zhihong Ying, Liang Zhao, Xu Yuan, Zhikui Chen:
A New Deep Transfer Learning Model for Judicial Data Classification. 126-131 - Bin Lv, Weiliang Hou, Guohua Liu, Jing Gao, Xu Yuan, Peng Li, Zhikui Chen:
A Deep CFS Model for Text Clustering. 132-137
IoT Enabling Technologies
- Amit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung:
Design and Performance Evaluation of Containerized Microservices on Edge Gateway in Mobile IoT. 138-145 - Roberto Rojas-Cessa, Chuan-Kuo Wong, Zhengqi Jiang, Haard Shah, Haim Grebel, Ahmed A. Mohamed:
An Energy Packet Switch for Digital Power Grids. 146-153 - Jyoti Budakoti, Amit Singh Gaur, Chung-Horng Lung:
IoT Gateway Middleware for SDN Managed IoT. 154-161 - Zakaria Benomar, Dario Bruneo, Salvatore Distefano, Khalid Elbaamrani, Noureddine Idboufker, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Extending Openstack for Cloud-Based Networking at the Edge. 162-169
IoT Networks and Communications
- Jason M. McGinthy, Alan J. Michaels:
Semi-Coherent Transmission Security for Low Power IoT Devices. 170-177
WiP Report
- Yukikazu Nakamoto, Daichi Minami, Shota Shiba, Yoshitaka Koga, Koji Fukuoka:
A Simulation Environment of Embedded Control Systems for Multi-Core Processors (WiP Report). 178-182
Special Session on IoT Solutions for Smart Healthcare
- Mohammad Moradi, Morteza Moradi, Amjad Anvari-Moghaddam:
MetaSyCar: A System for Metabolic Syndrome Control and Caring. 183-188 - Maxence Bobin, Hamdi Amroun, Mehdi Boukallel, Margarita Anastassova, Mehdi Ammi:
Smart Cup to Monitor Stroke Patients Activities During Everyday Life. 189-195 - Bader Aldughayfiq, Srinivas Sampalli:
A System to Lower the Risk of Dispensing Medication Errors at Pharmacies Using NFC. 196-202 - Amarjit Singh Dhillon, Shikharesh Majumdar, Marc St-Hilaire, Ali El-Haraki:
MCEP: A Mobile Device Based Complex Event Processing System for Remote Healthcare. 203-210
Special Session on Securing IoT Networks
- Luca Deri, Arianna Del Soldato:
An Architecture for Distributing and Enforcing IoT Security at the Network Edge. 211-218 - S. Rajashree, Pritam Gajkumar Shah, S. Murali:
Security Model for Internet of Things End Devices. 219-221
Special Session on Privacy, Data Assurance, Security Solutions in IoT
- Subhadeep Sarkar, Jean-Pierre Banâtre, Louis Rilling, Christine Morin:
Towards Enforcement of the EU GDPR: Enabling Data Erasure. 222-229
Special Session on IoT-driven energy systems (INET): Advances and Applications
- Xin Miao, Roberto Rojas-Cessa, Ahmed A. Mohamed, Haim Grebel:
The Digital Power Networks: Energy Dissemination Through a Micro-Grid. 230-235
GreenCom-2018: The 14th IEEE International Conference on Green Computing and Communications
Energy-Efficient Networking and Communications
- Zachary W. Lamb, Dharma P. Agrawal:
Spatio-Temporal Clustering of GPS Traces for Energy-Efficiency in Vehicular Ad-Hoc Networks. 236-243 - Juvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin:
Network Energy Efficiency Through Matching and Reconfiguration. 244-250 - M. Zulfiker Ali, Jelena V. Misic, Vojislav B. Misic:
Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition. 251-256 - Wajeeha Nasar, Abdur Rahman Maud, Hao Wang, Hong-Ning Dia:
An Efficient Greedy Algorithm for Wide Band Spectrum Sensing in Cognitive Radio Networks. 257-262
Energy Harvesting Communications and Networks
- Huijin Cao, Jun Cai:
Context-Aware Proactive Caching for Heterogeneous Networks with Energy Harvesting: An Online Learning Approach. 263-267 - Qizhen Li, Jie Gao, Jinming Wen, Xiaohu Tang, Lian Zhao, Limin Sun:
SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. 268-273 - Ala Abu Alkheir, Hussein T. Mouftah:
RF-Energy Harvesting from Moving Vehicles: Mathematical Modeling and Selection Protocol. 274-279 - Ziru Chen, Zhao Chen, Lin X. Cai, Yu Cheng, Ruoting Gong:
A Stochastic Geometry Analysis of Energy Harvesting in Large Scale Wireless Networks. 280-286 - Tony Liu, Peter He:
Sum Power Minimization of Greener Communications with Energy Harvesting. 287-294
Optimization and Analysis in Green Communications I
- Jie Chen:
Network Analysis Based on 2/4G Common Coverage Research in Rural Area. 295-300 - Xiaozheng Gao, Ping Wang, Dusit Niyato, Kai Yang, Jianping An:
An Auction-Based Time Scheduling Mechanism for Backscatter-Aided RF-Powered Cognitive Radio Networks. 301-307 - Long Chen, Ming Chi, Jie Chen, Bin Hu, Zhi-Hong Guan:
Energy Efficient Transport Protocol for Mitigating Congestion in Complex Networks. 308-312 - Abdulelah Alganas, Dongmei Zhao:
Distortion-Aware Multicasting of Multiple Description Coded Media in Wireless Mesh Networks. 313-319
Optimization and Analysis in Green Communications II
- Qi Sun, Hong-Ning Dai, Qiu Wang, Xuran Li, Hao Wang:
When Friendly Jamming Meets Wireless Energy Transfer. 320-325 - Nargis Khan, Jelena V. Misic, Vojislav B. Misic:
IEEE 802.15.6-Based LTE Overlay Network with Priority Support. 326-331 - Zhi Chen, Yan Wang:
An Improved DFT Channel Estimation Algorithm. 332-335 - Etienne Victor Depasquale, Saviour Zammit, Franco Davoli, Raffaele Bolla:
An Implementational Model of Telecommunications Networks for the Energy Analyst. 336-344 - Xuecai Bao, Hao Liang, Longzhe Han:
A Novel Node Selection Algorithm for Collaborative Beamforming in Wireless Sensor Networks. 345-349
Security and Privacy-Preserving in Green Communications
- Xiaoming Yuan, Ran Wang, Yi Zhuang, Kun Zhu, Jie Hao:
A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion Detection. 350-357 - Yandong Zheng, Rongxing Lu:
An Efficient and Privacy-Preserving $k$-NN Query Scheme for eHealthcare Data. 358-365 - Xiaopeng Yang, Hui Zhu, Rongxing Lu, Ximeng Liu, Hui Li:
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data. 366-373
Green Technologies for 5G
- Xi Tao, Wei Song:
Efficient Task Allocation for Mobile Crowd Sensing Based on Evolutionary Computing. 374-380 - Jiequ Ji, Kun Zhu, Ran Wang, Bing Chen, Chen Dai:
Energy Efficient Caching in Backhaul-Aware Ultra-Dense Cellular Networks. 381-388 - Tingting Yang, Zhi Jiang, Jie Dong, Hailong Feng, Chengming Yang:
Multi Agents to Search and Rescue Based on Group Intelligent Algorithm and Edge Computing. 389-394 - Akilan Thangarajah, Q. M. Jonathan Wu:
Double Encoding - Slow Decoding Image to Image CNN for Foreground Identification with Application Towards Intelligent Transportation. 395-403
Green Society Applications
- Xiaoyuan Liang, Guiling Wang, Zhu Han:
A Low-Cost Collaborative Indoor Localization System Based on Smartphone Platform. 404-411 - Qi Liu, Hong Li, Yan Hu, Limin Sun:
A Check-In System Leveraging Face Recognition. 412-418 - Massimo Marchiori:
Bins With Eyes: Towards a More Efficient Urban Ecosystem. 419-426 - Stefan Draskovic, Rehan Ahmed, Cong Lin, Lothar Thiele:
A Case for Atmospheric Transmittance: Solar Energy Prediction in Wireless Sensor Nodes. 427-434
Green Cloud Computing
- Abdulrahman Alamer, Sultan Basudan, Xiaodong Lin:
A Privacy-Preserving Incentive Framework for the Vehicular Cloud. 435-441 - Panagiotis Oikonomou, Maria G. Koziri, Nikos Tziritas, Antonios N. Dadaliaris, Thanasis Loukopoulos, Georgios I. Stamoulis, Samee U. Khan:
Scheduling Video Transcoding Jobs in the Cloud. 442-449 - Ruitao Chen, Xianbin Wang, Shuran Sheng:
Flexible Virtual Energy Sharing by Distributed Task Reallocation in IoT Edge Networks. 450-454 - Yiwen Lu, Ran Wang, Ping Wang, Yue Cao, Jie Hao, Kun Zhu:
Energy-Efficient Task Scheduling for Data Centers with Unstable Renewable Energy: A Robust Optimization Approach. 455-462 - Sultan Basudan, Abdulrahman Alamer, Xiaodong Lin, Karthik Sankaranarayanan:
Efficient Deduplicated Reporting in Fog-Assisted Vehicular Crowdsensing. 463-469
The 2nd International Workshop on Networked Vehicles for Intelligent Transportation and Smart Grid
- Yu-Rong Xiao, Kuang-Hao Liu:
Optimal Beamforming for Enabling Self-Sustainable Secondary Tier in Heterogeneous Networks. 470-476 - Shun-Ren Yang, Yi-Syuan Shen:
Modeling Trajectory-Based I2V Message Delivery Over VANETs with Vehicle Detours. 477-482 - Chia-Peng Lee, Phone Lin, Hsuan-Yeh Chen:
A Protocol to Protocol Switching Mechanism for Energy Saving of Power-Constrained in LTE and NB-IoT Interworking Networks. 483-489 - Cuijiao Fu, Depei Qian, Zhongzhi Luan:
Estimating Software Energy Consumption with Machine Learning Approach by Software Performance Feature. 490-496 - Abdulrahman Alshegaifi, Chun-Hsi Huang:
A Locality-Aware, Energy-Efficient Cache Design for Large-Scale Multi-Core Systems. 497-502
CPSCom-2018: The 11th IEEE International Conference on Cyber Physical and Social Computing
Service-related Computational Intelligence in Cyber Physical Systems
- Xiaolong Xu, Renhao Gu, Yuan Yuan, Kai Peng, Yadang Chen, Wanchun Dou, Alex X. Liu:
A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-II. 503-509 - Xingguang Zhao, Xing Guo, Yiwen Zhang, Wei Li:
A Parallel-Batch Multi-Objective Job Scheduling Algorithm in Edge Computing. 510-516 - Xiaolong Xu, Yuancheng Li, Yuan Yuan, Kai Peng, Wenbin Yu, Wanchun Dou, Alex X. Liu:
An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks. 517-523 - Wenda Tang, Xiang Liu, Wajid Rafique, Wanchun Dou:
A Dynamic Resource Allocation Method for Load-Balance Scheduling Over Big Data Platforms. 524-531
Advances in Tensor Computation and Analysis for Image Processing
- Chao Huang, Shubo Qiu, Huiyuan Zhou, Xiangyue Zhou:
An Adaptive Weighted Alternating Minimization Algorithm for Color Images Reconstruction In the Field of Automation. 532-536 - Duo Qiu, Hu Zhu, Xiongjun Zhang:
An Implementable Accelerated Alternating Direction Method of Multipliers for Low-Rank Tensor Completion. 537-541 - Hu Zhu, Lu Liu, Yusheng Guan, Jieke Zhang, Lizhen Deng, Xianfeng Mao:
Hyperspectral Image Dead Line Removal Based on Tensor Completion. 542-548 - Baojiang Sun, Qiaoqiao Kang:
Design and Application of Internet of Things Technology Based on WeChat Control. 549-553
Cyber Physical Systems and Edge Computing
- Hu Zhu, Tao Xie, Lizhen Deng, Xueqin Wang, Xianfeng Mao:
Hypergraph Matching via a Nonmonotone Newton Method. 554-560 - Xin Chen, Zhuo Li, Shenglong Xiao, Ying Chen:
Deep Square Similarity Learning for Person Re-Identification in the Edge Computing System. 561-567 - Yuzhe Zhao, Zhuo Li, Xin Chen, Ying Chen:
Mobile Crowd Sensing Service Platform for Social Security Incidents in Edge Computing. 568-574 - Baohua Huang, Sheng Liang, Dongdong Xu, Zhuohao Wan:
A Homomorphic Searching Scheme For Sensitive Data In NoSQL Database. 575-579
Machine Learning in Cyber Physical Systems
- Daji Tang, Kehua Guo, Jianhua Ma, Xiaoyan Kui:
Deep Neural Network Based Disease Discrimination Learning from Small Medical Image Training Set and User Feedback. 580-585 - Huan Wang, Yibin Chen, Bingyang Shen, Di Wu, Xiaojuan Ban:
Generative Adversarial Networks Imputation for High Rate Missing Values. 586-590 - Zhigang Chen, Hong Xiao, Rongyue Zhang, Xiucong Shi, YuBing Zhou, Jingsong Lv, Shengyun Xu:
Optimization of Dynamic Preventive Maintenance for Multicomponent Systems. 591-598 - Jingsong Lv, Shengyun Xu, Rongyue Zhang, Hong Xiao, Zhigang Chen:
Safety Analysis of Metro Turnouts Based on Fuzzy FMECA. 599-606
Networks & Communications
- Yaqin Shi, Ming Zhan, Jie Zeng:
FPGA Implementation and Power Estimation of a Memory-Reduced LTE-Advanced Turbo Decoder. 607-611 - Ishar Pratap Singh, Qiang Ye, Srinivas Sampalli:
High-Precision Indoor Localization Based on RFID and Stepscan Floor Tiles. 612-617 - Yongyong Mei, Xingang Liu, Tao Yu, Cheng Dai, Jingren Yan:
Multi-Scale Feature Learning Based on RICA for Single Training Sample Face Recognition. 618-621 - Shengli Pan:
The Measurement Coverage for Boolean Tomography with Limited End Monitors. 622-626
Technologies & Applications I
- Massimo Marchiori:
Mind Your Step: Monitoring Pedestrian Sidewalks. 627-634 - Cheng Dai, Xingang Liu, Luhao Zhong, Tao Yu:
Video Based Action Recognition Using Spatial and Temporal Feature. 635-638 - Hong Li, Xiaosheng Yang, Yao Xia, Lujie Zheng, Jie Wang, Guoqing Yang, Pan Lv:
EB-Boost: Medium-Long Term Forecasting Method of Supplies of Shared E-Cars in Smart Scenic Spots. 639-643 - Qianyuan Liu, Chengjin Zhang, Yong Song, Bao Pang:
Real-Time Object Recognition Based on NAO Humanoid Robot. 644-650 - Weijian Cao, Yuwan Gu, Juan Huan, Yilin Qin:
A Hybrid Model of Empirical Wavelet Transform and Extreme Learning Machine for Dissolved Oxygen Forecasting. 651-656
Technologies & Applications II
- Yuwan Gu, Yaru Wang, Juan Huan, Yuqiang Sun, Weikuan Jia:
An Improved TFIDF Algorithm Based on Dual Parallel Adaptive Computing Model. 657-663 - Shuchih Ernest Chang, Chi-Yin Chang:
Application of Blockchain Technology to Smart City Service: A Case of Ridesharing. 664-671
Systems & Design
- Huifang Min, Jason Gu, Na Duan, Chengyang Luo:
Global Stabilization of High-Order Stochastic Nonlinear Systems Disturbed by Unknown Covariance Noise and Time-Varying Delay. 672-676 - Tao Yu, Xingang Liu, Yongyong Mei, Cheng Dai, Jingren Yan:
Identification by Gait Using Convolutional Restricted Boltzmann Machine and Voting Algorithm. 677-681 - Yong Song, Changshen Xu, Xing Fang, Caihong Li, Di Wang, Simon X. Yang:
Design and Control of an Intelligent Wheeled Robot. 682-686 - Ivana Tomic, Michael J. Breza, Greg Jackson, Laksh Bhatia, Julie A. McCann:
Design and Evaluation of Jamming Resilient Cyber-Physical Systems. 687-694 - Hong Li, Huarui Zhang, Lei Huang, Kailai Shao, Guoqing Yang, Nenggan Zheng, Xufeng Jiang:
Android Evaluation Methodology in Automotive Electronics. 695-699
Data & Services I
- Saurabh Dey, Qiang Ye, Srinivas Sampalli:
AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing. 700-705 - Guifan Weng, Chun Yang, Jinyi Long, Shanying Chen:
An Improved Automatic Thumbnail Generation Algorithm Based on Interpolation Technique. 706-711 - Jingren Yan, Yongyong Mei, Xingang Liu, Cheng Dai, Tao Yu:
Patch-Wise Normalization for Pose-Invariant Face Recognition from Single Sample. 712-715
Data & Services II
- Ti Guan, Zheng Xu, Lin Lin, Guilin Zhang, Yujian Jia, Yawen Shi:
Maximum Incremental Load Recursive Model Based on LS-SVM Considering Accumulated Temperature Effect. 716-719 - Jie Zhang, Hongzhi Guo, Jiajia Liu:
Energy-Aware Task Offloading for Ultra-Dense Edge Computing. 720-727 - Dong Xia:
The Distribution of Transient Magnetic Field and Eddy Current Losses of Three-Phase Five-Legged Transformer Under DC Bias. 728-732
Data & Services III
- Deli Wang, Weijie Liu, Nenggan Zheng, Ting Zhao:
Semi-Automatic Neuron Tracing in Electron Microscope Images: Preliminary Results. 733-738 - Lei Zhao, Nenggan Zheng, Qian Ma:
Smooth 3D Trajectory Segmentation for Flying Insects. 739-745 - Fuhua Oscar Lin, M. Ali Akber Dewan, Matthew Nguyen:
Optimizing Rescheduling Intervals Through Using Multi-Armed Bandit Algorithms. 746-753 - Ruixia Guan, Yan Qi, Yi Jiang, Nenggan Zheng:
Representation and Computation Method for Bumblebee's Abdomen Movements. 754-757
Cloud Manufacturing and Industrial IoT I
- Zhaoquan Gu, Yuexuan Wang, Xiao Lin:
Achieving Real-Time Quality of Service with Software Defined Networking. 758-765 - Yu Liu, Yaoguang Hu, Jingqian Wen, Yue Tang:
An Overview on Smart Maintenance Service Scheduling System and Theoretical Basis for Agricultural Machinery. 766-771 - Xiaorong Gong, Chao Yin, Xiaobin Li:
Dynamic Construction and Evolution Analysis of Manufacturing Service Network Supported by Machine Tools in Cloud Manufacturing Environment. 772-779 - Xuesong Jiang, Jiarong Han, Xiumei Wei, QuanJun Li:
The Complex Network Model Construction of Multi-Objective Job Shop Based on Data Information. 780-785
Cloud Manufacturing and Industrial IoT ll
- Liping Wang, Wenhui Fan:
Research of Optimal Splitting Level of Splitting Algorithm. 786-790 - Lei Ren, Sanbao Zheng, Lin Zhang:
A Blockchain Model for Industrial Internet. 791-794 - Yan Chen, Jing Lai, Xiang Wei:
A Testing Method of the Residual Information Clearance in Virtual Machine for the Cloud Operating System. 795-800 - Zhenheng Liu, Lei Ren:
A Sharing Bike Scheduling Optimization Algorithm Based on Two-Dimensional Dynamic Model and Improved Genetic Algorithm. 801-806
SmartData-2018
Smart Data 1: Smart Data Processing and Analytics
- Basim Alghabashi, Nizar Bouguila:
A Finite Multi-Dimensional Generalized Gamma Mixture Model. 807-814 - Peijiang Zhao, Koji Zettsu:
Convolution Recurrent Neural Networks for Short-Term Prediction of Atmospheric Sensing Data. 815-821 - Afees Adegoke Odebode, Qiang Ye, Srinivas Sampalli, Saurabh Dey:
KD1: A Sampling-Based Clustering Scheme for Large Data Sets. 822-827 - Haoye Lu, Anand Srinivasan, Amiya Nayak:
Period Detection and Future Trend Prediction Using Machine Learning Techniques. 828-833
SmartData 2: Data Science and Big Data Infrastructure for Smart Cities
- Satu Tamminen, Xiaoli Liu, Henna Tiensuu, Eija Ferreira, Esa Puukko, Juha Röning:
AI Enhanced Alarm Presentation for Quality Monitoring. 834-839 - Si Saber Meriem Amina, Abdolkhalegh Bayati, Kim Khoa Nguyen, Mohamed Cheriet:
Featuring Real-Time Imbalanced Network Traffic Classification. 840-846 - Minh Le, Stephen W. Clyde:
INGRIM: A Middleware to Enable Remote Method Invocation Routing in Multiple Group Device-To-Device Networks. 847-857 - Yuan Wang, Vincent Ng:
Data Anomaly Detection with Parallelizing CDP Algorithm. 858-863
SmartData 3: Smart Data Applications I
- Iván Cabria:
Analysis of the Symmetry Properties of Large Periodic Magnetic Systems, to Reduce the Computation Time of the Calculation of the Magnetostatic Dipolar Energy. 864-871 - Bhumika Patel, Zaheenabanu Somani, Samuel A. Ajila, Chung-Horng Lung:
Hybrid Relabeled Model for Network Intrusion Detection. 872-877 - Mehdi Mohammadi, Ala I. Al-Fuqaha, Jun-Seok Oh:
Path Planning in Support of Smart Mobility Applications Using Generative Adversarial Networks. 878-885 - Carlos Toxtli, Claudia Flores-Saviaga, M. Maurier, A. Ribot, T. Bankole, A. Entrekin, M. Cantley, S. Singh, S. Reddy, Ramana Reddy:
ExperTwin: An Alter Ego in Cyberspace for Knowledge Workers. 886-891
SmartData 4: Smart Data Applications II
- Chris Soo-Hyun Eom, Wookey Lee, Carson Kai-Sang Leung:
STDP: Secure Privacy-Preserving Trajectory Data Publishing. 892-899 - Di Wu, Hadi Mohammed, Hao Wang, Razak Seidu:
Smart Data Analysis for Water Quality in Catchment Area Monitoring. 900-908 - Sonal Bajaj, Waqar Haque:
Visualization and Analysis of Breast Cancer Data. 909-915 - Nunziato Cassavia, Elio Masciari, Chiara Pulice, Domenico Saccà:
An Analysis on User Searches Effects. 916-921
The Sixth Workshop on Graph Big Databases
SmartData/GDB-5: Graph Big Database with Smart Applications I
- So-Hyun Park, Young-Ho Park:
Correlation Analysis Using Customer's Actual Data and Prediction Method of Store Preference. 922-924 - Kouki Kawabata, Yasuko Matsubara, Yasushi Sakurai:
Data Stream Analysis of Online Activities. 925-926 - Bingyang Huang, Chaokun Wang, Jun Qian:
DoOC: A Platform for Domain-Oriented Online Community System Construction. 927-930
SmartData/GDB-6: Graph Big Database with Smart Applications II
- Bunrong Leang, Rockwon Kim, Kwan-Hee Yoo:
Real-Time Transmission of Secured PLCs Sensing Data. 931-932 - Woong-Kee Loh, Young-Kuk Kim:
Robust Fault Analysis Using Sensors in Semiconductor Manufacturing Processes. 933-934 - Justin JongSu Song, Inkyo Kang, Wookey Lee, Jinho Kim, Joo-Yeon Lee:
Discussions on Subgraph Ranking for Keyworded Search. 935-936 - Yangjun Chen, Wei Shi:
On the Designing of Popular Packages. 937-944
Blockchain-2018: The 2018 IEEE International Conference on Blockchain
Blockchain - Regular and Short Papers
Smart Contract I
- Naoto Sato, Takaaki Tateishi, Shunichi Amano:
Formal Requirement Enforcement on Smart Contracts Based on Linear Dynamic Logic. 945-954 - Ardit Dika, Mariusz Nowostawski:
Security Vulnerabilities in Ethereum Smart Contracts. 955-962 - Olivia Choudhury, Nolan Rudolph, Issa Sylla, Noor Fairoza, Amar Das:
Auto-Generation of Smart Contracts from Domain-Specific Ontologies and Semantic Rules. 963-970 - Mohammad M. Jalalzai, Costas Busch:
Window Based BFT Blockchain Consensus. 971-979
Smart Contract I
- Zeinab Nehai, Pierre-Yves Piriou, Frédéric F. Daumas:
Model-Checking of Smart Contracts. 980-987 - Shuang Su, Ke Wang, Hyong S. Kim:
Smartsupply: Smart Contract Based Validation for Supply Chain Blockchain. 988-993 - Ahmad Sghaier Omar, Otman Basir:
Identity Management in IoT Networks Using Blockchain and Smart Contracts. 994-1000 - Feng Lu, Lu Gan, Zhongli Dong, Wei Li, Hai Jin, Albert Y. Zomaya:
A Cache Enhanced Endorser Design for Mitigating Performance Degradation in Hyperledger Fabric. 1001-1006
IoT and Blockchain I
- Gokhan Sagirlar, Barbara Carminati, Elena Ferrari, John D. Sheehan, Emanuele Ragnoli:
Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains. 1007-1016 - Sarah Asiri, Ali Miri:
A Sybil Resistant IoT Trust Model Using Blockchains. 1017-1026 - Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. 1027-1034 - Yiming Jiang, Chenxu Wang, Ye Huang, Siyu Long, Yilun Huo:
A Cross-Chain Solution to Integration of IoT Tangle for Data Access Management. 1035-1041
IoT and Blockchain II
- Ujjwal Guin, Pinchen Cui, Anthony Skjellum:
Ensuring Proof-of-Authenticity of IoT Edge Devices Using Blockchain Technology. 1042-1049 - Jea-Min Lim, Young-Pil Kim, Chuck Yoo:
Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment. 1050-1056 - James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network. 1057-1062 - Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, Yintang Yang:
Secure Time Synchronization Scheme in IoT Based on Blockchain. 1063-1068
Blockchain Management I
- Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:
When Can a Distributed Ledger Replace a Trusted Third Party? 1069-1077 - Sara Rouhani, Vahid Pourheidari, Ralph Deters:
Physical Access Control Management System Based on Permissioned Blockchain. 1078-1083 - Jacob Eberhardt, Stefan Tai:
ZoKrates - Scalable Privacy-Preserving Off-Chain Computations. 1084-1091 - Yuhao Dong, Woojung Kim, Raouf Boutaba:
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust. 1092-1099 - Jiayu Zhou, Fengyi Tang, He Zhu, Ning Nan, Ziheng Zhou:
Distributed Data Vending on Blockchain. 1100-1107
Blockchain Management II
- Anthony J. Perez, Ebrima N. Ceesay:
Improving End-to-End Verifiable Voting Systems with Blockchain Technologies. 1108-1115 - Elie F. Kfoury, David Kfoury:
Distributed Public Key Infrastructure and PSK Exchange Based on Blockchain Technology. 1116-1120 - Robert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Andrea J. Cullen:
IPFS for Reduction of Chain Size in Ethereum. 1121-1128 - Reza Soltani, Uyen Trang Nguyen, Aijun An:
A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. 1129-1136
Blockchain Applications I
- Yan Huang, Jing Wu, Chengnian Long:
Drugledger: A Practical Blockchain System for Drug Traceability and Regulation. 1137-1144 - John Adler, Ryan Berryhill, Andreas G. Veneris, Zissis Poulos, Neil Veira, Anastasia Kastania:
Astraea: A Decentralized Blockchain Oracle. 1145-1152 - Kentaroh Toyoda, Tomoaki Ohtsuki, P. Takis Mathiopoulos:
Multi-Class Bitcoin-Enabled Service Identification Based on Transaction History Summarization. 1153-1160 - Giovanni Di Stasi, Stefano Avallone, Roberto Canonico, Giorgio Ventre:
Routing Payments on the Lightning Network. 1161-1170 - Chuka Oham, Raja Jurdak, Salil S. Kanhere, Ali Dorri, Sanjay K. Jha:
B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication. 1171-1180
Blockchain Applications II
- Gladstone Moises Arantes, Jose Nogueira D'Almeida, Marcio Teruo Onodera, Suzana Mesquita de Borba Maranhão Moreno, Vanessa da Rocha Santos Almeida:
Improving the Process of Lending, Monitoring and Evaluating Through Blockchain Technologies: An Application of Blockchain in the Brazilian Development Bank (BNDES). 1181-1188 - Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter:
Blockchained Post-Quantum Signatures. 1196-1203 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment. 1204-1211
Blockchain Threat and Enhancement I
- Takeshi Ogawa, Hayato Kima, Noriharu Miyaho:
Proposal of Proof-of-Lucky-Id(PoL) to Solve the Problems of PoW and PoS. 1212-1218 - Gholamreza Ramezan, Cyril Leung, Z. Jane Wang:
A Strong Adaptive, Strategic Double-Spending Attack on Blockchains. 1219-1227 - Steven Tug, Weizhi Meng, Yu Wang:
CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection. 1228-1235 - Jordi Paillisse, Miquel Ferriol, Eric Garcia, Hamid Latif, Carlos Piris, Albert Lopez-Bresco, Brenden Kuerbis, Alberto Rodríguez-Natal, Vina Ermagan, Fabio Maino, Albert Cabellos:
IPchain: Securing IP Prefix Allocation and Delegation with Blockchain. 1236-1243
Blockchain Threat and Enhancement II
- Davor Frkat, Robert Annessi, Tanja Zseby:
ChainChannels: Private Botnet Communication Over Public Blockchains. 1244-1252 - Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. 1253-1262 - Scott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey:
SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities. 1263-1272 - Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. 1273-1280 - Kei-Léo Brousmiche, Antoine Durand, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida:
Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain. 1281-1286
Blockchain on Design of Blockchain Applications - Special Session Papers
Session 1
- Shuai Wang, Xiaochun Ni, Yong Yuan, Fei-Yue Wang, Xiao Wang, Liwei Ouyang:
A Preliminary Research of Prediction Markets Based on Blockchain Powered Smart Contracts. 1287-1293 - Ronald Chun Yu Lam, Alvin Junus, Joseph Yiu Wing Mak, L. C. H. Lam, Peter Kai Kwong Lee:
Blockchain for Civil Engineering Practices in Smart Cities. 1294-1300 - Saulo dos Santos, Daniyal Khowaja, Muskan Vinayak, Ruppa K. Thulasiram, Parimala Thulasiraman:
A Novel Heuristics for Validating Pairwise Transactions on Cryptocurrencies. 1301-1307 - Mordechai Guri:
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. 1308-1316
Session 2
- Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Sandro Amofa, Kingsley Nketia Acheampong, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
V-Chain: A Blockchain-Based Car Lease Platform. 1317-1325 - Sumanta Bose, Mayank Raikwar, Debdeep Mukhopadhyay, Anupam Chattopadhyay, Kwok-Yan Lam:
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS. 1326-1335 - Quinten Stokkink, Johan Pouwelse:
Deployment of a Blockchain-Based Self-Sovereign Identity. 1336-1342
IEEE Symposium on Recent Advances on Blockchain and Its Applications
Blockchain - Symposium Papers
Blockchain Application I
- Amir Kafshdar Goharshady, Ali Behrouz, Krishnendu Chatterjee:
Secure Credit Reporting on the Blockchain. 1343-1348 - Zhiguo Wan, Zhangshuang Guan, Xiuzhen Cheng:
PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain. 1349-1354 - Shaowei Liu, Jing Wu, Chengnian Long:
IoT Meets Blockchain: Parallel Distributed Architecture for Data Storage and Sharing. 1355-1360 - Xiaoyang Zhu, Youakim Badr:
Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks. 1361-1366 - Elias Rohrer, Steffen Heidel, Florian Tschorsch:
Webchain: Verifiable Citations and References for the World Wide Web. 1367-1372
Blockchain Application II
- Uchi Ugobame Uchibeke, Kevin A. Schneider, Sara Hosseinzadeh Kassani, Ralph Deters:
Blockchain Access Control Ecosystem for Big Data Security. 1373-1378 - Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci:
Blockchain Based Access Control Services. 1379-1386 - Shweta Jain, Rahul Simha:
Blockchain for the Common Good: A Digital Currency for Citizen Philanthropy and Social Entrepreneurship. 1387-1394 - Zhangshuang Guan, Xiaobei Shao, Zhiguo Wan:
Secure Fair and Efficient Data Trading Without Third Party Using Blockchain. 1395-1401
Blockchain Application III
- George D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert:
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics. 1402-1409 - Moein Sabounchi, Jin Wei, Rigoberto Roche':
Blockchain-Enabled Peer-to-Peer Data Trading Mechanism. 1410-1416 - Shiroq Al-Megren, Shada Alsalamah, Lina Altoaimy, Hessah A. Alsalamah, Leili Soltanisehat, Emad Almutairi, Alex Pentland:
Blockchain Use Cases in Digital Sectors: A Review of the Literature. 1417-1424 - Christopher Gorog, Terrance E. Boult:
Solving Global Cybersecurity Problems by Connecting Trust Using Blockchain. 1425-1432 - Marcello Cinque, Christian Esposito, Stefano Russo:
Trust Management in Fog/Edge Computing by Means of Blockchain Technologies. 1433-1439
Blockchain and Bitcoin
- Yoshiaki Kawase, Shoji Kasahara:
A Batch-Service Queueing System with General Input and Its Application to Analysis of Mining Process for Bitcoin Blockchain. 1440-1447 - Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira, Kota Hidaka, Jay Kishigami:
Niji: Autonomous Payment Bridge Between Bitcoin and Consortium Blockchain. 1448-1455 - Chi-Ning Chou, Yu-Jing Lin, Ren Chen, Hsiu-Yao Chang, I-Ping Tu, Shih-Wei Liao:
Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols. 1456-1462 - Emmanuelle Anceaume, Antoine Guellier, Romaric Ludinard:
UTXOs as a Proof of Membership for Byzantine Agreement Based Cryptocurrencies. 1463-1468
Blockchain Enforcement
- Guillaume Vizier, Vincent Gramoli:
ComChain: Bridging the Gap Between Public and Consortium Blockchains. 1469-1474 - Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel:
A Quantifiable Trust Model for Blockchain-Based Identity Management. 1475-1482 - Yuki Kondo, Taku Shimosawa, Satoshi Oshima:
A Practical Screening Method for Blockchain-Based Systems. 1483-1490 - Miroslav Kis, Bobby Singh:
A Cybersecurity Case for the Adoption of Blockchain in the Financial Industry. 1491-1498 - Mathis Steichen, Beltran Fiz, Robert Norvill, Wazen M. Shbair, Radu State:
Blockchain-Based, Decentralized Access Control for IPFS. 1499-1506
Smart Contract I
- Omnia Mahmoud, Henning Kopp, Amr T. Abdelhamid, Frank Kargl:
Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors. 1507-1512 - Maximilian Wöhrer, Uwe Zdun:
Design Patterns for Smart Contracts in the Ethereum Ecosystem. 1513-1520 - Ke Wang, Zhizhe Zhang, Hyong S. Kim:
ReviewChain: Smart Contract Based Review System with Multi-Blockchain Gateway. 1521-1526 - Chaonian Guo, Shenglan Ma, Hao Wang, Shuhan Cheng, Tongsen Wang:
LoC: Poverty Alleviation Loan Management System Based on Smart Contracts. 1527-1532 - Sara Rouhani, Luke Butterworth, Adam D. Simmons, Darryl G. Humphery, Ralph Deters:
MediChainTM: A Secure Decentralized Medical Data Asset Management System. 1533-1538
Smart Contract II
- Yan Zhu, Xiaoxu Song, Shuai Yang, Yao Qin, Qiong Zhou:
Secure Smart Contract System Built on SMPC Over Blockchain. 1539-1544 - Aleksey Charapko, Ailidani Ailijiang, Murat Demirbas:
Bridging Paxos and Blockchain Consensus. 1545-1552 - Harsh Desai, Kevin Liu, Murat Kantarcioglu, Lalana Kagal:
Adjudicating Violations in Data Sharing Agreements Using Smart Contracts. 1553-1560 - Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis:
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. 1561-1567
Blockchain and IoT
- Xiaoyang Zhu, Youakim Badr:
A Survey on Blockchain-Based Identity Management Systems for the Internet of Things. 1568-1573 - Hoang Tam Vo, Ziyuan Wang, Dileban Karunamoorthy, John Wagner, Ermyas Abebe, Mukesh K. Mohania:
Internet of Blockchains: Techniques and Challenges Ahead. 1574-1581 - Carl R. Worley, Anthony Skjellum:
Blockchain Tradeoffs and Challenges for Current and Emerging Applications: Generalization, Fragmentation, Sidechains, and Scalability. 1582-1587 - Vahid Pourheidari, Sara Rouhani, Ralph Deters:
A Case Study of Execution of Untrusted Business Process on Permissioned Blockchain. 1588-1594 - Martin Westerkamp, Friedhelm Victor, Axel Küpper:
Blockchain-Based Supply Chain Traceability: Token Recipes Model Manufacturing Processes. 1595-1602
Blockchain Protocol Design
- Abhishek Ray, Mario Ventresca, Hong Wan:
A Mechanism Design Approach to Blockchain Protocols. 1603-1608 - Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac:
Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations. 1609-1615 - S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology. 1616-1621 - Doriane Perard, Jérôme Lacan, Yann Bachy, Jonathan Detchart:
Erasure Code-Based Low Storage Blockchain Node. 1622-1627
Blockchain Privacy l
- Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. 1628-1633 - Xinchi He, Sarra M. Alqahtani, Rose F. Gamble:
Toward Privacy-Assured Health Insurance Claims. 1634-1641 - Kalpana Singh, Nicolas Heulot, Elyes Ben Hamida:
Towards Anonymous, Unlinkable, and Confidential Transactions in Blockchain. 1642-1649 - Darra L. Hofman, Casey P. Shannon, Bruce McManus, Victoria L. Lemieux, Karen K. Y. Lam, Sara Assadian, Raymond T. Ng:
Building Trust & Protecting Privacy: Analyzing Evidentiary Quality in a Blockchain Proof-of-Concept for Health Research Data Consent Management. 1650-1656 - Sachiko Yoshihama, Shin Saito:
Study on Integrity and Privacy Requirements of Distributed Ledger Technologies. 1657-1664
The 1st International Workshop on Blockchain for the Internet of Things
Blockchain Privacy II
- Sherman S. M. Chow, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao:
Sharding Blockchain. 1665 - Fthi Arefayne Abadi, Joshua Ellul, George Azzopardi:
The Blockchain of Things, Beyond Bitcoin: A Systematic Review. 1666-1672 - Adrian Mizzi, Joshua Ellul, Gordon J. Pace:
Macroprogramming the Blockchain of Things. 1673-1678 - Rahul Radhakrishnan, Bhaskar Krishnamachari:
Streaming Data Payment Protocol (SDPP) for the Internet of Things. 1679-1684 - Kwame-Lante Wright, Martin Martinez, Uday Chadha, Bhaskar Krishnamachari:
SmartEdge: A Smart Contract for Edge Computing. 1685-1690 - Ryan Cole, Liang Cheng:
Modeling the Energy Consumption of Blockchain Consensus Algorithms. 1691-1696
Poster Session
- Dragos Strugar, Rasheed Hussain, Manuel Mazzara, Victor Rivera, Jooyoung Lee, Ruslan Mustafin:
On M2M Micropayments: A Case Study of Electric Autonomous Vehicles. 1697-1700 - Muskan Vinayak, Amrit Pal Singh Panesar, Saulo dos Santos, Ruppa K. Thulasiram, Parimala Thulasiraman, Srimantoorao Semischetty Appadoo:
Analyzing Financial Smart Contracts for Blockchain. 1701-1706
CIT-2018: The 18th IEEE International Conference on Computer and Information Technology
CIT-1: Image Processing
- Shuai Wang, Yingying Zhang, Wenshuang Wang, Yanqing Zhao, Shiwei Zhu:
A Novel Image Mosaic Method Based on Improved ORB and its Application in Police-UAV. 1707-1713 - Haiying Liu, Junmei Guo, Fangzhou Xu, Lixia Deng, Hui Zhang:
Gray Image Reconstruction Algorithm Based 1p Optimization for Sparse Representation. 1714-1718 - Yiwei Wei, Chunlei Wu, Xiaoliang Chu, Weishan Zhang, Leiquan Wang:
Social Image Captioning with Tags-Based Attention Model. 1719-1724 - Yousef Abu Baker, Iker Gondra:
Canny SLIC to Compute Content-Sensitive Superpixels. 1725-1732
CIT-2: Wireless Networks and Communications
- Yuxin Liu, Weidong Fang, Wuxiong Zhang, Weiwei Gao, Haiguang Chen, Yuanyuan Zhu:
ECPUB: An Energy Efficiency Evaluation Metric in Wireless Sensor Network. 1733-1738 - Antoine Bossard, Keiichi Kaneko:
On the Torus Pairwise Disjoint-Path Routing Problem. 1739-1746 - Ahmad Abuashour, Michel Kadoch:
Passive CH Election Avoidance Protocol and CH Routing Protocol In VANET. 1753-1758 - Wei Chen, Yuequn, Ke Wang, Weidong Fang, Wuxiong Zhang, Tao Pan:
Research on Wireless Sensor Networks Routing Algorithms for Coal Mine Mobile Sensing. 1759-1764 - Zhenpeng Pang, Wuxiong Zhang, Shenghu Wang, Jufeng Luo, Haiguang Chen:
Energy-Efficient Improvements in Mod-LEACH Protocol on Optimal Cluster Heads Selection. 1765-1769
CIT-3: Internet of Things
- Yuanyuan Bao, Wai Chen:
Automated Concept Extraction in Internet-of-Things. 1770-1776 - Iman Saeed, Mourad Elhadef:
Performance Evaluation of an IoV-Based Intersection Traffic Control Approach. 1777-1784 - Ernando Batista, Gustavo B. Figueiredo, Maycon L. M. Peixoto, Martin Serrano, Cássio V. S. Prazeres:
Load Balancing in the Fog of Things Platforms Through Software-Defined Networking. 1785-1791
CIT-4: Security, Privacy, and Trust
- Fangming Bi, Xuzhi Miao, Wei Chen, Weidong Fang, Wuxiong Zhang, Deyu Wang:
An Overview on the Applications and Security Issues of Fog Computing. 1792-1797 - Junlin Chen, Uyen Trang Nguyen:
A Robust Protocol for Circumventing Censoring Firewalls. 1798-1805 - Nan Zhou, Weidong Fang, Wuxiong Zhang, Xiaoxiao Lv, Jifeng Huang:
A Novel Trust Management Scheme for Defending Against On-Off Attack Based on Gaussian Distribution. 1806-1811
CIT-5: Pattern Recognition
- Huiyuan Zhou, Shubo Qiu, Haiying Liu, Chao Huang:
License Plate Recognition Based On Adaptive Threshold. 1812-1816 - Xiaoxuan Hu, Kagome Naya, Peng Li, Toshiaki Miyazaki, Kun Wang, Yanfei Sun:
Non-Invasive Sleeping Posture Recognition and Body Movement Detection Based on RFID. 1817-1820 - Yang Li, Yuanyuan Bao, Wai Chen:
Domain Adaptation Transduction: An Algorithm for Autonomous Training with Applications to Activity Recognition Using Wearable Devices. 1821-1828 - Weishan Zhang, Haoyun Sun, Jiehan Zhou, Xin Liu, Zhanmin Zhang, Guizhi Min:
DCNN Based Real-Time Adaptive Ship License Plate Recognition (DRASLPR). 1829-1834
CIT-6: Machine Learning
- Haifeng Jing, Yafei Zhang, Jiehan Zhou, Weishan Zhang, Xin Liu, Guizhi Min, Zhanmin Zhang:
LSTM-Based Service Migration for Pervasive Cloud Computing. 1835-1840 - Fahd M. Aldosari, Sami Bourouis, Nizar Bouguila, Hassen Sallay, Khalid M. Jamil Khayyat:
Infinite Scaled Dirichlet Mixture Models for Spam Filtering via Bayesian and Variational Bayes Learning. 1841-1847 - Weijia Lu, Jie Shuai, Shuyan Gu, Joel Xue:
Method to Annotate Arrhythmias by Deep Network. 1848-1851
CIT-7: Software
- Karine Valença, Edna Dias Canedo, Rejane Maria da Costa Figueiredo:
Construction of a Software Measurement Tool Using Systematic Literature Review. 1852-1859 - Ritu Chaturvedi, Veerpal Brar, Jai Geelal, Kelvin Kong:
Concept Extraction: A Modular Approach to Extraction of Source Code Concepts. 1860-1866 - Junmei Guo, Haiying Liu, Yizhong Luan, Yun Wu:
Application of Birth Defect Prediction Model Based on C5.0 Decision Tree Algorithm. 1867-1871 - Hyosung Park, Chulwoo Park, Sangbong Yoo, Kichang Kim:
Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call Graph. 1872-1879
CIT-8: Systems
- Waqar Haque, Adam Vezina, Matthew Fontaine:
Topological Response to Deadlock Detection and Resolution in Real-Time Database Systems. 1880-1887 - Xin Lyu, Juan Chen, Tao Zeng, Chenglong Li:
A Collaborative Location Querying Method Based on Caching Information. 1888-1893 - Tsuyoshi Tanaka, Hiroshi Ishikawa:
Evaluation on Applicability of Measurement-Based Join Cost Calculation Method Using Different Generation CPUs. 1894-1901 - Jin Zhao, Jifeng Huang, Guoqing Jia, Xiaohong Ji, Lianhai Shan:
Non-Contact Method of Heart Rate Using a Webcam. 1902-1906
CIT-9: Future Networks and Communications
- Mostafa Mouawad, Zbigniew Dziong, Muhammad Khan:
Quality of Service Aware Dynamic BBU-RRH Mapping Based on Load Prediction Using Markov Model in C-RAN. 1907-1912 - Paulo Sena, Igor Carvalho, Antônio Abelém:
Content Placement Aware Cache Decision: A Caching Policy Based on the Content Replacement Ratio for Information-Centric Network. 1913-1920 - Seth D. Hitefield, Michael C. Fowler, T. Charles Clancy:
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios. 1921-1927
CIT-10: Industry 4.0 and Blockchain
- Jiangning Chen, Jiehan Zhou:
Revisiting Industry 4.0 with a Case Study. 1928-1932 - Quan Qi, Qingde Li:
Thin Implicit Utah Teapot: Design for Additive Manufacturing. 1933-1940 - Shuchih Ernest Chang, Siao Yin He:
Exploring Blockchain Technology for Capital Markets: A Case of Angel Fund. 1941-1948
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.