


default search action
5th CIC 2019: Los Angeles, CA, USA
- 5th IEEE International Conference on Collaboration and Internet Computing, CIC 2019, Los Angeles, CA, USA, December 12-14, 2019. IEEE 2019, ISBN 978-1-7281-6739-8

- Kilian Ros, Elena Mocanu

, Christin Seifert
:
Airport Restroom Cleanliness Prediction Using Real Time User Feedback Data. 1-10 - Alexander Tobias Neumann, Peter de Lange, Ralf Klamma:

Collaborative Creation and Training of Social Bots in Learning Communities. 11-19 - Filipi Rydzi, Hong-Linh Truong

:
Sharing Blockchain Performance Knowledge for Edge Service Development. 20-29 - Daiki Yamada, Norihiko Shinomiya:

A Solving Method for Computing and Network Resource Minimization Problem in Service Function Chain Against Multiple VNF Failures. 30-38 - Sunil Singh Samant

, Mohan Baruwal Chhetri
, Quoc Bao Vo, Surya Nepal
, Ryszard Kowalczyk
:
Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines. 39-48 - Richard Price, Lakshmish Ramaswamy:

Challenges and Approaches to Teaching Data Science Technologies in an Information Technology Program with Non-Traditional Students. 49-56 - Pinata Winoto

, Jane Jie Chen, Hangzhi Guo, Tiffany Ya Tang:
An Interactive Play Environment on Mathematics and Cognitive Training with Behavioral Tracking for Children with Autism. 57-60 - Maryam Bahojb Imani, Latifur Khan

, Bhavani Thuraisingham:
Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages. 61-70 - Kimberley Hemmings-Jarrett, Julian Jarrett, M. Brian Blake:

A Taxonomy for Classifying User Group Activity in Online Political Discourse. 71-80 - Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai

, Ping Yang, Guanhua Yan, Shiyong Lu:
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. 81-90 - Anh-Tu Hoang

, Barbara Carminati, Elena Ferrari:
Cluster-Based Anonymization of Directed Graphs. 91-100 - Sean Rooney, Daniel Bauer, Luis Garcés-Erice

, Peter Urbanetz, Florian Froese, Sasa Tomic:
Experiences with Managing Data Ingestion into a Corporate Datalake. 101-109 - Xiaozhong Zhang, Xiaoyu Ge, Panos K. Chrysanthis

:
Leveraging Data-Analysis Session Logs for Efficient, Personalized, Interactive View Recommendation. 110-119 - Cui Yu, Allen Lu, Steven Cassidy, Wenjin Zhang:

ActionTime: App to Help Develop Execution Skill. 120-126 - Cindy Kim, Christoph U. Lehmann, Dupree Hatch, Jonathan S. Schildcrout

, Daniel J. France, You Chen:
Provider Networks in the Neonatal Intensive Care Unit Associate with Length of Stay. 127-134 - Aayush Goyal, Curtis E. Dyreson

:
Temporal JSON. 135-144 - Nazli Siasi, Adrian Jaesim, Nasir Ghani:

Tabu Search for Efficient Service Function Chain Provisioning in Fog Networks. 145-150 - Ricardo Anderson:

An Assessment of the Impacts of Workflow Management Systems on Knowledge Management Process Activities. 151-157 - Ronak Razavisousan, Karuna P. Joshi:

Two Tier Analysis of Social Media Collaboration for Student Migration. 158-167 - Abhijit Suprem, Calton Pu:

Event Detection in Noisy Streaming Data with Combination of Corroborative and Probabilistic Sources. 168-177 - Li Liu, Dragos Guta, Shuo Niu:

Integration of User Emotion and Self-Awareness in Text Messaging. 178-183 - Oyesh Mann Singh, Ankur Padia, Anupam Joshi

:
Named Entity Recognition for Nepali Language. 184-190 - Pinata Winoto

, Tiffany Ya Tang:
Collaborative Online Educational Games for Children with Learning Disabilities: Lessons Learned. 191-195 - Elisa Bertino:

IoT Security A Comprehensive Life Cycle Framework. 196-203 - Indrajit Ray, Diptendu Mohan Kar, Jordan Peterson, Steve Goeringer:

Device Identity and Trust in IoT-sphere Forsaking Cryptography. 204-213 - Dimitrios Georgakopoulos

:
A Global IoT Device Discovery and Integration Vision. 214-221 - Thomas W. Pusztai

, Christos Tsigkanos, Schahram Dustdar
:
Engineering Heterogeneous Internet of Things Applications: From Models to Code. 222-231 - Adrienne Jeanisha Raglin, Dijiang Huang

, Huan Liu, James McCabe:
Smart CCR IoT: Internet of Things Testbed. 232-235 - Eve M. Schooler, David Zage, Hassnaa Moustafa, Jeff Sedayao:

A Marauder's Map for the IoT Edge. 236-245 - Anton V. Uzunov, Surya Nepal, Mohan Baruwal Chhetri:

Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge. 246-255 - Balaji Palanisamy, Chao Li

:
Self-Emerging Data Infrastructures. 256-265 - Dawn A. Lott, Adrienne Raglin, Somiya Metu:

On the Use of Operations Research for Decision Making with Uncertainty for IoT Devices in Battlefield Situations. 266-297 - Jelena Mirkovic, Simon S. Woo:

Designing for Fallible Humans. 298-305 - Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, L. Jean Camp:

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. 306-313 - Alan Colman

, Mohammad Jabed Morshed Chowdhury, Mohan Baruwal Chhetri:
Towards a Trusted Marketplace for Wearable Data. 314-321 - Joshua Streiff, Sanchari Das, Joshua Cannon:

Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. 322-329 - Jongkil Jay Jeong

, Marthie Grobler, M. A. P. Chamikara
, Carsten Rudolph
:
Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity. 330-337 - Jongkil Jeong

, Joanne Mihelcic, Gillian C. Oliver
, Carsten Rudolph
:
Towards an Improved Understanding of Human Factors in Cybersecurity. 338-345 - Kimberly Ferguson-Walter, Maxine Major, Dirk Van Bruggen, Sunny Fugate

, Robert S. Gutzwiller:
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment. 346-353 - Kamrul Hasan, Sachin Shetty

, Sharif Ullah
:
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities. 354-359 - Wenjia Li, Neha Bala, Aemun Ahmar, Fernanda Tovar, Arpit Battu, Prachi Bambarkar:

A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks. 360-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














