


default search action
16th I-SPAN 2019: Naples, Italy
- Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo:

Pervasive Systems, Algorithms and Networks - 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings. Communications in Computer and Information Science 1080, Springer 2019, ISBN 978-3-030-30142-2
Big Data Analysis and Machine Learning
- Lisa Natswi Tafa

, Xin Su
, Jiman Hong
, Chang Choi
:
Automatic Maritime Traffic Synthetic Route: A Framework for Route Prediction. 3-14 - Antonio Coronato, Muddasar Naeem

:
A Reinforcement Learning Based Intelligent System for the Healthcare Treatment Assistance of Patients with Disabilities. 15-28 - Syeda Fouzia Noor, Mark Bell, Reinhard Klette

:
Saliency Guided Data Association Measure for Multiple-Object Tracking. 29-42 - Antonio M. Rinaldi:

A Document Visualization Strategy Based on Semantic Multimedia Big Data. 43-57 - Xiaoran Wang, James Ho-Shek, Dominik Ondusko, D. Frank Hsu:

Improving Portfolio Performance Using Attribute Selection and Combination. 58-70 - Daniela D'Auria, Mouzhi Ge, Fabio Persia

:
Exploiting Recommender Systems in Collaborative Healthcare. 71-82 - Lucian Perju, Marius-Dorian Nicolaescu, Florin Pop, Ciprian Dobre

, Sanda Maiduc
:
Advanced Methods to Extract Value from Scientific Datasets. 83-95 - Antonio Galli, Michela Gravina

, Vincenzo Moscato, Antonio Picariello, Carlo Sansone
, Giancarlo Sperlì:
A Business Reputation Methodology Using Social Network Analysis. 96-106
Cyber Security
- Yiming Liu

, Xin Su
, Ning Xu
, Xiao Yao
:
Sensitive Data Encoding in Blockchain-Based P2P Trading System. 109-117 - Paolo D'Arco, Marco Nilo:

A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem. 118-132 - Kyungroul Lee

, Sun-Young Lee
, Kangbin Yim
:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. 133-139 - Zahra Ebadi Ansaroudi

, Saeid Pashazadeh:
Modeling and Formal Verification of the Ticket-Based Handoff Authentication Protocol for Wireless Mesh Networks. 140-154 - Daniele Casola, Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Clemente Galdi, Gianluca Roscigno

:
TRUST: TRust Unguarded Service Terminals. 155-169
Cloud Fog and Edge Computing
- Marek R. Ogiela, Lidia Ogiela:

Nature-Inspired Protocols for Cloud Computing and Security Systems. 173-177 - Tarek Menouer, Patrice Darmon:

Containers Scheduling Consolidation Approach for Cloud Computing. 178-192 - Tarek Menouer, Otman Manad, Christophe Cérin, Patrice Darmon:

Power Efficiency Containers Scheduling Approach Based on Machine Learning Technique for Cloud Computing Environment. 193-206 - Leila Shooshtarian, Dapeng Lan, Amir Taherkordi:

A Clustering-Based Approach to Efficient Resource Allocation in Fog Computing. 207-224
Communication Solutions
- Dongyao Wang, Sung-Hwan Kim, Xiaoqiang Zhu:

Enhanced Probability-Based Grant-Free Uplink Data Transmission in 5G mMTC. 227-239 - Chung-Ming Huang, Rung-Shiang Cheng, Yin-Ming Li:

The Registration-Based Collision Avoidance Mechanism for IEEE 802.11ah. 240-255 - Flavio Frattini, Marcello Cinque

, Christian Esposito
:
Accurate and Lightweight Range-Free Localization for Wireless Sensor Networks. 256-272
1st International Workshop on High Performance Computing and Applications (IW-HPCA 2019)
- Mei-Chen Li, Lokesh Sharma, Shih-Lin Wu:

Enhance Object Detection Capability with the Object Relation. 275-282 - Yin-Te Tsai, Hsing Cheng Wu, Shao Ming Zhu:

A Simple Algorithm for Oncidium Orchid Cut Flower Grading with Deep Learning. 283-288 - Che-Lun Hung, Chine-fu Hsin, Hsiao-Hsi Wang, Chuan Yi Tang:

Optimization of GPU Memory Usage for Training Deep Neural Networks. 289-293 - Ming-Yan Guo, Hui-Jun Cheng, Chun-Yuan Lin, Yen-Jen Lin, Ann-Shyn Chiang:

Computing Image Intersection and Union Regions for Drosophila Neurons Based on Multi-core CPUs. 294-303 - Halim Fathoni

, Chao-Tung Yang, Chih-Hung Chang
, Chin-Yin Huang
:
Performance Comparison of Lightweight Kubernetes in Edge Devices. 304-309
1st International Workshop on Consumer Cyber Security (IW-ConSec 2019)
- Andrea Bruno

, Giuseppe Cattaneo
:
Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes. 313-320 - Sime Lugovic, Leo Mrsic

, Ljiljana Zekanovic-Korona:
Public WiFi Security Network Protocol Practices in Tourist Destination. 321-332
1st International Workshop on Vehicular Technology (IWVT 2019)
- Xunyi Li, Jinju Shao, Guo Wei, Ruhong Hou:

AEB Control Strategy and Collision Analysis Considering the Human-Vehicle-Road Environment. 335-346 - Shihyang Lin, Jieqin Wan:

Context-Awareness Enhances 5G MEC Resource Allocation. 347-358 - Gang Shen, Jinju Shao, Derong Tan, Yaming Niu, Song Gao:

Optimal Hybrid Path Planning Considering Dynamic and Static Characteristics of Intelligent Vehicles. 359-370 - Xiaotian Ma, Xiaoqing Sang, Yehui Sun, Xiaotong Gong, Shanshang Gao, Yi Xu, Derong Tan:

Single-Binocular Vision Conversion Strategy for Obstacle Detection at Non-signalized Intersections. 371-380 - Yaming Niu, Di Tan, Jinju Shao, Gang Shen, Xunyi Li, Guo Wei:

The Research on Intelligent Vehicle Trajectory Tracking Based on Model Predictive Control. 381-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














