callback( { "result":{ "query":":facetid:toc:\"db/conf/aina/ainaw2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.99" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"123", "@dc":"123", "@oc":"123", "@id":"43365966", "text":":facetid:toc:db/conf/aina/ainaw2018.bht" } }, "hits":{ "@total":"123", "@computed":"123", "@sent":"123", "@first":"0", "hit":[{ "@score":"1", "@id":"2512423", "info":{"authors":{"author":[{"@pid":"203/3434","text":"Tasnim Abar"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"42/830","text":"Sadok El Asmi"}]},"title":"How Modeling QoE Requirements Using Game Theory.","venue":"AINA Workshops","pages":"147-152","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbarLA18","doi":"10.1109/WAINA.2018.00078","ee":"https://doi.org/10.1109/WAINA.2018.00078","url":"https://dblp.org/rec/conf/aina/AbarLA18"}, "url":"URL#2512423" }, { "@score":"1", "@id":"2512424", "info":{"authors":{"author":[{"@pid":"203/3434","text":"Tasnim Abar"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"42/830","text":"Sadok El Asmi"}]},"title":"Enhancing QoE Based on Machine Learning and DASH in SDN Networks.","venue":"AINA Workshops","pages":"258-263","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbarLA18a","doi":"10.1109/WAINA.2018.00095","ee":"https://doi.org/10.1109/WAINA.2018.00095","url":"https://dblp.org/rec/conf/aina/AbarLA18a"}, "url":"URL#2512424" }, { "@score":"1", "@id":"2512426", "info":{"authors":{"author":[{"@pid":"223/6701","text":"Nawres Abdelwahed"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"42/830","text":"Sadok El Asmi"}]},"title":"Content Based Algorithm Aiming to Improve the WEB_QoE Over SDN Networks.","venue":"AINA Workshops","pages":"153-158","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbdelwahedLA18","doi":"10.1109/WAINA.2018.00079","ee":"https://doi.org/10.1109/WAINA.2018.00079","url":"https://dblp.org/rec/conf/aina/AbdelwahedLA18"}, "url":"URL#2512426" }, { "@score":"1", "@id":"2512427", "info":{"authors":{"author":[{"@pid":"223/6701","text":"Nawres Abdelwahed"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"42/830","text":"Sadok El Asmi"}]},"title":"Ameliorating the Web QoE Using SPA.","venue":"AINA Workshops","pages":"164-169","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbdelwahedLA18a","doi":"10.1109/WAINA.2018.00081","ee":"https://doi.org/10.1109/WAINA.2018.00081","url":"https://dblp.org/rec/conf/aina/AbdelwahedLA18a"}, "url":"URL#2512427" }, { "@score":"1", "@id":"2512428", "info":{"authors":{"author":[{"@pid":"223/6707","text":"Maha Abderrahim"},{"@pid":"48/10836","text":"Hela Hakim"},{"@pid":"20/1343","text":"Hatem Boujemaa"}]},"title":"Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs.","venue":"AINA Workshops","pages":"545-549","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbderrahimHB18","doi":"10.1109/WAINA.2018.00142","ee":"https://doi.org/10.1109/WAINA.2018.00142","url":"https://dblp.org/rec/conf/aina/AbderrahimHB18"}, "url":"URL#2512428" }, { "@score":"1", "@id":"2512429", "info":{"authors":{"author":[{"@pid":"223/6707","text":"Maha Abderrahim"},{"@pid":"48/10836","text":"Hela Hakim"},{"@pid":"20/1343","text":"Hatem Boujemaa"},{"@pid":"175/2423","text":"Raed al Hamad"}]},"title":"Multihop Transmission Strategy to Improve Energy Efficiency in WSNs.","venue":"AINA Workshops","pages":"136-140","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbderrahimHBH18","doi":"10.1109/WAINA.2018.00076","ee":"https://doi.org/10.1109/WAINA.2018.00076","url":"https://dblp.org/rec/conf/aina/AbderrahimHBH18"}, "url":"URL#2512429" }, { "@score":"1", "@id":"2512430", "info":{"authors":{"author":[{"@pid":"223/6841","text":"Marwa Abderrahim"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"80/10596","text":"Amel Haji"},{"@pid":"20/856","text":"Sami Tabbane"}]},"title":"A Game Theory-Based Effective Network Management in SDN Networks.","venue":"AINA Workshops","pages":"390-395","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbderrahimLHT18","doi":"10.1109/WAINA.2018.00117","ee":"https://doi.org/10.1109/WAINA.2018.00117","url":"https://dblp.org/rec/conf/aina/AbderrahimLHT18"}, "url":"URL#2512430" }, { "@score":"1", "@id":"2512431", "info":{"authors":{"author":[{"@pid":"223/6841","text":"Marwa Abderrahim"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"80/10596","text":"Amel Haji"},{"@pid":"20/856","text":"Sami Tabbane"}]},"title":"How to use MEC and ML to Improve Resources Allocation in SDN Networks?","venue":"AINA Workshops","pages":"442-447","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AbderrahimLHT18a","doi":"10.1109/WAINA.2018.00126","ee":"https://doi.org/10.1109/WAINA.2018.00126","url":"https://dblp.org/rec/conf/aina/AbderrahimLHT18a"}, "url":"URL#2512431" }, { "@score":"1", "@id":"2512434", "info":{"authors":{"author":[{"@pid":"223/6739","text":"Jose Alfredo Alvarez Aldana"},{"@pid":"63/5522","text":"Stephane Maag"},{"@pid":"91/3486","text":"Fatiha Zaïdi"}]},"title":"MANETs Interoperability: Current Trends and Open Research.","venue":"AINA Workshops","pages":"481-487","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AldanaMZ18","doi":"10.1109/WAINA.2018.00132","ee":"https://doi.org/10.1109/WAINA.2018.00132","url":"https://dblp.org/rec/conf/aina/AldanaMZ18"}, "url":"URL#2512434" }, { "@score":"1", "@id":"2512435", "info":{"authors":{"author":[{"@pid":"223/6855","text":"Omar Aldhaibani"},{"@pid":"55/5979","text":"Faycal Bouhafs"},{"@pid":"22/3732-1","text":"Michael Mackay 0001"},{"@pid":"27/7304","text":"Alessandro Raschellà"}]},"title":"An SDN-Based Architecture for Smart Handover to Improve QoE in IEEE 802.11 WLANs.","venue":"AINA Workshops","pages":"287-292","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AldhaibaniBMR18","doi":"10.1109/WAINA.2018.00100","ee":"https://doi.org/10.1109/WAINA.2018.00100","url":"https://dblp.org/rec/conf/aina/AldhaibaniBMR18"}, "url":"URL#2512435" }, { "@score":"1", "@id":"2512437", "info":{"authors":{"author":[{"@pid":"198/7761","text":"Ali Saeed Dayem Alfoudi"},{"@pid":"198/7832","text":"Mohammed Dighriri"},{"@pid":"134/5428","text":"Abayomi Moradeyo Otebolaku"},{"@pid":"09/3375","text":"Rubem Pereira"},{"@pid":"97/5389","text":"Gyu Myoung Lee"}]},"title":"Mobility Management Architecture in Different RATs Based Network Slicing.","venue":"AINA Workshops","pages":"270-274","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AlfoudiDOPL18","doi":"10.1109/WAINA.2018.00097","ee":"https://doi.org/10.1109/WAINA.2018.00097","url":"https://dblp.org/rec/conf/aina/AlfoudiDOPL18"}, "url":"URL#2512437" }, { "@score":"1", "@id":"2512439", "info":{"authors":{"author":[{"@pid":"223/6866","text":"Mohammad Alhabashneh"},{"@pid":"167/2644","text":"Bilal Abu-Salih"},{"@pid":"03/9797","text":"Shirlee-ann Knight"}]},"title":"Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges.","venue":"AINA Workshops","pages":"693-697","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AlhabashnehAK18","doi":"10.1109/WAINA.2018.00169","ee":"https://doi.org/10.1109/WAINA.2018.00169","url":"https://dblp.org/rec/conf/aina/AlhabashnehAK18"}, "url":"URL#2512439" }, { "@score":"1", "@id":"2512441", "info":{"authors":{"author":[{"@pid":"223/6750","text":"Imen Allani"},{"@pid":"29/4999","text":"Belhassen Zouari"}]},"title":"A Semantic Model for Document Management in Business Processes.","venue":"AINA Workshops","pages":"331-336","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AllaniZ18","doi":"10.1109/WAINA.2018.00107","ee":"https://doi.org/10.1109/WAINA.2018.00107","url":"https://dblp.org/rec/conf/aina/AllaniZ18"}, "url":"URL#2512441" }, { "@score":"1", "@id":"2512442", "info":{"authors":{"author":[{"@pid":"74/5825","text":"Gianluca Aloi"},{"@pid":"f/GiancarloFortino","text":"Giancarlo Fortino"},{"@pid":"54/7358","text":"Raffaele Gravina"},{"@pid":"29/594","text":"Pasquale Pace"},{"@pid":"137/6080","text":"Giuseppe Caliciuri"}]},"title":"Edge Computing-Enabled Body Area Networks.","venue":"AINA Workshops","pages":"349-353","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AloiFGPC18","doi":"10.1109/WAINA.2018.00110","ee":"https://doi.org/10.1109/WAINA.2018.00110","url":"https://dblp.org/rec/conf/aina/AloiFGPC18"}, "url":"URL#2512442" }, { "@score":"1", "@id":"2512443", "info":{"authors":{"author":[{"@pid":"68/4698","text":"Flora Amato"},{"@pid":"87/786","text":"Francesco Moscato 0001"},{"@pid":"80/6437","text":"Fatos Xhafa"}]},"title":"Enabling IoT Stream Management in Multi-cloud Environment by Orchestration.","venue":"AINA Workshops","pages":"687-692","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Amato0X18","doi":"10.1109/WAINA.2018.00168","ee":"https://doi.org/10.1109/WAINA.2018.00168","url":"https://dblp.org/rec/conf/aina/Amato0X18"}, "url":"URL#2512443" }, { "@score":"1", "@id":"2512444", "info":{"authors":{"author":[{"@pid":"68/4698","text":"Flora Amato"},{"@pid":"09/6391","text":"Leonard Barolli"},{"@pid":"97/4042","text":"Vincenzo Moscato"},{"@pid":"62/431","text":"Antonio Picariello"},{"@pid":"121/0078","text":"Giancarlo Sperlì"}]},"title":"Strategies for Social Networks Modeling.","venue":"AINA Workshops","pages":"681-686","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AmatoBMPS18","doi":"10.1109/WAINA.2018.00167","ee":"https://doi.org/10.1109/WAINA.2018.00167","url":"https://dblp.org/rec/conf/aina/AmatoBMPS18"}, "url":"URL#2512444" }, { "@score":"1", "@id":"2512445", "info":{"authors":{"author":[{"@pid":"68/4698","text":"Flora Amato"},{"@pid":"180/2519","text":"Giovanni Cozzolino"},{"@pid":"46/20","text":"Antonino Mazzeo"},{"@pid":"87/786","text":"Francesco Moscato 0001"}]},"title":"An Application of Semantic Techniques for Forensic Analysis.","venue":"AINA Workshops","pages":"380-385","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AmatoCM018","doi":"10.1109/WAINA.2018.00115","ee":"https://doi.org/10.1109/WAINA.2018.00115","url":"https://dblp.org/rec/conf/aina/AmatoCM018"}, "url":"URL#2512445" }, { "@score":"1", "@id":"2512446", "info":{"authors":{"author":[{"@pid":"180/2487","text":"Pacome Landry Ambassa"},{"@pid":"48/6963","text":"Anne V. D. M. Kayem"},{"@pid":"w/StephenDWolthusen","text":"Stephen D. Wolthusen"},{"@pid":"m/CMeinel","text":"Christoph Meinel"}]},"title":"Privacy Risks in Resource Constrained Smart Micro-Grids.","venue":"AINA Workshops","pages":"527-532","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AmbassaKWM18","doi":"10.1109/WAINA.2018.00139","ee":"https://doi.org/10.1109/WAINA.2018.00139","url":"https://dblp.org/rec/conf/aina/AmbassaKWM18"}, "url":"URL#2512446" }, { "@score":"1", "@id":"2512449", "info":{"authors":{"author":[{"@pid":"223/6722","text":"Sandeli Priyanwada Kasthuri Arachchi"},{"@pid":"157/9826","text":"Noorkholis Luthfil Hakim"},{"@pid":"84/3187","text":"Hui-Huang Hsu"},{"@pid":"19/334","text":"Stanislav Vladimirovich Klimenko"},{"@pid":"34/6910","text":"Timothy K. Shih"}]},"title":"Real-Time Static and Dynamic Gesture Recognition Using Mixed Space Features for 3D Virtual World's Interactions.","venue":"AINA Workshops","pages":"627-632","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ArachchiHHKS18","doi":"10.1109/WAINA.2018.00157","ee":"https://doi.org/10.1109/WAINA.2018.00157","url":"https://dblp.org/rec/conf/aina/ArachchiHHKS18"}, "url":"URL#2512449" }, { "@score":"1", "@id":"2512453", "info":{"authors":{"author":[{"@pid":"42/356","text":"Deepali Arora"},{"@pid":"33/4867","text":"Panajotis Agathoklis"},{"@pid":"180/2482","text":"Alex Loffler"}]},"title":"Network Event Classification for Security of IT Infrastructure.","venue":"AINA Workshops","pages":"187-192","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AroraAL18","doi":"10.1109/WAINA.2018.00085","ee":"https://doi.org/10.1109/WAINA.2018.00085","url":"https://dblp.org/rec/conf/aina/AroraAL18"}, "url":"URL#2512453" }, { "@score":"1", "@id":"2512454", "info":{"authors":{"author":[{"@pid":"a/GAttardi","text":"Giuseppe Attardi"},{"@pid":"202/2219","text":"Alex Barchiesi"},{"@pid":"202/1893","text":"Alberto Colla"},{"@pid":"176/1017","text":"Roberto di Lallo"},{"@pid":"165/0673","text":"Fulvio Galeazzi"}]},"title":"Declarative Modeling for Deploying a Container Platform.","venue":"AINA Workshops","pages":"386-389","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AttardiBCLG18","doi":"10.1109/WAINA.2018.00116","ee":"https://doi.org/10.1109/WAINA.2018.00116","url":"https://dblp.org/rec/conf/aina/AttardiBCLG18"}, "url":"URL#2512454" }, { "@score":"1", "@id":"2512455", "info":{"authors":{"author":[{"@pid":"a/GAttardi","text":"Giuseppe Attardi"},{"@pid":"19/953","text":"Beniamino Di Martino"},{"@pid":"85/1860-1","text":"Antonio Esposito 0001"},{"@pid":"38/3757","text":"Michele Mastroianni"}]},"title":"Using Federated Cloud Platform to Implement Academia Services for Research and Administration.","venue":"AINA Workshops","pages":"413-418","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/AttardiMEM18","doi":"10.1109/WAINA.2018.00121","ee":"https://doi.org/10.1109/WAINA.2018.00121","url":"https://dblp.org/rec/conf/aina/AttardiMEM18"}, "url":"URL#2512455" }, { "@score":"1", "@id":"2512458", "info":{"authors":{"author":[{"@pid":"03/1643","text":"Walter Balzano"},{"@pid":"205/3694","text":"Vinicio Barbieri"},{"@pid":"166/5185","text":"Giovanni Riccardi"}]},"title":"Smart Priority Park Framework Based on DDGP3.","venue":"AINA Workshops","pages":"674-680","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BalzanoBR18","doi":"10.1109/WAINA.2018.00166","ee":"https://doi.org/10.1109/WAINA.2018.00166","url":"https://dblp.org/rec/conf/aina/BalzanoBR18"}, "url":"URL#2512458" }, { "@score":"1", "@id":"2512459", "info":{"authors":{"author":[{"@pid":"223/6727","text":"Cesare Bandirali"},{"@pid":"61/3451","text":"Stefano Lodi"},{"@pid":"m/GianlucaMoro","text":"Gianluca Moro"},{"@pid":"172/1657","text":"Andrea Pagliarani"},{"@pid":"s/ClaudioSartori","text":"Claudio Sartori 0001"}]},"title":"Parallel Primitives for Vendor-Agnostic Implementation of Big Data Mining Algorithms.","venue":"AINA Workshops","pages":"396-401","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BandiraliLMP018","doi":"10.1109/WAINA.2018.00118","ee":"https://doi.org/10.1109/WAINA.2018.00118","url":"https://dblp.org/rec/conf/aina/BandiraliLMP018"}, "url":"URL#2512459" }, { "@score":"1", "@id":"2512462", "info":{"authors":{"author":[{"@pid":"215/4271","text":"Alexandr Basov"},{"@pid":"64/4962","text":"Daniel de Carvalho"},{"@pid":"45/2295","text":"Manuel Mazzara"}]},"title":"Implementing Distributed Lamda-Calculus Interpreter.","venue":"AINA Workshops","pages":"34-39","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BasovCM18","doi":"10.1109/WAINA.2018.00060","ee":"https://doi.org/10.1109/WAINA.2018.00060","url":"https://dblp.org/rec/conf/aina/BasovCM18"}, "url":"URL#2512462" }, { "@score":"1", "@id":"2512464", "info":{"authors":{"author":{"@pid":"54/4248","text":"Claude R. Baudoin"}},"title":"The Impact of Data Residency on Cloud Computing.","venue":"AINA Workshops","pages":"430-435","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Baudoin18","doi":"10.1109/WAINA.2018.00124","ee":"https://doi.org/10.1109/WAINA.2018.00124","url":"https://dblp.org/rec/conf/aina/Baudoin18"}, "url":"URL#2512464" }, { "@score":"1", "@id":"2512466", "info":{"authors":{"author":[{"@pid":"126/0494","text":"Michele Bottone"},{"@pid":"58/461","text":"Franco Raimondi"},{"@pid":"60/5305","text":"Giuseppe Primiero"}]},"title":"Multi-agent Based Simulations of Block-Free Distributed Ledgers.","venue":"AINA Workshops","pages":"585-590","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BottoneRP18","doi":"10.1109/WAINA.2018.00149","ee":"https://doi.org/10.1109/WAINA.2018.00149","url":"https://dblp.org/rec/conf/aina/BottoneRP18"}, "url":"URL#2512466" }, { "@score":"1", "@id":"2512467", "info":{"authors":{"author":[{"@pid":"220/0483","text":"Amal Bouazizi"},{"@pid":"77/10000","text":"Ghada Zaibi"},{"@pid":"73/4037","text":"Mounir Samet"},{"@pid":"17/7782","text":"Abdennaceur Kachouri"}]},"title":"A Miniaturized Invasive Antenna Study for a Better Performance in Medical Application.","venue":"AINA Workshops","pages":"98-103","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BouaziziZSK18","doi":"10.1109/WAINA.2018.00070","ee":"https://doi.org/10.1109/WAINA.2018.00070","url":"https://dblp.org/rec/conf/aina/BouaziziZSK18"}, "url":"URL#2512467" }, { "@score":"1", "@id":"2512472", "info":{"authors":{"author":[{"@pid":"60/2255","text":"Dario Bruneo"},{"@pid":"223/6803","text":"Sebastiano Chillari"},{"@pid":"32/2891","text":"Salvatore Distefano"},{"@pid":"23/7381","text":"Maurizio Giacobbe"},{"@pid":"17/9959","text":"Antonino Longo Minnolo"},{"@pid":"02/709","text":"Francesco Longo 0001"},{"@pid":"119/1709","text":"Giovanni Merlino"},{"@pid":"130/2280","text":"Davide Mulfari"},{"@pid":"150/6680","text":"Alfonso Panarello"},{"@pid":"62/1462-2","text":"Giuseppe Patanè 0002"},{"@pid":"15/7009","text":"Antonio Puliafito"},{"@pid":"201/8126","text":"Carlo Puliafito"},{"@pid":"25/1629","text":"Marco Scarpa"},{"@pid":"215/6319","text":"Nachiket Tapas"},{"@pid":"223/6702","text":"Giancarlo Visalli"}]},"title":"Building a Smart City Service Platform in Messina with the #SmartME Project.","venue":"AINA Workshops","pages":"343-348","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BruneoCDGM0MMPP18","doi":"10.1109/WAINA.2018.00109","ee":"https://doi.org/10.1109/WAINA.2018.00109","url":"https://dblp.org/rec/conf/aina/BruneoCDGM0MMPP18"}, "url":"URL#2512472" }, { "@score":"1", "@id":"2512473", "info":{"authors":{"author":[{"@pid":"221/7694","text":"Rasool Bukhsh"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"121/2776","text":"Zafar Iqbal"},{"@pid":"63/2255","text":"Usman Ahmed"},{"@pid":"66/5387","text":"Zeeshan Ahmad"},{"@pid":"220/8241","text":"Muhammad Nadeem Iqbal"}]},"title":"Appliances Scheduling Using Hybrid Scheme of Genetic Algorithm and Elephant Herd Optimization for Residential Demand Response.","venue":"AINA Workshops","pages":"210-217","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/BukhshJIAAI18","doi":"10.1109/WAINA.2018.00089","ee":"https://doi.org/10.1109/WAINA.2018.00089","url":"https://dblp.org/rec/conf/aina/BukhshJIAAI18"}, "url":"URL#2512473" }, { "@score":"1", "@id":"2512475", "info":{"authors":{"author":[{"@pid":"19/6630","text":"Diletta Romana Cacciagrano"},{"@pid":"94/805","text":"Rosario Culmone"}]},"title":"Formal Semantics of an IoT-Specific Language.","venue":"AINA Workshops","pages":"579-584","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CacciagranoC18","doi":"10.1109/WAINA.2018.00148","ee":"https://doi.org/10.1109/WAINA.2018.00148","url":"https://dblp.org/rec/conf/aina/CacciagranoC18"}, "url":"URL#2512475" }, { "@score":"1", "@id":"2512476", "info":{"authors":{"author":[{"@pid":"115/9100","text":"Giuseppe Caggianese"},{"@pid":"188/0017","text":"Andrea Chirico"},{"@pid":"64/4882","text":"Giuseppe De Pietro"},{"@pid":"69/3696","text":"Luigi Gallo"},{"@pid":"21/1154","text":"Antonio Giordano"},{"@pid":"223/6861","text":"Marco Predazzi"},{"@pid":"155/1646","text":"Pietro Neroni"}]},"title":"Towards a Virtual Reality Cognitive Training System for Mild Cognitive Impairment and Alzheimer's Disease Patients.","venue":"AINA Workshops","pages":"663-667","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CaggianeseCPGGP18","doi":"10.1109/WAINA.2018.00164","ee":"https://doi.org/10.1109/WAINA.2018.00164","url":"https://dblp.org/rec/conf/aina/CaggianeseCPGGP18"}, "url":"URL#2512476" }, { "@score":"1", "@id":"2512477", "info":{"authors":{"author":[{"@pid":"99/5681","text":"Maria Carla Calzarossa"},{"@pid":"39/2254","text":"Daniele Tessera"}]},"title":"Analysis and Forecasting of Web Content Dynamics.","venue":"AINA Workshops","pages":"12-17","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CalzarossaT18","doi":"10.1109/WAINA.2018.00056","ee":"https://doi.org/10.1109/WAINA.2018.00056","url":"https://dblp.org/rec/conf/aina/CalzarossaT18"}, "url":"URL#2512477" }, { "@score":"1", "@id":"2512478", "info":{"authors":{"author":[{"@pid":"205/5542","text":"Lorenzo Carnevale"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"202/3093","text":"Antonino Galletta"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing.","venue":"AINA Workshops","pages":"419-424","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CarnevaleCGDV18","doi":"10.1109/WAINA.2018.00122","ee":"https://doi.org/10.1109/WAINA.2018.00122","url":"https://dblp.org/rec/conf/aina/CarnevaleCGDV18"}, "url":"URL#2512478" }, { "@score":"1", "@id":"2512480", "info":{"authors":{"author":[{"@pid":"76/6202","text":"Luca Caviglione"},{"@pid":"54/3464","text":"Alessio Merlo"},{"@pid":"03/6666","text":"Mauro Migliardi"}]},"title":"Covert Channels in IoT Deployments Through Data Hiding Techniques.","venue":"AINA Workshops","pages":"559-563","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CaviglioneMM18","doi":"10.1109/WAINA.2018.00144","ee":"https://doi.org/10.1109/WAINA.2018.00144","url":"https://dblp.org/rec/conf/aina/CaviglioneMM18"}, "url":"URL#2512480" }, { "@score":"1", "@id":"2512482", "info":{"authors":{"author":[{"@pid":"52/3819","text":"Chuan-Yu Chang"},{"@pid":"223/6847","text":"Fu Ren Chen"}]},"title":"Application of Deep Learning for Infant Vomiting and Crying Detection.","venue":"AINA Workshops","pages":"633-635","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ChangC18","doi":"10.1109/WAINA.2018.00158","ee":"https://doi.org/10.1109/WAINA.2018.00158","url":"https://dblp.org/rec/conf/aina/ChangC18"}, "url":"URL#2512482" }, { "@score":"1", "@id":"2512483", "info":{"authors":{"author":[{"@pid":"78/2510","text":"Shih-Hao Chang"},{"@pid":"19/808","text":"Teh-Sheng Huang"}]},"title":"A Robust CSI-HARQ MIMO Visible Light Communication Scheme for Wireless Industrial Networking.","venue":"AINA Workshops","pages":"281-286","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ChangH18","doi":"10.1109/WAINA.2018.00099","ee":"https://doi.org/10.1109/WAINA.2018.00099","url":"https://dblp.org/rec/conf/aina/ChangH18"}, "url":"URL#2512483" }, { "@score":"1", "@id":"2512484", "info":{"authors":{"author":[{"@pid":"68/6984","text":"Ying-Nong Chen"},{"@pid":"95/2753","text":"Chi-Hung Chuang"},{"@pid":"f/KuoChinFan","text":"Kuo-Chin Fan"}]},"title":"Stereo-Based 3D Space Handwriting Recognition.","venue":"AINA Workshops","pages":"615-617","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ChenCF18","doi":"10.1109/WAINA.2018.00154","ee":"https://doi.org/10.1109/WAINA.2018.00154","url":"https://dblp.org/rec/conf/aina/ChenCF18"}, "url":"URL#2512484" }, { "@score":"1", "@id":"2512485", "info":{"authors":{"author":[{"@pid":"28/7034","text":"Hsing-Chung Chen"},{"@pid":"67/5910","text":"Shyi-Shiun Kuo"},{"@pid":"223/6832","text":"Han-Mi Chen"}]},"title":"Secure OTT Service Scheme Based on Blockchain Technology.","venue":"AINA Workshops","pages":"645-650","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ChenKC18","doi":"10.1109/WAINA.2018.00161","ee":"https://doi.org/10.1109/WAINA.2018.00161","url":"https://dblp.org/rec/conf/aina/ChenKC18"}, "url":"URL#2512485" }, { "@score":"1", "@id":"2512488", "info":{"authors":{"author":[{"@pid":"205/8159","text":"Ons Chikhaoui"},{"@pid":"147/1893","text":"Aida Ben Chehida Douss"},{"@pid":"87/2508","text":"Ryma Abassi"},{"@pid":"83/6057","text":"Sihem Guemara El Fatmi"}]},"title":"Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETs.","venue":"AINA Workshops","pages":"496-501","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ChikhaouiDAF18","doi":"10.1109/WAINA.2018.00134","ee":"https://doi.org/10.1109/WAINA.2018.00134","url":"https://dblp.org/rec/conf/aina/ChikhaouiDAF18"}, "url":"URL#2512488" }, { "@score":"1", "@id":"2512491", "info":{"authors":{"author":[{"@pid":"32/5766","text":"Luigi Coppolino"},{"@pid":"06/552","text":"Salvatore D'Antonio"},{"@pid":"184/1720","text":"Giovanni Mazzeo"},{"@pid":"59/3062","text":"Luigi Romano"},{"@pid":"144/7809","text":"Luigi Sgaglione"}]},"title":"How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.","venue":"AINA Workshops","pages":"573-578","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/CoppolinoDMRS18","doi":"10.1109/WAINA.2018.00147","ee":"https://doi.org/10.1109/WAINA.2018.00147","url":"https://dblp.org/rec/conf/aina/CoppolinoDMRS18"}, "url":"URL#2512491" }, { "@score":"1", "@id":"2512495", "info":{"authors":{"author":[{"@pid":"198/9902","text":"Emanuele Damiano"},{"@pid":"77/7787","text":"Aniello Minutolo"},{"@pid":"69/3473","text":"Massimo Esposito"}]},"title":"Open Information Extraction for Italian Sentences.","venue":"AINA Workshops","pages":"668-673","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/DamianoME18","doi":"10.1109/WAINA.2018.00165","ee":"https://doi.org/10.1109/WAINA.2018.00165","url":"https://dblp.org/rec/conf/aina/DamianoME18"}, "url":"URL#2512495" }, { "@score":"1", "@id":"2512496", "info":{"authors":{"author":[{"@pid":"223/6773","text":"Ahmed Dawoud"},{"@pid":"223/6763","text":"Seyed Shahristani"},{"@pid":"223/6864","text":"Chun Raun"}]},"title":"A Deep Learning Framework to Enhance Software Defined Networks Security.","venue":"AINA Workshops","pages":"709-714","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/DawoudSR18","doi":"10.1109/WAINA.2018.00172","ee":"https://doi.org/10.1109/WAINA.2018.00172","url":"https://dblp.org/rec/conf/aina/DawoudSR18"}, "url":"URL#2512496" }, { "@score":"1", "@id":"2512499", "info":{"authors":{"author":[{"@pid":"194/9877","text":"Yosra Ben Dhief"},{"@pid":"09/3926","text":"Yacine Djemaiel"},{"@pid":"01/5254","text":"Slim Rekhis"},{"@pid":"28/3198","text":"Noureddine Boudriga"}]},"title":"Cloud-Based Global Monitoring System for Smart Cities.","venue":"AINA Workshops","pages":"307-312","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/DhiefDRB18","doi":"10.1109/WAINA.2018.00103","ee":"https://doi.org/10.1109/WAINA.2018.00103","url":"https://dblp.org/rec/conf/aina/DhiefDRB18"}, "url":"URL#2512499" }, { "@score":"1", "@id":"2512500", "info":{"authors":{"author":[{"@pid":"198/7832","text":"Mohammed Dighriri"},{"@pid":"198/7761","text":"Ali Saeed Dayem Alfoudi"},{"@pid":"97/5389","text":"Gyu Myoung Lee"},{"@pid":"83/2178","text":"Thar Baker"},{"@pid":"09/3375","text":"Rubem Pereira"}]},"title":"Resource Allocation Scheme in 5G Network Slices.","venue":"AINA Workshops","pages":"275-280","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/DighririALBP18","doi":"10.1109/WAINA.2018.00098","ee":"https://doi.org/10.1109/WAINA.2018.00098","url":"https://dblp.org/rec/conf/aina/DighririALBP18"}, "url":"URL#2512500" }, { "@score":"1", "@id":"2512506", "info":{"authors":{"author":[{"@pid":"72/10224","text":"Mahmoud Elkhodr"},{"@pid":"195/5797","text":"Belal Alsinglawi"},{"@pid":"171/3686","text":"Mohammad Dahman Alshehri"}]},"title":"Data Provenance in the Internet of Things.","venue":"AINA Workshops","pages":"727-731","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ElkhodrAA18","doi":"10.1109/WAINA.2018.00175","ee":"https://doi.org/10.1109/WAINA.2018.00175","url":"https://dblp.org/rec/conf/aina/ElkhodrAA18"}, "url":"URL#2512506" }, { "@score":"1", "@id":"2512509", "info":{"authors":{"author":[{"@pid":"131/8022","text":"Shadi Esnaashari"},{"@pid":"125/1151","text":"Lesley A. Gardner"},{"@pid":"85/10911","text":"Paul A. Watters"}]},"title":"Clustering Student Participation: Implications for Education.","venue":"AINA Workshops","pages":"313-318","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/EsnaashariGW18","doi":"10.1109/WAINA.2018.00104","ee":"https://doi.org/10.1109/WAINA.2018.00104","url":"https://dblp.org/rec/conf/aina/EsnaashariGW18"}, "url":"URL#2512509" }, { "@score":"1", "@id":"2512510", "info":{"authors":{"author":[{"@pid":"131/8022","text":"Shadi Esnaashari"},{"@pid":"125/1151","text":"Lesley A. Gardner"},{"@pid":"189/6005","text":"Michael Rehm"}]},"title":"Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand.","venue":"AINA Workshops","pages":"6-11","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/EsnsashariGR18","doi":"10.1109/WAINA.2018.00055","ee":"https://doi.org/10.1109/WAINA.2018.00055","url":"https://dblp.org/rec/conf/aina/EsnsashariGR18"}, "url":"URL#2512510" }, { "@score":"1", "@id":"2512515", "info":{"authors":{"author":[{"@pid":"56/1446","text":"Carlo Ferrari"},{"@pid":"95/1425","text":"Daniele Marini"},{"@pid":"52/8882","text":"Michele Moro"}]},"title":"An Adaptive Typing Biometric System with Varying users Model.","venue":"AINA Workshops","pages":"564-568","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/FerrariMM18","doi":"10.1109/WAINA.2018.00145","ee":"https://doi.org/10.1109/WAINA.2018.00145","url":"https://dblp.org/rec/conf/aina/FerrariMM18"}, "url":"URL#2512515" }, { "@score":"1", "@id":"2512516", "info":{"authors":{"author":{"@pid":"223/6724","text":"Gianluca Fimiani"}},"title":"Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE).","venue":"AINA Workshops","pages":"569-572","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Fimiani18","doi":"10.1109/WAINA.2018.00146","ee":"https://doi.org/10.1109/WAINA.2018.00146","url":"https://dblp.org/rec/conf/aina/Fimiani18"}, "url":"URL#2512516" }, { "@score":"1", "@id":"2512525", "info":{"authors":{"author":[{"@pid":"223/6827","text":"Pooyan Habibi"},{"@pid":"223/6704","text":"Soroush Baharlooei"},{"@pid":"182/6874","text":"Mohammad Farhoudi 0002"},{"@pid":"219/9874","text":"Sepehr Kazemian"},{"@pid":"74/4836","text":"Siavash Khorsandi"}]},"title":"Virtualized SDN-Based End-to-End Reference Architecture for Fog Networking.","venue":"AINA Workshops","pages":"61-66","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HabibiBFKK18","doi":"10.1109/WAINA.2018.00064","ee":"https://doi.org/10.1109/WAINA.2018.00064","url":"https://dblp.org/rec/conf/aina/HabibiBFKK18"}, "url":"URL#2512525" }, { "@score":"1", "@id":"2512527", "info":{"authors":{"author":[{"@pid":"80/10596","text":"Amel Haji"},{"@pid":"85/2368","text":"Asma Ben Letaifa"},{"@pid":"20/856","text":"Sami Tabbane"}]},"title":"Elastic Architecture Based NFV and OpenStack to Deploy VA Service.","venue":"AINA Workshops","pages":"425-429","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HajiLT18","doi":"10.1109/WAINA.2018.00123","ee":"https://doi.org/10.1109/WAINA.2018.00123","url":"https://dblp.org/rec/conf/aina/HajiLT18"}, "url":"URL#2512527" }, { "@score":"1", "@id":"2512530", "info":{"authors":{"author":[{"@pid":"37/2942","text":"Geir Horn"},{"@pid":"223/6687","text":"Pawel Skrzypek"}]},"title":"MELODIC: Utility Based Cross Cloud Deployment Optimisation.","venue":"AINA Workshops","pages":"360-367","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HornS18","doi":"10.1109/WAINA.2018.00112","ee":"https://doi.org/10.1109/WAINA.2018.00112","url":"https://dblp.org/rec/conf/aina/HornS18"}, "url":"URL#2512530" }, { "@score":"1", "@id":"2512531", "info":{"authors":{"author":{"@pid":"180/2497","text":"Ines Hosni"}},"title":"Performance of IEEE802.15.4e TSCH Protocol for Multi-hop Wireless Sensor Networks.","venue":"AINA Workshops","pages":"603-608","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Hosni18","doi":"10.1109/WAINA.2018.00152","ee":"https://doi.org/10.1109/WAINA.2018.00152","url":"https://dblp.org/rec/conf/aina/Hosni18"}, "url":"URL#2512531" }, { "@score":"1", "@id":"2512533", "info":{"authors":{"author":[{"@pid":"223/6713","text":"Dhouha El Houssaini"},{"@pid":"223/6840","text":"Zina Mohamed"},{"@pid":"223/6850","text":"Sabrine Khriji"},{"@pid":"42/2543","text":"Kamel Besbes"},{"@pid":"60/9664","text":"Olfa Kanoun"}]},"title":"A Filtered RSSI Model Based on Hardware Characteristic for Localization Algorithm in Wireless Sensor Networks.","venue":"AINA Workshops","pages":"118-123","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HoussainiMKBK18","doi":"10.1109/WAINA.2018.00073","ee":"https://doi.org/10.1109/WAINA.2018.00073","url":"https://dblp.org/rec/conf/aina/HoussainiMKBK18"}, "url":"URL#2512533" }, { "@score":"1", "@id":"2512534", "info":{"authors":{"author":[{"@pid":"97/5227","text":"Deng-Yuan Huang"},{"@pid":"26/3209","text":"Chao-Ho Chen"},{"@pid":"32/2819","text":"Tsong-Yi Chen"},{"@pid":"223/6858","text":"Jian-He Wu"},{"@pid":"38/5245","text":"Chien-Chuan Ko"}]},"title":"Real-Time Face Detection Using a Moving Camera.","venue":"AINA Workshops","pages":"609-614","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HuangCCWK18","doi":"10.1109/WAINA.2018.00153","ee":"https://doi.org/10.1109/WAINA.2018.00153","url":"https://dblp.org/rec/conf/aina/HuangCCWK18"}, "url":"URL#2512534" }, { "@score":"1", "@id":"2512538", "info":{"authors":{"author":[{"@pid":"29/3731","text":"Chi-Pan Hwang"},{"@pid":"95/1397","text":"Mu-Song Chen"},{"@pid":"223/6802","text":"Chih-Min Shih"},{"@pid":"115/6237","text":"Hsing-Yu Chen"},{"@pid":"81/3707","text":"Wen-Kai Liu"}]},"title":"Apply Scikit-Learn in Python to Analyze Driver Behavior Based on OBD Data.","venue":"AINA Workshops","pages":"636-639","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/HwangCSCL18","doi":"10.1109/WAINA.2018.00159","ee":"https://doi.org/10.1109/WAINA.2018.00159","url":"https://dblp.org/rec/conf/aina/HwangCSCL18"}, "url":"URL#2512538" }, { "@score":"1", "@id":"2512539", "info":{"authors":{"author":[{"@pid":"223/6869","text":"Mohammed Suhel Inamdar"},{"@pid":"83/11198","text":"Ali Tekeoglu"}]},"title":"Security Analysis of Open Source Network Access Control in Virtual Networks.","venue":"AINA Workshops","pages":"475-480","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/InamdarT18","doi":"10.1109/WAINA.2018.00131","ee":"https://doi.org/10.1109/WAINA.2018.00131","url":"https://dblp.org/rec/conf/aina/InamdarT18"}, "url":"URL#2512539" }, { "@score":"1", "@id":"2512548", "info":{"authors":{"author":[{"@pid":"223/6755","text":"Rajaguru K"},{"@pid":"40/3318","text":"R. C. Hansdah"}]},"title":"Symmetric Key-Based Lightweight Authentication Protocols for RFID Security.","venue":"AINA Workshops","pages":"488-495","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KH18","doi":"10.1109/WAINA.2018.00133","ee":"https://doi.org/10.1109/WAINA.2018.00133","url":"https://dblp.org/rec/conf/aina/KH18"}, "url":"URL#2512548" }, { "@score":"1", "@id":"2512550", "info":{"authors":{"author":[{"@pid":"210/6363","text":"Evgenia Kapassa"},{"@pid":"220/8943","text":"Marios Touloupou"},{"@pid":"85/4341","text":"Dimosthenis Kyriazis"}]},"title":"SLAs in 5G: A Complete Framework Facilitating VNF- and NS- Tailored SLAs Management.","venue":"AINA Workshops","pages":"469-474","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KapassaTK18","doi":"10.1109/WAINA.2018.00130","ee":"https://doi.org/10.1109/WAINA.2018.00130","url":"https://dblp.org/rec/conf/aina/KapassaTK18"}, "url":"URL#2512550" }, { "@score":"1", "@id":"2512551", "info":{"authors":{"author":[{"@pid":"223/6782","text":"Jaswinder Kaur"},{"@pid":"122/2036","text":"Pornpit Wongthongtham"},{"@pid":"167/2644","text":"Bilal Abu-Salih"},{"@pid":"223/6731","text":"Sogand Fathy"}]},"title":"Analysis of Scientific Production of IoE Big Data Research.","venue":"AINA Workshops","pages":"715-720","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KaurWAF18","doi":"10.1109/WAINA.2018.00173","ee":"https://doi.org/10.1109/WAINA.2018.00173","url":"https://dblp.org/rec/conf/aina/KaurWAF18"}, "url":"URL#2512551" }, { "@score":"1", "@id":"2512552", "info":{"authors":{"author":[{"@pid":"200/2502","text":"Saki Kawanobe"},{"@pid":"60/2340","text":"Tomonobu Ozaki"}]},"title":"Experimental Study of Characterizing Frequent Itemsets Using Representation Learning.","venue":"AINA Workshops","pages":"170-174","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KawanobeO18","doi":"10.1109/WAINA.2018.00082","ee":"https://doi.org/10.1109/WAINA.2018.00082","url":"https://dblp.org/rec/conf/aina/KawanobeO18"}, "url":"URL#2512552" }, { "@score":"1", "@id":"2512554", "info":{"authors":{"author":[{"@pid":"223/6718","text":"Amira Kchaou"},{"@pid":"87/2508","text":"Ryma Abassi"},{"@pid":"83/6057","text":"Sihem Guemara El Fatmi"}]},"title":"Towards a Secured Clustering Mechanism for Messages Exchange in VANET.","venue":"AINA Workshops","pages":"88-93","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KchaouAF18","doi":"10.1109/WAINA.2018.00068","ee":"https://doi.org/10.1109/WAINA.2018.00068","url":"https://dblp.org/rec/conf/aina/KchaouAF18"}, "url":"URL#2512554" }, { "@score":"1", "@id":"2512556", "info":{"authors":{"author":[{"@pid":"223/6745","text":"Ahmad Jaffar Khan"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"121/2776","text":"Zafar Iqbal"},{"@pid":"216/5768","text":"Naveed Anwar"},{"@pid":"200/9847","text":"Abdul Saboor"},{"@pid":"223/6712","text":"Inzimam ul-Haq"},{"@pid":"52/7458","text":"Umar Qasim"}]},"title":"A Hybrid Bacterial Foraging Tabu Search Heuristic Optimization for Demand Side Management in Smart Grid.","venue":"AINA Workshops","pages":"550-558","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KhanJIASuQ18","doi":"10.1109/WAINA.2018.00143","ee":"https://doi.org/10.1109/WAINA.2018.00143","url":"https://dblp.org/rec/conf/aina/KhanJIASuQ18"}, "url":"URL#2512556" }, { "@score":"1", "@id":"2512560", "info":{"authors":{"author":[{"@pid":"213/8196","text":"Rinat Khatipov"},{"@pid":"213/7819","text":"Aydar Negimatzhanov"},{"@pid":"213/7828","text":"Ilgiz Zamaleev"},{"@pid":"213/7761","text":"Anvar Zakirov"},{"@pid":"45/2295","text":"Manuel Mazzara"},{"@pid":"40/11498","text":"Victor Rivera"}]},"title":"Hikester - The Event Management Application.","venue":"AINA Workshops","pages":"462-468","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KhatipovNZZMR18","doi":"10.1109/WAINA.2018.00129","ee":"https://doi.org/10.1109/WAINA.2018.00129","url":"https://dblp.org/rec/conf/aina/KhatipovNZZMR18"}, "url":"URL#2512560" }, { "@score":"1", "@id":"2512564", "info":{"authors":{"author":[{"@pid":"213/7359","text":"Azat Khusnutdinov"},{"@pid":"213/7507","text":"Denis Usachev"},{"@pid":"45/2295","text":"Manuel Mazzara"},{"@pid":"55/6837-1","text":"Adil Khan 0001"},{"@pid":"182/6506","text":"Ivan Panchenko"}]},"title":"Open Source Platform Digital Personal Assistant.","venue":"AINA Workshops","pages":"45-50","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KhusnutdinovUMK18","doi":"10.1109/WAINA.2018.00062","ee":"https://doi.org/10.1109/WAINA.2018.00062","url":"https://dblp.org/rec/conf/aina/KhusnutdinovUMK18"}, "url":"URL#2512564" }, { "@score":"1", "@id":"2512566", "info":{"authors":{"author":[{"@pid":"223/6719","text":"Burak Kizilkaya"},{"@pid":"223/6758","text":"Mehmet Caglar"},{"@pid":"18/3784","text":"Fadi Al-Turjman 0001"},{"@pid":"41/6741","text":"Enver Ever"}]},"title":"An Intelligent Car Park Management System : Hierarchical Placement Algorithm Based on Nearest Location.","venue":"AINA Workshops","pages":"597-602","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KizilkayaCAE18","doi":"10.1109/WAINA.2018.00151","ee":"https://doi.org/10.1109/WAINA.2018.00151","url":"https://dblp.org/rec/conf/aina/KizilkayaCAE18"}, "url":"URL#2512566" }, { "@score":"1", "@id":"2512568", "info":{"authors":{"author":[{"@pid":"63/8101","text":"Masaki Kohana"},{"@pid":"66/835","text":"Hiroki Sakaji"},{"@pid":"81/2587","text":"Akio Kobayashi"},{"@pid":"56/3175","text":"Shusuke Okamoto"}]},"title":"A Parallel Calculation Method on Web Browser for Contents Categorization.","venue":"AINA Workshops","pages":"40-44","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KohanaSKO18","doi":"10.1109/WAINA.2018.00061","ee":"https://doi.org/10.1109/WAINA.2018.00061","url":"https://dblp.org/rec/conf/aina/KohanaSKO18"}, "url":"URL#2512568" }, { "@score":"1", "@id":"2512571", "info":{"authors":{"author":[{"@pid":"k/evaKuhn","text":"Eva Kühn"},{"@pid":"48/7399","text":"Stefan Craß"}]},"title":"Coordination Pattern-Based Approach for Auto-Scaling in Multi-clouds.","venue":"AINA Workshops","pages":"368-373","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KuhnC18","doi":"10.1109/WAINA.2018.00113","ee":"https://doi.org/10.1109/WAINA.2018.00113","url":"https://dblp.org/rec/conf/aina/KuhnC18"}, "url":"URL#2512571" }, { "@score":"1", "@id":"2512573", "info":{"authors":{"author":[{"@pid":"79/2198","text":"Hiroki Kuzuno"},{"@pid":"223/6730","text":"Shintaro Otsuka"}]},"title":"Early Detection of Network Incident Using Open Security Information.","venue":"AINA Workshops","pages":"18-23","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/KuzunoO18","doi":"10.1109/WAINA.2018.00057","ee":"https://doi.org/10.1109/WAINA.2018.00057","url":"https://dblp.org/rec/conf/aina/KuzunoO18"}, "url":"URL#2512573" }, { "@score":"1", "@id":"2512574", "info":{"authors":{"author":{"@pid":"85/4341","text":"Dimosthenis Kyriazis"}},"title":"BYOS: Bring Your Own Security in Clouds and Service Oriented Infrastructures.","venue":"AINA Workshops","pages":"374-379","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Kyriazis18","doi":"10.1109/WAINA.2018.00114","ee":"https://doi.org/10.1109/WAINA.2018.00114","url":"https://dblp.org/rec/conf/aina/Kyriazis18"}, "url":"URL#2512574" }, { "@score":"1", "@id":"2512575", "info":{"authors":{"author":[{"@pid":"223/6817","text":"Narjes Lassoued"},{"@pid":"21/9224","text":"Noureddine Boujnah"},{"@pid":"43/5509","text":"Ridha Bouallegue"}]},"title":"Reducing Power Consumption in HetNet Network Using Power Adjustment and Coordinated Multipoint Technique.","venue":"AINA Workshops","pages":"539-544","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/LassouedBB18","doi":"10.1109/WAINA.2018.00141","ee":"https://doi.org/10.1109/WAINA.2018.00141","url":"https://dblp.org/rec/conf/aina/LassouedBB18"}, "url":"URL#2512575" }, { "@score":"1", "@id":"2512582", "info":{"authors":{"author":[{"@pid":"27/10487-3","text":"Zijian Li 0003"},{"@pid":"181/2799-35","text":"Jun Yang 0035"},{"@pid":"22/1154","text":"Baojiang Cui"}]},"title":"Study on Sensitive Data Protection Based on SEAndroid.","venue":"AINA Workshops","pages":"502-507","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/LiYC18","doi":"10.1109/WAINA.2018.00135","ee":"https://doi.org/10.1109/WAINA.2018.00135","url":"https://dblp.org/rec/conf/aina/LiYC18"}, "url":"URL#2512582" }, { "@score":"1", "@id":"2512586", "info":{"authors":{"author":[{"@pid":"220/8116","text":"Ruiqing Liu"},{"@pid":"181/2799-35","text":"Jun Yang 0035"},{"@pid":"22/1154","text":"Baojiang Cui"}]},"title":"Improved Secure ZigBee Light Link Touchlink Commissioning Protocol Design.","venue":"AINA Workshops","pages":"521-526","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/LiuYC18","doi":"10.1109/WAINA.2018.00138","ee":"https://doi.org/10.1109/WAINA.2018.00138","url":"https://dblp.org/rec/conf/aina/LiuYC18"}, "url":"URL#2512586" }, { "@score":"1", "@id":"2512587", "info":{"authors":{"author":[{"@pid":"68/606","text":"Antonella Longo"},{"@pid":"94/1328","text":"Mario A. Bochicchio"},{"@pid":"67/6789","text":"Marco Zappatore"}]},"title":"A Cloud-Based Approach to Assess the Quality of Local Transportation Services in Apulia Region.","venue":"AINA Workshops","pages":"354-359","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/LongoBZ18","doi":"10.1109/WAINA.2018.00111","ee":"https://doi.org/10.1109/WAINA.2018.00111","url":"https://dblp.org/rec/conf/aina/LongoBZ18"}, "url":"URL#2512587" }, { "@score":"1", "@id":"2512590", "info":{"authors":{"author":[{"@pid":"188/1042","text":"Dharmendra Prasad Mahato"},{"@pid":"158/4357","text":"Ravi Shankar Singh"}]},"title":"Reliability Modeling and Analysis for Deadline-Constrained Grid Service.","venue":"AINA Workshops","pages":"75-81","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MahatoS18","doi":"10.1109/WAINA.2018.00066","ee":"https://doi.org/10.1109/WAINA.2018.00066","url":"https://dblp.org/rec/conf/aina/MahatoS18"}, "url":"URL#2512590" }, { "@score":"1", "@id":"2512592", "info":{"authors":{"author":[{"@pid":"138/7365","text":"Alessandro Maisto"},{"@pid":"138/7387","text":"Serena Pelosi"},{"@pid":"174/7192","text":"Raffaele Guarasci"},{"@pid":"209/2920","text":"Pierluigi Vitale"}]},"title":"Text Analysis on User Generated Content: The Rap Lyrics Challenge.","venue":"AINA Workshops","pages":"657-662","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MaistoPGV18","doi":"10.1109/WAINA.2018.00163","ee":"https://doi.org/10.1109/WAINA.2018.00163","url":"https://dblp.org/rec/conf/aina/MaistoPGV18"}, "url":"URL#2512592" }, { "@score":"1", "@id":"2512593", "info":{"authors":{"author":[{"@pid":"184/1188","text":"Irina Makarova"},{"@pid":"201/3300","text":"Anton Pashkevich"},{"@pid":"201/4442","text":"Ksenia Shubenkova"}]},"title":"Blended Learning Technologies in the Automotive Industry Specialists' Training.","venue":"AINA Workshops","pages":"319-324","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MakarovaPS18","doi":"10.1109/WAINA.2018.00105","ee":"https://doi.org/10.1109/WAINA.2018.00105","url":"https://dblp.org/rec/conf/aina/MakarovaPS18"}, "url":"URL#2512593" }, { "@score":"1", "@id":"2512594", "info":{"authors":{"author":[{"@pid":"153/2009","text":"Stathis Maneas"},{"@pid":"s/BiancaSchroeder","text":"Bianca Schroeder"}]},"title":"The Evolution of the Hadoop Distributed File System.","venue":"AINA Workshops","pages":"67-74","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ManeasS18","doi":"10.1109/WAINA.2018.00065","ee":"https://doi.org/10.1109/WAINA.2018.00065","url":"https://dblp.org/rec/conf/aina/ManeasS18"}, "url":"URL#2512594" }, { "@score":"1", "@id":"2512595", "info":{"authors":{"author":{"@pid":"223/6865","text":"Seyed M.-H. Mansourbeigi"}},"title":"Sheaf Theory as a Mathematical Foundation for Distributed Applications Involving Heterogeneous Data Sets.","venue":"AINA Workshops","pages":"28-33","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Mansourbeigi18","doi":"10.1109/WAINA.2018.00059","ee":"https://doi.org/10.1109/WAINA.2018.00059","url":"https://dblp.org/rec/conf/aina/Mansourbeigi18"}, "url":"URL#2512595" }, { "@score":"1", "@id":"2512597", "info":{"authors":{"author":[{"@pid":"57/8414","text":"Ivan Martinez"},{"@pid":"223/6779","text":"Jorge Montero"},{"@pid":"77/6013","text":"Tomás Pariente Lobo"},{"@pid":"19/953","text":"Beniamino Di Martino"},{"@pid":"31/6009","text":"Salvatore D'Angelo"},{"@pid":"85/1860-1","text":"Antonio Esposito 0001"}]},"title":"Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach.","venue":"AINA Workshops","pages":"408-412","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MartinezMLMDE18","doi":"10.1109/WAINA.2018.00120","ee":"https://doi.org/10.1109/WAINA.2018.00120","url":"https://dblp.org/rec/conf/aina/MartinezMLMDE18"}, "url":"URL#2512597" }, { "@score":"1", "@id":"2512598", "info":{"authors":{"author":[{"@pid":"19/953","text":"Beniamino Di Martino"},{"@pid":"31/6009","text":"Salvatore D'Angelo"},{"@pid":"85/1860-1","text":"Antonio Esposito 0001"},{"@pid":"222/3441","text":"Riccardo Cappuzzo"},{"@pid":"s/AndersonSantana","text":"Anderson Santana de Oliveira"}]},"title":"ROCK Algorithm Parallelization with TOREADOR Primitives.","venue":"AINA Workshops","pages":"402-407","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MartinoDECO18","doi":"10.1109/WAINA.2018.00119","ee":"https://doi.org/10.1109/WAINA.2018.00119","url":"https://dblp.org/rec/conf/aina/MartinoDECO18"}, "url":"URL#2512598" }, { "@score":"1", "@id":"2512599", "info":{"authors":{"author":[{"@pid":"19/953","text":"Beniamino Di Martino"},{"@pid":"223/6777","text":"Jessica Pascarella"},{"@pid":"178/2045","text":"Stefania Nacchia"},{"@pid":"178/2117","text":"Salvatore Augusto Maisto"},{"@pid":"220/2816","text":"Pietro Iannucci"},{"@pid":"223/6857","text":"Fabio Cerri"}]},"title":"Cloud Services Categories Identification from Requirements Specifications.","venue":"AINA Workshops","pages":"436-441","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MartinoPNMIC18","doi":"10.1109/WAINA.2018.00125","ee":"https://doi.org/10.1109/WAINA.2018.00125","url":"https://dblp.org/rec/conf/aina/MartinoPNMIC18"}, "url":"URL#2512599" }, { "@score":"1", "@id":"2512601", "info":{"authors":{"author":[{"@pid":"91/1675","text":"Abdul Mateen"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"80/3639-2","text":"Muhammad Awais 0002"},{"@pid":"132/9302","text":"Nasir Khan"},{"@pid":"221/5657","text":"Urva Latif"},{"@pid":"220/8110","text":"Ihtisham Ullah"}]},"title":"Bio-Inspired Optimization Techniques for Home Energy Management in Smart Grid.","venue":"AINA Workshops","pages":"250-257","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MateenJAKLU18","doi":"10.1109/WAINA.2018.00094","ee":"https://doi.org/10.1109/WAINA.2018.00094","url":"https://dblp.org/rec/conf/aina/MateenJAKLU18"}, "url":"URL#2512601" }, { "@score":"1", "@id":"2512602", "info":{"authors":{"author":[{"@pid":"84/6689","text":"Keita Matsuo"},{"@pid":"91/3961","text":"Masafumi Yamada"},{"@pid":"192/0037","text":"Kevin Bylykbashi"},{"@pid":"194/3682","text":"Miralda Cuka"},{"@pid":"97/4626-11","text":"Yi Liu 0011"},{"@pid":"09/6391","text":"Leonard Barolli"}]},"title":"Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves.","venue":"AINA Workshops","pages":"203-209","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MatsuoYBC0B18","doi":"10.1109/WAINA.2018.00088","ee":"https://doi.org/10.1109/WAINA.2018.00088","url":"https://dblp.org/rec/conf/aina/MatsuoYBC0B18"}, "url":"URL#2512602" }, { "@score":"1", "@id":"2512603", "info":{"authors":{"author":[{"@pid":"158/8643","text":"Channamallikarjuna Mattihalli"},{"@pid":"223/6820","text":"Edemialem Gedefaye"},{"@pid":"223/6834","text":"Fasil Endalamaw"},{"@pid":"223/6775","text":"Adugna Necho"}]},"title":"Real Time Automation of Agriculture Land, by automatically Detecting Plant Leaf Diseases and Auto Medicine.","venue":"AINA Workshops","pages":"325-330","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MattihalliGEN18","doi":"10.1109/WAINA.2018.00106","ee":"https://doi.org/10.1109/WAINA.2018.00106","url":"https://dblp.org/rec/conf/aina/MattihalliGEN18"}, "url":"URL#2512603" }, { "@score":"1", "@id":"2512604", "info":{"authors":{"author":[{"@pid":"203/3314","text":"Meriem Meddah"},{"@pid":"203/3402","text":"Rim Haddad"},{"@pid":"143/7212","text":"Tahar Ezzedine"}]},"title":"Residual Energy and Density Control Aware Cluster Head Election in Wireless Sensor Network.","venue":"AINA Workshops","pages":"141-146","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MeddahHE18","doi":"10.1109/WAINA.2018.00077","ee":"https://doi.org/10.1109/WAINA.2018.00077","url":"https://dblp.org/rec/conf/aina/MeddahHE18"}, "url":"URL#2512604" }, { "@score":"1", "@id":"2512606", "info":{"authors":{"author":[{"@pid":"223/6768","text":"Hana Mejdi"},{"@pid":"148/2362","text":"Oussama Kallel"},{"@pid":"80/6890","text":"Salem Hasnaoui"}]},"title":"Rules to Transform Specific Description Language Diagram Into Coloured Petri Nets.","venue":"AINA Workshops","pages":"24-27","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MejdiKH18","doi":"10.1109/WAINA.2018.00058","ee":"https://doi.org/10.1109/WAINA.2018.00058","url":"https://dblp.org/rec/conf/aina/MejdiKH18"}, "url":"URL#2512606" }, { "@score":"1", "@id":"2512610", "info":{"authors":{"author":[{"@pid":"223/6772","text":"Muhammad Rashid Minhas"},{"@pid":"75/5039","text":"Vidyasagar M. Potdar"},{"@pid":"134/5563","text":"Omid Ameri Sianaki"}]},"title":"A Decision Support System for Selecting Sustainable Materials in Construction Projects.","venue":"AINA Workshops","pages":"721-726","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MinhasPS18","doi":"10.1109/WAINA.2018.00174","ee":"https://doi.org/10.1109/WAINA.2018.00174","url":"https://dblp.org/rec/conf/aina/MinhasPS18"}, "url":"URL#2512610" }, { "@score":"1", "@id":"2512611", "info":{"authors":{"author":[{"@pid":"220/7938","text":"Syed Muhammad Mohsin"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"73/5667","text":"Sajjad Ahmad Madani"},{"@pid":"223/6715","text":"Syed Kashif Abbas"},{"@pid":"220/7057","text":"Syed Muhammad Abrar Akber"},{"@pid":"13/10456","text":"Zahoor Ali Khan"}]},"title":"Appliance Scheduling in Smart Homes with Harmony Search Algorithm for Different Operation Time Intervals.","venue":"AINA Workshops","pages":"51-60","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MohsinJMAAK18","doi":"10.1109/WAINA.2018.00063","ee":"https://doi.org/10.1109/WAINA.2018.00063","url":"https://dblp.org/rec/conf/aina/MohsinJMAAK18"}, "url":"URL#2512611" }, { "@score":"1", "@id":"2512612", "info":{"authors":{"author":[{"@pid":"220/7938","text":"Syed Muhammad Mohsin"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"73/5667","text":"Sajjad Ahmad Madani"},{"@pid":"220/7057","text":"Syed Muhammad Abrar Akber"},{"@pid":"223/6728","text":"Sohaib Manzoor"},{"@pid":"220/8069","text":"Javed Ahmad"}]},"title":"Implementing Elephant Herding Optimization Algorithm with different Operation Time Intervals for Appliance Scheduling in Smart Grid.","venue":"AINA Workshops","pages":"240-249","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/MohsinJMAMA18","doi":"10.1109/WAINA.2018.00093","ee":"https://doi.org/10.1109/WAINA.2018.00093","url":"https://dblp.org/rec/conf/aina/MohsinJMAMA18"}, "url":"URL#2512612" }, { "@score":"1", "@id":"2512618", "info":{"authors":{"author":[{"@pid":"220/7940","text":"Shogo Nakasaki"},{"@pid":"209/8923","text":"Yu Yoshino"},{"@pid":"29/1552","text":"Makoto Ikeda"},{"@pid":"09/6391","text":"Leonard Barolli"}]},"title":"A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs.","venue":"AINA Workshops","pages":"130-135","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/NakasakiYIB18","doi":"10.1109/WAINA.2018.00075","ee":"https://doi.org/10.1109/WAINA.2018.00075","url":"https://dblp.org/rec/conf/aina/NakasakiYIB18"}, "url":"URL#2512618" }, { "@score":"1", "@id":"2512620", "info":{"authors":{"author":[{"@pid":"n/AlfredoNavarra","text":"Alfredo Navarra"},{"@pid":"19/6630","text":"Diletta Cacciagrano"}]},"title":"Energy Saving and Collision-Free Motion Planning for Oblivious Robots.","venue":"AINA Workshops","pages":"591-596","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/NavarraC18","doi":"10.1109/WAINA.2018.00150","ee":"https://doi.org/10.1109/WAINA.2018.00150","url":"https://dblp.org/rec/conf/aina/NavarraC18"}, "url":"URL#2512620" }, { "@score":"1", "@id":"2512621", "info":{"authors":{"author":[{"@pid":"220/8051","text":"Aqdas Naz"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"223/6854","text":"Muhammad Mudassar Iqbal"},{"@pid":"200/2744","text":"Mujahid Ali"},{"@pid":"78/5250-1","text":"Muhammad Imran 0001"},{"@pid":"13/10456","text":"Zahoor Ali Khan"}]},"title":"TBEENISH: Threshold Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol for WSNs.","venue":"AINA Workshops","pages":"104-111","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/NazJIAIK18","doi":"10.1109/WAINA.2018.00071","ee":"https://doi.org/10.1109/WAINA.2018.00071","url":"https://dblp.org/rec/conf/aina/NazJIAIK18"}, "url":"URL#2512621" }, { "@score":"1", "@id":"2512623", "info":{"authors":{"author":[{"@pid":"220/8051","text":"Aqdas Naz"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"117/9170","text":"Talha Naeem Qureshi"},{"@pid":"78/5250-1","text":"Muhammad Imran 0001"},{"@pid":"200/2744","text":"Mujahid Ali"},{"@pid":"13/10456","text":"Zahoor Ali Khan"}]},"title":"EDHBPSO: Enhanced Differential Harmony Binary Particle Swarm Optimization for Demand Side Management in Smart Grid.","venue":"AINA Workshops","pages":"218-225","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/NazJQIAK18","doi":"10.1109/WAINA.2018.00090","ee":"https://doi.org/10.1109/WAINA.2018.00090","url":"https://dblp.org/rec/conf/aina/NazJQIAK18"}, "url":"URL#2512623" }, { "@score":"1", "@id":"2512625", "info":{"authors":{"author":[{"@pid":"223/6746","text":"Kole Nunley"},{"@pid":"98/6613-18","text":"Wei Lu 0018"}]},"title":"Detecting Network Intrusions Using a Confidence-Based Reward System.","venue":"AINA Workshops","pages":"175-180","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/NunleyL18","doi":"10.1109/WAINA.2018.00083","ee":"https://doi.org/10.1109/WAINA.2018.00083","url":"https://dblp.org/rec/conf/aina/NunleyL18"}, "url":"URL#2512625" }, { "@score":"1", "@id":"2512626", "info":{"authors":{"author":[{"@pid":"80/7013","text":"Kazuya Odagiri"},{"@pid":"65/2411","text":"Shogo Shimizu"},{"@pid":"26/5966","text":"Naohiro Ishii"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"}]},"title":"Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain.","venue":"AINA Workshops","pages":"448-453","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/OdagiriSI018","doi":"10.1109/WAINA.2018.00127","ee":"https://doi.org/10.1109/WAINA.2018.00127","url":"https://dblp.org/rec/conf/aina/OdagiriSI018"}, "url":"URL#2512626" }, { "@score":"1", "@id":"2512627", "info":{"authors":{"author":[{"@pid":"199/7150","text":"Emi Ogawa"},{"@pid":"147/1028","text":"Shigenari Nakamura"},{"@pid":"43/2269","text":"Tomoya Enokido"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"}]},"title":"Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc Networks.","venue":"AINA Workshops","pages":"533-538","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/OgawaNE018","doi":"10.1109/WAINA.2018.00140","ee":"https://doi.org/10.1109/WAINA.2018.00140","url":"https://dblp.org/rec/conf/aina/OgawaNE018"}, "url":"URL#2512627" }, { "@score":"1", "@id":"2512636", "info":{"authors":{"author":[{"@pid":"209/8868","text":"Ryuji Oma"},{"@pid":"147/1028","text":"Shigenari Nakamura"},{"@pid":"43/2269","text":"Tomoya Enokido"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"}]},"title":"An Energy-Efficient Model of Fog and Device Nodes in IoT.","venue":"AINA Workshops","pages":"301-306","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/OmaNE018","doi":"10.1109/WAINA.2018.00102","ee":"https://doi.org/10.1109/WAINA.2018.00102","url":"https://dblp.org/rec/conf/aina/OmaNE018"}, "url":"URL#2512636" }, { "@score":"1", "@id":"2512637", "info":{"authors":{"author":[{"@pid":"223/6766","text":"Cheng-Fang Peng"},{"@pid":"83/5722","text":"Jun-Wei Hsieh"},{"@pid":"11/6768","text":"Shao-Wei Leu"},{"@pid":"95/2753","text":"Chi-Hung Chuang"}]},"title":"Drone-Based Vacant Parking Space Detection.","venue":"AINA Workshops","pages":"618-622","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/PengHLC18","doi":"10.1109/WAINA.2018.00155","ee":"https://doi.org/10.1109/WAINA.2018.00155","url":"https://dblp.org/rec/conf/aina/PengHLC18"}, "url":"URL#2512637" }, { "@score":"1", "@id":"2512638", "info":{"authors":{"author":{"@pid":"60/8901","text":"Alfredo J. Perez"}},"title":"M-SPOT: A Hybrid Multiobjective Evolutionary Algorithm for Node Placement in Wireless Sensor Networks.","venue":"AINA Workshops","pages":"264-269","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/Perez18","doi":"10.1109/WAINA.2018.00096","ee":"https://doi.org/10.1109/WAINA.2018.00096","url":"https://dblp.org/rec/conf/aina/Perez18"}, "url":"URL#2512638" }, { "@score":"1", "@id":"2512640", "info":{"authors":{"author":[{"@pid":"70/10716","text":"Marco Pota"},{"@pid":"69/3473","text":"Massimo Esposito"},{"@pid":"89/1901","text":"Marco A. Palomino"},{"@pid":"95/4832","text":"Giovanni Luca Masala"}]},"title":"A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets.","venue":"AINA Workshops","pages":"651-656","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/PotaEPM18","doi":"10.1109/WAINA.2018.00162","ee":"https://doi.org/10.1109/WAINA.2018.00162","url":"https://dblp.org/rec/conf/aina/PotaEPM18"}, "url":"URL#2512640" }, { "@score":"1", "@id":"2512642", "info":{"authors":{"author":[{"@pid":"117/9170","text":"Talha Naeem Qureshi"},{"@pid":"23/8275","text":"Nadeem Javaid"},{"@pid":"220/8051","text":"Aqdas Naz"},{"@pid":"11/4659","text":"Waseem Ahmad"},{"@pid":"78/5250-1","text":"Muhammad Imran 0001"},{"@pid":"13/10456","text":"Zahoor Ali Khan"}]},"title":"A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid.","venue":"AINA Workshops","pages":"454-461","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/QureshiJNAIK18","doi":"10.1109/WAINA.2018.00128","ee":"https://doi.org/10.1109/WAINA.2018.00128","url":"https://dblp.org/rec/conf/aina/QureshiJNAIK18"}, "url":"URL#2512642" }, { "@score":"1", "@id":"2512657", "info":{"authors":{"author":[{"@pid":"173/0180","text":"Atsuhiro Sawada"},{"@pid":"122/1214","text":"Dilawaer Duolikun"},{"@pid":"77/5569","text":"Ryo Watanabe"},{"@pid":"43/2269","text":"Tomoya Enokido"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"}]},"title":"A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation Processes.","venue":"AINA Workshops","pages":"293-300","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/SawadaDWE018","doi":"10.1109/WAINA.2018.00101","ee":"https://doi.org/10.1109/WAINA.2018.00101","url":"https://dblp.org/rec/conf/aina/SawadaDWE018"}, "url":"URL#2512657" }, { "@score":"1", "@id":"2512658", "info":{"authors":{"author":[{"@pid":"223/6774","text":"Sadyk Sayfullin"},{"@pid":"223/6844","text":"Fedor Akhmetov"},{"@pid":"45/2295","text":"Manuel Mazzara"},{"@pid":"182/2521","text":"Ruslan Mustafin"},{"@pid":"40/11498","text":"Victor Rivera"}]},"title":"Gene Expression for Simulation of Biological Tissue.","venue":"AINA Workshops","pages":"232-239","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/SayfullinAMMR18","doi":"10.1109/WAINA.2018.00092","ee":"https://doi.org/10.1109/WAINA.2018.00092","url":"https://dblp.org/rec/conf/aina/SayfullinAMMR18"}, "url":"URL#2512658" }, { "@score":"1", "@id":"2512660", "info":{"authors":{"author":[{"@pid":"98/5218","text":"Lutz Schubert"},{"@pid":"155/7151","text":"Athanasios Tsitsipas"},{"@pid":"j/KeithGJeffery","text":"Keith G. Jeffery"}]},"title":"How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles.","venue":"AINA Workshops","pages":"337-342","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/SchubertTJ18","doi":"10.1109/WAINA.2018.00108","ee":"https://doi.org/10.1109/WAINA.2018.00108","url":"https://dblp.org/rec/conf/aina/SchubertTJ18"}, "url":"URL#2512660" }, { "@score":"1", "@id":"2512661", "info":{"authors":{"author":[{"@pid":"209/8857","text":"Sundas Shafiq"},{"@pid":"209/8855","text":"Sikandar Asif"},{"@pid":"209/8938","text":"Iqra Fatima"},{"@pid":"223/6839","text":"Kubra Yousaf"},{"@pid":"223/6741","text":"Wajiha Safat"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"An Approach Towards Efficient Scheduling of Home Energy Management System Using Backtracking Search Optimization and Tabu Search.","venue":"AINA Workshops","pages":"226-231","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ShafiqAFYSJ18","doi":"10.1109/WAINA.2018.00091","ee":"https://doi.org/10.1109/WAINA.2018.00091","url":"https://dblp.org/rec/conf/aina/ShafiqAFYSJ18"}, "url":"URL#2512661" }, { "@score":"1", "@id":"2512662", "info":{"authors":{"author":[{"@pid":"223/6800","text":"Hussain Shafquat"},{"@pid":"46/4262","text":"Athula Ginige"}]},"title":"Extending a Conventional Chatbot Knowledge Base to External Knowledge Source and Introducing User Based Sessions for Diabetes Education.","venue":"AINA Workshops","pages":"698-703","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ShafquatG18","doi":"10.1109/WAINA.2018.00170","ee":"https://doi.org/10.1109/WAINA.2018.00170","url":"https://dblp.org/rec/conf/aina/ShafquatG18"}, "url":"URL#2512662" }, { "@score":"1", "@id":"2512665", "info":{"authors":{"author":[{"@pid":"07/6833","text":"Shih-Chieh Shie"},{"@pid":"96/5632","text":"Ji-Han Jiang"},{"@pid":"28/2418","text":"Yi-Jen Su"},{"@pid":"223/6759","text":"Wei-Yan Chang"}]},"title":"An Improved Steganographic Scheme Implemented on the Compression Domain of Image Using BTC and Histogram Modification.","venue":"AINA Workshops","pages":"640-644","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ShieJSC18","doi":"10.1109/WAINA.2018.00160","ee":"https://doi.org/10.1109/WAINA.2018.00160","url":"https://dblp.org/rec/conf/aina/ShieJSC18"}, "url":"URL#2512665" }, { "@score":"1", "@id":"2512667", "info":{"authors":{"author":[{"@pid":"134/5563","text":"Omid Ameri Sianaki"},{"@pid":"223/6805","text":"Ashkan Yousefi"},{"@pid":"61/9091","text":"Azadeh Rajabian Tabesh"},{"@pid":"52/945","text":"Mehregan Mahdavi"}]},"title":"Internet of Everything and Machine Learning Applications: Issues and Challenges.","venue":"AINA Workshops","pages":"704-708","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/SianakiYTM18","doi":"10.1109/WAINA.2018.00171","ee":"https://doi.org/10.1109/WAINA.2018.00171","url":"https://dblp.org/rec/conf/aina/SianakiYTM18"}, "url":"URL#2512667" }, { "@score":"1", "@id":"2512670", "info":{"authors":{"author":[{"@pid":"207/5991","text":"Bouthaina Smari"},{"@pid":"194/0829","text":"Mondher Labidi"},{"@pid":"80/4475","text":"Fethi Choubani"}]},"title":"Design of a Small Metamtrial Antenna for Millimetric Wave Applications.","venue":"AINA Workshops","pages":"94-97","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/SmariLC18","doi":"10.1109/WAINA.2018.00069","ee":"https://doi.org/10.1109/WAINA.2018.00069","url":"https://dblp.org/rec/conf/aina/SmariLC18"}, "url":"URL#2512670" }, { "@score":"1", "@id":"2512678", "info":{"authors":{"author":[{"@pid":"180/2515","text":"Hayato Tsukiji"},{"@pid":"97/3296","text":"Kosuke Takano"}]},"title":"An Estimation Method of User Roles Based on Online Technical Communication Activities.","venue":"AINA Workshops","pages":"181-186","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/TsukijiT18","doi":"10.1109/WAINA.2018.00084","ee":"https://doi.org/10.1109/WAINA.2018.00084","url":"https://dblp.org/rec/conf/aina/TsukijiT18"}, "url":"URL#2512678" }, { "@score":"1", "@id":"2512679", "info":{"authors":{"author":[{"@pid":"15/7757","text":"Kazunori Uchida"},{"@pid":"09/6391","text":"Leonard Barolli"}]},"title":"Dijkstra Algorithm Based Ray Tracing: A Case Study for Tunnel Structures.","venue":"AINA Workshops","pages":"82-87","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/UchidaB18","doi":"10.1109/WAINA.2018.00067","ee":"https://doi.org/10.1109/WAINA.2018.00067","url":"https://dblp.org/rec/conf/aina/UchidaB18"}, "url":"URL#2512679" }, { "@score":"1", "@id":"2512680", "info":{"authors":{"author":[{"@pid":"73/3322","text":"Noriki Uchida"},{"@pid":"223/6821","text":"Takahiro Shingai"},{"@pid":"223/6733","text":"Takato Shigetome"},{"@pid":"50/1620","text":"Tomoyuki Ishida"},{"@pid":"27/4275","text":"Yoshitaka Shibata"}]},"title":"Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems.","venue":"AINA Workshops","pages":"112-117","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/UchidaSSIS18","doi":"10.1109/WAINA.2018.00072","ee":"https://doi.org/10.1109/WAINA.2018.00072","url":"https://dblp.org/rec/conf/aina/UchidaSSIS18"}, "url":"URL#2512680" }, { "@score":"1", "@id":"2512681", "info":{"authors":{"author":[{"@pid":"223/6801","text":"Shivraj VL"},{"@pid":"223/6784","text":"Meena Singh Dilip Thakur"},{"@pid":"369/8721","text":"Rajan MA"}]},"title":"A Novel Multi Verifier Device Attestation Scheme for Swarm of Devices.","venue":"AINA Workshops","pages":"124-129","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/VLTM18","doi":"10.1109/WAINA.2018.00074","ee":"https://doi.org/10.1109/WAINA.2018.00074","url":"https://dblp.org/rec/conf/aina/VLTM18"}, "url":"URL#2512681" }, { "@score":"1", "@id":"2512682", "info":{"authors":{"author":[{"@pid":"36/4419","text":"Lung-Jen Wang"},{"@pid":"26/2636","text":"Wen-Shyong Hsieh"}]},"title":"Toward an Improvement of UAV-Aerial Image Using Non-linear Image Enhancement.","venue":"AINA Workshops","pages":"623-626","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/WangH18","doi":"10.1109/WAINA.2018.00156","ee":"https://doi.org/10.1109/WAINA.2018.00156","url":"https://dblp.org/rec/conf/aina/WangH18"}, "url":"URL#2512682" }, { "@score":"1", "@id":"2512685", "info":{"authors":{"author":[{"@pid":"29/8864","text":"Noriyasu Yamamoto"},{"@pid":"73/3322","text":"Noriki Uchida"}]},"title":"Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones.","venue":"AINA Workshops","pages":"199-202","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/YamamotoU18","doi":"10.1109/WAINA.2018.00087","ee":"https://doi.org/10.1109/WAINA.2018.00087","url":"https://dblp.org/rec/conf/aina/YamamotoU18"}, "url":"URL#2512685" }, { "@score":"1", "@id":"2512687", "info":{"authors":{"author":[{"@pid":"14/6978","text":"Jianhua Yang"},{"@pid":"25/93","text":"Yongzhong Zhang"}]},"title":"Using Postal Mail System to Teach Packet Switching in Computer Networks.","venue":"AINA Workshops","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/YangZ18","doi":"10.1109/WAINA.2018.00054","ee":"https://doi.org/10.1109/WAINA.2018.00054","url":"https://dblp.org/rec/conf/aina/YangZ18"}, "url":"URL#2512687" }, { "@score":"1", "@id":"2512688", "info":{"authors":{"author":[{"@pid":"14/6978","text":"Jianhua Yang"},{"@pid":"25/93","text":"Yongzhong Zhang"},{"@pid":"83/5183","text":"Robert King"},{"@pid":"223/6703","text":"Tim Tolbert"}]},"title":"Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection.","venue":"AINA Workshops","pages":"515-520","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/YangZKT18","doi":"10.1109/WAINA.2018.00137","ee":"https://doi.org/10.1109/WAINA.2018.00137","url":"https://dblp.org/rec/conf/aina/YangZKT18"}, "url":"URL#2512688" }, { "@score":"1", "@id":"2512690", "info":{"authors":{"author":[{"@pid":"209/8923","text":"Yu Yoshino"},{"@pid":"220/7940","text":"Shogo Nakasaki"},{"@pid":"29/1552","text":"Makoto Ikeda"},{"@pid":"09/6391","text":"Leonard Barolli"}]},"title":"An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs.","venue":"AINA Workshops","pages":"159-163","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/YoshinoNIB18","doi":"10.1109/WAINA.2018.00080","ee":"https://doi.org/10.1109/WAINA.2018.00080","url":"https://dblp.org/rec/conf/aina/YoshinoNIB18"}, "url":"URL#2512690" }, { "@score":"1", "@id":"2512694", "info":{"authors":{"author":[{"@pid":"68/1772","text":"Linlin Zhang"},{"@pid":"33/2872","text":"Kin Fun Li"}]},"title":"Education Analytics: Challenges and Approaches.","venue":"AINA Workshops","pages":"193-198","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ZhangL18","doi":"10.1109/WAINA.2018.00086","ee":"https://doi.org/10.1109/WAINA.2018.00086","url":"https://dblp.org/rec/conf/aina/ZhangL18"}, "url":"URL#2512694" }, { "@score":"1", "@id":"2512695", "info":{"authors":{"author":[{"@pid":"83/3714","text":"Shuo Zhang"},{"@pid":"w/StephenDWolthusen","text":"Stephen D. Wolthusen"}]},"title":"Security-Aware Network Analysis for Network Controllability.","venue":"AINA Workshops","pages":"508-514","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/aina/ZhangW18","doi":"10.1109/WAINA.2018.00136","ee":"https://doi.org/10.1109/WAINA.2018.00136","url":"https://dblp.org/rec/conf/aina/ZhangW18"}, "url":"URL#2512695" }, { "@score":"1", "@id":"2682180", "info":{"authors":{"author":[{"@pid":"09/6391","text":"Leonard Barolli"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"},{"@pid":"43/2269","text":"Tomoya Enokido"},{"@pid":"80/2337","text":"Marek R. Ogiela"},{"@pid":"14/1024","text":"Lidia Ogiela"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"32nd International Conference on Advanced Information Networking and Applications Workshops, AINA 2018 workshops, Krakow, Poland, May 16-18, 2018","venue":"AINA Workshops","publisher":"IEEE Computer Society","year":"2018","type":"Editorship","key":"conf/aina/2018w","ee":"https://ieeexplore.ieee.org/xpl/conhome/8411562/proceeding","url":"https://dblp.org/rec/conf/aina/2018w"}, "url":"URL#2682180" } ] } } } )