


default search action
iThings/GreenCom/CPSCom/SmartData 2018: Halifax, NS, Canada
- IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE 2018, ISBN 978-1-5386-7975-3

iThings-2018: The 11th IEEE International Conference on Internet of Things
of Things IoT Systems and Applications I
- A. H. El Fawal, Ali Mansour, Mohamad Najem, Frédéric Le Roy, Denis Le Jeune:

CTMC Modeling for M2M/H2H Coexistence in a NB-IoT Adaptive eNodeB. 1-8 - Roberto Girau

, Enrico Ferrara
, Maura Pintor
, Mariella Sole, Daniele D. Giusto:
Be Right Beach: A Social IoT System for Sustainable Tourism Based on Beach Overcrowding Avoidance. 9-14
IoT Systems and Applications II
- Bilhanan Silverajan, Mert Ocak, Benjamin Nagel:

Cybersecurity Attacks and Defences for Unmanned Smart Ships. 15-20 - Tina Mirfakhraie, Giuliano Vitor, Ken Grogan:

Applicable Protocol for Updating Firmware of Automotive HVAC Electronic Control Units (ECUs) Over the Air. 21-26
IoT Systems and Applications III
- Golnar Kalantar, Arash Mohammadi, S. Nima Sadrieh:

Analyzing the Effect of Bluetooth Low Energy (BLE) with Randomized MAC Addresses in IoT Applications. 27-34 - Hamdi Amroun, Yacine Benziani, M'hamed Hamy Temkit, Mehdi Ammi:

Advanced Statistical Models for Modeling Hot Water Consumption Using a Connected Boiler. 35-42 - Jing Bi, Shoulin Yin

:
A New Graph Semi-Supervised Learning Method for Medical Image Automatic Annotation. 43-46 - Shoulin Yin

, Jing Bi:
Medical Image Annotation Based on Deep Transfer Learning. 47-49
IoT Services and Intelligence I
- Attlee M. Gamundani

, Amelia Phillips, Hippolyte N. Muyingi:
An Overview of Potential Authentication Threats and Attacks on Internet of Things(IoT): A Focus on Smart Home Applications. 50-57 - Jinyang Huang

, Bin Liu, Hongxin Jin, Zhiqiang Liu:
WiAnti: an Anti-Interference Activity Recognition System Based on WiFi CSI. 58-65 - Marco E. Pérez Hernández, Badraddin Alturki

, Stephan Reiff-Marganiec
:
FABIoT: A Flexible Agent-Based Simulation Model for IoT Environments. 66-73
IoT Services and Intelligence II
- Jason M. McGinthy, Alan J. Michaels:

Lightweight Internet of Things Encryption Using Galois Extension Field Arithmetic. 74-80 - Yiyun Zhou, Meng Han, Liyuan Liu, Yan Wang, Yi Liang, Ling Tian:

Improving IoT Services in Smart-Home Using Blockchain Smart Contract. 81-87 - Desiree I. Cendana, Neriza V. Bustillo, Thelma D. Palaoag

, Mark Anthony Marcial, Arjay E. Perreras:
Harnessing Energy Consumption in a Smarthome IoT Framework. 88-96
IoT Services and Intelligence III
- Luciano Baresi

, Mersedeh Sadeghi
, Massimo Valla:
TDeX: A Description Model for Heterogeneous Smart Devices and GUI Generation. 97-104 - Yue Xu, Pengfei Hu, Huansheng Ning

:
An Ontology-Based Domain Modeling and Device Search in Smart Home. 105-111 - Antti Kolehmainen

:
Secure Firmware Updates for IoT: A Survey. 112-117
IoT Services and Intelligence IV
- Xiong Luo, Zhijie He, Long Wang

, Weiping Wang, Huansheng Ning
, Jenq-Haur Wang, Wenbing Zhao:
An Efficient Jaya Algorithm for Resource Allocation in the Cognitive-Radio-Networks-Aided Internet of Things. 118-125 - Guohua Liu, Zhihong Ying, Liang Zhao, Xu Yuan, Zhikui Chen:

A New Deep Transfer Learning Model for Judicial Data Classification. 126-131 - Bin Lv, Weiliang Hou, Guohua Liu, Jing Gao, Xu Yuan, Peng Li, Zhikui Chen:

A Deep CFS Model for Text Clustering. 132-137
IoT Enabling Technologies
- Amit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung:

Design and Performance Evaluation of Containerized Microservices on Edge Gateway in Mobile IoT. 138-145 - Roberto Rojas-Cessa, Chuan-Kuo Wong, Zhengqi Jiang, Haard Shah, Haim Grebel, Ahmed A. Mohamed:

An Energy Packet Switch for Digital Power Grids. 146-153 - Jyoti Budakoti, Amit Singh Gaur, Chung-Horng Lung:

IoT Gateway Middleware for SDN Managed IoT. 154-161 - Zakaria Benomar

, Dario Bruneo, Salvatore Distefano, Khalid Elbaamrani
, Noureddine Idboufker, Francesco Longo
, Giovanni Merlino
, Antonio Puliafito:
Extending Openstack for Cloud-Based Networking at the Edge. 162-169
IoT Networks and Communications
- Jason M. McGinthy, Alan J. Michaels:

Semi-Coherent Transmission Security for Low Power IoT Devices. 170-177
WiP Report
- Yukikazu Nakamoto, Daichi Minami, Shota Shiba, Yoshitaka Koga, Koji Fukuoka:

A Simulation Environment of Embedded Control Systems for Multi-Core Processors (WiP Report). 178-182
Special Session on IoT Solutions for Smart Healthcare
- Mohammad Moradi

, Morteza Moradi
, Amjad Anvari-Moghaddam
:
MetaSyCar: A System for Metabolic Syndrome Control and Caring. 183-188 - Maxence Bobin, Hamdi Amroun, Mehdi Boukallel, Margarita Anastassova

, Mehdi Ammi:
Smart Cup to Monitor Stroke Patients Activities During Everyday Life. 189-195 - Bader Aldughayfiq

, Srinivas Sampalli:
A System to Lower the Risk of Dispensing Medication Errors at Pharmacies Using NFC. 196-202 - Amarjit Singh Dhillon, Shikharesh Majumdar, Marc St-Hilaire, Ali El-Haraki:

MCEP: A Mobile Device Based Complex Event Processing System for Remote Healthcare. 203-210
Special Session on Securing IoT Networks
- Luca Deri, Arianna Del Soldato:

An Architecture for Distributing and Enforcing IoT Security at the Network Edge. 211-218 - S. Rajashree

, Pritam Gajkumar Shah, S. Murali:
Security Model for Internet of Things End Devices. 219-221
Special Session on Privacy, Data Assurance, Security Solutions in IoT
- Subhadeep Sarkar

, Jean-Pierre Banâtre, Louis Rilling, Christine Morin:
Towards Enforcement of the EU GDPR: Enabling Data Erasure. 222-229
Special Session on IoT-driven energy systems (INET): Advances and Applications
- Xin Miao, Roberto Rojas-Cessa, Ahmed A. Mohamed

, Haim Grebel:
The Digital Power Networks: Energy Dissemination Through a Micro-Grid. 230-235
GreenCom-2018: The 14th IEEE International Conference on Green Computing and Communications
Energy-Efficient Networking and Communications
- Zachary W. Lamb, Dharma P. Agrawal:

Spatio-Temporal Clustering of GPS Traces for Energy-Efficiency in Vehicular Ad-Hoc Networks. 236-243 - Juvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin:

Network Energy Efficiency Through Matching and Reconfiguration. 244-250 - M. Zulfiker Ali, Jelena V. Misic, Vojislav B. Misic:

Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition. 251-256 - Wajeeha Nasar

, Abdur Rahman Maud, Hao Wang
, Hong-Ning Dia:
An Efficient Greedy Algorithm for Wide Band Spectrum Sensing in Cognitive Radio Networks. 257-262
Energy Harvesting Communications and Networks
- Huijin Cao, Jun Cai:

Context-Aware Proactive Caching for Heterogeneous Networks with Energy Harvesting: An Online Learning Approach. 263-267 - Qizhen Li, Jie Gao, Jinming Wen, Xiaohu Tang, Lian Zhao, Limin Sun:

SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. 268-273 - Ala Abu Alkheir, Hussein T. Mouftah:

RF-Energy Harvesting from Moving Vehicles: Mathematical Modeling and Selection Protocol. 274-279 - Ziru Chen, Zhao Chen, Lin X. Cai

, Yu Cheng
, Ruoting Gong:
A Stochastic Geometry Analysis of Energy Harvesting in Large Scale Wireless Networks. 280-286 - Tony Liu, Peter He:

Sum Power Minimization of Greener Communications with Energy Harvesting. 287-294
Optimization and Analysis in Green Communications I
- Jie Chen:

Network Analysis Based on 2/4G Common Coverage Research in Rural Area. 295-300 - Xiaozheng Gao, Ping Wang, Dusit Niyato, Kai Yang, Jianping An:

An Auction-Based Time Scheduling Mechanism for Backscatter-Aided RF-Powered Cognitive Radio Networks. 301-307 - Long Chen

, Ming Chi, Jie Chen, Bin Hu, Zhi-Hong Guan:
Energy Efficient Transport Protocol for Mitigating Congestion in Complex Networks. 308-312 - Abdulelah Alganas, Dongmei Zhao:

Distortion-Aware Multicasting of Multiple Description Coded Media in Wireless Mesh Networks. 313-319
Optimization and Analysis in Green Communications II
- Qi Sun, Hong-Ning Dai

, Qiu Wang, Xuran Li
, Hao Wang
:
When Friendly Jamming Meets Wireless Energy Transfer. 320-325 - Nargis Khan, Jelena V. Misic, Vojislav B. Misic:

IEEE 802.15.6-Based LTE Overlay Network with Priority Support. 326-331 - Zhi Chen, Yan Wang:

An Improved DFT Channel Estimation Algorithm. 332-335 - Etienne Victor Depasquale, Saviour Zammit, Franco Davoli

, Raffaele Bolla:
An Implementational Model of Telecommunications Networks for the Energy Analyst. 336-344 - Xuecai Bao, Hao Liang, Longzhe Han:

A Novel Node Selection Algorithm for Collaborative Beamforming in Wireless Sensor Networks. 345-349
Security and Privacy-Preserving in Green Communications
- Xiaoming Yuan, Ran Wang, Yi Zhuang, Kun Zhu, Jie Hao:

A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion Detection. 350-357 - Yandong Zheng, Rongxing Lu:

An Efficient and Privacy-Preserving $k$-NN Query Scheme for eHealthcare Data. 358-365 - Xiaopeng Yang, Hui Zhu, Rongxing Lu, Ximeng Liu, Hui Li:

Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data. 366-373
Green Technologies for 5G
- Xi Tao, Wei Song:

Efficient Task Allocation for Mobile Crowd Sensing Based on Evolutionary Computing. 374-380 - Jiequ Ji, Kun Zhu, Ran Wang, Bing Chen, Chen Dai:

Energy Efficient Caching in Backhaul-Aware Ultra-Dense Cellular Networks. 381-388 - Tingting Yang, Zhi Jiang, Jie Dong, Hailong Feng, Chengming Yang:

Multi Agents to Search and Rescue Based on Group Intelligent Algorithm and Edge Computing. 389-394 - Akilan Thangarajah, Q. M. Jonathan Wu

:
Double Encoding - Slow Decoding Image to Image CNN for Foreground Identification with Application Towards Intelligent Transportation. 395-403
Green Society Applications
- Xiaoyuan Liang, Guiling Wang

, Zhu Han:
A Low-Cost Collaborative Indoor Localization System Based on Smartphone Platform. 404-411 - Qi Liu, Hong Li, Yan Hu, Limin Sun:

A Check-In System Leveraging Face Recognition. 412-418 - Massimo Marchiori:

Bins With Eyes: Towards a More Efficient Urban Ecosystem. 419-426 - Stefan Draskovic, Rehan Ahmed, Cong Lin, Lothar Thiele:

A Case for Atmospheric Transmittance: Solar Energy Prediction in Wireless Sensor Nodes. 427-434
Green Cloud Computing
- Abdulrahman Alamer, Sultan Basudan

, Xiaodong Lin:
A Privacy-Preserving Incentive Framework for the Vehicular Cloud. 435-441 - Panagiotis Oikonomou

, Maria G. Koziri, Nikos Tziritas, Antonios N. Dadaliaris
, Thanasis Loukopoulos, Georgios I. Stamoulis, Samee U. Khan
:
Scheduling Video Transcoding Jobs in the Cloud. 442-449 - Ruitao Chen, Xianbin Wang

, Shuran Sheng:
Flexible Virtual Energy Sharing by Distributed Task Reallocation in IoT Edge Networks. 450-454 - Yiwen Lu, Ran Wang, Ping Wang, Yue Cao

, Jie Hao, Kun Zhu:
Energy-Efficient Task Scheduling for Data Centers with Unstable Renewable Energy: A Robust Optimization Approach. 455-462 - Sultan Basudan

, Abdulrahman Alamer, Xiaodong Lin, Karthik Sankaranarayanan
:
Efficient Deduplicated Reporting in Fog-Assisted Vehicular Crowdsensing. 463-469
The 2nd International Workshop on Networked Vehicles for Intelligent Transportation and Smart Grid
- Yu-Rong Xiao, Kuang-Hao Liu:

Optimal Beamforming for Enabling Self-Sustainable Secondary Tier in Heterogeneous Networks. 470-476 - Shun-Ren Yang, Yi-Syuan Shen:

Modeling Trajectory-Based I2V Message Delivery Over VANETs with Vehicle Detours. 477-482 - Chia-Peng Lee, Phone Lin

, Hsuan-Yeh Chen:
A Protocol to Protocol Switching Mechanism for Energy Saving of Power-Constrained in LTE and NB-IoT Interworking Networks. 483-489 - Cuijiao Fu, Depei Qian, Zhongzhi Luan:

Estimating Software Energy Consumption with Machine Learning Approach by Software Performance Feature. 490-496 - Abdulrahman Alshegaifi, Chun-Hsi Huang:

A Locality-Aware, Energy-Efficient Cache Design for Large-Scale Multi-Core Systems. 497-502
CPSCom-2018: The 11th IEEE International Conference on Cyber Physical and Social Computing
Service-related Computational Intelligence in Cyber Physical Systems
- Xiaolong Xu, Renhao Gu, Yuan Yuan, Kai Peng, Yadang Chen, Wanchun Dou, Alex X. Liu:

A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-II. 503-509 - Xingguang Zhao, Xing Guo, Yiwen Zhang, Wei Li:

A Parallel-Batch Multi-Objective Job Scheduling Algorithm in Edge Computing. 510-516 - Xiaolong Xu, Yuancheng Li, Yuan Yuan, Kai Peng, Wenbin Yu, Wanchun Dou, Alex X. Liu:

An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks. 517-523 - Wenda Tang, Xiang Liu, Wajid Rafique

, Wanchun Dou:
A Dynamic Resource Allocation Method for Load-Balance Scheduling Over Big Data Platforms. 524-531
Advances in Tensor Computation and Analysis for Image Processing
- Chao Huang, Shubo Qiu, Huiyuan Zhou, Xiangyue Zhou:

An Adaptive Weighted Alternating Minimization Algorithm for Color Images Reconstruction In the Field of Automation. 532-536 - Duo Qiu, Hu Zhu, Xiongjun Zhang

:
An Implementable Accelerated Alternating Direction Method of Multipliers for Low-Rank Tensor Completion. 537-541 - Hu Zhu, Lu Liu, Yusheng Guan, Jieke Zhang, Lizhen Deng, Xianfeng Mao:

Hyperspectral Image Dead Line Removal Based on Tensor Completion. 542-548 - Baojiang Sun, Qiaoqiao Kang:

Design and Application of Internet of Things Technology Based on WeChat Control. 549-553
Cyber Physical Systems and Edge Computing
- Hu Zhu, Tao Xie, Lizhen Deng, Xueqin Wang, Xianfeng Mao:

Hypergraph Matching via a Nonmonotone Newton Method. 554-560 - Xin Chen, Zhuo Li, Shenglong Xiao, Ying Chen:

Deep Square Similarity Learning for Person Re-Identification in the Edge Computing System. 561-567 - Yuzhe Zhao, Zhuo Li, Xin Chen, Ying Chen:

Mobile Crowd Sensing Service Platform for Social Security Incidents in Edge Computing. 568-574 - Baohua Huang, Sheng Liang, Dongdong Xu, Zhuohao Wan:

A Homomorphic Searching Scheme For Sensitive Data In NoSQL Database. 575-579
Machine Learning in Cyber Physical Systems
- Daji Tang, Kehua Guo, Jianhua Ma, Xiaoyan Kui:

Deep Neural Network Based Disease Discrimination Learning from Small Medical Image Training Set and User Feedback. 580-585 - Huan Wang, Yibin Chen, Bingyang Shen, Di Wu, Xiaojuan Ban:

Generative Adversarial Networks Imputation for High Rate Missing Values. 586-590 - Zhigang Chen, Hong Xiao, Rongyue Zhang, Xiucong Shi, YuBing Zhou, Jingsong Lv, Shengyun Xu:

Optimization of Dynamic Preventive Maintenance for Multicomponent Systems. 591-598 - Jingsong Lv, Shengyun Xu, Rongyue Zhang, Hong Xiao, Zhigang Chen:

Safety Analysis of Metro Turnouts Based on Fuzzy FMECA. 599-606
Networks & Communications
- Yaqin Shi, Ming Zhan, Jie Zeng:

FPGA Implementation and Power Estimation of a Memory-Reduced LTE-Advanced Turbo Decoder. 607-611 - Ishar Pratap Singh, Qiang Ye

, Srinivas Sampalli:
High-Precision Indoor Localization Based on RFID and Stepscan Floor Tiles. 612-617 - Yongyong Mei, Xingang Liu, Tao Yu, Cheng Dai, Jingren Yan:

Multi-Scale Feature Learning Based on RICA for Single Training Sample Face Recognition. 618-621 - Shengli Pan:

The Measurement Coverage for Boolean Tomography with Limited End Monitors. 622-626
Technologies & Applications I
- Massimo Marchiori:

Mind Your Step: Monitoring Pedestrian Sidewalks. 627-634 - Cheng Dai, Xingang Liu, Luhao Zhong, Tao Yu:

Video Based Action Recognition Using Spatial and Temporal Feature. 635-638 - Hong Li, Xiaosheng Yang, Yao Xia, Lujie Zheng, Jie Wang, Guoqing Yang, Pan Lv:

EB-Boost: Medium-Long Term Forecasting Method of Supplies of Shared E-Cars in Smart Scenic Spots. 639-643 - Qianyuan Liu, Chengjin Zhang, Yong Song, Bao Pang:

Real-Time Object Recognition Based on NAO Humanoid Robot. 644-650 - Weijian Cao, Yuwan Gu, Juan Huan, Yilin Qin:

A Hybrid Model of Empirical Wavelet Transform and Extreme Learning Machine for Dissolved Oxygen Forecasting. 651-656
Technologies & Applications II
- Yuwan Gu, Yaru Wang, Juan Huan, Yuqiang Sun, Weikuan Jia:

An Improved TFIDF Algorithm Based on Dual Parallel Adaptive Computing Model. 657-663 - Shuchih Ernest Chang, Chi-Yin Chang:

Application of Blockchain Technology to Smart City Service: A Case of Ridesharing. 664-671
Systems & Design
- Huifang Min, Jason Gu

, Na Duan, Chengyang Luo:
Global Stabilization of High-Order Stochastic Nonlinear Systems Disturbed by Unknown Covariance Noise and Time-Varying Delay. 672-676 - Tao Yu, Xingang Liu, Yongyong Mei, Cheng Dai, Jingren Yan:

Identification by Gait Using Convolutional Restricted Boltzmann Machine and Voting Algorithm. 677-681 - Yong Song, Changshen Xu, Xing Fang, Caihong Li, Di Wang, Simon X. Yang

:
Design and Control of an Intelligent Wheeled Robot. 682-686 - Ivana Tomic, Michael J. Breza, Greg Jackson, Laksh Bhatia, Julie A. McCann:

Design and Evaluation of Jamming Resilient Cyber-Physical Systems. 687-694 - Hong Li, Huarui Zhang, Lei Huang, Kailai Shao, Guoqing Yang, Nenggan Zheng, Xufeng Jiang:

Android Evaluation Methodology in Automotive Electronics. 695-699
Data & Services I
- Saurabh Dey, Qiang Ye

, Srinivas Sampalli:
AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing. 700-705 - Guifan Weng, Chun Yang, Jinyi Long, Shanying Chen:

An Improved Automatic Thumbnail Generation Algorithm Based on Interpolation Technique. 706-711 - Jingren Yan, Yongyong Mei, Xingang Liu, Cheng Dai, Tao Yu:

Patch-Wise Normalization for Pose-Invariant Face Recognition from Single Sample. 712-715
Data & Services II
- Ti Guan, Zheng Xu, Lin Lin, Guilin Zhang, Yujian Jia, Yawen Shi:

Maximum Incremental Load Recursive Model Based on LS-SVM Considering Accumulated Temperature Effect. 716-719 - Jie Zhang

, Hongzhi Guo, Jiajia Liu
:
Energy-Aware Task Offloading for Ultra-Dense Edge Computing. 720-727 - Dong Xia:

The Distribution of Transient Magnetic Field and Eddy Current Losses of Three-Phase Five-Legged Transformer Under DC Bias. 728-732
Data & Services III
- Deli Wang, Weijie Liu, Nenggan Zheng, Ting Zhao:

Semi-Automatic Neuron Tracing in Electron Microscope Images: Preliminary Results. 733-738 - Lei Zhao, Nenggan Zheng, Qian Ma:

Smooth 3D Trajectory Segmentation for Flying Insects. 739-745 - Fuhua Oscar Lin

, M. Ali Akber Dewan, Matthew Nguyen:
Optimizing Rescheduling Intervals Through Using Multi-Armed Bandit Algorithms. 746-753 - Ruixia Guan, Yan Qi, Yi Jiang, Nenggan Zheng:

Representation and Computation Method for Bumblebee's Abdomen Movements. 754-757
Cloud Manufacturing and Industrial IoT I
- Zhaoquan Gu, Yuexuan Wang, Xiao Lin:

Achieving Real-Time Quality of Service with Software Defined Networking. 758-765 - Yu Liu, Yaoguang Hu, Jingqian Wen, Yue Tang:

An Overview on Smart Maintenance Service Scheduling System and Theoretical Basis for Agricultural Machinery. 766-771 - Xiaorong Gong, Chao Yin, Xiaobin Li:

Dynamic Construction and Evolution Analysis of Manufacturing Service Network Supported by Machine Tools in Cloud Manufacturing Environment. 772-779 - Xuesong Jiang, Jiarong Han, Xiumei Wei, QuanJun Li:

The Complex Network Model Construction of Multi-Objective Job Shop Based on Data Information. 780-785
Cloud Manufacturing and Industrial IoT ll
- Liping Wang, Wenhui Fan:

Research of Optimal Splitting Level of Splitting Algorithm. 786-790 - Lei Ren, Sanbao Zheng, Lin Zhang:

A Blockchain Model for Industrial Internet. 791-794 - Yan Chen, Jing Lai, Xiang Wei:

A Testing Method of the Residual Information Clearance in Virtual Machine for the Cloud Operating System. 795-800 - Zhenheng Liu, Lei Ren:

A Sharing Bike Scheduling Optimization Algorithm Based on Two-Dimensional Dynamic Model and Improved Genetic Algorithm. 801-806
SmartData-2018
Smart Data 1: Smart Data Processing and Analytics
- Basim Alghabashi, Nizar Bouguila:

A Finite Multi-Dimensional Generalized Gamma Mixture Model. 807-814 - Peijiang Zhao, Koji Zettsu:

Convolution Recurrent Neural Networks for Short-Term Prediction of Atmospheric Sensing Data. 815-821 - Afees Adegoke Odebode, Qiang Ye

, Srinivas Sampalli, Saurabh Dey:
KD1: A Sampling-Based Clustering Scheme for Large Data Sets. 822-827 - Haoye Lu, Anand Srinivasan, Amiya Nayak

:
Period Detection and Future Trend Prediction Using Machine Learning Techniques. 828-833
SmartData 2: Data Science and Big Data Infrastructure for Smart Cities
- Satu Tamminen, Xiaoli Liu

, Henna Tiensuu
, Eija Ferreira, Esa Puukko, Juha Röning
:
AI Enhanced Alarm Presentation for Quality Monitoring. 834-839 - Si Saber Meriem Amina, Abdolkhalegh Bayati, Kim Khoa Nguyen, Mohamed Cheriet:

Featuring Real-Time Imbalanced Network Traffic Classification. 840-846 - Minh Le, Stephen W. Clyde:

INGRIM: A Middleware to Enable Remote Method Invocation Routing in Multiple Group Device-To-Device Networks. 847-857 - Yuan Wang, Vincent Ng:

Data Anomaly Detection with Parallelizing CDP Algorithm. 858-863
SmartData 3: Smart Data Applications I
- Iván Cabria

:
Analysis of the Symmetry Properties of Large Periodic Magnetic Systems, to Reduce the Computation Time of the Calculation of the Magnetostatic Dipolar Energy. 864-871 - Bhumika Patel, Zaheenabanu Somani, Samuel A. Ajila

, Chung-Horng Lung:
Hybrid Relabeled Model for Network Intrusion Detection. 872-877 - Mehdi Mohammadi

, Ala I. Al-Fuqaha
, Jun-Seok Oh
:
Path Planning in Support of Smart Mobility Applications Using Generative Adversarial Networks. 878-885 - Carlos Toxtli, Claudia Flores-Saviaga, M. Maurier, A. Ribot, T. Bankole, A. Entrekin, M. Cantley, S. Singh, S. Reddy, Ramana Reddy:

ExperTwin: An Alter Ego in Cyberspace for Knowledge Workers. 886-891
SmartData 4: Smart Data Applications II
- Chris Soo-Hyun Eom, Wookey Lee, Carson Kai-Sang Leung

:
STDP: Secure Privacy-Preserving Trajectory Data Publishing. 892-899 - Di Wu, Hadi Mohammed, Hao Wang

, Razak Seidu:
Smart Data Analysis for Water Quality in Catchment Area Monitoring. 900-908 - Sonal Bajaj, Waqar Haque:

Visualization and Analysis of Breast Cancer Data. 909-915 - Nunziato Cassavia, Elio Masciari

, Chiara Pulice, Domenico Saccà:
An Analysis on User Searches Effects. 916-921
The Sixth Workshop on Graph Big Databases
SmartData/GDB-5: Graph Big Database with Smart Applications I
- So-Hyun Park, Young-Ho Park:

Correlation Analysis Using Customer's Actual Data and Prediction Method of Store Preference. 922-924 - Kouki Kawabata, Yasuko Matsubara, Yasushi Sakurai:

Data Stream Analysis of Online Activities. 925-926 - Bingyang Huang, Chaokun Wang, Jun Qian:

DoOC: A Platform for Domain-Oriented Online Community System Construction. 927-930
SmartData/GDB-6: Graph Big Database with Smart Applications II
- Bunrong Leang, Rockwon Kim, Kwan-Hee Yoo:

Real-Time Transmission of Secured PLCs Sensing Data. 931-932 - Woong-Kee Loh, Young-Kuk Kim:

Robust Fault Analysis Using Sensors in Semiconductor Manufacturing Processes. 933-934 - Justin JongSu Song, Inkyo Kang, Wookey Lee, Jinho Kim, Joo-Yeon Lee:

Discussions on Subgraph Ranking for Keyworded Search. 935-936 - Yangjun Chen, Wei Shi:

On the Designing of Popular Packages. 937-944
Blockchain-2018: The 2018 IEEE International Conference on Blockchain
Blockchain - Regular and Short Papers
Smart Contract I
- Naoto Sato, Takaaki Tateishi, Shunichi Amano:

Formal Requirement Enforcement on Smart Contracts Based on Linear Dynamic Logic. 945-954 - Ardit Dika, Mariusz Nowostawski:

Security Vulnerabilities in Ethereum Smart Contracts. 955-962 - Olivia Choudhury, Nolan Rudolph, Issa Sylla, Noor Fairoza, Amar Das:

Auto-Generation of Smart Contracts from Domain-Specific Ontologies and Semantic Rules. 963-970 - Mohammad M. Jalalzai, Costas Busch:

Window Based BFT Blockchain Consensus. 971-979
Smart Contract I
- Zeinab Nehai, Pierre-Yves Piriou, Frédéric F. Daumas:

Model-Checking of Smart Contracts. 980-987 - Shuang Su, Ke Wang, Hyong S. Kim:

Smartsupply: Smart Contract Based Validation for Supply Chain Blockchain. 988-993 - Ahmad Sghaier Omar, Otman Basir

:
Identity Management in IoT Networks Using Blockchain and Smart Contracts. 994-1000 - Feng Lu, Lu Gan, Zhongli Dong, Wei Li, Hai Jin, Albert Y. Zomaya

:
A Cache Enhanced Endorser Design for Mitigating Performance Degradation in Hyperledger Fabric. 1001-1006
IoT and Blockchain I
- Gokhan Sagirlar, Barbara Carminati, Elena Ferrari, John D. Sheehan, Emanuele Ragnoli:

Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains. 1007-1016 - Sarah Asiri, Ali Miri:

A Sybil Resistant IoT Trust Model Using Blockchains. 1017-1026 - Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:

BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. 1027-1034 - Yiming Jiang, Chenxu Wang, Ye Huang, Siyu Long, Yilun Huo:

A Cross-Chain Solution to Integration of IoT Tangle for Data Access Management. 1035-1041
IoT and Blockchain II
- Ujjwal Guin, Pinchen Cui, Anthony Skjellum:

Ensuring Proof-of-Authenticity of IoT Edge Devices Using Blockchain Technology. 1042-1049 - Jea-Min Lim, Young-Pil Kim, Chuck Yoo:

Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment. 1050-1056 - James Tapsell, Raja Naeem Akram

, Konstantinos Markantonakis
:
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network. 1057-1062 - Kai Fan, Yanhui Ren, Zheng Yan

, Shangyang Wang, Hui Li, Yintang Yang:
Secure Time Synchronization Scheme in IoT Based on Blockchain. 1063-1068
Blockchain Management I
- Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:

When Can a Distributed Ledger Replace a Trusted Third Party? 1069-1077 - Sara Rouhani, Vahid Pourheidari, Ralph Deters:

Physical Access Control Management System Based on Permissioned Blockchain. 1078-1083 - Jacob Eberhardt, Stefan Tai:

ZoKrates - Scalable Privacy-Preserving Off-Chain Computations. 1084-1091 - Yuhao Dong, Woojung Kim, Raouf Boutaba:

Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust. 1092-1099 - Jiayu Zhou, Fengyi Tang, He Zhu, Ning Nan, Ziheng Zhou:

Distributed Data Vending on Blockchain. 1100-1107
Blockchain Management II
- Anthony J. Perez, Ebrima N. Ceesay:

Improving End-to-End Verifiable Voting Systems with Blockchain Technologies. 1108-1115 - Elie F. Kfoury

, David J. Khoury
:
Distributed Public Key Infrastructure and PSK Exchange Based on Blockchain Technology. 1116-1120 - Robert Norvill, Beltran Borja Fiz Pontiveros

, Radu State, Andrea J. Cullen:
IPFS for Reduction of Chain Size in Ethereum. 1121-1128 - Reza Soltani, Uyen Trang Nguyen, Aijun An

:
A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. 1129-1136
Blockchain Applications I
- Yan Huang, Jing Wu, Chengnian Long:

Drugledger: A Practical Blockchain System for Drug Traceability and Regulation. 1137-1144 - John Adler, Ryan Berryhill, Andreas G. Veneris, Zissis Poulos, Neil Veira, Anastasia Kastania:

Astraea: A Decentralized Blockchain Oracle. 1145-1152 - Kentaroh Toyoda

, Tomoaki Ohtsuki
, P. Takis Mathiopoulos
:
Multi-Class Bitcoin-Enabled Service Identification Based on Transaction History Summarization. 1153-1160 - Giovanni Di Stasi, Stefano Avallone

, Roberto Canonico
, Giorgio Ventre:
Routing Payments on the Lightning Network. 1161-1170 - Chuka Oham, Raja Jurdak

, Salil S. Kanhere
, Ali Dorri, Sanjay K. Jha
:
B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication. 1171-1180
Blockchain Applications II
- Gladstone Moises Arantes, Jose Nogueira D'Almeida, Marcio Teruo Onodera, Suzana Mesquita de Borba Maranhão Moreno, Vanessa da Rocha Santos Almeida:

Improving the Process of Lending, Monitoring and Evaluating Through Blockchain Technologies: An Application of Blockchain in the Brazilian Development Bank (BNDES). 1181-1188 - Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter:

Blockchained Post-Quantum Signatures. 1196-1203 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment. 1204-1211
Blockchain Threat and Enhancement I
- Takeshi Ogawa, Hayato Kima, Noriharu Miyaho:

Proposal of Proof-of-Lucky-Id(PoL) to Solve the Problems of PoW and PoS. 1212-1218 - Gholamreza Ramezan, Cyril Leung, Z. Jane Wang:

A Strong Adaptive, Strategic Double-Spending Attack on Blockchains. 1219-1227 - Steven Tug, Weizhi Meng

, Yu Wang:
CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection. 1228-1235 - Jordi Paillisse

, Miquel Ferriol, Eric Garcia, Hamid Latif, Carlos Piris, Albert Lopez-Bresco, Brenden Kuerbis
, Alberto Rodríguez-Natal, Vina Ermagan, Fabio Maino, Albert Cabellos:
IPchain: Securing IP Prefix Allocation and Delegation with Blockchain. 1236-1243
Blockchain Threat and Enhancement II
- Davor Frkat, Robert Annessi, Tanja Zseby:

ChainChannels: Private Botnet Communication Over Public Blockchains. 1244-1252 - Benjamin Johnson, Aron Laszka

, Jens Grossklags, Tyler Moore
:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. 1253-1262 - Scott Eisele, Aron Laszka

, Anastasia Mavridou, Abhishek Dubey
:
SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities. 1263-1272 - Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:

Rethinking Blockchain Security: Position Paper. 1273-1280 - Kei-Léo Brousmiche, Antoine Durand, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida:

Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain. 1281-1286
Blockchain on Design of Blockchain Applications - Special Session Papers
Session 1
- Shuai Wang, Xiaochun Ni, Yong Yuan, Fei-Yue Wang, Xiao Wang, Liwei Ouyang

:
A Preliminary Research of Prediction Markets Based on Blockchain Powered Smart Contracts. 1287-1293 - Ronald Chun Yu Lam, Alvin Junus

, Joseph Yiu Wing Mak, L. C. H. Lam, Peter Kai Kwong Lee:
Blockchain for Civil Engineering Practices in Smart Cities. 1294-1300 - Saulo dos Santos, Daniyal Khowaja, Muskan Vinayak, Ruppa K. Thulasiram, Parimala Thulasiraman:

A Novel Heuristics for Validating Pairwise Transactions on Cryptocurrencies. 1301-1307 - Mordechai Guri:

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets. 1308-1316
Session 2
- Kwame Opuni-Boachie Obour Agyekum

, Qi Xia, Emmanuel Boateng Sifah, Sandro Amofa
, Kingsley Nketia Acheampong, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
V-Chain: A Blockchain-Based Car Lease Platform. 1317-1325 - Sumanta Bose, Mayank Raikwar, Debdeep Mukhopadhyay, Anupam Chattopadhyay, Kwok-Yan Lam:

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS. 1326-1335 - Quinten Stokkink

, Johan Pouwelse
:
Deployment of a Blockchain-Based Self-Sovereign Identity. 1336-1342
IEEE Symposium on Recent Advances on Blockchain and Its Applications
Blockchain - Symposium Papers
Blockchain Application I
- Amir Kafshdar Goharshady, Ali Behrouz, Krishnendu Chatterjee:

Secure Credit Reporting on the Blockchain. 1343-1348 - Zhiguo Wan, Zhangshuang Guan, Xiuzhen Cheng:

PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain. 1349-1354 - Shaowei Liu, Jing Wu, Chengnian Long:

IoT Meets Blockchain: Parallel Distributed Architecture for Data Storage and Sharing. 1355-1360 - Xiaoyang Zhu, Youakim Badr

:
Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks. 1361-1366 - Elias Rohrer, Steffen Heidel, Florian Tschorsch:

Webchain: Verifiable Citations and References for the World Wide Web. 1367-1372
Blockchain Application II
- Uchi Ugobame Uchibeke, Kevin A. Schneider, Sara Hosseinzadeh Kassani

, Ralph Deters:
Blockchain Access Control Ecosystem for Big Data Security. 1373-1378 - Damiano Di Francesco Maesa

, Paolo Mori
, Laura Ricci:
Blockchain Based Access Control Services. 1379-1386 - Shweta Jain, Rahul Simha:

Blockchain for the Common Good: A Digital Currency for Citizen Philanthropy and Social Entrepreneurship. 1387-1394 - Zhangshuang Guan, Xiaobei Shao, Zhiguo Wan:

Secure Fair and Efficient Data Trading Without Third Party Using Blockchain. 1395-1401
Blockchain Application III
- George D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert:

Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics. 1402-1409 - Moein Sabounchi, Jin Wei, Rigoberto Roche':

Blockchain-Enabled Peer-to-Peer Data Trading Mechanism. 1410-1416 - Shiroq Al-Megren, Shada Alsalamah

, Lina Altoaimy, Hessah A. Alsalamah
, Leili Soltanisehat, Emad Almutairi, Alex Pentland:
Blockchain Use Cases in Digital Sectors: A Review of the Literature. 1417-1424 - Christopher Gorog, Terrance E. Boult:

Solving Global Cybersecurity Problems by Connecting Trust Using Blockchain. 1425-1432 - Marcello Cinque

, Christian Esposito
, Stefano Russo
:
Trust Management in Fog/Edge Computing by Means of Blockchain Technologies. 1433-1439
Blockchain and Bitcoin
- Yoshiaki Kawase

, Shoji Kasahara
:
A Batch-Service Queueing System with General Input and Its Application to Analysis of Mining Process for Bitcoin Blockchain. 1440-1447 - Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura, Atsushi Nakadaira, Kota Hidaka, Jay Kishigami:

Niji: Autonomous Payment Bridge Between Bitcoin and Consortium Blockchain. 1448-1455 - Chi-Ning Chou, Yu-Jing Lin, Ren Chen, Hsiu-Yao Chang, I-Ping Tu

, Shih-Wei Liao:
Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols. 1456-1462 - Emmanuelle Anceaume, Antoine Guellier, Romaric Ludinard

:
UTXOs as a Proof of Membership for Byzantine Agreement Based Cryptocurrencies. 1463-1468
Blockchain Enforcement
- Guillaume Vizier, Vincent Gramoli:

ComChain: Bridging the Gap Between Public and Consortium Blockchains. 1469-1474 - Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel:

A Quantifiable Trust Model for Blockchain-Based Identity Management. 1475-1482 - Yuki Kondo, Taku Shimosawa, Satoshi Oshima:

A Practical Screening Method for Blockchain-Based Systems. 1483-1490 - Miroslav Kis, Bobby Singh:

A Cybersecurity Case for the Adoption of Blockchain in the Financial Industry. 1491-1498 - Mathis Steichen, Beltran Fiz

, Robert Norvill, Wazen M. Shbair, Radu State:
Blockchain-Based, Decentralized Access Control for IPFS. 1499-1506
Smart Contract I
- Omnia Mahmoud

, Henning Kopp, Amr T. Abdelhamid, Frank Kargl:
Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors. 1507-1512 - Maximilian Wöhrer, Uwe Zdun:

Design Patterns for Smart Contracts in the Ethereum Ecosystem. 1513-1520 - Ke Wang, Zhizhe Zhang, Hyong S. Kim:

ReviewChain: Smart Contract Based Review System with Multi-Blockchain Gateway. 1521-1526 - Chaonian Guo, Shenglan Ma, Hao Wang

, Shuhan Cheng, Tongsen Wang:
LoC: Poverty Alleviation Loan Management System Based on Smart Contracts. 1527-1532 - Sara Rouhani, Luke Butterworth, Adam D. Simmons, Darryl G. Humphery, Ralph Deters:

MediChainTM: A Secure Decentralized Medical Data Asset Management System. 1533-1538
Smart Contract II
- Yan Zhu

, Xiaoxu Song, Shuai Yang, Yao Qin, Qiong Zhou:
Secure Smart Contract System Built on SMPC Over Blockchain. 1539-1544 - Aleksey Charapko, Ailidani Ailijiang, Murat Demirbas:

Bridging Paxos and Blockchain Consensus. 1545-1552 - Harsh Desai, Kevin Liu, Murat Kantarcioglu, Lalana Kagal:

Adjudicating Violations in Data Sharing Agreements Using Smart Contracts. 1553-1560 - Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram

, Konstantinos Markantonakis
:
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. 1561-1567
Blockchain and IoT
- Xiaoyang Zhu, Youakim Badr

:
A Survey on Blockchain-Based Identity Management Systems for the Internet of Things. 1568-1573 - Hoang Tam Vo, Ziyuan Wang

, Dileban Karunamoorthy, John Wagner, Ermyas Abebe, Mukesh K. Mohania:
Internet of Blockchains: Techniques and Challenges Ahead. 1574-1581 - Carl R. Worley, Anthony Skjellum:

Blockchain Tradeoffs and Challenges for Current and Emerging Applications: Generalization, Fragmentation, Sidechains, and Scalability. 1582-1587 - Vahid Pourheidari, Sara Rouhani, Ralph Deters:

A Case Study of Execution of Untrusted Business Process on Permissioned Blockchain. 1588-1594 - Martin Westerkamp, Friedhelm Victor

, Axel Küpper:
Blockchain-Based Supply Chain Traceability: Token Recipes Model Manufacturing Processes. 1595-1602
Blockchain Protocol Design
- Abhishek Ray

, Mario Ventresca, Hong Wan:
A Mechanism Design Approach to Blockchain Protocols. 1603-1608 - Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac:

Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations. 1609-1615 - S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:

RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology. 1616-1621 - Doriane Perard, Jérôme Lacan, Yann Bachy, Jonathan Detchart:

Erasure Code-Based Low Storage Blockchain Node. 1622-1627
Blockchain Privacy l
- Shahzaib Tahir, Muttukrishnan Rajarajan:

Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks. 1628-1633 - Xinchi He, Sarra M. Alqahtani, Rose F. Gamble:

Toward Privacy-Assured Health Insurance Claims. 1634-1641 - Kalpana Singh, Nicolas Heulot, Elyes Ben Hamida:

Towards Anonymous, Unlinkable, and Confidential Transactions in Blockchain. 1642-1649 - Darra L. Hofman

, Casey P. Shannon, Bruce McManus, Victoria L. Lemieux, Karen K. Y. Lam, Sara Assadian, Raymond T. Ng:
Building Trust & Protecting Privacy: Analyzing Evidentiary Quality in a Blockchain Proof-of-Concept for Health Research Data Consent Management. 1650-1656 - Sachiko Yoshihama, Shin Saito:

Study on Integrity and Privacy Requirements of Distributed Ledger Technologies. 1657-1664
The 1st International Workshop on Blockchain for the Internet of Things
Blockchain Privacy II
- Sherman S. M. Chow

, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao
:
Sharding Blockchain. 1665 - Fthi Arefayne Abadi, Joshua Ellul

, George Azzopardi
:
The Blockchain of Things, Beyond Bitcoin: A Systematic Review. 1666-1672 - Adrian Mizzi, Joshua Ellul

, Gordon J. Pace:
Macroprogramming the Blockchain of Things. 1673-1678 - Rahul Radhakrishnan, Bhaskar Krishnamachari:

Streaming Data Payment Protocol (SDPP) for the Internet of Things. 1679-1684 - Kwame-Lante Wright, Martin Martinez, Uday Chadha, Bhaskar Krishnamachari:

SmartEdge: A Smart Contract for Edge Computing. 1685-1690 - Ryan Cole, Liang Cheng:

Modeling the Energy Consumption of Blockchain Consensus Algorithms. 1691-1696
Poster Session
- Dragos Strugar

, Rasheed Hussain
, Manuel Mazzara
, Victor Rivera, Jooyoung Lee, Ruslan Mustafin:
On M2M Micropayments: A Case Study of Electric Autonomous Vehicles. 1697-1700 - Muskan Vinayak, Amrit Pal Singh Panesar, Saulo dos Santos, Ruppa K. Thulasiram, Parimala Thulasiraman, Srimantoorao Semischetty Appadoo:

Analyzing Financial Smart Contracts for Blockchain. 1701-1706
CIT-2018: The 18th IEEE International Conference on Computer and Information Technology
CIT-1: Image Processing
- Shuai Wang, Yingying Zhang, Wenshuang Wang, Yanqing Zhao, Shiwei Zhu:

A Novel Image Mosaic Method Based on Improved ORB and its Application in Police-UAV. 1707-1713 - Haiying Liu, Junmei Guo, Fangzhou Xu, Lixia Deng, Hui Zhang:

Gray Image Reconstruction Algorithm Based 1p Optimization for Sparse Representation. 1714-1718 - Yiwei Wei, Chunlei Wu, Xiaoliang Chu, Weishan Zhang, Leiquan Wang:

Social Image Captioning with Tags-Based Attention Model. 1719-1724 - Yousef Abu Baker, Iker Gondra:

Canny SLIC to Compute Content-Sensitive Superpixels. 1725-1732
CIT-2: Wireless Networks and Communications
- Yuxin Liu, Weidong Fang, Wuxiong Zhang, Weiwei Gao, Haiguang Chen, Yuanyuan Zhu:

ECPUB: An Energy Efficiency Evaluation Metric in Wireless Sensor Network. 1733-1738 - Antoine Bossard, Keiichi Kaneko

:
On the Torus Pairwise Disjoint-Path Routing Problem. 1739-1746 - Ahmad Abuashour, Michel Kadoch

:
Passive CH Election Avoidance Protocol and CH Routing Protocol In VANET. 1753-1758 - Wei Chen, Yuequn, Ke Wang, Weidong Fang, Wuxiong Zhang, Tao Pan:

Research on Wireless Sensor Networks Routing Algorithms for Coal Mine Mobile Sensing. 1759-1764 - Zhenpeng Pang, Wuxiong Zhang, Shenghu Wang, Jufeng Luo, Haiguang Chen:

Energy-Efficient Improvements in Mod-LEACH Protocol on Optimal Cluster Heads Selection. 1765-1769
CIT-3: Internet of Things
- Yuanyuan Bao, Wai Chen:

Automated Concept Extraction in Internet-of-Things. 1770-1776 - Iman Saeed, Mourad Elhadef

:
Performance Evaluation of an IoV-Based Intersection Traffic Control Approach. 1777-1784 - Ernando Batista

, Gustavo B. Figueiredo, Maycon L. M. Peixoto
, Martin Serrano, Cássio V. S. Prazeres:
Load Balancing in the Fog of Things Platforms Through Software-Defined Networking. 1785-1791
CIT-4: Security, Privacy, and Trust
- Fangming Bi, Xuzhi Miao, Wei Chen, Weidong Fang, Wuxiong Zhang, Deyu Wang:

An Overview on the Applications and Security Issues of Fog Computing. 1792-1797 - Junlin Chen, Uyen Trang Nguyen:

A Robust Protocol for Circumventing Censoring Firewalls. 1798-1805 - Nan Zhou, Weidong Fang, Wuxiong Zhang, Xiaoxiao Lv, Jifeng Huang:

A Novel Trust Management Scheme for Defending Against On-Off Attack Based on Gaussian Distribution. 1806-1811
CIT-5: Pattern Recognition
- Huiyuan Zhou, Shubo Qiu, Haiying Liu, Chao Huang:

License Plate Recognition Based On Adaptive Threshold. 1812-1816 - Xiaoxuan Hu, Kagome Naya, Peng Li, Toshiaki Miyazaki, Kun Wang, Yanfei Sun:

Non-Invasive Sleeping Posture Recognition and Body Movement Detection Based on RFID. 1817-1820 - Yang Li, Yuanyuan Bao, Wai Chen:

Domain Adaptation Transduction: An Algorithm for Autonomous Training with Applications to Activity Recognition Using Wearable Devices. 1821-1828 - Weishan Zhang, Haoyun Sun, Jiehan Zhou, Xin Liu, Zhanmin Zhang, Guizhi Min:

DCNN Based Real-Time Adaptive Ship License Plate Recognition (DRASLPR). 1829-1834
CIT-6: Machine Learning
- Haifeng Jing, Yafei Zhang, Jiehan Zhou, Weishan Zhang, Xin Liu, Guizhi Min, Zhanmin Zhang:

LSTM-Based Service Migration for Pervasive Cloud Computing. 1835-1840 - Fahd M. Aldosari, Sami Bourouis

, Nizar Bouguila, Hassen Sallay
, Khalid M. Jamil Khayyat:
Infinite Scaled Dirichlet Mixture Models for Spam Filtering via Bayesian and Variational Bayes Learning. 1841-1847 - Weijia Lu

, Jie Shuai, Shuyan Gu, Joel Xue:
Method to Annotate Arrhythmias by Deep Network. 1848-1851
CIT-7: Software
- Karine Valença, Edna Dias Canedo

, Rejane Maria da Costa Figueiredo
:
Construction of a Software Measurement Tool Using Systematic Literature Review. 1852-1859 - Ritu Chaturvedi, Veerpal Brar, Jai Geelal, Kelvin Kong:

Concept Extraction: A Modular Approach to Extraction of Source Code Concepts. 1860-1866 - Junmei Guo, Haiying Liu, Yizhong Luan, Yun Wu:

Application of Birth Defect Prediction Model Based on C5.0 Decision Tree Algorithm. 1867-1871 - Hyosung Park, Chulwoo Park, Sangbong Yoo, Kichang Kim:

Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call Graph. 1872-1879
CIT-8: Systems
- Waqar Haque, Adam Vezina, Matthew Fontaine:

Topological Response to Deadlock Detection and Resolution in Real-Time Database Systems. 1880-1887 - Xin Lyu, Juan Chen, Tao Zeng, Chenglong Li:

A Collaborative Location Querying Method Based on Caching Information. 1888-1893 - Tsuyoshi Tanaka, Hiroshi Ishikawa:

Evaluation on Applicability of Measurement-Based Join Cost Calculation Method Using Different Generation CPUs. 1894-1901 - Jin Zhao, Jifeng Huang, Guoqing Jia, Xiaohong Ji, Lianhai Shan:

Non-Contact Method of Heart Rate Using a Webcam. 1902-1906
CIT-9: Future Networks and Communications
- Mostafa Mouawad, Zbigniew Dziong, Muhammad Khan:

Quality of Service Aware Dynamic BBU-RRH Mapping Based on Load Prediction Using Markov Model in C-RAN. 1907-1912 - Paulo Sena, Igor Carvalho, Antônio Abelém

:
Content Placement Aware Cache Decision: A Caching Policy Based on the Content Replacement Ratio for Information-Centric Network. 1913-1920 - Seth D. Hitefield, Michael C. Fowler, T. Charles Clancy:

Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios. 1921-1927
CIT-10: Industry 4.0 and Blockchain
- Jiangning Chen, Jiehan Zhou:

Revisiting Industry 4.0 with a Case Study. 1928-1932 - Quan Qi, Qingde Li:

Thin Implicit Utah Teapot: Design for Additive Manufacturing. 1933-1940 - Shuchih Ernest Chang, Siao Yin He:

Exploring Blockchain Technology for Capital Markets: A Case of Angel Fund. 1941-1948

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














