


default search action
28th WETICE 2019: Naples, Italy
- Sumitra Reddy:

28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2019, Naples, Italy, June 12-14, 2019. IEEE 2019, ISBN 978-1-7281-0676-2
Adaptive Computing (and Agents) for Enhanced Collaboration: ACEC 2019
- Stefania Monica, Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid:

Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2019). 1-2 - Nicola Bicocchi, Giacomo Cabri, Letizia Leonardi

, Giulio Salierno
:
A Survey of the Use of Software Agents in Digital Factories. 3-8 - Wissem Eljaoued, Nesrine Ben Yahia

, Narjès Bellamine Ben Saoud
, Chihab Hanachi:
A Hybrid Recommendation Approach for Agent Organizational Structures. 9-14 - Valentina Casola

, Alessandra De Benedictis, Umberto Villano:
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference. 14-15 - Claudia Di Napoli, Emanuela Del Grosso, Silvia Rossi

:
Robotic Entertainments as Personalizable Workflow of Services: a Home-Care Case Study. 15-20 - Carmelo Fabio Longo

, Corrado Santoro
, Federico Fausto Santoro:
Meaning Extraction in a Domotic Assistant Agent Interacting by Means of Natural Language. 21-26
Adaptive and Reconfigurable Systems and Architectures: AROSA 2019
- Stefano Musso, Guido Perboli

, Mariangela Rosano
, Alessandro Manfredi:
A Decentralized Marketplace for M2M Economy for Smart Cities. 27-30 - Marwa Mdimagh, Sami Bhiri:

Towards Automated and Fine-Grain Reuse of Configurable Business Process Models. 31-36 - Mouna Rekik

, Abderrahim Ait Wakrime
, Nasredine Cheniki, Yacine Sam:
On the Fly Reconfiguration of BPaaS Based on SaaS Services Federation and SAT Solving Techniques. 37-42 - Zakaria Afkir, Hatim Guermah, Mahmoud Nassar

, Sophie Ebersold:
Machine Learning Based Approach for Context Aware System. 43-48
Convergence of Distributed Clouds, Grids and their Management: CDCGM 2019
- Fabrizio Messina, Rao Mikkilineni, Giovanni Morana:

Track Chair's Report of CDCGM2019 - Convergence of Distributed Clouds, Grids and their Management WETICE-2019. 49-51 - Roberto Vasconcelos Melo, Douglas D. J. de Macedo:

A Cloud Immune Security Model Based on Alert Correlation and Software Defined Network. 52-57 - Mario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca

:
PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems. 58-63 - Georgia Garani

, Andrey V. Chernov
, Ilias K. Savvas
, Maria Butakova
:
A Data Warehouse Approach for Business Intelligence. 70-75 - Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino, Marit K. Natvig, Shanshan Jiang, Regina Enrich Sard

:
Evaluating Technology Innovation for E-Mobility. 76-81 - Rao Mikkilineni, Giovanni Morana:

Post-Turing Computing, Hierarchical Named Networks and a New Class of Edge Computing. 82-87 - Dorian Knoblauch, Christian Banse:

Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API. 88-92 - Enrico Russo

, Luca Verderame
, Alessio Merlo:
Towards Policy-Driven Monitoring of Fog Applications. 93-97 - Luciano Ocone, Massimiliano Rak

, Umberto Villano:
Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud. 98-103
Collaborative Modeling and Simulation: CoMetS2019
- Andrea D'Ambrogio, Gregory Zacharewicz

:
Report of Collaborative Modeling and Simulation (CoMetS) Track of WETICE 2019. 104-105 - Mamadou Lakhassane Cisse, Hanh Nhi Tran

, Samba Diaw, Bernard Coulette, Alassane Bah
:
Using Patterns to Parameterize the Execution of Collaborative Tasks. 106-111 - Saloua Bennani, Sophie Ebersold, Mahmoud El Hamlaoui

, Bernard Coulette, Mahmoud Nassar
:
A Collaborative Decision Approach for Alignment of Heterogeneous Models. 112-117 - Jalal Joseph Possik, Andrea D'Ambrogio, Gregory Zacharewicz

, Aicha Anne Amrani, Bruno Vallespir:
A BPMN/HLA-Based Methodology for Collaborative Distributed DES. 118-123
Complex Networks Monitoring, Security and Fraud Detection for Enterprises: CoNeSec 2019
- Krzysztof Juszczyszyn, Grzegorz Kolaczek

:
Complex Networks Monitoring and Security and Fraud Detection for Enterprises. 124-125 - Piotr Bienias, Grzegorz Kolaczek

, Arkadiusz Warzynski:
Architecture of Anomaly Detection Module for the Security Operations Center. 126-131 - Hassan Mokalled, Rosario Catelli

, Valentina Casola
, Daniele Debertol, Ermete Meda, Rodolfo Zunino:
The Applicability of a SIEM Solution: Requirements and Evaluation. 132-137
Data Exploration in the Web 3.0 Age: DEW 2019
- Maurizio Atzori, Barbara Pes:

DEW 2019: Data Exploration in the Web 3.0 Age. 138-139 - George Pacheco Pinto

, Cássio V. S. Prazeres:
Web of Things Data Visualization: From Devices to Web Via Fog and Cloud Computing. 140-145 - Stefanie Urchs

, Lorenz Wendlinger, Jelena Mitrovic
, Michael Granitzer:
MMoveT15: A Twitter Dataset for Extracting and Analysing Migration-Movement Data of the European Migration Crisis 2015. 146-149 - Barbara Pes:

Handling Class Imbalance in High-Dimensional Biomedical Datasets. 150-155 - Roberto Cocco, Maurizio Atzori, Carlo Zaniolo:

Machine Learning of SPARQL Templates for Question Answering Over LinkedSpending. 156-161 - Giorgia Campanile, Cecilia Di Ruberto

, Andrea Loddo
:
An Open Source Plugin for Image Analysis in Biology. 162-167
Future Internet Services and Applications: FISA 2019
- Mohamed Sellami, Hatem Hadj Kacem

, Anderson Santana de Oliveira:
Track Report of Future Internet Services and Applications (FISA'2019). 168-169 - Mouna Rhahla, Takoua Abdellatif, Rabah Attia, Wassel Berrayana:

A GDPR Controller for IoT Systems: Application to e-Health. 170-173 - Wided Mathlouthi, Chahrazed Labba, Walid Gaaloul

, Narjès Bellamine Ben Saoud
:
SoS Paradigm Benefits SaaS Integration: Novel Approach and First Results. 174-179 - Fatma Raissi, Sami Yangui, Frédéric Camps:

Autonomous Cars, 5G Mobile Networks and Smart Cities: Beyond the Hype. 180-185 - Amina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, Thomas Devogele, Walid Gaaloul:

Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries. 186-191 - Nasredine Cheniki, Marwa Boulakbech, Hamza Labbaci, Yacine Sam, Nizar Messai, Thomas Devogele:

A Linked Open Data Based Approach for Trip Recommendation. 192-195
Security, Safety and Trust Management: SSTM 2019
- Haider Abbas

, Farrukh Aslam Khan
, Kashif Kifayat
, Asif Masood, Imran Rashid, Fawad Khan
:
Security Safety and Trust Management (SSTM' 19). 196-197 - Mathias Morbitzer:

Scanclave: Verifying Application Runtime Integrity in Untrusted Environments. 198-203 - Abhinav Khare, Giovanni Merlino

, Francesco Longo
, Antonio Puliafito, Om Prakash Vyas:
Toward a Trustless Smart City: the #SmartME Experience. 204-207 - Mourad Benmalek

, Yacine Challal
, Abdelouahid Derhab:
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges. 208-213 - Farah Saleem, Naima Iltaf, Hammad Afzal, Mobeena Shahzad

:
Using Trust in Collaborative Filtering for Recommendations. 214-222
Validation of Safety-Critical Collaboration Systems: VSC 2019
- Emiliano Tramontana, Andrea Calvagna

, Andrea Fornaia:
Validation of Safety Critical Collaboration Systems (VSC) at WETICE 2019: Track Report. 223-224 - Konstantin Scherer, Tobias F. Pfeffer, Sabine Glesner:

I/O Interaction Analysis of Binary Code. 225-230 - Francesco Mercaldo, Fabio Martinelli, Antonella Santone:

Real-Time SCADA Attack Detection by Means of Formal Methods. 231-236 - Andrea Fornaia, Stefano Scafiti, Emiliano Tramontana:

JSCAN: Designing an Easy to use LLVM-Based Static Analysis Framework. 237-242 - Emiliano Tramontana, Gabriella Verga

:
Mitigating Privacy-Related Risks for Android Users. 243-248 - Antonio Borrelli, Giuseppe Antonio Di Lucca

, Vittoria Nardone, Antonella Santone:
Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique. 249-254
Semantic Technologies in Smart Information Sharing and Web Collaboration: Web2Touch 2019
- Mariagrazia Fugini, Rodrigo Bonacin

, Riccardo Martoglia, Olga Nabuco, Fatiha Saïs:
Web2Touch 2019: Semantic Technologies for Smart Information Sharing and Web Collaboration. 255-258 - Marbilia Possagnolo Sergio

, Talita de Souza Costa, Marcelo Schneck de Paula Pessôa, Paulo S. M. Pedro:
A Semantic Approach to Support the Analysis of Abstracts in a Bibliographical Review. 259-264 - Nabil Georges Badr

, Maddalena Sorrentino
, Marco de Marco, Mariagrazia Fugini
:
Improving Interaction in Integrated Chronic Care Management. 265-270 - Mariagrazia Fugini

, Jacopo Finocchi, Filippo Leccardi, Paolo Locatelli, Alfredo Lupi:
A Text Analytics Architecture for Smart Companies. 271-276 - Pasquale Ardimento

, Mario Luca Bernardi
, Marta Cimitile, Giuseppe De Ruvo
:
Mining Developer's Behavior from Web-Based IDE Logs. 277-282 - Allan Mazimwe

, Imed Hammouda, Anthony Gidudu
:
Ontology Design Patterns for Representing Knowledge in the Disaster Risk Domain. 283-288 - Luma Oliveira Lombello, Júlio Cesar dos Reis, Rodrigo Bonacin

:
Soft Ontologies as Fuzzy RDF Statements. 289-294 - Christian Esposito

, Oscar Tamburis:
An Effective Retrieval Approach for Documents Related to Past Civil Engineering Projects. 295-300 - Marcos Vinícius Macêdo Borges, Júlio Cesar dos Reis, Guilherme Pereira Gribeler:

Empirical Analysis of Semantic Metadata Extraction from Video Lecture Subtitles. 301-306 - Amira Mouakher

, Rami Belkaroui, Aurélie Bertaux, Ouassila Labbani
, Clémentine Hugol-Gential, Christophe Nicolle:
An Ontology-Based Monitoring System in Vineyards of the Burgundy Region. 307-312 - Fahad Anwar, Naima Iltaf, Hammad Afzal, Haider Abbas

:
A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata. 313-319
Enabling Technologies: Infrastructure for Collaborative Enterprises General Track
- Massimiliano Rak

:
WETICE 2019 - General Track. 320 - Luigi Sgaglione, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo

, Luigi Romano, Domenico Cotroneo, Andrea Scognamiglio:
Privacy Preserving Intrusion Detection Via Homomorphic Encryption. 321-326 - Meriem Guerar

, Luca Verderame
, Mauro Migliardi
, Alessio Merlo:
2GesturePIN: Securing PIN-Based Authentication on Smartwatches. 327-333 - Valentina Casola

, Rosario Catelli
, Alessandra De Benedictis:
A First Step Towards an ISO-Based Information Security Domain Ontology. 334-339 - Sergio Di Martino

, Luca Fiadone, Adriano Peron, Alberto Riccabone, Vincenzo Norman Vitale
:
Industrial Internet of Things: Persistence for Time Series with NoSQL Databases. 340-345 - Riccardo Di Pietro, Marco Scarpa, Antonio Puliafito:

How Much Enhancing Confidentiality and Integrity on Data Can Affect Mobile Multi-Cloud: The "ARIANNA" Experience. 346-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














