


default search action
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: Leicester, UK
- 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019. IEEE 2019, ISBN 978-1-7281-4034-6
- Georgios Chrysanidis
, Dimitrios Kosmanos, Antonios Argyriou, Leandros A. Maglaras
:
Stochastic Optimization of Electric Vehicle Charging Stations. 1-7 - Pengfei Hu, Wai Chen:
Software-Defined Edge Computing (SDEC): Principles, Open System Architecture and Challenges. 8-16 - Ahmed Osama Basil
, Mu Mu, Michael Opoku Agyeman
:
A Multi-modal Framework for Future Emergency Systems. 17-20 - Hussain Al-Aqrabi
, Anju P. Johnson
, Richard Hill
:
Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things. 21-28 - Julius Quarshie Azasoo, Triantafyllos Kanakis
, Ali Al-Sherbaz, Michael Opoku Agyeman
:
Optimal Demand Side Management in Generation Constrained Power Systems. 29-36 - Bilal Khan, Kirk Dombrowski, Alekhya Bellam, Gisela Font Sayeras, Kin Pi, Devan Crawford, Patrick Habecker, Maisha Jauernig:
Towards a Smart(er) Social Science Using High-Dimensional Continuous-Time Trajectories from the Open Dynamic Interaction Networks (ODIN) Platform. 37-44 - Nontawat Pattanajak, Hossein Malekmohamadi
:
Improving a 3-D Convolutional Neural Network Model Reinvented from VGG16 with Batch Normalization. 45-50 - Liying Li, Zhi Li, Lara Reichmann, Diane Woodbridge:
A Scalable and Reliable Model for Real-time Air Quality Prediction. 51-57 - Yuxin Wang, Bin Wu, Tongkun Xu, Yanming Shen, Feng Chen:
A Dynamic Grid-Based Algorithm for Taxi Ridesharing in Multiple Road Condition. 58-65 - Shan Ding, Hui Wang, Gang Zeng:
An Integrated Framework for Packing CAN-FD Frames and Assigning Offsets. 66-73 - Zhilong Lu, Weifeng Lv, Zhipu Xie, Bowen Du, Runhe Huang:
Leveraging Graph Neural Network with LSTM For Traffic Speed Prediction. 74-81 - Yipeng Yang
, Zhan Li, Zhaoting Li, Liu Yang, Yingxin Yan:
An Automatic Laser Scanning System for Objects with Unknown Model. 82-87 - Ranti Endeley, Tom Fleming, Nanlin Jin
, Gerhard Fehringer, Steve Cammish:
A Smart Gateway Enabling OPC UA and DDS Interoperability. 88-93 - Darpan Triboan, Liming Chen
, Feng Chen:
Fuzzy-Based Fine-Grained Human Activity Recognition within Smart Environments. 94-101 - Zoe Bartlett, Liangxiu Han
, Trung Thanh Nguyen, Princy Johnson:
Prediction of Road Traffic Flow Based on Deep Recurrent Neural Networks. 102-109 - Anastasia Keck, Miguel Romero, Robert Sandor, Diane Woodbridge, Paul Intrevado:
Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework. 110-116 - Massimo Marchiori:
Happy Cows, Happy Milk: Smart Cows and Quality Factors. 117-124 - Kangqing Yu, Wei Shi
, Nicola Santoro, Xiangyu Ma:
Real-time Outlier Detection Over Streaming Data. 125-132 - Eduardo Manuel Silva Machado, Ivan Carrillo, Miguel Collado, Liming Chen
:
Visual Attention-Based Object Detection in Cluttered Environments. 133-139 - Qing Zhang, Matthew J. A. D'Souza
, Uyen Balogh, Vanessa Smallbon:
Efficient BLE Fingerprinting through UWB Sensors for Indoor Localization. 140-143 - Erinc Merdivan, Anastasios Vafeiadis, Dimitrios Kalatzis, Sten Hanke, Joahannes Kroph, Konstantinos Votis
, Dimitrios Giakoumis
, Dimitrios Tzovaras, Liming Chen
, Raouf Hamzaoui, Matthieu Geist:
Image-Based Text Classification using 2D Convolutional Neural Networks. 144-149 - Hyunsik Ahn:
Object Handling of Cognitive Robots Using Deep Leaning Based Object Recognition. 150-153 - Nicholas Ayres, Lipika Deka
, Benjamin N. Passow:
Virtualisation as a Means for Dynamic Software Update within the Automotive E/E Architecture. 154-157 - Chao Zhang, Qi Wang, Quanzhong Zhan, Ting He, Yi An:
Autonomous System Design for Dam Surveillance Robots. 158-161 - Yan Zhang, Qingfeng Xia
, Yongyi Xu:
Multi-Robot Cooperation System Based on Wireless Network. 162-165 - Federico Cruciani, Chen Sun, Shuai Zhang, Chris D. Nugent, Chunping Li, Shaoxu Song, Cheng Cheng, Ian Cleland, Paul J. McCullagh
:
A Public Domain Dataset for Human Activity Recognition in Free-Living Conditions. 166-171 - Clara Haider, Yegor Chebotarev, Christiana Tsiourti, Markus Vincze:
Effects of Task-Dependent Robot Errors on Trust in Human-Robot Interaction: A Pilot Study. 172-177 - Ismini Psychoula
, Liming Chen
, Xuanxia Yao, Huansheng Ning
:
A Privacy Aware Architecture for IoT Enabled Systems. 178-183 - Jose Gabriel Teriús-Padrón, Ezequiel Simeoni, Rebeca I. García-Betances, Nikolaos Liappas
, Eugenio Gaeta, María Fernanda Cabrera-Umpiérrez
, María Teresa Arredondo Waldmeyer
:
Autonomus air Quality Management System Based on Web of Things Standard Architecture. 184-189 - Nikolaos Liappas
, Jose Gabriel Terius-Padron, Eduardo Machado, Mohammad Reza Loghmani, Rebeca Isabel García-Betances, Markus Vincze, Ivan Carrillo Quero, María Fernanda Cabrera-Umpiérrez
:
Best Practices on Personalization and Adaptive Interaction Techniques in the Scope of Smart Homes and Active Assisted Living. 190-195 - Wenbing Zhao, William Matcham, Conor Mclennan, Selma Koc, Reed Chen, Dylan Siegler:
Minimizing Errors in the Nursing Profession with Technology-Enhanced Education and Training. 196-201 - Rongyang Li, Shan Cui, Xuanxia Yao:
Access Control for Physical Objects in Internet of Things. 202-206 - Qingjuan Li, Huansheng Ning
, Ismini Psychoula, Liming Chen
:
Recognition of Similar Activities Based on Activity Relationship. 207-212 - Noé Pérez-Higueras, Alberto Jardón
, Ángel Rodríguez, Carlos Balaguer:
An Autonomous Navigation and Exploration System for Search and Rescue Robots in Mine Incidents. 213-218 - Efthimios Tsiogas, Ioannis Kostavelis
, Georgios Kouros
, Andreas Kargakos, Dimitrios Giakoumis
, Dimitrios Tzovaras
:
Surface Exploration with a Robot-Trailer System for Autonomous Subsurface Scanning. 219-224 - Ioannis Chatzikonstantinou
, Dimitrios Giakoumis
, Dimitrios Tzovaras
:
A New Shopfloor Orchestration Approach for Collaborative Human-Robot Device Disassembly. 225-230 - Evangelos Skartados, Ioannis Kostavelis
, Dimitrios Giakoumis
, Dimitrios Tzovaras
:
Automatic Subsurface Map Generation Based on GPR Data Processing. 231-236 - Elisabeth Menendez
, Santiago Martínez de la Casa Díaz, Marcos Marín, Carlos Balaguer:
uSLAM Implementation for Autonomous Underground Robot. 237-241 - Kevin J. Worrall, Cameron Houston, Mikulas Cebecauer, Thaleia Flessa, Euan William McGookin, Douglas G. Thomson, Patrick Harkness:
Design and Implementation of a Control System for a Tunneling Robot. 242-247 - Gábor Kiss
:
External Manipulation of Autonomous Vehicles. 248-252 - Mahmod Al-Bkree:
Man-Tracking and Sign Cutting by Surveillance UAV. 253-256 - Nitin Sukhija, Elizabeth Bautista:
Towards a Framework for Monitoring and Analyzing High Performance Computing Environments Using Kubernetes and Prometheus. 257-262 - Unai Lopez-Novoa
:
Exploring Performance and Energy Consumption Differences between Recent Intel Processors. 263-267 - Nitin Sukhija, Elizabeth Bautista, Moon Moore, John-George Sample:
Employing Blockchain Technology for Decentralized Crowdsourced Data Access and Management. 268-273 - Eda Tumer, Stefan Kuhn
:
Puffle-Pod Marine Evacuation System (POMES). 274-278 - Hamed Hamzeh
, Sofia Meacham, Kashaf Khan, Keith Phalp, Angelos Stefanidis
:
FFMRA: A Fully Fair Multi-Resource Allocation Algorithm in Cloud Environments. 279-286 - Rodion Yakoubovsky
:
IoT in effective distance learning process. 287-290 - Wen Zeng, Vasileios Germanos:
Benefit and Cost of Cloud Computing Security. 291-295 - Qi Liu, Williams Dannah, Xiaodong Liu:
Intelligent Algorithms in Home Energy Management Systems: A Survey. 296-299 - Mingxu Sun, Raphael Anaadumba
, Qi Liu, Xiaodong Liu, Yi Yang:
A Survey on Demand-Response in HEMS: Algorithm Types, Objectives and Constraints. 300-304 - Martijn Scheltema:
Embedding Private Standards in AI and Mitigating Artificial Intelligence Risks. 305-310 - David Wright:
Creating Companions for Senior Citizens with Technologies That Mimic People. 311-316 - David Wright:
AI and Information Warfare in 2025. 317-322 - Robert Bradshaw:
Ethics and Design in the Smart Bikeshare Domain. 323-328 - Jani Koskinen
, Sari Knaapi-Junnila
, Minna M. Rantanen
:
What if we Had Fair, People-Centred Data Economy Ecosystems? 329-334 - Mark Ryan, Josephina Antoniou
, Laurence D. Brooks, Tilimbe Jiya
, Kevin Macnish, Bernd Carsten Stahl:
Technofixing the Future: Ethical Side Effects of Using AI and Big Data to Meet the SDGs. 335-341 - Chiara Addis, Maria Kutar:
AI Management An Exploratory Survey of the Influence of GDPR and FAT Principles. 342-347 - Olli I. Heimo, Kai K. Kimppa, Antti Hakkala:
Automated Automobiles in Society. 348-353 - Marie Eneman:
Internet Filtering: A Solution to Harmful and Illegal Content? 354-359 - Fei Chao, Jitu Lyu, Ruiqi Wu
, Xingen Gao, Changle Zhou, Longzhi Yang
, Chih-Min Lin, Changjing Shang:
Robotic Chinese Calligraphy with Human Preference. 360-366 - Zikun Chen
, Junyu Dong:
Study of LSTM Model in Sea Surface Temperature Prediction of the Yellow Sea Cold Water Mass Area. 367-371 - Hongwei Xv, Xin Sun
, Junyu Dong, Shu Zhang, Qiong Li:
Multi-Level Similarity Learning for Low-Shot Recognition. 372-377 - Unai Lopez-Novoa
, Cyril Charron, C. John Evans, Leandro Beltrachini:
The BIDS Toolbox: A web Service to Manage Brain Imaging Datasets. 378-382 - Shuai Han, Xin Sun
, Junyu Dong, Shu Zhang, Qiong Li:
PhytoGAN: Unpaired Dead-to-Live Phytoplankton Translation. 383-388 - Tingting Chen, Junyu Dong, Lin Qi, Shu Zhang, Xiang Wang, Qilu Zhao:
Spatial-Temporal Skeleton Feature: An Unit-Level Feature for Temporal Action Proposal Generation. 389-394 - Wei Gai, Xiyu Bao
, Meng Qi, Yafang Wang, Juan Liu, Gerard de Melo, Lu Wang, Lizhen Cui, Chenglei Yang, Xiangxu Meng:
Optimization Strategies for Real-Time Rendering of Virtual Scenes on Heterogeneous Mobile Devices. 395-400 - Guo Niu, Yanchun Gu, Zhikui Duan:
Semi-Supervised Learning Based on Local Adaptive Kernels. 401-405 - Amanuel Hirpa Madessa, Junyu Dong, Xinghui Dong, Ying Gao, Hui Yu
, Israel Mugunga:
Leveraging an Instance Segmentation Method for Detection of Transparent Materials. 406-412 - Wei Gai, Meng Qi, Lu Wang, Chenglei Yang, Juan Liu, Yulong Bian, Gerard de Melo, Shijun Liu, Xiangxu Meng:
Catch the Shadow: Person Tracking Under Occlusion with a Single RGB-D Camera. 413-418 - Yeqing Chen, Yulong Bian, Chenglei Yang, Xiyu Bao
, Yafang Wang, Gerard de Melo, Juan Liu, Wei Gai, Lu Wang, Xiangxu Meng:
Leveraging Blowing as a Directly Controlled Interface. 419-424 - Chaohui Yu, Xin Qin, Yiqiang Chen, Jindong Wang
, Chenchen Fan:
DrowsyDet: A Mobile Application for Real-time Driver Drowsiness Detection. 425-432 - Geyu Tang, Xingyu Gao, Zhenyu Chen
, Yu Zhang, Huicai Zhong, Menggang Li:
Deep Neural Network Based Multiple Targets DOA Estimation for Millimeter-Wave Radar. 433-438 - Xinlong Jiang, Yunbing Xing, Yiqiang Chen, Yang Gu, Junfa Liu:
Indoor Trajectory Restoration Method Based on PoI Relation Constraints. 439-446 - Yang Gu, Yiqiang Chen, Xinlong Jiang, Jiwei Wang
, Yunlong Xiao, Tong Wu:
CoFINLo: Coarse to Fine Indoor Navigation and Localization System. 447-453 - Yunlong Xiao, Yang Gu, Jiwei Wang
, Tong Wu:
A Collaborative Multi-modality Selection Method Based on Data Utility Assessment. 454-459 - Xudong Gong
, Bo Ding, Jie Xu, Huaimin Wang, Xing Zhou, Hongda Jia:
Synchronous n-Step Method for Independent Q-Learning in Multi-Agent Deep Reinforcement Learning. 460-467 - Qianhong Hu, Zhiwen Yu
, Zhu Wang, Bin Guo
, Chao Chen:
ViHand: Gesture Recognition with Ambient Light. 468-474 - Kevin I-Kai Wang, Shiyang Wu, Ameer Ivoghlian, Zoran Salcic, Andrew Charles Mallory Austin
, Xiaokang Zhou:
LWS: A LoRaWAN Wireless Underground Sensor Network Simulator for Agriculture Applications. 475-482 - Ya Li, Jiying Li, Xinlong Jiang, Chenlong Gao, Teng Zhang:
A Driving Attention Detection Method Based on Head Pose. 483-490 - Xuejun Zhang, Qian Chen, Xiaohui Peng, Xinlong Jiang:
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing. 491-496 - Mengxia Yu, Silong Wang, Yulong Liu, Lulu Xu, Terry Tao Ye
:
Passive Embroidered Stretch Sensor Utilizing UHF RFID Antennas. 497-501 - Zhenyu Chen
, Dapeng Li, Can Cui, Yunhao Huang, Jiaqi Wang, Fangchun Di, Lixin Li, Jie Zhang, Lingxu Guo, Xingyu Gao:
A Multi-database Hybrid Storage Method for Big Data of Power Dispatching and Control. 502-507 - Cheng-Liang Wang, Xin-Tian Huang, Minhui Zou, Rahim Baig:
Study on Optimal Allocation of Inference Nodes for Distributed Inference in Smart Environment. 508-513 - Di Zhang, Yuezhi Zhou, Yaoxue Zhang:
Network-Aware Data Transmission Scheduling for Saving Energy in Cellular Networks. 514-521 - Liang Ge, Hang Li, Junling Liu, Aoli Zhou:
Traffic Speed Prediction with Missing Data Based on TGCN. 522-529 - Congcong Liu, Hengxin Chen, Mingqi Gao:
A Context-Aware Map Matching Method Based on Supported Degree. 530-535 - Liang Ge, Aoli Zhou, Hang Li, Junling Liu:
Deep Spatial-Temporal Fusion Network for Fine-Grained Air Quality Prediction. 536-543 - Lingqiu Zeng, Guangyan He, Qingwen Han, Lei Ye, Fengxi Li, Lidong Chen:
A LSTM Based Bus Arrival Time Prediction Method. 544-549 - Seng W. Loke, Majed Alwateer:
Decision-Making for Drone Services in Urban Environments: a Simulated Study on Clients' Satisfaction and Profit Maximisation. 550-557 - Wenfu Wang, Yao Yang, An Chen, Zhijie Pan:
A Scoring Method for Driving Safety Credit Using Trajectory Data. 558-565 - Wenjian Yang, Yu-e Sun, He Huang, Yang Du, Danlei Huang, Fanzhang Li, Yonglong Luo:
Persistent Transportation Traffic Volume Estimation with Differential Privacy. 566-573 - Siyang Wang, Weigang Wu, Zhi Zhou:
Varied Priority-Based Data Forwarding via NDN in VANET. 574-581 - Jing Huang, Linjiang Zheng, Jiangling Qin, Dong Xia
, Li Chen, Dihua Sun:
Short-Term Travel Time Prediction on Urban Road Networks using Massive ERI Data. 582-588 - Xudong Song, Xiaochen Fan, Xiangjian He
, Chaocan Xiang, Qianwen Ye
, Xiang Huang
, Gengfa Fang, Liming Luke Chen
, Jing Qin, Zumin Wang:
CNNLoc: Deep-Learning Based Indoor Localization with WiFi Fingerprinting. 589-595 - Fangwan Huang, Shijie Zhuang, Zhiyong Yu
:
Power Load Prediction Based On An Improved Clock-Work RNN. 596-601 - Xu Li, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Lin Qi, Liu Liu:
CurveCluster: Automated Recognition of Hard Landing Patterns Based on QAR Curve Clustering. 602-609 - Ruijie Wang, Liming Chen
, Aladdin Ayesh
, Jethro Shell
, Ivar Solheim:
Gaze-Based Assessment of Dyslexic Students' Motivation within an E-Learning Environment. 610-617 - Balz Maag, Zimu Zhou, Lothar Thiele:
Enhancing Multi-hop Sensor Calibration with Uncertainty Estimates. 618-625 - Liantao Ma, Yasha Wang
, Guangju Peng, Chaohe Zhang, Chao Chen, Junfeng Zhao, Jiangtao Wang
:
Multi-Source Data Integration-Based Urban Road GPS Environment Friendliness Estimation. 626-633 - Yuantian Zhang, Yang Cheng:
An Amplification DDoS Attack Defence Mechanism using Reinforcement Learning. 634-639 - Xingxia Ming, Hongwei Feng, Qirong Bu, Jing Zhang, Gang Yang, Tuo Zhang:
HumanFi: WiFi-Based Human Identification Using Recurrent Neural Network. 640-647 - Yuanchen Xu, Yingjie Yang, Ying He
:
A Business Process Oriented Dynamic Cyber Threat Intelligence Model. 648-653 - Jiakun Li, Kuangi Shu, Heng Zhang:
An Efficient Method for Tri-Axis Magnetometer Calibration. 654-660 - Huijuan Chang, Zhiyong Yu
, Zhiwen Yu
, Bin Guo
:
Selecting Sensing Location Leveraging Spatial and Cross-Domain Correlations. 661-666 - Sarah Fallmann, Liming Chen
, Feng Chen:
Fine-Grained Sleep-Wake Behaviour Analysis. 667-674 - Bo He, Kuangi Shu, Heng Zhang:
Diabetes Diagnosis and Treatment Research Based on Machine Learning. 675-679 - Xing Liu, Weibin Liu, Weiwei Xing:
Image Caption Generation with Local Semantic Information and Global Information. 680-685 - Ruiying Guo, Zhihan Jiang, Jingchun Huang, Jianrong Tao, Cheng Wang, Jonathan Li
, Longbiao Chen
:
BikeNet: Accurate Bike Demand Prediction Using Graph Neural Networks for Station Rebalancing. 686-693 - Xu Lian, Sarah Melancon, Jon-Ross Presta, Adam Reevesman, Brian Spiering, Diane Woodbridge:
Scalable Real-time Prediction and Analysis of San Francisco Fire Department Response Times. 694-699 - Yunting Shao, Linghong Hong, Tianqi Xie, Binbin Zhou
, Jinzhun Wu, Ming Cheng, Cheng Wang, Jonathan Li
, Longbiao Chen
:
iDrug: Pediatric Drug Interaction Modeling and Risk Evaluation Leveraging Prescription Big Data. 700-706 - Hongda Jia, Bo Ding, Huaimin Wang, Xudong Gong
, Xing Zhou:
Fast Adaptation via Meta Learning in Multi-agent Cooperative Tasks. 707-714 - Kai Yang, Wenqi Sun, Junfeng Zhao, Yasha Wang
, Bing Xie:
Supervised Nonnegative Tucker Decomposition for Computational Phenotyping. 715-722 - Alexandros Konios
, Matias Garcia-Constantino, Stavros-Richard G. Christopoulos
, Mustafa Asan Mustafa
, Idongesit Ekerete, Colin Shewell, Chris D. Nugent, Gareth Morrison:
Probabilistic Analysis of Temporal and Sequential Aspects of Activities of Daily Living for Abnormal Behaviour Detection. 723-730 - Xiaolei Qin, Yongxin Ge, Jinyuan Feng, Yida Chen, Liuwei Zhan, Xuchu Wang, Yuangan Wang:
Two-Stream Network with 3D Common-Specific Framework for RGB-D Action Recognition. 731-738 - Qilin Fan, Hao Yin, Geyong Min, Sen Wang, Yongqiang Lyu, Xu Zhang:
Content and Network Aware Replication and Scheduling Mechanism for User Generated Content Videos. 739-746 - Zhishu Shen
, Kenji Yokota, Atsushi Tagami, Teruo Higashino:
Energy-Efficient Activation/Inactivation Strategy for Long-term IoT Network Operation. 747-752 - Yiying Li, Wei Zhou, Huaimin Wang, Bo Ding, Kele Xu
:
Improving Fast Adaptation for Newcomers in Multi-Robot Reinforcement Learning System. 753-760 - Guiyu Tian, Chunhua Xiao, Weichen Liu:
Dynamic No-Fly Zone for Drones. 761-766 - Xiaoping Che, Siqi Ma, Qi Yu, Chenfeng Yue:
An Event-Based User Experience Evaluation Method for Virtual Reality Applications. 767-774 - Jinyuan Feng, Dan Yang, Yongxin Ge, Xiaolei Qin, Yida Chen, Yuangan Wang:
MSAHTA: Mixed Spatial Attention and Hierarchical Temporal Aggregation for Action Recognition. 775-782 - Chen Pan, Dianxi Shi, Naiyang Guan, Yongjun Zhang, Liujing Wang, Songchang Jin:
Learning to Track by Bi-Directional Long Short-Term Memory Networks. 783-790 - Essa Q. Shahra, Wenyan Wu
, Michele Romano:
Considerations on the Deployment of Heterogeneous IoT Devices For Smart Water Networks. 791-796 - Liqing Wan, Weiwei Xing, Shunli Zhang, Xiaoping Che:
A Fast Action Recognition Method with Cascaded Networks. 797-803 - Yi Yuan, Xiaoping Che:
Research on Road Condition Detection Based on Crowdsensing. 804-811 - Carlos Cedeño Z., Jose Cordova-Garcia, Víctor Asanza
, Ronald Ponguillo, Leonardo Muñoz M.:
k-NN-Based EMG Recognition for Gestures Communication with Limited Hardware Resources. 812-817 - Congying Yang, Zhiwen Yu
, Yimeng Liu, Liang Wang, Bin Guo
:
Dynamic Allocation for Complex Mobile Crowdsourcing Task with Internal Dependencies. 818-825 - Junyi He, Di Zhang, Yuezhi Zhou, Yaoxue Zhang:
An Online Computation Offloading Mechanism for Mobile Edge Computing in Ultra-Dense Small Cell Networks. 826-833 - Yiwen Jiang, Wei Tang, Neng Gao, Ji Xiang, Daren Zha, Xiang Li:
Your Pedometer Tells You: Attribute Inference via Daily Walking Step Count. 834-842 - Yangwei Sun, Jian Ye:
FEDet: Feature Enhancement Single Shot Detector. 843-850 - Jing Zhang, Bin Guo
, Zhimin Li, Yan Liu, Zhiwen Yu
, Qi Han:
CrowdTravel: Leveraging Cross-Modal CrowdSourced Data for Fine-Grained and Context-Based Travel Route Recommendation. 851-858 - Qiuyun Zhang, Bin Guo
, Hao Wang, Yunji Liang, Shaoyang Hao, Zhiwen Yu
:
AI-Powered Text Generation for Harmonious Human-Machine Interaction: Current State and Future Directions. 859-864 - Mei Wang, Yangyang Zhu, Shulin Liu, Chunfeng Song, Zheng Wang, Pai Wang, Xuebin Qin:
Sentiment Analysis Based on Attention Mechanisms and Bi-Directional LSTM Fusion Model. 865-868 - Jian Kang, Zhiwen Yu
, Yunji Liang, Jiayu Xie, Bin Guo
:
Characterizing Collective Knowledge Sharing Behaviors in Social Network. 869-876 - Zhiyi Zhou, Chang Liu, Xingda Yu, Cong Yang, Pengsong Duan, Yangjie Cao:
Deep-WiID: WiFi-Based Contactless Human Identification via Deep Learning. 877-884 - Xiaocui Li, Zhangbing Zhou, Jine Tang, Lei Shu:
Energy-Aware Anomaly Detection in Industrial Multi-Modal IoT Applications. 885-890 - Xin Gao, Chaohe Zhang, Liantao Ma, Yasha Wang
, Jiangtao Wang
, Daqing Zhang:
Correlating MSM's Mental Health with Usage Behaviors on MSM-Specific Social Applications. 891-898 - Junyi Gao, Weihao Tan, Liantao Ma
, Yasha Wang
, Wen Tang:
MUSEFood: Multi-Sensor-Based Food Volume Estimation on Smartphones. 899-906 - Huihui Chen, Bin Guo
, Zhiwen Yu
:
Measures to Improve Outdoor Crowdsourcing Photo Collection on Smart Phones. 907-915 - Zhi Chen
, Shuai Zhang, Sally I. McClean, Gaye Lightbody, Michael Milliken, Ian Kegel, Aygul Garifullina
:
Using Eye Tracking to Gain Insight into TV Customer Experience by Markov Modelling. 916-921 - Georgios Kapidis, Ronald Poppe
, Elsbeth A. van Dam, Lucas P. J. J. Noldus, Remco C. Veltkamp:
Egocentric Hand Track and Object-Based Human Action Recognition. 922-929 - Junfeng Zhao, Minjia Zhang, Hongji Yang:
Code Refactoring from OpenMP to MapReduce Model for Big Data Processing. 930-935 - Jiahui Shen, Ji Xiang, Nan Mu, Lei Wang:
A New Image Classification Architecture Inspired by Working Memory. 936-943 - Liang Wang, Congying Yang, Zhiwen Yu
, Yimeng Liu, Zhu Wang, Bin Guo
:
CrackSense: A CrowdSourcing Based Urban Road Crack Detection System. 944-951 - Yingwei Zhang, Yiqiang Chen, Hanchao Yu, Zeping Lv, Pan Shang, Yiyi Ouyang, Xiaodong Yang, Wang Lu:
Wearable Sensors Based Automatic Box and Block Test System. 952-959 - Federico Cruciani, Anastasios Vafeiadis, Chris D. Nugent, Ian Cleland, Paul J. McCullagh
, Konstantinos Votis
, Dimitrios Giakoumis
, Dimitrios Tzovaras
, Liming Chen
, Raouf Hamzaoui:
Comparing CNN and Human Crafted Features for Human Activity Recognition. 960-967 - Nesrine Ben Salah, Inés Bayoudh Saâdi
, Marion A. Hersh, Henda Ben Ghézala
:
Ontological Modeling of Ubiquitous Accessible Learning Context for Disabled Learners. 968-973 - Yang Yang, Zhaohong Jia, Yiwen Zhang, Kai Li:
An Improved ACO with First-job Restriction and P-ANT for Batch Scheduling Problem. 974-980 - Bowen Du, Yanan Qiao, Jiejie Zhao, Leilei Sun, Weifeng Lv, Runhe Huang:
Urban Micro-Circulation Bus Planning Based on Temporal and Spatial Travel Demand. 981-988 - Zhibo Huai, Bo Ding, Huaimin Wang, Mingyang Geng, Lei Zhang:
Towards Deep Learning on Resource-Constrained Robots: A Crowdsourcing Approach with Model Partition. 989-994 - Le Yu
, Bowen Du, Xiao Hu, Leilei Sun, Weifeng Lv, Runhe Huang:
Traffic Accident Prediction Based on Deep Spatio-Temporal Analysis. 995-1002 - Shuang Tang, Junfeng Zhao, Yasha Wang, Da Cui:
HISMA: A Human-Machine Iterative Schema Matching Algorithm. 1003-1010 - Wei Zhang, Hongbo Ni, Meijuan He, Junqi Liu, Zhu Wang, Xingshe Zhou:
IFC: Your Invisible Fitness Coach Based on CSI Sensing. 1011-1018 - Yuan Sun, Gang Yang, Xing-She Zhou:
Online Intelligent Resource Management for Power-Delay Tradeoff in Backhaul-Limited Mobile Edge Computing Systems. 1019-1024 - Yunfei Yin, Xuesong Feng:
Friend Recommendation Algorithm Based on Interest and Cognition Combined with Feedback Mechanism. 1025-1030 - Feng Wang, Yasha Wang, Jiangtao Wang
, Haoyi Xiong
, Junfeng Zhao, Daqing Zhang:
Assessing Mental Stress Based on Smartphone Sensing Data: An Empirical Study. 1031-1038 - Changsheng Ma, Jianjun Li, Peng Pan, Guohui Li, Junbo Du:
BDMF: A Biased Deep Matrix Factorization Model for Recommendation. 1039-1045 - Chen Cui, Linjiang Zheng, Dong Xia
, Li Chen, Dihua Sun:
A Carpooling Service for Private Vehicles Using Electronic Registration Identification Data. 1046-1054 - Qing Zhou, Fenglu Liao, Liang Ge, Jianglin Sun:
Personalized Preference Collaborative Filtering: Job Recommendation for Graduates. 1055-1062 - Jingjing Cao, Wenjing Yuan, Wenfeng Li, Xiaozheng E:
Dynamic Ensemble Pruning Selection using Meta-Learning for Multi-Sensor Based Activity Recognition. 1063-1068 - Neena Damodaran, Jörg Schäfer
:
Device Free Human Activity Recognition using WiFi Channel State Information. 1069-1074 - Farzana Jabeen
, Linmi Tao, Tong Lin, Shanshan Mei:
Modeling Chinese Input Interaction for Patients with Cloud Based Learning. 1075-1082 - Bing Li, Hong Zhu, Meiyi Xie:
LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations. 1083-1092 - Qiaolin Pu, Joseph Kee-Yin Ng, Kai Liu:
Projection-Induced Access Point Deployment for Fingerprint-Based Indoor Positioning. 1093-1100 - Jiong Wang, Neng Gao, Jia Peng, Jingjie Mo:
Attributed Network Embedding via a Siamese Neural Network. 1101-1108 - Hao Li, Joseph K. Ng, Kai Liu:
Handling Fingerprint Sparsity for Wi-Fi Based Indoor Localization in Complex Environments. 1109-1116 - Zhengxun Zhao, Weiqi Xu, Cong Xue, Lei Wang:
Mutual Graph Embedding in LBSN: Capturing Multi-Factor Influence for Point-of-Interest Prediction. 1117-1122 - Qianwen Zhu, Jiaxing Shang, Xinjun Cai, Linli Jiang, Feiyi Liu, Baohua Qiang:
CoxRF: Employee Turnover Prediction Based on Survival Analysis. 1123-1130 - Guanqun Sun, Ao Guo, Jianhua Ma, Jianguo Wei
:
Personal Trait Analysis Using Word2vec Based on User-Generated Text. 1131-1137 - Yuxin Zhang, Yiqiang Chen, Chenlong Gao:
An Effective Deep Learning Approach for Dialogue Emotion Recognition in Car-Hailing Platform. 1138-1145 - Weiping Zhu, Yaodong Li, Yi Xu, Xiaohui Cui:
Optimal Bandwidth Allocation for Web Crawler Systems. 1146-1153 - Xueqin Liang
, Zheng Yan
, Wenxiu Ding, Robert H. Deng
:
Game Theoretical Study on a Client-Controlled Deduplication Scheme. 1154-1161 - Chaoxiong Chen
, Yuyang Liu, Chengwu Liao, Chao Chen, Liang Feng, Zhu Wang:
Where to Build New Public Toilets? Multi-Source Urban Data Tell the Truth. 1162-1169 - Hanxue Ji, Wenge Rong, Jingshuang Liu, Yuanxin Ouyang, Zhang Xiong:
LSTM Based Semi-Supervised Attention Framework for Sentiment Analysis. 1170-1177 - Giovanni Schiboni, Juan Carlos Suarez
, Rui Zhang, Oliver Amft:
Attention-Based Adaptive Sampling for Continuous EMG Data Streams. 1178-1183 - Sandro Rodriguez Garzon
, Thomas Pöllabauer, Sebastian Zickau, Axel Küpper:
Interactive Design of Geofences for Proactive Location-Based Services in Smart Cities. 1184-1187 - Tae Yeong Hah, Sang-Lim Ju, Kyung-Seok Kim:
Enhanced Approach for Finger Vein Recognition using BLPOC. 1188-1191 - Felix Beierle, Tobias Eichinger:
Collaborating with Users in Proximity for Decentralized Mobile Recommender Systems. 1192-1197 - Samia Bachir, Laurent Gallon, Angel Abenia, Philippe Aniorté, Ernesto Exposito
:
Towards Autonomic Educational Cyber Physical Systems. 1198-1204 - Yinnan Yao, Xiunan Zheng, Kun Ma
:
ILFS: Intelligent Lost and Found System using Multidimensional Matching Model. 1205-1208 - Alexander David Fredericks
, Zhong Fan, Sandra I. Woolley
:
Visualising the Invisible: Augmented Reality and Virtual Reality as Persuasive Technologies for Energy Feedback. 1209-1212 - Rong Xie:
Exploring Mobile Phone Data for Urban Activity Analysis: Applications from Individual Activity Pattern to Group Activity Regularity. 1213-1218 - Jun Liao, Dandan Liu, Junfeng Hu, Yande Li, Aamir Khan, Li Liu, Qingyu Xiong, Junhao Wen:
Individual Risk Prediction of Gastric Cancer Using Fully Connected Neural Network with Weighted Neighborhood Feature. 1219-1224 - Dandan Liu, Jun Liao, Li Liu:
Modeling Data-Driven Liver Cancer Prediction with Medical Knowledge on Chinese Population. 1225-1230 - Xiaoping Dai, Li Yao:
A Classification Method and Implementation of Trojan and BotNet Infected User Based on Threat Matrix Model. 1231-1236 - Feifei Xu, Jia Peng, Ji Xiang, Daren Zha:
A Practical Differentially Private Support Vector Machine. 1237-1242 - Jia Peng, Xin Huang, Min Li, Jiacheng Zhang, Yifei Zhang, Neng Gao:
Differential Attribute Desensitization System for Personal Information Protection. 1243-1248 - Shuo Qiu, Zekun Dai, Daren Zha, Zheng Zhang, Yanan Liu:
PPSI: Practical Private Set Intersection Over Large-Scale Datasets. 1249-1254 - Dandan Huang, Zheng Zhang, Zhihao Tang:
Fast Algorithms on Primality Testing for Numbers 255 ⋅ 2^n ± 1. 1255-1258 - Yousef Al Tawil, Wathiq Mansoor
, Shadi Atalla, Husameldin Mukhtar
, Kamarul Faizal Bin Hashim
, Sami Miniaoui:
Performance and Endurance Training for Equine Racing (PETER). 1259-1262 - Karl Biron, Wathiq Mansoor
, Sami Miniaoui, Shadi Atalla, Husameldin Mukhtar
, Kamarul Faizal Bin Hashim
:
Data Science Tools for Crime Investigation, Archival, and Analysis. 1263-1266 - Robin Ankele, Andrew Simpson
:
Abstracting Syntactic Privacy Notions via Privacy Games. 1267-1274 - Robin Ankele, Andrew Simpson
:
Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case Study. 1275-1282 - Kok-Seng Wong
, Myung Ho Kim
:
A Privacy-Preserving Coalition Loyalty Program. 1283-1288 - Rui Ma, Haoran Gao, Bowen Dou, Xiajing Wang, Changzhen Hu:
Segmental Symbolic Execution Based on Clustering. 1289-1296 - Haider Ali
, Umair Ullah Tariq
, Lu Liu
, John Panneerselvam
, Xiaojun Zhai:
Energy Optimization of Streaming Applications in IoT on NoC Based Heterogeneous MPSoCs using Re-Timing and DVFS. 1297-1304 - Peng Wang, Chun Shan, Shanshan Mei, Ning Li:
Research on a Multi-Level Combination of Software Defect Localization Method. 1305-1311 - Toki Matsumoto, Yukikazu Nakamoto, Ryota Yamamoto, Shinya Honda, Kazutoshi Wakabayashi:
Convolution Neural Network Development Support System using Approximation Methods to Evaluate Inference Accuracy and Memory Usage in an Embedded System. 1312-1317 - Yun-Tai Chang, Marc J. Dupuis:
My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants. 1318-1325 - Yan Zhou, Chun Shan, Shiyou Sun, Shengjun Wei, Sicong Zhang:
Software Defect Prediction Model Based On KPCA-SVM. 1326-1332 - Mekhla Sharma, Jaiteg Singh
, Ankur Gupta
:
Intelligent Resource Discovery in Inter-Cloud using Blockchain. 1333-1338 - Ling Xiong, Chun Shan, Changzhen Hu, Zijun Yun, Wenjie Xiong:
A Vulnerability Detection Model for Java Systems Based on Complex Networks. 1339-1347 - Yosef Razin, Karen M. Feigh:
Toward Interactional Trust for Humans and Automation: Extending Interdependence. 1348-1355 - Mingjun Wang, Zheng Yan
, Bin Song, Mohammed Atiquzzaman
:
AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications. 1356-1362 - Kazuya Aizawa, Kenji Tei, Shinichi Honiden:
Analysis Space Reduction with State Merging for Ensuring Safety Properties of Self-Adaptive Systems. 1363-1370 - Claudio Badii, Pierfrancesco Bellini, Angelo Difino, Paolo Nesi:
Privacy and Security Aspects on a Smart City IoT Platform. 1371-1376 - Forough Goudarzi, Hamid Asgari, Hamed S. Al-Raweshidy
, Evtim Peytchev:
Joint Beacon Power and Rate Control for Vehicular Ad Hoc Networks. 1377-1383 - Andrew Yu, Sun Sunnie Chung:
Framework for Analysis and Prediction of NBA Basketball Plays: On-Ball Screens. 1384-1391 - Andrea Balogh, Deepak Mehta, Piotr Sobonski, Alieldin Mady, Satyanarayana Vuppala:
Learning Constraint-Based Model for Detecting Malicious Activities in Cyber Physical Systems. 1392-1399 - Jinjie Liu, Sun Sunnie Chung:
Automatic Feature Extraction and Selection For Machine Learning Based Intrusion Detection. 1400-1405 - Chengsheng Pan, Jinjin Shi, Li Yang, Zhixiang Kong:
Satellite Network Load Balancing Strategy for SDN/NFV Collaborative Deployment. 1406-1411 - Marc J. Dupuis, Andrew Williams:
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking. 1412-1418 - Ziyi Jia, Chensi Wu, Yuqing Zhang:
Research on the Destructive Capability Metrics of Common Network Attacks. 1419-1424 - Yulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan
, Hui Li:
A Security Formal Model for Multiple Channels Communication. 1425-1430 - Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan
, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. 1431-1436 - Marc J. Dupuis, Camelia Bejan, Matt Bishop, Scott David, Brent Lagesse:
Design Patterns for Compensating Controls for Securing Financial Sessions. 1437-1443 - Yuhang Mao, Xuejun Li, Yan Jia, Shangru Zhao, Yuqing Zhang:
Security Analysis of Smart Home Based on Life Cycle. 1444-1449 - Chensi Wu, Weiqiang Xie, Su Yang, Shangru Zhao, Huiyang Shi, Yuqing Zhang, Ziyi Jia:
Research on the Impact of Attacks on Security Characteristics. 1450-1455 - Su Yang, Chensi Wu, Yuqing Zhang, Wenjie Wang, Weiqiang Xie:
Attack-Defense Utility Quantification And Security Risk Assessment. 1456-1461 - Yibo Han, Zheng Zhang, Bo Yuan
, Haixia Bi, Mohammad Nasir Shahzad, Lu Liu
:
An Experimental Online Judge System Based on Docker Container for Learning and Teaching Assistance. 1462-1467 - Abdullah Alsalemi, Mona Ramadan, Faycal Bensaali
, Abbes Amira, Christos Sardianos
, Iraklis Varlamis, George Dimitrakopoulos:
Boosting Domestic Energy Efficiency Through Accurate Consumption Data Collection. 1468-1472 - Naif Al Mudawi, Natalia Beloff, Martin White
:
Cloud Computing in Government Organizations-Towards a New Comprehensive Model. 1473-1479 - Ayman Al-Kababji, Lisan Shidqi, Issam Boukhennoufa, Abbes Amira, Faycal Bensaali
, Mohamed Sadok Gastli, Abdulah Jarouf, Walid Aboueata, Alhusain Abdalla:
IoT-Based Fall and ECG Monitoring System: Wireless Communication System Based Firebase Realtime Database. 1480-1485 - Jianfeng Chen, Chunlin Li, Zhihong Rao, Rui Xu, Chunhui Hu:
Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods. 1486-1493 - Liangcai Fang, Chungui Ge, Guolin Zu, Xinkun Wang, Weiguo Ding, Changliang Xiao, Liang Zhao
:
A Mobile Edge Computing Architecture for Safety in Mining Industry. 1494-1498 - Yuhui Han, Dengsheng Fu, Liang Zhao
, Chen Cheng, Xinzhou Cheng, Lexi Xu
:
Research on User Behavioral Intention Based on Telecommunication Data. 1499-1504 - Riyadh A. Abbas
, Ali Al-Sherbaz, Abdeldjalil Bennecer, Phil D. Picton
:
Collision Evaluation in Low Power Wide Area Networks. 1505-1512 - Changbo Zhu, Xinzhou Cheng, Haina Ye, Jianjian Yang, Lexi Xu
, Kun Chao:
5G Wireless Networks Meet Big Data Challenges, Trends, and Applications. 1513-1516 - Yuwei Jia, Kun Chao, Xinzhou Cheng, Lexi Xu
, Xueqing Zhao, Lin Yao:
Telecom Big Data Based Precise User Classification Scheme. 1517-1520 - Lexi Xu
, Xueqing Zhao, Yanli Yu, Yuting Luan, Liang Zhao
, Xinzhou Cheng, Kun Chao, Yuwei Jia, Yuhui Han, Haina Ye:
A Comprehensive Operation and Revenue Analysis Algorithm for LTE/5G Wireless System Based on Telecom Operator Data. 1521-1524 - Kun Chao, Di Ge, Lexi Xu
, Liang Zhao
, Yuwei Jia, Xinzhou Cheng:
A Precise Pollution Prevention and Control Method Based on Telecom Operator Data. 1525-1528 - Pierfrancesco Bellini, Francesco Bugli, Paolo Nesi, Gianni Pantaleo, Michela Paolucci, Imad Zaza:
Data Flow Management and Visual Analytic for Big Data Smart City/IOT. 1529-1536 - Thomas Rauber, Gudula Rünger:
Multiprocessor Task Programming and Flexible Load Balancing for Time-Stepping Methods on Heterogeneous Cloud Infrastructures. 1537-1544 - Umair Ullah Tariq
, Haider Ali
, Lu Liu
, Xiaojun Zhai:
A Novel Meta-Heuristic for Green Computing on VFI-NoC-HMPSoCs. 1545-1552 - Jeeta Ann Chacko
, Isaías A. Comprés Ureña, Michael Gerndt:
Integration of Apache Spark with Invasive Resource Manager. 1553-1560 - Huw Lloyd:
Decentralized Parallel Any Colony Optimization for Distributed Memory Systems. 1561-1567 - Weichao Ding, Fei Luo, Chunhua Gu, Haifeng Lu:
QARPF: A QoS-Aware Active Resource Provisioning Framework Based on OpenStack. 1568-1576 - Sanna Aizad, Ashiq Anjum:
Graph Data Modelling for Genomic Variants. 1577-1584 - Weidong Li, Jing Liu, Jun Tie, Zimao Li, Jun Qin, Lu Liu
:
A Novel Relationship Extraction Scheme Based on Negative Feedback Attention. 1585-1589 - Zhu Li, Zheng Ruojun, Li Jun, Ran Lin, Yu Ya, Guo Li, Hu Tao:
Based on Super-Pixels to Simulate Water Ripples from a Single Image. 1590-1594 - Taku Noguchi
, Yosuke Komiya:
Persistent Cooperative Monitoring System of Disaster Areas Using UAV Networks. 1595-1600 - Tao Zhang, Zhongnian Li, Qi Zhu, Daoqiang Zhang:
Improved Procedures for Training Primal Wasserstein GANs. 1601-1607 - You Jiang, Zhongnian Li, Daoqiang Zhang:
Unsupervised Domain Adaptation for Multi-Center Autism Spectrum Disorder Identification. 1608-1613 - Li Yang, Peng Yang, Debin Wei, Huaifeng Shi:
The Function Extension Method for SDN Controller Based on LightGBM. 1614-1619 - Yachao Yin, Yayu Gao, Sohaib Manzoor, Xiaojun Hei:
Optimal RTS Threshold for IEEE 802.11 WLANs: Basic or RTS/CTS? 1620-1625 - Kazi Md Shahiduzzman, Junqing Peng, Yayu Gao, Xiaojun Hei, Wenqing Cheng:
Towards Accurate and Robust Fall Detection for the Elderly in a Hybrid Cloud-Edge Architecture. 1626-1631 - Yangzhe Liao, Liqing Shou, Quan Yu, Xiaojun Zhai, Qingsong Ai, Quan Liu:
A Novel Task Offloading Framework to Support Wireless Body Area Networks with MEC. 1632-1637 - Yayu Gao:
LTE-LAA and WiFi in 5G NR Unlicensed: Fairness, Optimization and Win-Win Solution. 1638-1643 - Xueyan Chen, Kehao Wang, Jihon Yu
, Lin Chen, Pan Zhou:
Energy-Efficient Base Station Deployment in Heterogeneous Communication Network. 1644-1649 - Quan Yu, Xinyi Zeng, Yangzhe Liao, Qingsong Ai:
Storage-Repair Tradeoff for Hierarchical Distributed Storage Systems. 1650-1654 - Yi Han, Yafeng Ma, Yangzhe Liao, Gabriel-Miro Muntean:
QoE Oriented Adaptive Streaming Method for 360° Virtual Reality Videos. 1655-1659 - Ed Kamya Kiyemba Edris
, Mahdi Aiash, Jonathan Loo
:
Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications. 1660-1665 - Ebenezer Okai, Xiaohua Feng, Paul Sant:
Security and Forensics Challenges to The MK Smart Project. 1666-1670 - Fang Miao, Wenhui Yang, Yan Xie, Wenjie Fan:
Consideration and Research on Data Architecture for the Future Cyber Society. 1671-1676 - Iroshan Abeykoon, Xiaohua Feng:
Challenges in ROS Forensics. 1677-1682 - Hong Qing Yu:
Extracting Reliable Health Condition and Symptom Information to Support Machine Learning. 1683-1687 - Xiaohua Feng, Edward Swarlat Dawam, Dayou Li:
Autonomous Vehicles' Forensics in Smart Cities. 1688-1694 - Xiaohua Feng, Yunzhong Feng, Junke Xu, Shu Sun, Yuping Zhao:
Computer Laws Consideration on Smart City Data Planning of Chongli 2022. 1695-1699 - Mudhafar M. Al-Jarrah, Shawq S. Al-Khafaji, Saad Ali Amin, Xiaohua Feng:
Finger-Drawn Signature Verification on Touch Devices Using Statistical Anomaly Detectors. 1700-1705 - Wangyang Yu, Lu Liu
, Yisheng An, Xiaojun Zhai:
Analyzing the Validation Flaws of Online Shopping Systems Based on Coloured Petri Nets. 1706-1710 - Bo Yuan
, Jiayan Gu, Lu Liu
:
A Privacy-Preserved Probabilistic Routing Index Model for Decentralised Online Social Networks. 1711-1716 - Mohammad Shahzad, John Panneerselvam
, Lu Liu
, Xiaojun Zhai:
Data Aggregation Challenges in Fog Computing. 1717-1721 - Leyi Xue, Han Cao, Fan Ye, Yuehua Qin:
A Method of Chinese Tourism Named Entity Recognition Based on BBLC Model. 1722-1727 - Zhiqiang Li, Chao Qi, Li Zhang, Jie Ren:
Discriminant Subspace Alignment for Cross-Project Defect Prediction. 1728-1733 - Mohamed Benouis
, Maryam Abo-Tabik, Yael Benn
, Olivia Salmon, Alex Barret-Chapman, Nicholas Costen:
Behavioural Smoking Identification via Hand-Movement Dynamics. 1734-1739 - Rubén Sánchez-Corcuera, Diego Casado-Mansilla, Cruz E. Borges
, Diego López-de-Ipiña
:
Persuade Me!: A User-Based Recommendation System Approach. 1740-1745 - Maryam Abo-Tabik, Nicholas Costen, John Darby, Yael Benn
:
Decision Tree Model of Smoking Behaviour. 1746-1753 - Apostolos Axenopoulos, Georgios Th. Papadopoulos, Dimitrios Giakoumis
, Ioannis Kostavelis
, Alexis Papadimitriou Papadimitriou, Sara Sillaurren
, Leire Bastida
, Ozgur S. Oguz
, Dirk Wollherr, Eugenio Garnica, Vasiliki Vouloutsi, Paul F. M. J. Verschure, Dimitrios Tzovaras
, Petros Daras
:
A Hybrid Human-Robot Collaborative Environment for Recycling Electrical and Electronic Equipment. 1754-1759 - Daniel Defiebre, Panagiotis Germanakos:
Towards a Human-Centered Model in SIoT -Enhancing the Interaction Behaviour of Things with Personality Traits. 1760-1767 - Anton Smerdov, Evgeny Burnaev
, Andrey Somov:
eSports Pro-Players Behavior During the Game Events: Statistical Analysis of Data Obtained Using the Smart Chair. 1768-1775 - Kieran Woodward
, David J. Brown
, Eiman Kanjo
:
AI-Powered Tangible Interfaces to Transform Children's Mental Well-Being. 1776-1782 - Nithya G. Nair, Ahmed Saeed, Md. Israfil Biswas
, Mamun I. Abu-Tair, Pushpinder Kaur Chouhan, Ian Cleland, Joseph Rafferty, Chris D. Nugent
, Philip J. Morrow, Mohammad Hossein Zoualfaghari, Zhan Cui:
Evaluation of an IoT Framework for a Workplace Wellbeing Application. 1783-1788 - Alejandro Pérez-Vereda, Juan Manuel Murillo, Carlos Canal:
Dynamically Programmable Virtual Profiles as a Service. 1789-1794 - Bojan Simoski, Michel C. A. Klein
, Eric Fernandes de Mello Araújo
, Aart Tijmen van Halteren
, Thabo van Woudenberg
, Kirsten E. Bevelander, Moniek Buijzen, Henri E. Bal:
Parameter Optimization for Deriving Bluetooth-Based Social Network Graphs. 1795-1803 - Alexander Korotin
, Nikita Khromov, Anton Stepanov, Andrey Lange, Evgeny Burnaev
, Andrey Somov:
Towards Understanding of eSports Athletes' Potentialities: The Sensing System for Data Collection and Analysis. 1804-1810 - Konstantinos Peppas
, Adamantia Chouliara, Apostolos Tsolakis
, Stelios Krinidis
, Dimitrios Tzovaras
:
Redefining Micro-Moments for Improving Energy Behaviour: The SIT4Energy Approach. 1811-1816 - Dimitris Papageorgiou, Diego Casado-Mansilla, Apostolos C. Tsolakis
, Cruz E. Borges
, Diego López-de-Ipiña
, Oihane Kamara Esteban, Rubén Sánchez-Corcuera, Ioannis Moschos, Ane Irizar-Arrieta
, Stelios Krinidis
, Angeliki Zacharaki, Jose Manuel Ávila
, Dimitrios Tzovaras
:
A Socio-Economic Survey for Understanding Self-Perceived Effectiveness of Persuasive Strategies Towards Energy Efficiency in Tertiary Buildings. 1817-1824 - Marc J. Dupuis:
Going Back for That One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy Behavior. 1825-1833 - Marc J. Dupuis, Seth Pham, Maximilian Weiß:
Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors. 1834-1840 - Marc J. Dupuis, Maximilian Weiß:
Veterans and Their Inherent Cybersecurity Preparedness: Myth or Reality? 1841-1845 - Massimo Marchiori, Enrico Bonetti Vieno, Matteo Botticchia:
The People Perspective: Categorization and Controversial Information in Wikipedia. 1846-1853 - Koldo Zabaleta, Ana Belen Lago
, Diego López-de-Ipiña
, Giuseppe Di Modica
, Raúl Santos de La Cámara, Marco Pistore
:
Combining Human and Machine Intelligence to Foster Wider Adoption of e-Services. 1854-1859 - Piyush Sharma, Adrienne Raglin:
IoT in Smart Cities: Exploring Information Theoretic and Deep Learning Models to Improve Parking Solutions. 1860-1865 - Adrienne Raglin, Anshuman Venkateswaran, Huan Liu:
Abductive Causal Reasoning for Internet of Things. 1866-1869 - Enrique Moguel, Javier Berrocal
, José García-Alonso, Daniel Flores-Martín, Jaime Galán-Jiménez, Juan Manuel Murillo:
Extensible Environment for Monitoring and Detecting Symptoms of Depression. 1870-1875 - Jing Zhou, Yajie Gu, Weiguo Lin:
Complementing Travel Itinerary Recommendation Using Location-Based Social Networks. 1876-1881 - Pramoth Pongpunpurt, Weerawat Khawsuk, Nikorn Sutthisangiam:
Development of Huffman Code for Lora Technology. 1882-1887 - Ebtesam Ahmad Alomari, Rashid Mehmood, Iyad A. Katib
:
Road Traffic Event Detection Using Twitter Data, Machine Learning, and Apache Spark. 1888-1895 - Yi Xu, Xin Di, Zhaoyu Zhang, Lei Li, Jun Tian:
Millimeter-Wave Multi-Radar System for Ubiquitous Concealed Dangerous Object Detection. 1896-1900 - Davide Scazzoli
, Giulia Bartezzaghi, Annalaura Silvestro, Maurizio Magarini, Marco Melacini, Giacomo Verticale
:
SIVEQ: An Integrated System for the Valorization of Surplus Food. 1901-1907 - Samuel J. Moore
, Chris D. Nugent
, Ian Cleland, Shuai Zhang:
Impact Analysis of Erroneous Data on IoT Reliability. 1908-1915 - Tazar Hussain
, Chris D. Nugent
, Adrian Moore, Jun Liu:
An Analysis of the Impact of Uncertainty on the Internet of Things: A Smart Home Case Study. 1916-1921 - Shuqin Wang, Jerry Zeyu Gao, Weiyi Li, Yanning Li, Kaixuan Wang, Shengqiang Lu:
Building Smart City Drone for Graffiti Detection and Clean-up. 1922-1928 - Massimo Marchiori:
Health Zone Monitoring: A Passive Approach. 1929-1936 - Ibrahim Mohammedameen, Is-Haka Mkwawa, Lingfen Sun:
Follow-me Prefetching for Video Streaming Over Mobile Edge Computing Networks. 1937-1942 - Aisha Naseer, Mona Jaber:
Swarm Wisdom for Smart Mobility - The Next Generation of Autonomous Vehicles. 1943-1949 - Diane Woodbridge, Nina Hua, Victoria Suarez, Rebecca Reilly, Philip Trinh, Paul Intrevado:
The Impact of Bike-Sharing Ridership on Air Quality: A Scalable Data Science Framework. 1950-1957 - Nan Lin, Evan Liu, Fiorella Tenorio, Xi Yang, Diane Woodbridge:
Distributed Data Analytics Framework for Cluster Analysis of Parking Violation. 1958-1963 - Cathryn Peoples, Kashif Rabbani, Mamun I. Abu-Tair, Bin Wang, Philip J. Morrow, Adrian Moore, Joseph Rafferty, Sally I. McClean, Mohammad Hossein Zoualfaghari, Parag G. Kulkarni:
A Review of IoT Service Provision to Assess the Potential for System Interoperability in an Uncertain Ecosystem. 1964-1971 - Vineet Mishra, Stephen S. Yau, Chandralekha Yenugunti:
Recovering Decentralized Critical Archival Data From Tampering in Smart City Environment Using Blockchain. 1972-1977 - Alexandros Mavromatis, Sam Gunner, Theo Tryfonas
, Dimitra Simeonidou:
Dynamic Cloud Service Management for Scalable Internet of Things Applications. 1978-1982

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.