Abstract is missing.
- cVM: Containerized Virtual MachineGong Su. 1-7 [doi]
- SenShaMart: A Trusted loT Marketplace for Sensor SharingDimitrios Georgakopoulos, Prem Prakash Jayaraman, Anas Dawod. 8-17 [doi]
- Crowdsharing Wireless Energy ServicesAbdallah Lakhdari, Amani Abusafia, Athman Bouguettaya. 18-24 [doi]
- Challenges in developing collaborative IoT systemsFlávia Coimbra Delicato, Paulo F. Pires. 25-33 [doi]
- The 10 Research Topics in the Internet of ThingsWei Emma Zhang, Quan Z. Sheng, Adnan Mahmood, Dai Hoang Tran, Munazza Zaib, Salma Abdalla Hamad, Abdulwahab Aljubairy, Ahoud Abdulrahmn F. Alhazmi, Subhash Sagar, Congbo Ma. 34-43 [doi]
- Design and Implementation of a Platform for Managing Time-Sensitive IoT ApplicationsHarindu Korala, Ali Yavari, Dimitrios Georgakopoulos, Prem Prakash Jayaraman. 44-53 [doi]
- Proactive Digital Companions in Pervasive Hypermedia EnvironmentsKimberly García, Simon Mayer, Alessandro Ricci, Andrei Ciortea. 54-59 [doi]
- Sustainability-aware Resource Provisioning in Data CentersJingzhe Wang, Balaji Palanisamy, Jinlai Xu. 60-69 [doi]
- HydraSpace: Computational Data Storage for Autonomous VehiclesRuiJun Wang, Liangkai Liu, Weisong Shi. 70-77 [doi]
- Memory Abstraction and Optimization for Distributed ExecutorsSemih Sahin, Ling Liu, Wenqi Cao, Qi Zhang, Juhyun Bae, Yanzhao Wu. 78-87 [doi]
- Discovering Localized Information for Heterogeneous Graph Node Representation LearningLin Meng, Ning Yan, Masood Mortazavi, Jiawei Zhang 0001. 88-96 [doi]
- PerfDB: A Data Management System for Fine-Grained Performance Anomaly DetectionJoshua Kimball, Rodrigo Alves Lima, Yasuhiko Kanemasa, Calton Pu. 97-106 [doi]
- ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and PermissionsAbdullah Al-Alaj, Ram Krishnan, Ravi Sandhu. 107-116 [doi]
- A Short Survey of LSTM Models for De-identification of Medical Free TextJoffrey L. Leevy, Taghi M. Khoshgoftaar. 117-124 [doi]
- PriSE: Slenderized Privacy-Preserving Surveillance as an Edge ServiceAlem Fitwi, Yu Chen 0002, Sencun Zhu. 125-134 [doi]
- Cyber Attacks on Smart Farming InfrastructureSina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi Sandhu. 135-143 [doi]
- Hcpcs2Vec: Healthcare Procedure Embeddings for Medicare Fraud PredictionJustin M. Johnson, Taghi M. Khoshgoftaar. 145-152 [doi]
- Smart Storytelling: Video and Text Risk Communication to Increase MFA AcceptabilitySanchari Das, Shrirang Mare, L. Jean Camp. 153-160 [doi]
- Assessing the provision of public-facing cybersecurity guidance for end-usersNirosha Holton, Steven Furnell. 161-168 [doi]
- Cybersecurity in Medical Private Practice: Results of a Survey in AudiologyJosiah Dykstra, Rohan Mathur, Alicia Spoor. 169-176 [doi]
- What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future ChallengesFariha Tasmin Jaigirdar, Carsten Rudolph, Gillian Oliver, David Watts, Chris Bain. 177-183 [doi]
- Invisible Security: Protecting Users with No Time to SpareJosiah Dykstra. 184-190 [doi]