Abstract is missing.
- Message from the SCA 2018 Workshop OrganizersWilliam Cheng-Chung Chu, Chih-Hung Chang. 1 [doi]
- Smart Applications in Heat and Power SystemsEugene Voloshin, Valeri Chipulis, Roman Kuznetsov. 2-7 [doi]
- A Design of IoT-Based Searching System for Displaying Victim's Presence AreaM. Rosyidi, Ratih H. Puspita, Shigeru Kashihara, Doudou Fall, Kazushi Ikeda. 8-13 [doi]
- A Feature Envy Detection Method Based on Dataflow AnalysisWoei-kae Chen, Chien-Hung Liu, Bo-Hong Li. 14-19 [doi]
- How Agile Impacts a Software Corporation: An Empirical StudyHwai-jung Hsu, Yves Lin. 20-25 [doi]
- Time-Aware Recommendation Based on User Preference DrivenThitiporn Neammanee, Saranya Maneeroj. 26-31 [doi]
- Smart Block: A Visual Programming Environment for SmartThingsNayeon Bak, Byeong-Mo Chang, Kwanghoon Choi 0001. 32-37 [doi]
- Improving the Smartness of Cloud Management via Machine Learning Based Workload PredictionYongjia Yu, Vasu Jindal, Farokh B. Bastani, Fang Li, I-Ling Yen. 38-44 [doi]
- A New Way of Being Smart? Creative Computing and Its Applications in TourismLu Zhang, Hongji Yang, Chi Zhang, Nao Li. 45-50 [doi]
- A Wisdom Search EngineHongji Yang, Lin Zou, Qinyun Liu, Sicong Ma. 51-56 [doi]
- Successive POI Recommendation with Category Transition and Temporal InfluenceI-Cheng Lin, Yi-Shu Lu, Wen-Yueh Shih, Jiun-Long Huang. 57-62 [doi]
- Indoor Augmented Reality Using Deep Learning for Industry 4.0 Smart FactoriesHanas Subakti, Jehn-Ruey Jiang. 63-68 [doi]
- NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling Android ApplicationsChien-Hung Liu, Woei-kae Chen, Shu-Hang Ho. 69-74 [doi]
- Test Command Auto-Wait Mechanisms for Record and Playback-Style Web Application TestingShin-Jie Lee, Yu-Xian Chen, Shang-Pin Ma, Wen-Tin Lee. 75-80 [doi]
- Using Service Dependency Graph to Analyze and Test MicroservicesShang-Pin Ma, Chen-Yuan Fan, Yen Chuang, Wen-Tin Lee, Shin-Jie Lee, Nien-Lin Hsueh. 81-86 [doi]
- The Implementation of a Data-Accessing Platform Built from Big Data Warehouse of Electric LoadsSheng-Cang Chou, Chao-Tung Yang, Fuu-Cheng Jiang, Chih-Hung Chang. 87-92 [doi]
- The Integration of Shared Storages with the CephFS and Rados Gateway for Big Data AccessingJia-Yow Weng, Chao-Tung Yang, Chih-Hung Chang. 93-98 [doi]
- The Learning Effectiveness Analysis of JAVA Programming with Automatic Grading SystemChorng-Shiuh Koong, Hsin-Ying Tsai, Yi-Yang Hsu, Yeh-Cheng Chen. 99-104 [doi]
- Message from the AMIL 2018 Workshop OrganizersSan Murugesan, Takahira Yamaguchi. 105 [doi]
- Review of Small Data Learning MethodsXiali Li, Songting Deng, Song Wang, Zhengyu Lv, Licheng Wu. 106-109 [doi]
- A Deep Learning Approach for Estimating Inventory Rebalancing Demand in Bicycle Sharing SystemsPetar Mrazovic, Josep-Lluís Larriba-Pey, Mihhail Matskin. 110-115 [doi]
- On Learning Fuel Consumption Prediction in Vehicle ClustersVictor Parque, Tomoyuki Miyashita. 116-121 [doi]
- An Approach to Proposing New Business Models Basing on Association Rule Learning, BP Neural Network and Creative ComputingQinyun Liu, Lin Zou, Hua Zhou, Hongji Yang. 122-125 [doi]
- Mining Sequential Patterns to Explore Users' Learning Behavior in a Visual Programming AppWen-Chung Shih. 126-129 [doi]
- Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine LearningMichael Benedict L. Virtucio, Jeffrey A. Aborot, John Kevin C. Abonita, Roxanne S. Aviñante, Rother Jay B. Copino, Michelle P. Neverida, Vanesa O. Osiana, Elmer C. Peramo, Joanna G. Syjuco, Glenn Brian A. Tan. 130-135 [doi]
- Prediction Method of Blasting Vibration by Optimized GEP Based on SparkYunlan Wang, Bin Zhang, Tianhai Zhao, Zhengxiong Hou, Xiangyu Wu, Hussain Khanzada Muzammil. 136-140 [doi]
- Empirical Evaluation of Idle-Time Analysis Driven Improved Decision Making by Always-On AgentsSravyasri Garapati, Kamalakar Karlapalem. 141-146 [doi]
- Practice of Multi-robot Teahouse Based on PRINTEPS and Evaluation of Service QualityTakeshi Morita 0001, Naho Kashiwagi, Ayanori Yorozu, Michael Walch, Hideo Suzuki, Dimitris Karagiannis, Takahira Yamaguchi. 147-152 [doi]
- Transfer Learning Method for Very Deep CNN for Text Classification and Methods for its EvaluationShun Moriya, Chihiro Shibata. 153-158 [doi]
- Understanding Mindsets Across Markets, Internationally: A Public-Private Innovation Project for Developing a Tourist Data Analytic PlatformKristoffer Jon Albers, Mikkel N. Schmidt, Morten Mørup, Marisciel Litong-Palima, Rasmus Bonnevie, Fumiko Kano Glückstad. 159-164 [doi]
- Modified Memetic Self-Adaptive Firefly Algorithm for 2D Fractal Image ReconstructionAkemi Gálvez, Andrés Iglesias 0001. 165-170 [doi]
- Approximation of Time-Consuming Simulation Based on Generative Adversarial NetworkRyohei Orihara, Ryota Narasaki, Yuma Yoshinaga, Yasuhiro Morioka, Yoshiyuki Kokojima. 171-176 [doi]
- Model-Space Regularization and Fully Interpretable Algorithms for Postural Control QuantificationAlice Nicolaï, Julien Audiffren. 177-182 [doi]
- Generation of Character Illustrations from Stick Figures Using a Modification of Generative Adversarial NetworkYuuya Fukumoto, Daiki Shimizu, Chihiro Shibata. 183-186 [doi]
- NDFMF: An Author Name Disambiguation Algorithm Based on the Fusion of Multiple FeaturesXiaolong Xu, Yongping Li, Mark Liptrott, Nik Bessis. 187-190 [doi]
- Message from the ADMNET 2018 Workshop OrganizersTakashi Yamanoue, Hiroki Kashiwazaki, Yong Jin, Ruediger Gad. 191-192 [doi]
- Development and Evaluation of the MEC Platform Supporting the Edge Instance MobilityTohru Kondo, Keita Isawaki, Kaori Maeda. 193-198 [doi]
- Towards Effective Generation of Synthetic Memory References Via Markovian ModelsAlfredo Cuzzocrea, Enzo Mumolo, Marwan Hassani, Giorgio Mario Grasso. 199-203 [doi]
- Throughput Improvement of MPTCP by Selective Bicasting with Cross-Layer Control in Wireless EnvironmentMasami Fukuyama, Nariyoshi Yamai, Satoshi Ohzahata, Naoya Kitagawa. 204-209 [doi]
- System Resource Management to Control the Risk of Data-Loss in a Cloud-Based Disaster RecoveryYuichi Taguchi, Tsutomu Yoshinaga. 210-215 [doi]
- A Load-Balanced Approach to Time Efficient Resource Scheduling in SDN-Enabled Data CenterHuaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen. 216-221 [doi]
- On the Confirmation Method of the User's Record of the GakuNinMoodleNobukuni Hamamoto, Shigetoshi Yokoyama, Hiroshi Ueda. 222-227 [doi]
- Large-Scale Certificate Management on Multi-Tenant Web ServersRyosuke Matsumoto, Kenji Rikitake, Kentaro Kuribayashi. 228-233 [doi]
- Security Requirement Modeling Support System Using Software Security Knowledge BaseAtsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka. 234-239 [doi]
- Message from the CDS 2018 Workshop OrganizersRyozo Kiyohara, Yasuo Okabe, Atsushi Tagami. 240 [doi]
- Community Energy Management System To Encourage Power Saving CompetitionTakahiro Fujiwara, Toshihiko Tanaka, Kai Takashima, Shigeo Kaneda. 241-246 [doi]
- Development of Bicycle Simulator with Tilt Angle Control Tilt AngleTetsuji Yamaguchi, Akira Yamada, Takeshi Fujiwara, Ryoichi Takahashi, Tetsuya Shimada, Yuki Ishida, Koichiro Ueda, Shigeo Kaneda. 247-252 [doi]
- Interaction with Platform Games Using Smartwatches and Continuous Gesture Recognition: A Case StudyThamer Horbylon Nascimento, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Hugo Alexandre Dantas do Nascimento, Rogério Lopes Salvini, Mateus Machado Luna, Cristhiane Gonçalves, Eduardo Faria de Souza. 253-258 [doi]
- Information Harvesting Method by an Energy Harvesting Device with Multiple MicrocontrollersTadanobu Tsunoda, Kazuaki Nimura. 259-265 [doi]
- Adapted Decision Support Service Based on the Prediction of Offline Consumers' Real-Time Intention and Devices InteractionsFanjuan Shi, Chirine Ghedira Guegan. 266-271 [doi]
- Text Entry on Smartwatches: A Systematic Review of LiteratureMateus Machado Luna, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Hugo Alexandre Dantas do Nascimento, Joyce Siqueira, Eduardo Faria de Souza, Thamer Horbylon Nascimento, Ronaldo Martins da Costa. 272-277 [doi]
- The Use of System Development Methodologies in the Development of Mobile Applications: Are they Worthy of Use?Wilfred C. Okonkwo, Magda Huisman. 278-283 [doi]
- Situation Based Energy Management Framework on Mobile DevicesChen-Yeou Yu, Richard O. Oyeleke, Carl K. Chang. 284-289 [doi]
- Application on Intersection Classification Algorithm Based on Clustering AnalysisDong Chen, Hao Wang. 290-297 [doi]
- Using Interactive E-Books in Elementary School Origami Activities: Analysis of Learning Effect, Learning Motivation, and Cognitive LoadWen-Jung Chu, Hong-Ren Chen. 298-303 [doi]
- Process Modeling, Behavior Analytics and Group Performance Assessment of e-Learning Logs Via Fuzzy Miner AlgorithmWichian Premchaiswadi, Parham Porouhan, Nucharee Premchaiswadi. 304-309 [doi]
- Who are Interested in Open Education? An Analysis of the Participants in the First MOOC of the IEEE Education SocietyRosa Cabedo Gallén, Edmundo Tovar, Sergio Martín, Martín Llamas, Manuel Caeiro, Oscar Martínez Bonastre, Rebecca Strachan, Manuel Castro, Sorel Reisman. 310-314 [doi]
- Message from the ESAS 2018 Workshop OrganizersAtilla Elçi, Duygu Çelik Ertugrul. 315-316 [doi]
- Situ-Centric Reinforcement Learning for Recommendation of Tasks in Activities of Daily Living In Smart HomesRichard O. Oyeleke, Chen-Yeou Yu, Carl K. Chang. 317-322 [doi]
- Development of a Performance Visualization Model of Basic Life Support Training with Feedback Devices for Mobile ApplicationNavadon Khunlertgit. 323-328 [doi]
- Ontology-Based Obesity Tracking System for Children and AdolescentsÖzgü Taçyildiz, Duygu Çelik Ertugrul, Yiltan Bitirim, Nese Akcan, Atilla Elçi. 329-334 [doi]
- Are mHealth Apps Secure? A Case StudyChiara Braghin, Stelvio Cimato, Alessio Della Libera. 335-340 [doi]
- An Android Application for Geolocation Based Health Monitoring, Consultancy and Alarm SystemEmre Oner Tartan, Cebrail Çiflikli. 341-344 [doi]
- Knowledge Based e-Health Surveillance System for Predicting Hospital Acquired InfectionsAmin Y. Noaman, Nabeela Al-Abdullah, Arwa Jamjoom, Abdul Hamid M. Ragab, Farrukh Nadeem, Anser G. Ali. 345-351 [doi]
- Message from the CFSE 2018 Workshop OrganizersRyôichi Sasaki, Tetsutaro Uehara, Jigang Liu. 352 [doi]
- Video Forensics for Detecting Shot Manipulation Using the Information of Deblocking FilteringChen-Kuang Hsieh, Ching-Chun Chiu, Po-Chyi Su. 353-358 [doi]
- Design Scheme of Copyright Management System Based on Digital Watermarking and BlockchainZhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita. 359-364 [doi]
- Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary ResearchSongpon Teerakanok, Tetsutaro Uehara. 365-369 [doi]
- The Expansion of Source Code Abbreviations Using a Language ModelAbdulrahman Alatawi, Weifeng Xu, Jie Yan. 370-375 [doi]
- Modeling and Verifying OpenFlow Scheduled Bundle Mechanism Using CSPHuiwen Wang, Huibiao Zhu, Lili Xiao, Wanling Xie, Gang Lu. 376-381 [doi]
- A high-Capacity Watermarking Algorithm Using two Bins Histogram ModificationZhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang. 382-387 [doi]
- TRAC: A Therapeutic Regimen-Oriented Access Control Model in HealthcareHongcan Gao, Yanfeng Wu, Sihan Xu, Chenkai Guo, Xiaolei Hou, Jing Xu. 388-393 [doi]
- Enhancing Inter-Node Process Migration for Load Balancing on Linux-Based NUMA Multicore SystemsMei-Ling Chiang, Shu-Wei Tu, Wei-Lun Su, Chen-Wei Lin. 394-399 [doi]
- Message from the MediComp 2018 Workshop OrganizersJi-Jiang Yang, Sheikh Iqbal Ahamed, JianQiang Li. 400-401 [doi]
- Emotion Recognition Based on Photoplethysmogram and ElectroencephalogramZhongkai Tong, Xianxiang Chen, Zhengling He, Kai Tong, Zhen Fang, Xianlong Wang. 402-407 [doi]
- Gastric Pathology Image Recognition Based on Deep Residual NetworksBo Liu, Kelu Yao, Mengmeng Huang, Jiahui Zhang, Yong Li, Rong Li. 408-412 [doi]
- Vessel Recognition of Retinal Fundus Images Based on Fully Convolutional NetworkJianQiang Li, Qidong Hu, Azhar Imran, Li Zhang, Ji-Jiang Yang, Qing Wang. 413-418 [doi]
- A Childhood Disease Database Based on Word Segmentation Technology: Research and PracticeShu Wang, Shishi Ma, Min Chen, Mingyue Wei, Guangjun Yu. 419-423 [doi]
- Property-Based Testing of Browser Rendering Engines with a Consensus OracleJoel Martin, David Levine. 424-429 [doi]
- A Projection-Based Approach for Memory Leak DetectionXiaohui Sun, Sihan Xu, Chenkai Guo, Jing Xu, Naipeng Dong, Xiujuan Ji, Sen Zhang. 430-435 [doi]
- Generating Realistic Logically Unreasonable Faulty Data for Fault InjectionJu Qian, Fusheng Lin, Changjian Li, Zhiyi Zhang, Zhe Chen. 436-441 [doi]
- High-Frequency Keywords to Predict Defects for Android ApplicationsYaqing Fan, Xinya Cao, Jing Xu, Sihan Xu, Hongji Yang. 442-447 [doi]
- Synthetic Runtime Monitoring of Microservices Software ArchitectureChadarat Phipathananunth, Panuchart Bunyakiati. 448-453 [doi]
- Test Case Prioritization for GUI Regression Testing Based on Centrality MeasuresYijie Ren, Bei-Bei Yin, Bin Wang. 454-459 [doi]
- Message from the STPSA 2018 Workshop OrganizersSheikh Iqbal Ahamed, Mohammad Zulkernine. 460-461 [doi]
- Identifying Security Spots for Data IntegrityPushkar Ogale, Michael Shin, Sasanka Abeysinghe. 462-467 [doi]
- A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare ArchitectureSaad El Jaouhari, Ahmed Bouabdallah. 468-473 [doi]
- Static Analysis of HIPPA Security Requirements in Electronic Health Record ApplicationsMaryam Farhadi, Hisham Haddad, Hossain Shahriar. 474-479 [doi]
- Resource and Role Hierarchy Based Access Control for Resourceful SystemsNidhiben Solanki, Yongtao Huang, I-Ling Yen, Farokh B. Bastani, Yuqun Zhang. 480-486 [doi]
- An Unknown Malware Detection Using Execution Registry AccessKento Kono, Sanouphab Phomkeona, Koji Okamura. 487-491 [doi]
- A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android AppsRatinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova. 492-497 [doi]
- Chained of Things: A Secure and Dependable Design of Autonomous Vehicle ServicesMd. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar. 498-503 [doi]
- Removing Software Vulnerabilities During DesignGeorge Yee. 504-509 [doi]
- A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart GridsMohammad Ashrafuzzaman, Hasan Jamil, Yacine Chakhchoukh, Frederick T. Sheldon. 510-515 [doi]
- Message from the BIOT 2018 Workshop OrganizersHideya Ochiai, Kurt Geihs, Susumu Takeuchi. 516 [doi]
- Exploratory Study for Data Visualization in Internet of ThingsMohamad Yuzrie Khalid, Patrick Hang Hui Then, Valliappan Raman. 517-521 [doi]
- Real-Time Data-Intensive Telematics Functionalities at the Extreme Edge of the Network: Experience with the PrEstoCloud ProjectSalman Taherizadeh, Blaz Novak, Marija Komatar, Marko Grobelnik. 522-527 [doi]
- Secure IoT Agent Platform with m-Cloud Distributed Statistical Computation MechanismShinji Shimojo, Ikuo Nakagawa. 528-533 [doi]
- An Accurate Model for Hurricane Trajectory PredictionTaylor S. Cox, Calvin S. H. Hoi, Carson K. Leung, Caden R. Marofke. 534-539 [doi]
- Introducing Hierarchical Clustering with Real Time Stream Reasoning into Semantic-Enabled IoTJingyu Sun, Masato Kamiya, Susumu Takeuchi. 540-545 [doi]
- A New Combined CNN-RNN Model for Sector Stock Price AnalysisRuixun Zhang, Zhaozheng Yuan, Xiuli Shao. 546-551 [doi]
- Assisting Replace Method with Method Object: Selecting Fields and Preserving Data AccessAndrea Fornaia, Emiliano Tramontana. 552-557 [doi]
- Message from the SDIM 2018 Workshop OrganizersBian Yang, Julien Bringer, Hideaki Goto. 558 [doi]
- Secure and Long-Lived Wireless Sensor Network for Data Center MonitoringToyokazu Akiyama, Morito Matsuoka, Kazuhiro Matsuda, Yumi Sakemi, Hisashi Kojima. 559-564 [doi]
- Towards an Operable Evaluation System for Evidence of IdentityØyvind Anders Arntzen Toftegaard, Bian Yang. 565-570 [doi]
- Texture Based Vein Biometrics for Human Identification: A Comparative StudyKhayrul Bashar, Manzur Murshed. 571-576 [doi]
- Storage Protocol for Securing Blockchain TransparencyRyosuke Abe, Hiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura 0002, Atsushi Nakadaira. 577-581 [doi]
- Sora Identity: Secure, Digital Identity on the BlockchainMakoto Takemiya, Bohdan Vanieiev. 582-587 [doi]
- Message from the EACIS 2018 Workshop OrganizersMidori Sugaya, Yoshito Tobe. 588 [doi]
- Human Emotional State Analysis During Driving Simulation Experiment Using Bio-Emotion Estimation MethodMidori Sugaya, Issei Watanabe, Reiji Yoshida, Feng Chen. 589-594 [doi]
- Differences of Passenger Unease Emotional Areas, An Experimental Case StudyNahoko Takada, Shinji Nakagawa. 595-600 [doi]
- Preliminary Reaction Analysis of Audience with Bio-Emotion Estimation MethodMidori Sugaya, Takuya Hiramatsu, Reiji Yoshida, Feng Chen. 601-605 [doi]
- Influence of Hedonic State Visualization on Self and SurroundingsGuillaume Lopez, Hiroko Tobase, Naoya Isoyama. 606-610 [doi]
- An Experiment of Human Feeling for Hospitality Robot Measured with Biological InformationMidori Sugaya, Yuki Nishida, Reiji Yoshida, Yuya Takahashi. 611-615 [doi]
- Access Control Model for IoT Environment Including Automated ConfigurationKenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai. 616-621 [doi]
- Near Cloud: Low-cost Low-Power Cloud Implementation for Rural Area Connectivity and Data ProcessingJose Paolo Talusan, Yugo Nakamura, Teruhiro Mizumoto, Keiichi Yasumoto. 622-627 [doi]
- A Social Sensor Visualization System for a Platform to Generate and Share Social Sensor DataZennosuke Aiko, Keisuke Nakashima, Tomoki Yoshihisa, Takahiro Hara. 628-633 [doi]
- Proposal of Automatic GPU Offloading Technology on Open IoT EnvironmentYoji Yamato, Tatsuya Demizu, Hirofumi Noguchi, Misao Kataoka. 634-639 [doi]
- Low-cost Pedestrian Counter Using Wi-Fi APs for Smart Building ApplicationsSatomi Kura, Hirozumi Yamaguchi, Yoh Shiraishi. 640-645 [doi]
- Dynamic Public Key Certificates for IoT and WSN ScenariosHung-Yu Chien. 646-651 [doi]
- Message from the NETSAP 2018 Workshop OrganizersMasaki Hashimoto, Yoshiaki Hori, Yutaka Miyake. 652 [doi]
- A Malware Beacon of Botnet by Local Periodic Communication BehaviorYi-Ren Yeh, Ming-Kung Sun, C.-Y. Huang. 653-657 [doi]
- Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with DarknetRyoh Akiyoshi, Daisuke Kotani, Yasuo Okabe. 658-663 [doi]
- Lightweight Classification of IoT Malware Based on Image RecognitionJiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai. 664-669 [doi]
- Towards a Packet Traffic Genome Project as a Method for Realtime Sub-Flow Traffic AnalysisMarat Zhanikeev. 670-675 [doi]
- PDL: An Efficient Prediction-Based False Data Injection Attack Detection and Location in Smart GridWanjiao Shi, Yufeng Wang, Qun Jin, Jianhua Ma. 676-681 [doi]
- Formal Verification and Improvement of the PKMv3 Protocol Using CSPJinpeng Jiang, Hongyan Mao, Rumeng Shao, Yuanmin Xu. 682-687 [doi]
- Message from the SAPSE 2018 Workshop OrganizersStelvio Cimato. 688 [doi]
- A New Paradigm to Address Threats for Virtualized ServicesStefan Covaci, Matteo Repetto, Fulvio Risso. 689-694 [doi]
- Detecting Web Spams Using Evidence TheoryMoitrayee Chatterjee, Akbar Siami Namin. 695-700 [doi]
- LIoPY: A Legal Compliant Ontology to Preserve Privacy for the Internet of ThingsFaiza Loukil, Chirine Ghedira Guegan, Khouloud Boukadi, Aïcha-Nabila Benharkat. 701-706 [doi]
- Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-CrimeTakashi Hatashima, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo. 707-712 [doi]
- Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android AppsKanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka. 713-718 [doi]
- Experience Report: How to Extract Security Protocols' Specifications from C LibrariesItzel Vázquez Sandoval, Gabriele Lenzini. 719-724 [doi]
- An Efficient Approach to Forecasting Monthly Calls for Repair from Gas ConsumersHuiqun Yu, Cunbin Deng, Guisheng Fan, Liqiong Chen, Huaiying Sun. 725-730 [doi]
- A Cooperated Data Management Platform for Coronary Heart Disease Early Identification and Risk Warning ResearchPeili Yang, Hui Zhao, Xuezhen Yin, Jian Ye, Lingfeng Yang, Jimin Liang. 731-736 [doi]
- Message from the QUORS 2018 Workshop OrganizersXiaodong Liu, Hongji Yang. 737 [doi]
- SUCCEEd: Support Mechanism for Creating and Executing Workflows for Decoupled SAS in IoTBelmondo Rodrigues Aragão Junior, Rossana Maria de Castro Andrade, Marcio Espíndola Freire Maia, Tales Paiva Nogueira. 738-743 [doi]
- Towards Modelling and Reasoning About Uncertain Data of Sensor Measurements for Decision Support in Smart SpacesOluwaseun Bamgboye, Xiaodong Liu, Peter Cruickshank. 744-749 [doi]
- Utilising Abstration Techniques and Gaming Theory for Developing Intangible Cultural HeritageSicong Ma, Hongji Yang, Meiyu Shi. 750-755 [doi]
- Evaluate How Cyclomatic Complexity Changes in the Context of Software EvolutionHuihui Liu, Xufang Gong, Li Liao, Bixin Li. 756-761 [doi]
- Message from the IWFIT 2018 Workshop OrganizersHiroyuki Ohsaki, Yasuo Okabe, Koji Okamura. 762 [doi]
- An Adaptive Bandwidth Reservation Method for a Content-Centric NetworkTomoharu Endo, Atsuko Yokotani, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato. 763-768 [doi]
- A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering SchemesTsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe. 769-776 [doi]
- Bio-Inspired Model for Data Distribution in Fog and Mist ComputingDanilo Reis de Vasconcelos, Valdenir Severino, José Neuman de Souza, Rossana M. C. Andrade, Márcio Maia. 777-782 [doi]
- A Probabilistic Interest Packet Aggregation for Content-Centric NetworkingYuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki. 783-788 [doi]
- Message from the SIS-SS 2018 Workshop OrganizersLuca Vollero, Salvatore D'Antonio. 789 [doi]
- A Comparison Study on Dynamic Duty Cycle and Dynamic Channel Polling Approaches for Wireless Sensor NetworksShama Siddiqui, Anwar Ahmed Khan, Sayeed Ghani. 790-793 [doi]
- New RSSI-Based LoRa Localization Algorithms for Very Noisy Outdoor EnvironmentKa-Ho Lam, Chi-Chung Cheung, Wah Ching Lee. 794-799 [doi]
- A Smart Sensor Architecture for eHealth ApplicationsErmanno Cordelli, Giorgio Pennazza, Marco Sabatini, Marco Santonico, Luca Vollero. 800-804 [doi]
- Message from the IEESD 2018 Workshop OrganizersDetlef Streitferdt, Tiberiu Seceleanu, Philipp Nenninger. 805 [doi]
- Increasing Efficiency in Data Flow Oriented Model Driven Software Development for Softcore ProcessorsMichael Kirchhoff, Jörn Weisensee, Detlef Streitferdt, Wolfgang Fengler 0001, Elena Rozova. 806-811 [doi]
- State Estimation Using Neural Networks in Industrial ProcessesPhilipp Nenninger, Nils Bieler. 812-817 [doi]
- Traceability in Systems Engineering: An Avionics Case StudyNasser Mustafa, Yvan Labiche, Dave Towey. 818-823 [doi]