Abstract is missing.
- Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2MWei-Han Chen, Fuchun Joseph Lin. 1-6 [doi]
- A Dynamic Intervals Determination Method Based on Transaction Rates for Real-Time IoT ApplicationsChaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo. 7-12 [doi]
- Analyzing the Effect of Increased Distribution on a Wearable ApplianceMateus Silva, Ricardo Oliveira. 13-18 [doi]
- On the Effectiveness of Position-Based Routing in Delay/Disruption-Tolerant NetworkingNatusko Kawabata, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 19-23 [doi]
- On the Predictability of Network Robustness from Spectral MeasuresKazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki. 24-29 [doi]
- Spread of Anycast and GSLBKenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya. 30-35 [doi]
- A Proposal of SDN-FIT System to Evaluate Wide-Area Distributed Applications Based on Exhaustive FIT Scenario GenerationHiroki Kashiwazaki, Shinnosuke Miura, Shinji Shimojo. 36-41 [doi]
- Multi-scale Discriminative Location-Aware Network for Few-Shot Semantic SegmentationZihao Dong, Ruixun Zhang, Xiuli Shao, Hongyu Zhou. 42-47 [doi]
- Research on Evaluation Function of Clustering Algorithm Based on Duty CycleHongjie Liu, Hongzhe Xu, Yu Yan, Wen Li. 48-54 [doi]
- How Smart is your Manufacturing? Build Smarter with AIMike McMahon, Dale Mumper, Mitsuko Ihaza, Dominic Farrar. 55-60 [doi]
- Feature Boosting in Natural Image ClassificationPiyush Saxena, Devansh Saxena, Xiao Nie, Aaron Helmers, Nithin Ramachandran, Nazmus Sakib, Sheikh Iqbal Ahamed. 61-67 [doi]
- A Teaching Assistant Robot Design Tool Based on Knowledge Chunks ReuseTakeshi Morita 0001, Naoya Takahashi, Mizuki Kosuda, Takahira Yamaguchi. 68-73 [doi]
- Identifying Buildings with Ramp Entrances Using Convolutional Neural NetworksJiawei Wu, Wenliang Hu, Joseph Coelho, Paromita Nitu, Hanna R. Paul, Praveen Madiraju, Roger O. Smith, Sheikh Iqbal Ahamed. 74-79 [doi]
- Modeling the Structured Porous Network Using Stacked Ensemble LearningMehdi Nekouei, Sara Sartoli. 80-84 [doi]
- Semantic Stream Management Framework for Data Consistency in Smart SpacesOluwaseun Bamgboye, Xiaodong Liu, Peter Cruickshank. 85-90 [doi]
- Utilization of Bio-Ontologies for Enhancing Patent Information RetrievalKincho H. Law, Siddarth Taduri, Jay Kesan, Ram Sriram. 91-96 [doi]
- Micro-Level Analysis and Visualization of Tennis Shot Patterns with Fractal TablesShiraj Pokharel, Ying Zhu, Satish Puri. 97-102 [doi]
- From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data EraYan Zhu 0010, Yi Zhang, Jing Wang, Weijing Song, William Cheng-Chung Chu, Guowei Liu. 103-109 [doi]
- Intelligent Highway Traffic Forecast Based on Deep Learning and Restructured Road ModelsSeungyo Ryu, Dongseung Kim. 110-114 [doi]
- A Mapping Language for IoT Device DescriptionsFabian Burzlaff, Maurice Ackel, Christian Bartelt. 115-120 [doi]
- Development of Mobile Intercloud ApplicationsYuxuan Deng, Henry C. B. Chan. 121-126 [doi]
- Improving the Detection of Sequential Anomalies Associated with a LoopFaisal Fahmi, Pei Shu Huang, Feng-Jian Wang. 127-134 [doi]
- A Smart Role Mapping Recommendation SystemLijuan Diao, Huaduo Wang, Sultan Alsarra, I-Ling Yen, Farokh B. Bastani. 135-140 [doi]
- Modern Architecture for Deep Learning-Based Automatic Optical InspectionJohannes Richter, Detlef Streitferdt. 141-145 [doi]
- A Data-Driven Approach to Energy Cost Prediction Of Dwellings Based on Partitioned Parallel ModelingYingjie Zhang, Yujie Gong, Daniel Morgan, Ying Zhang. 146-152 [doi]
- Experiencing Technology IndependenceAnton Urvantsev, Morgan E. Johansson, Nils Müllner, Tiberiu Seceleanu. 153-158 [doi]
- Embedded Control System for Decentralized Wastewater TreatmentTamer Omar, Olusegun Bamgbose, Ibrahim Naffaa, Omar Naffaa. 159-164 [doi]
- Towards a Framework for Safe and Secure Adaptive Collaborative SystemsAida Causevic, Alessandro Vittorio Papadopoulos, Marjan Sirjani. 165-170 [doi]
- How to Bring Project Management of Embedded Systems to an Appropriate Level of Abstraction for a Discrete Event ModelMaxi Weichenhain, Wolfgang Fengler 0001, Detlef Streitferdt. 171-176 [doi]
- LiRUL: A Lightweight LSTM Based Model for Remaining Useful Life Estimation at the EdgeOlumide Kayode, Ali Saman Tosun. 177-182 [doi]
- Modeling Genome Data Using Bidirectional LSTMNeda Tavakoli. 183-188 [doi]
- A Scalable Framework for Multilevel Streaming Data Analytics using Deep LearningShihao Ge, Haruna Isah, Farhana H. Zulkernine, Shahzad Khan. 189-194 [doi]
- Social Media and Forecasting Stock Price ChangeJoseph Coelho, Dawson D'almeida, Scott Coyne, Nathan Gilkerson, Katelyn Mills, Praveen Madiraju. 195-200 [doi]
- TALS: A Framework for Text Analysis, Fine-Grained Annotation, Localisation and Semantic SegmentationShatha Jaradat, Nima Dokoohaki, Ummul Wara, Mallu Goswami, Kim Hammar, Mihhail Matskin. 201-206 [doi]
- Twitter vs News: Concern Analysis of the 2018 California Wildfire EventHanxiang Du, Long Hoang Nguyen 0002, Zhou Yang, Hashim Abu-gellban, Xingyu Zhou, Wanli Xing, Guofeng Cao, Fang Jin. 207-212 [doi]
- A Speech Data-Driven Stakeholder Analysis Methodology Based on the Stakeholder Graph ModelsYuta Shirasaki, Yuya Kobayashi, Mikio Aoyama. 213-220 [doi]
- Fuzzy Value-at-Risk Forecasts Using a Novel Data-Driven Neuro Volatility Predictive ModelAerambamoorthy Thavaneswaran, Ruppa K. Thulasiram, Zimo Zhu, Mohammed Erfanul Hoque, Nalini Ravishanker. 221-226 [doi]
- Detecting Phishing Websites through Deep Reinforcement LearningMoitrayee Chatterjee, Akbar Siami Namin. 227-232 [doi]
- COMEX: Identifying Mislabeled Human Behavioral Context Data Using Visual AnalyticsHamid Mansoor, Walter Gerych, Luke Buquicchio, Kavin Chandrasekaran, Emmanuel Agu, Elke A. Rundensteiner. 233-238 [doi]
- SpacePhaser: Phase Space Embedding Visual AnalyticsTommy Dang, Ngan Nguyen. 239-244 [doi]
- A Pen-Grip Shaped Device for Estimating Writing Pressure and AltitudeTsutomu Terada, Masahiko Tsukamoto. 245-250 [doi]
- Communication Robot for Elderly Based on Robotic Process AutomationToru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai. 251-256 [doi]
- Estimation Method of Traffic Volume in Provincial City Using Big-DataKazuki Someya, Masashi Saito, Ryozo Kiyohara. 257-262 [doi]
- Using Smartwatches as an Interactive Movie Controller: A Case Study with the Bandersnatch MovieThamer Horbylon Nascimento, Fabrízzio Alphonsus Alves de Melo Nunes Soares, Marcos Alves Vieira, Juliana Paula Felix, Jaline Gonçalves Mombach, Livia Mancine Coelho De Campos, Wellington Galvão Rodrigues, Wesley F. de Miranda, Ronaldo Martins da Costa. 263-268 [doi]
- Machine Learning-Based Modeling of Big Clinical Trials Data for Adverse Outcome Prediction: A Case Study of Death EventsLing Tong, Jake Luo, Ron A. Cisler, Michael Cantor. 269-274 [doi]
- A Framework for Dengue Surveillance and Data Collection in PakistanKomal Minhas, Munazza Tabassam, Rida Rasheed, Assad Abbas, Hasan Ali Khattak, Samee U. Khan. 275-280 [doi]
- A Real-Time Cardiac Monitoring using a Multisensory Smart IoT SystemA. K. M. Jahangir Alam Majumder, Mohammed ElSaadany, Joshua Aaron Izaguirre, Donald R. Ucci. 281-287 [doi]
- Educational app Proposal to Support Pregnant WomenDaniel Scherer, José George Dias De Souza. 288-293 [doi]
- World First Retransmission of Medical Images in an Operating Room via DICOM-RTV: Technical DetailsSaad El Jaouhari, Patrick Hardy, Guillaume Pasquier, Pierrick Guitter, Eric Poiseau, Cédric Moubri-Tournes, Stéphane Leduc, Sebastien Vincendeau, Laurent Bourgeois, Bernard Gibaud, Emmanuel Cordonnier. 294-299 [doi]
- Prototyping for Internet of Things with Web Technologies: A Case on Project-Based Learning using ScrumBahtijar Vogel, Bo Peterson, Blerim Emruli. 300-305 [doi]
- Mindset for Software Architecture StudentsLotfi Ben Othmane, Monica Lamm. 306-311 [doi]
- Implementing Cybersecurity into the Wisconsin K-12 ClassroomJustin Wang, Dennis Brylow, Debbie Perouli. 312-317 [doi]
- An Approach for Developing a Conceptual Quality Model by Changing the Learner Behavior with OERAhmed Alzaghoul, Edmundo Tovar. 318-323 [doi]
- Mitigating Threats to Validity in Empirical Software Engineering: A Traceability Case StudyNasser Mustafa, Yvan Labiche, Dave Towey. 324-329 [doi]
- Short-Term Performance Metrics Forecasting for Virtual Machine to Support Anomaly Detection Using Hybrid ARIMA-WNN ModelJuan Qiu, Qingfeng Du, Wei Wang, Kanglin Yin, Liang Chen. 330-335 [doi]
- Software Fault Proneness Prediction with Group Lasso Regression: On Factors that Affect Classification PerformanceKaterina Goseva-Popstojanova, Mohammad Ahmad, Yasser Alshehri. 336-343 [doi]
- SPL-AT Gherkin: A Gherkin Extension for Feature Oriented Testing of Software Product LinesTugkan Tuglular, Sercan Sensülün. 344-349 [doi]
- Towards Transforming User Requirements to Test Cases Using MDE and NLPSai Chaithra Allala, Juan P. Sotomayor, Dionny Santiago, Tariq M. King, Peter J. Clarke. 350-355 [doi]
- Comparison of Runtime Testing Tools for MicroservicesJuan P. Sotomayor, Sai Chaithra Allala, Patrick Alt, Justin Phillips, Tariq M. King, Peter J. Clarke. 356-361 [doi]
- An Improved Semi-Supervised Learning Method on Cataract Fundus Image ClassificationWenai Song, Ying Cao, Zhiqiang Qiao, Qing Wang, Ji-Jiang Yang. 362-367 [doi]
- A Novel Grading Method of Cataract Based on AWMChangshaui Huo, Faheem Akhtar, Pengzhi Li. 368-373 [doi]
- Bi-Dimensional Representation of Patients for Diagnosis PredictionWeijing Wang, Chenkai Guo, Jing Xu 0008, Ao Liu. 374-379 [doi]
- Viscoelasticity Measurements of knee Muscles with Simulated Knee Osteoarthritis Treated by Novel Chinese Medicine: A Preliminary StudySiyuan Fang, Lixia Hu, Bin Du, Haoteng Zheng, Minhua Lu, Rui Mao. 380-385 [doi]
- Towards Clinical Decision Support for Veteran Mental Health Crisis Events using Tree AlgorithmFitrat Hossain, Olawunmi George, Nadiyah Johnson, Praveen Madiraju, Mark Flower, Zeno Franco, Katinka Hooyer, Jose Lizarraga Mazaba, Lisa Rein, Sheikh Iqbal Ahamed. 386-390 [doi]
- Semi-Automatic Construction Method of Chronic Obstructive Pulmonary Disease Knowledge GraphXin-Hong Jia, Wen-ai Song, Wei-Yan Li, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang. 391-396 [doi]
- Observational Measures for Effective Profiling of Healthcare Staffs' Security PracticesProsper Kandabongee Yeng, Bian Yang, Einar Snekkenes. 397-404 [doi]
- Multi-Scale Network with the Deeper and Wider Residual Block for MRI Motion Artifact CorrectionWei-liang Zhang, Qin-Yan Zhang, Ji-Jiang Yang, Qing Wang. 405-410 [doi]
- Classification of Pulmonary Nodules by using Improved Convolutional Neural NetworksJing Gao, Huanqing Zhang, Ruifang Shen. 411-416 [doi]
- Supervised and Unsupervised-Based Analytics of Intensive Care Unit DataRehnuma Afrin, Hisham Haddad, Hossain Shahriar. 417-422 [doi]
- Prediction and Study of the Applicability of Medical Gels to PatientsBo Liu, Mengmeng Huang, Kelu Yao, Lan Wei, Xiaolu Fei, Qing Wang. 423-428 [doi]
- Drug Specification Named Entity Recognition Base on BiLSTM-CRF ModelWei-Yan Li, Wen-ai Song, Xin-Hong Jia, Ji-Jiang Yang, Qing Wang, Yi Lei, Ke Huang, Jun Li, Ting Yang. 429-433 [doi]
- AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI SegmentationChao Luo, Canghong Shi, Xian Zhang, Jing Peng, Xiaojie Li, Yucheng Chen. 434-439 [doi]
- Non-Invasive Wi-Fi Sensors For Smart HealthcareLori Kim, Hossain Shahriar, Chi Zhang. 440-445 [doi]
- A Scalable Automated Diagnostic Feature Extraction System for EEGsPrakhar Agrawal, Divya Bhargavi, Gokul Krishna G., Xiao Han, Neha Tevathia, Abbie Popa, Nicholas Ross, Diane Myung-kyung Woodbridge, Barbie Zimmerman-Bier, William Bosl. 446-451 [doi]
- Blockchain-Based Interoperable Electronic Health Record Sharing FrameworkGracie Carter, Hossain Shahriar, Sweta Sneha. 452-457 [doi]
- Towards Enhancement of Fault Traceability Among Multiple Hazard Analyses in Cyber-Physical SystemsDaneth Horn, Nazakat Ali, Jang-Eui Hong. 458-464 [doi]
- Automatic Whitelist Generation for SQL Queries Using Web Application TestsKomei Nomura, Kenji Rikitake, Ryosuke Matsumoto. 465-470 [doi]
- Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote ShellcodesYo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe. 471-476 [doi]
- Activity Segmentation Using Wearable Sensors for DVT/PE Risk DetectionAustin Gentry, William M. Mongan, Brent Lee, Owen C. Montgomery, Kapil R. Dandekar. 477-483 [doi]
- Scalable Motor Movement Recognition from Electroencephalography using Machine LearningAditi Sharma, Shivee Singh, Brian Wright, Alan Perry, Diane Myung-kyung Woodbridge, Abbie Popa. 484-489 [doi]
- Personalized Pain Study Platform using Evidence-Based Continuous Learning ToolAmit Kumar Saha, G. M. Tanimul Ahsan, Md. Osman Gani, Sheikh Iqbal Ahamed. 490-495 [doi]
- DrunkSelfie: Intoxication Detection from Smartphone Facial ImagesColin Willoughby, Ian Banatoski, Paul Roberts, Emmanuel Agu. 496-501 [doi]
- Generating Real Time Cyber Situational Awareness Information Through Social Media Data MiningAriel Rodríguez, Koji Okamura. 502-507 [doi]
- Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven ParadigmsAlfredo Cuzzocrea, Ernesto Damiani. 508-516 [doi]
- Hybrid Approach for Enabling Hierarchical Fog Networks in an IoT DeploymentNuwan Jayawardene, Pumudu Fernando. 517-521 [doi]
- A Comparative Approach on the use of Unmanned Aerial Vehicles kind of Fixed-Wing and Rotative Wing Applied to the Precision Agriculture ScenarioRobison Cris Brito, Mainara Cristina Lorencena, José Felippe Loureiro, Fábio Favarim, Eduardo Todt. 522-526 [doi]
- OpenFlow Based Information Flow Control Considering Route Switching CostKosuke Gotani, Hiroyuki Takahira, Misumi Hata, Luis Guillen, Satoru Izumi, Toru Abe. 527-530 [doi]
- A Discrete Model of IEEE 1588-2008 Precision Time Protocol with Clock Servo using PI ControllerRyuichiro Maegawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 531-536 [doi]
- Optimization System for Dynamic Flight Planning for Groups of Drones using Cooperation with Mobile Recharge Bases by Means of Multiagent System and Recursive AuctionsRobison Cris Brito, José Felippe Loureiro, André Guedes, Eduardo Todt. 537-542 [doi]
- Fluid-Based Modeling of Large-Scale IEEE 802.15.4 Wireless Sensor NetworksKei Katayama, Hiroyuki Ohsaki. 543-548 [doi]
- A Grammar Based Approach to BPMN Model Semantic Preservation using RefinementSalma Ayari, Yousra Bendaly Hlaoui, Leila Ben Ayed. 549-554 [doi]
- Formal Verification of Blockchain Smart Contract Based on Colored Petri Net ModelsZhen-Tian Liu, Jing Liu 0003. 555-560 [doi]
- From BPMN2 to Event B: A Specification and Verification Approach of Workflow ApplicationsAhlem Ben Younes, Yousra Bendaly Hlaoui, Leila Ben Ayed, Mayssa Bessifi. 561-566 [doi]
- STPSA 2019 Welcome MessageSheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi. 567-568 [doi]
- Identification of the Impacts of Code Changes on the Security of SoftwareLotfi Ben Othmane, Ameerah-Muhsina Jamil, Moataz AbdelKhalek. 569-574 [doi]
- User Behaviour-Based Access Control for Social Media with Qualitative Research and Bayesian ModellingSara Mccloskey, John Herbert. 575-579 [doi]
- Designing Good Security MetricsGeorge O. M. Yee. 580-585 [doi]
- Toward Machine Learning Based Analyses on Compressed FirmwareSeoksu Lee, Joon-Young Paik, Rize Jin, Eun-Sun Cho. 586-591 [doi]
- Security Features for Proximity VerificationJuan Wang, Karim Lounis, Mohammad Zulkernine. 592-597 [doi]
- Continuous User Authentication Based on Context-Emphasized Behavior ProfilingShen Fu, Mathew L. Wymore, Ting-Wei Chang, Daji Qiao. 598-603 [doi]
- Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software DevelopmentHossain Shahriar, Md Arabin Islam Talukder, Mohammad Ashiqur Rahman, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu. 604-609 [doi]
- Automatic Multi-class Non-Functional Software Requirements Classification Using Neural NetworksCody Baker, Lin Deng, Suranjan Chakraborty, Josh Dehlinger. 610-615 [doi]
- Mob Programming: A Systematic Literature ReviewMakoto Shiraishi, Hironori Washizaki, Yoshiaki Fukazawa, Joseph W. Yoder. 616-621 [doi]
- Research on the Realizability of Microservice Interaction Contract Based on CSP#Ruiqiong Wu, Qing Duan, Fei Dai 0002, Hongji Yang, Yi Zhang, Biseng Xie. 622-627 [doi]
- Toward A High-Performance Emulation Platformfor Brain-Inspired Intelligent SystemsExploring Dataflow-Based Execution Model and BeyondSihan Zeng, Jose Manuel Monsalve Diaz, Siddhisanket Raskar. 628-633 [doi]
- A Disparity Computation FrameworkGabriel da Silva Vieira, Fabrízzio Alphonsus A. M. N. Soares, Junio Cesar de Lima, Hugo A. D. do Nascimento, Gustavo Teodoro Laureano, Ronaldo Martins da Costa, Julio C. Ferreira, Wellington Galvão Rodrigues. 634-639 [doi]
- Position Paper: Extending Codelet Model for Dataflow Software Pipelining using Software-Hardware Co-DesignSiddhisanket Raskar, Thomas Applencourt, Kalyan Kumaran, Guang Gao. 640-645 [doi]
- A Functional Programming Model for Embedded Dataflow ApplicationsChristoph Kühbacher, Christian Mellwig, Florian Haas, Theo Ungerer. 646-651 [doi]
- An Evaluation of An Asynchronous Task Based Dataflow Approach For UintahAlan Humphrey, Martin Berzins. 652-657 [doi]
- Open Science, Business Analytics, and FAIR Digital ObjectsGeorge Strawn. 658-663 [doi]
- Job-Aware Optimization of File Placement in HadoopMakoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi. 664-669 [doi]
- An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business ProcessDan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller. 670-675 [doi]
- Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File SystemYong Jin, Masahiko Tomoishi. 676-681 [doi]
- An Interactive and Continuous Authorization Scheme by using Belnap LogicHiroyuki Sato, Sridhar Nikita. 682-687 [doi]
- Polysizemic Encryption: Towards a Variable-Length Output Symmetric-Key CryptosystemJacob Hendricks, Brandon Burke, Thoshitha T. Gamage. 688-693 [doi]
- A Privacy-Preserving and Fully Decentralized Storage and Sharing System on BlockchainGen Li, Hiroyuki Sato. 694-699 [doi]