Abstract is missing.
- Table Tennis Stroke Recognition Based on Body Sensor NetworkRuichen Liu, Zhelong Wang, Xin Shi, Hongyu Zhao, Sen Qiu, Jie Li, Ning Yang. 1-10 [doi]
- The Analysis of the Computation Offloading Scheme with Two-Parameter Offloading Criterion in Fog ComputingEduard S. Sopin, Konstantin E. Samouylov, Sergey Shorgin. 11-20 [doi]
- Protecting Personal Data Using Smart ContractsMohsin Ur Rahman, Fabrizio Baiardi, Barbara Guidi, Laura Ricci. 21-32 [doi]
- Towards Environmental Impact Reduction Leveraging IoT Infrastructures: The PIXEL ApproachIgnacio Lacalle, Miguel Ángel Llorente, Carlos E. Palau. 33-45 [doi]
- Adaptive Application Deployment of Priority Services in Virtual EnvironmentsJesús Carretero 0001, Mario Vasile-Cabezas, Victor Sosa-Sosa. 46-56 [doi]
- An Adaptive Restart Mechanism for Continuous Epidemic SystemsMosab M. Ayiad, Giuseppe Di Fatta. 57-68 [doi]
- Using Sentiment Analysis and Automated Reasoning to Boost Smart Lighting SystemsFrancesco Cauteruccio, Luca Cinelli, Giancarlo Fortino, Claudio Savaglio, Giorgio Terracina. 69-78 [doi]
- In-network Hebbian Plasticity for Wireless Sensor NetworksTim van der Lee, Georgios Exarchakos, Sonia M. Heemstra de Groot. 79-88 [doi]
- A High Performance Modified K-Means Algorithm for Dynamic Data Clustering in Multi-core CPUs Based EnvironmentsGiuliano Laccetti, Marco Lapegna, Valeria Mele, Diego Romano. 89-99 [doi]
- Overcoming GPU Memory Capacity Limitations in Hybrid MPI Implementations of CFDJake Choi, Yoonhee Kim, Heon Young Yeom. 100-111 [doi]
- Using Trust and "Utility" for Group Formation in the Cloud of ThingsGiancarlo Fortino, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné. 112-122 [doi]
- Unsupervised Anomaly Thresholding from Reconstruction ErrorsMaryleen U. Ndubuaku, Ashiq Anjum, Antonio Liotta. 123-129 [doi]
- Yet Another Way to Unknowingly Gather People Coordinates and Its CountermeasuresGabriella Verga, Andrea Fornaia, Salvatore Calcagno, Emiliano Tramontana. 130-139 [doi]
- Computation Offloading with MQTT Protocol on a Fog-Mist Computing FrameworkPietro Battistoni, Monica Sebillo, Giuliana Vitiello. 140-147 [doi]
- Load Balancing in Hybrid Clouds Through Process Mining MonitoringKenneth Kwame Azumah, Sokol Kosta, Lene Tolstrup Sørensen. 148-157 [doi]
- Distributed Processor Load Balancing Based on Multi-objective Extremal OptimizationIvanoe De Falco, Eryk Laskowski, Richard Olejnik, Umberto Scafuri, Ernesto Tarantino, Marek Tudruj. 158-168 [doi]
- Argumentation-Based Coordination in IoT: A Speaking Objects Proof-of-ConceptStefano Mariani 0001, Andrea Bicego, Marco Lippi 0001, Marco Mamei, Franco Zambonelli. 169-180 [doi]
- Optimized Analytics Query Allocation at the Edge of the NetworkAnna Karanika, Madalena Soula, Christos Anagnostopoulos, Kostas Kolomvatsos, George Stamoulis. 181-190 [doi]
- MR-DNS: Multi-resolution Domain Name SystemSaidur Rahman, Mike P. Wittie. 191-202 [doi]
- Temporal-Variation-Aware Profit-Maximized and Delay-Bounded Task Scheduling in Green Data CenterHaitao Yuan, Jing Bi, MengChu Zhou. 203-212 [doi]
- A Lévy Walk and Firefly Based Multi-Robots Foraging AlgorithmOuarda Zedadra, Antonio Guerrieri, Hamid Seridi, Giancarlo Fortino. 213-222 [doi]
- An Overview of Wireless Indoor Positioning Systems: Techniques, Security, and CountermeasuresMouna S. Chebli, Heba Mohammad, Khalifa Al Amer. 223-233 [doi]
- Hybrid Software-Defined Network MonitoringAbdulfatah A. G. Abushagur, Saw Chin Tan, Rizaludin Kaspin, Nazaruddin Omar, Ahmad Tajuddin Samsudin. 234-247 [doi]
- Time-Sensitive-Aware Scheduling Traffic (TSA-ST) Algorithm in Software-Defined NetworkingNg Kean Haur, Tan Saw Chin. 248-259 [doi]
- Engineering Micro-intelligence at the Edge of CPCS: Design GuidelinesRoberta Calegari, Giovanni Ciatto, Enrico Denti, Andrea Omicini. 260-270 [doi]
- NIOECM: A Network I/O Event Control Mechanism to Provide Fairness of Network Performance Among VMs with Same Resource Configuration in Virtualized EnvironmentJaehak Lee, Jihun Kang, HeonChang Yu. 271-283 [doi]
- Learning and Prediction of E-Car Charging Requirements for Flexible Loads ShiftingSalvatore Venticinque, Stefania Nacchia. 284-293 [doi]
- Making IoT Services Accountable: A Solution Based on Blockchain and Physically Unclonable FunctionsCarmelo Felicetti, Angelo Furfaro, Domenico Saccà, Massimo Vatalaro, Marco Lanuzza, Felice Crupi. 294-305 [doi]
- Generation of Network Traffic Using WGAN-GP and a DFT Filter for Resolving Data ImbalanceWoo Ho Lee, BongNam Noh, Yeonsu Kim, Kimoon Jeong. 306-317 [doi]
- Secure Cross-Border Exchange of Health Related Data: The KONFIDO ApproachSotiris Diamantopoulos, Dimitris Karamitros, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude. 318-327 [doi]
- Safety Management in Smart ShipsMassimo Cossentino, Luca Sabatucci, Flavia Zaffora. 328-337 [doi]
- Managing Privacy in a Social Broker Internet of ThingVincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 338-348 [doi]
- A PageRank Inspired Approach to Measure Network CohesivenessVincenza Carchiolo, Marco Grassia, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 349-356 [doi]
- TaRad: A Thing-Centric Sensing System for Detecting Activities of Daily LivingHaiming Chen, Xiwen Liu, Ze Zhao, Giuseppe Aceto, Antonio Pescapè. 357-368 [doi]
- Distributed Genomic Compression in MapReduce ParadigmPasquale De Luca, Stefano Fiscale, Luca Landolfi, Annabella Di Mauro. 369-378 [doi]
- Distributed ACO Based Reputation Management in CrowdsourcingSafina Showkat Ara, Subhasis Thakur, John G. Breslin. 379-390 [doi]
- Osmotic Flow Deployment Leveraging FaaS CapabilitiesAlina Buzachis, Maria Fazio, Antonio Celesti, Massimo Villari. 391-401 [doi]
- Secure and Distributed Crowd-Sourcing Task Coordination Using the Blockchain MechanismSafina Showkat Ara, Subhasis Thakur, John G. Breslin. 402-413 [doi]
- CUDA Virtualization and Remoting for GPGPU Based Acceleration Offloading at the EdgeAntonio Mentone, Diana Di Luccio, Luca Landolfi, Sokol Kosta, Raffaele Montella. 414-423 [doi]
- Design of Self-organizing Protocol for LoWPAN NetworksMatteo Buffa, Fabrizio Messina, Corrado Santoro, Federico Fausto Santoro. 424-433 [doi]
- Rough-Fuzzy Entropy in Neighbourhood CharacterizationAntonio Maratea, Alessio Ferone. 434-443 [doi]
- StormSeeker: A Machine-Learning-Based Mediterranean Storm TracerRaffaele Montella, Diana Di Luccio, Angelo Ciaramella, Ian T. Foster. 444-456 [doi]
- Smart Cities and Open WiFis: When Android OS Permissions Cease to Protect PrivacyGabriella Verga, Salvatore Calcagno, Andrea Fornaia, Emiliano Tramontana. 457-467 [doi]
- Multidimensional Neuroimaging Processing in ReCaS DatacenterAngela Lombardi, Eufemia Lella, Nicola Amoroso, Domenico Diacono, Alfonso Monaco, Roberto Bellotti, Sabina Tangaro. 468-477 [doi]
- A Data Preparation Approach for Cloud Storage Based on Containerized Parallel PatternsDiana Carrizales, Dante D. Sánchez-Gallegos, Hugo Reyes, José Luis González Compeán, Miguel Morales-Sandoval, Jesús Carretero 0001, Alejandro Galaviz-Mosqueda. 478-490 [doi]
- Distributed Training of 3DPyranet over Intel AI DevCloud PlatformEmanuel Di Nardo, Fabio Narducci. 491-497 [doi]
- Parallel and Distributed Computing Methodologies in BioinformaticsGiuseppe Agapito. 498-507 [doi]