Abstract is missing.
- CTMC Modeling for M2M/H2H Coexistence in a NB-IoT Adaptive eNodeBA. H. El Fawal, Ali Mansour, M. Najem, Frédéric Le Roy, Denis Le Jeune. 1-8 [doi]
- Be Right Beach: A Social IoT System for Sustainable Tourism Based on Beach Overcrowding AvoidanceRoberto Girau, Enrico Ferrara, Maura Pintor, Mariella Sole, Daniele D. Giusto. 9-14 [doi]
- Cybersecurity Attacks and Defences for Unmanned Smart ShipsBilhanan Silverajan, Mert Ocak, Benjamin Nagel. 15-20 [doi]
- Applicable Protocol for Updating Firmware of Automotive HVAC Electronic Control Units (ECUs) Over the AirTina Mirfakhraie, Giuliano Vitor, Ken Grogan. 21-26 [doi]
- Analyzing the Effect of Bluetooth Low Energy (BLE) with Randomized MAC Addresses in IoT ApplicationsGolnar Kalantar, Arash Mohammadi 0001, S. Nima Sadrieh. 27-34 [doi]
- Advanced Statistical Models for Modeling Hot Water Consumption Using a Connected BoilerHamdi Amroun, Yacine Benziani, M'hamed Hamy Temkit, Mehdi Ammi. 35-42 [doi]
- A New Graph Semi-Supervised Learning Method for Medical Image Automatic AnnotationJing Bi, Shoulin Yin. 43-46 [doi]
- Medical Image Annotation Based on Deep Transfer LearningShoulin Yin, Jing Bi. 47-49 [doi]
- An Overview of Potential Authentication Threats and Attacks on Internet of Things(IoT): A Focus on Smart Home ApplicationsAttlee M. Gamundani, Amelia Phillips, Hippolyte N. Muyingi. 50-57 [doi]
- WiAnti: an Anti-Interference Activity Recognition System Based on WiFi CSIJinyang Huang, Bin Liu, Hongxin Jin, Zhiqiang Liu. 58-65 [doi]
- FABIoT: A Flexible Agent-Based Simulation Model for IoT EnvironmentsMarco E. Pérez Hernández, Badraddin Alturki, Stephan Reiff-Marganiec. 66-73 [doi]
- Lightweight Internet of Things Encryption Using Galois Extension Field ArithmeticJason M. McGinthy, Alan J. Michaels. 74-80 [doi]
- Improving IoT Services in Smart-Home Using Blockchain Smart ContractYiyun Zhou, Meng Han, Liyuan Liu, Yan Wang, Yi Liang, Ling Tian. 81-87 [doi]
- Harnessing Energy Consumption in a Smarthome IoT FrameworkDesiree I. Cendana, Neriza V. Bustillo, Thelma D. Palaoag, Mark Anthony Marcial, Arjay E. Perreras. 88-96 [doi]
- TDeX: A Description Model for Heterogeneous Smart Devices and GUI GenerationLuciano Baresi, Mersedeh Sadeghi, Massimo Valla. 97-104 [doi]
- An Ontology-Based Domain Modeling and Device Search in Smart HomeYue Xu, Pengfei Hu, Huansheng Ning. 105-111 [doi]
- Secure Firmware Updates for IoT: A SurveyAntti Kolehmainen. 112-117 [doi]
- An Efficient Jaya Algorithm for Resource Allocation in the Cognitive-Radio-Networks-Aided Internet of ThingsXiong Luo, Zhijie He, Long Wang 0015, Weiping Wang 0008, Huansheng Ning, Jenq-Haur Wang, Wenbing Zhao 0001. 118-125 [doi]
- A New Deep Transfer Learning Model for Judicial Data ClassificationGuohua Liu, Zhihong Ying, Liang Zhao 0005, Xu Yuan, Zhikui Chen. 126-131 [doi]
- A Deep CFS Model for Text ClusteringBin Lv, Weiliang Hou, Guohua Liu, Jing Gao, Xu Yuan, Peng Li, Zhikui Chen. 132-137 [doi]
- Design and Performance Evaluation of Containerized Microservices on Edge Gateway in Mobile IoTAmit Singh Gaur, Jyoti Budakoti, Chung-Horng Lung. 138-145 [doi]
- An Energy Packet Switch for Digital Power GridsRoberto Rojas-Cessa, Chuan-Kuo Wong, Zhengqi Jiang, Haard Shah, Haim Grebel, Ahmed A. Mohamed 0001. 146-153 [doi]
- IoT Gateway Middleware for SDN Managed IoTJyoti Budakoti, Amit Singh Gaur, Chung-Horng Lung. 154-161 [doi]
- Extending Openstack for Cloud-Based Networking at the EdgeZakaria Benomar, Dario Bruneo, Salvatore Distefano, Khalid Elbaamrani, Noureddine Idboufker, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. 162-169 [doi]
- Semi-Coherent Transmission Security for Low Power IoT DevicesJason M. McGinthy, Alan J. Michaels. 170-177 [doi]
- A Simulation Environment of Embedded Control Systems for Multi-Core Processors (WiP Report)Yukikazu Nakamoto, Daichi Minami, Shota Shiba, Yoshitaka Koga, Koji Fukuoka. 178-182 [doi]
- MetaSyCar: A System for Metabolic Syndrome Control and CaringMohammad Moradi, Morteza Moradi, Amjad Anvari-Moghaddam. 183-188 [doi]
- Smart Cup to Monitor Stroke Patients Activities During Everyday LifeMaxence Bobin, Hamdi Amroun, Mehdi Boukallel, Margarita Anastassova, Mehdi Ammi. 189-195 [doi]
- A System to Lower the Risk of Dispensing Medication Errors at Pharmacies Using NFCBader Aldughayfiq, Srinivas Sampalli. 196-202 [doi]
- MCEP: A Mobile Device Based Complex Event Processing System for Remote HealthcareAmarjit Singh Dhillon, Shikharesh Majumdar, Marc St-Hilaire, Ali El-Haraki. 203-210 [doi]
- An Architecture for Distributing and Enforcing IoT Security at the Network EdgeLuca Deri, Arianna Del Soldato. 211-218 [doi]
- Security Model for Internet of Things End DevicesS. Rajashree, Pritam Gajkumar Shah, S. Murali. 219-221 [doi]
- Towards Enforcement of the EU GDPR: Enabling Data ErasureSubhadeep Sarkar, Jean-Pierre Banâtre, Louis Rilling, Christine Morin. 222-229 [doi]
- The Digital Power Networks: Energy Dissemination Through a Micro-GridXin Miao, Roberto Rojas-Cessa, Ahmed Mohamed, Haim Grebel. 230-235 [doi]
- Spatio-Temporal Clustering of GPS Traces for Energy-Efficiency in Vehicular Ad-Hoc NetworksZachary W. Lamb, Dharma P. Agrawal. 236-243 [doi]
- Network Energy Efficiency Through Matching and ReconfigurationJuvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin. 244-250 [doi]
- Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel ConditionM. Zulfiker Ali, Jelena V. Misic, Vojislav B. Misic. 251-256 [doi]
- An Efficient Greedy Algorithm for Wide Band Spectrum Sensing in Cognitive Radio NetworksWajeeha Nasar, Abdur Rahman Maud, Hao Wang, Hong-Ning Dia. 257-262 [doi]
- Context-Aware Proactive Caching for Heterogeneous Networks with Energy Harvesting: An Online Learning ApproachHuijin Cao, Jun Cai. 263-267 [doi]
- SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous NetworksQizhen Li, Jie Gao, Jinming Wen, Xiaohu Tang, Lian Zhao, Limin Sun. 268-273 [doi]
- RF-Energy Harvesting from Moving Vehicles: Mathematical Modeling and Selection ProtocolAla Abu Alkheir, Hussein T. Mouftah. 274-279 [doi]
- A Stochastic Geometry Analysis of Energy Harvesting in Large Scale Wireless NetworksZiru Chen, Zhao Chen, Lin X. Cai, Yu Cheng, Ruoting Gong. 280-286 [doi]
- Sum Power Minimization of Greener Communications with Energy HarvestingTony Liu, Peter He. 287-294 [doi]
- Network Analysis Based on 2/4G Common Coverage Research in Rural AreaJie Chen. 295-300 [doi]
- An Auction-Based Time Scheduling Mechanism for Backscatter-Aided RF-Powered Cognitive Radio NetworksXiaozheng Gao, Ping Wang 0001, Dusit Niyato, Kai Yang 0004, Jianping An. 301-307 [doi]
- Energy Efficient Transport Protocol for Mitigating Congestion in Complex NetworksLong Chen, Ming Chi, Jie Chen, Bin Hu 0008, Zhi-Hong Guan. 308-312 [doi]
- Distortion-Aware Multicasting of Multiple Description Coded Media in Wireless Mesh NetworksAbdulelah Alganas, Dongmei Zhao. 313-319 [doi]
- When Friendly Jamming Meets Wireless Energy TransferQi Sun, Hong-Ning Dai, Qiu Wang, Xuran Li, Hao Wang. 320-325 [doi]
- IEEE 802.15.6-Based LTE Overlay Network with Priority SupportNargis Khan, Jelena V. Misic, Vojislav B. Misic. 326-331 [doi]
- An Improved DFT Channel Estimation AlgorithmZhi Chen, Yan Wang. 332-335 [doi]
- An Implementational Model of Telecommunications Networks for the Energy AnalystEtienne Victor Depasquale, Saviour Zammit, Franco Davoli, Raffaele Bolla. 336-344 [doi]
- A Novel Node Selection Algorithm for Collaborative Beamforming in Wireless Sensor NetworksXuecai Bao, Hao Liang, Longzhe Han. 345-349 [doi]
- A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion DetectionXiaoming Yuan, Ran Wang, Yi Zhuang, Kun Zhu, Jie Hao. 350-357 [doi]
- An Efficient and Privacy-Preserving $k$-NN Query Scheme for eHealthcare DataYandong Zheng, Rongxing Lu. 358-365 [doi]
- Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced DataXiaopeng Yang, Hui Zhu, Rongxing Lu, Ximeng Liu, Hui Li. 366-373 [doi]
- Efficient Task Allocation for Mobile Crowd Sensing Based on Evolutionary ComputingXi Tao, Wei Song 0001. 374-380 [doi]
- Energy Efficient Caching in Backhaul-Aware Ultra-Dense Cellular NetworksJiequ Ji, Kun Zhu, Ran Wang, Bing Chen, Chen Dai. 381-388 [doi]
- Multi Agents to Search and Rescue Based on Group Intelligent Algorithm and Edge ComputingTingting Yang, Zhi Jiang, Jie Dong, Hailong Feng, Chengming Yang. 389-394 [doi]
- Double Encoding - Slow Decoding Image to Image CNN for Foreground Identification with Application Towards Intelligent TransportationAkilan Thangarajah, Q. M. Jonathan Wu. 395-403 [doi]
- A Low-Cost Collaborative Indoor Localization System Based on Smartphone PlatformXiaoyuan Liang, Guiling Wang, Zhu Han. 404-411 [doi]
- A Check-In System Leveraging Face RecognitionQi Liu, Hong Li, Yan Hu, Limin Sun. 412-418 [doi]
- Bins With Eyes: Towards a More Efficient Urban EcosystemMassimo Marchiori. 419-426 [doi]
- A Case for Atmospheric Transmittance: Solar Energy Prediction in Wireless Sensor NodesStefan Draskovic, Rehan Ahmed, Cong Lin, Lothar Thiele. 427-434 [doi]
- A Privacy-Preserving Incentive Framework for the Vehicular CloudAbdulrahman Alamer, Sultan Basudan, Xiaodong Lin. 435-441 [doi]
- Scheduling Video Transcoding Jobs in the CloudPanagiotis Oikonomou, Maria G. Koziri, Nikos Tziritas, Antonios N. Dadaliaris, Thanasis Loukopoulos, Georgios I. Stamoulis, Samee U. Khan. 442-449 [doi]
- Flexible Virtual Energy Sharing by Distributed Task Reallocation in IoT Edge NetworksRuitao Chen, Xianbin Wang, Shuran Sheng. 450-454 [doi]
- Energy-Efficient Task Scheduling for Data Centers with Unstable Renewable Energy: A Robust Optimization ApproachYiwen Lu, Ran, Ping Wang, Yue Cao, Jie Hao, Kun Zhu. 455-462 [doi]
- Efficient Deduplicated Reporting in Fog-Assisted Vehicular CrowdsensingSultan Basudan, Abdulrahman Alamer, Xiaodong Lin, Karthik Sankaranarayanan. 463-469 [doi]
- Optimal Beamforming for Enabling Self-Sustainable Secondary Tier in Heterogeneous NetworksYu-Rong Xiao, Kuang-Hao Liu. 470-476 [doi]
- Modeling Trajectory-Based I2V Message Delivery Over VANETs with Vehicle DetoursShun-Ren Yang, Yi-Syuan Shen. 477-482 [doi]
- A Protocol to Protocol Switching Mechanism for Energy Saving of Power-Constrained in LTE and NB-IoT Interworking NetworksChia-Peng Lee, Phone Lin, Hsuan-Yeh Chen. 483-489 [doi]
- Estimating Software Energy Consumption with Machine Learning Approach by Software Performance FeatureCuijiao Fu, Depei Qian, Zhongzhi Luan. 490-496 [doi]
- A Locality-Aware, Energy-Efficient Cache Design for Large-Scale Multi-Core SystemsAbdulrahman Alshegaifi, Chun-Hsi Huang. 497-502 [doi]
- A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-IIXiaolong Xu, Renhao Gu, Yuan Yuan 0003, Kai Peng, Yadang Chen, Wanchun Dou, Alex X. Liu. 503-509 [doi]
- A Parallel-Batch Multi-Objective Job Scheduling Algorithm in Edge ComputingXingguang Zhao, Xing Guo, Yiwen Zhang, Wei Li. 510-516 [doi]
- An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area NetworksXiaolong Xu, Yuancheng Li, Yuan Yuan 0003, Kai Peng, Wenbin Yu 0002, Wanchun Dou, Alex X. Liu. 517-523 [doi]
- A Dynamic Resource Allocation Method for Load-Balance Scheduling Over Big Data PlatformsWenda Tang, Xiang Liu, Wajid Rafique, Wanchun Dou. 524-531 [doi]
- An Adaptive Weighted Alternating Minimization Algorithm for Color Images Reconstruction In the Field of AutomationChao Huang, Shubo Qiu, Huiyuan Zhou, Xiangyue Zhou. 532-536 [doi]
- An Implementable Accelerated Alternating Direction Method of Multipliers for Low-Rank Tensor CompletionDuo Qiu, Hu Zhu, Xiongjun Zhang. 537-541 [doi]
- Hyperspectral Image Dead Line Removal Based on Tensor CompletionHu Zhu, Lu Liu, Yusheng Guan, Jieke Zhang, Lizhen Deng, Xianfeng Mao. 542-548 [doi]
- Design and Application of Internet of Things Technology Based on WeChat ControlBaojiang Sun, Qiaoqiao Kang. 549-553 [doi]
- Hypergraph Matching via a Nonmonotone Newton MethodHu Zhu, Tao Xie, Lizhen Deng, Xueqin Wang, Xianfeng Mao. 554-560 [doi]
- Deep Square Similarity Learning for Person Re-Identification in the Edge Computing SystemXin Chen, Zhuo Li, Shenglong Xiao, Ying Chen. 561-567 [doi]
- Mobile Crowd Sensing Service Platform for Social Security Incidents in Edge ComputingYuzhe Zhao, Zhuo Li, Xin Chen, Ying Chen. 568-574 [doi]
- A Homomorphic Searching Scheme For Sensitive Data In NoSQL DatabaseBaohua Huang, Sheng Liang, Dongdong Xu, Zhuohao Wan. 575-579 [doi]
- Deep Neural Network Based Disease Discrimination Learning from Small Medical Image Training Set and User FeedbackDaji Tang, Kehua Guo, Jianhua Ma, Xiaoyan Kui. 580-585 [doi]
- Generative Adversarial Networks Imputation for High Rate Missing ValuesHuan Wang, Yibin Chen, Bingyang Shen, Di Wu, Xiaojuan Ban. 586-590 [doi]
- Optimization of Dynamic Preventive Maintenance for Multicomponent SystemsZhigang Chen, Hong Xiao, Rongyue Zhang, Xiucong Shi, YuBing Zhou, Jingsong Lv, Shengyun Xu. 591-598 [doi]
- Safety Analysis of Metro Turnouts Based on Fuzzy FMECAJingsong Lv, Shengyun Xu, Rongyue Zhang, Hong Xiao, Zhigang Chen. 599-606 [doi]
- FPGA Implementation and Power Estimation of a Memory-Reduced LTE-Advanced Turbo DecoderYaqin Shi, Ming Zhan, Jie Zeng. 607-611 [doi]
- High-Precision Indoor Localization Based on RFID and Stepscan Floor TilesIshar Pratap Singh, Qiang Ye, Srinivas Sampalli. 612-617 [doi]
- Multi-Scale Feature Learning Based on RICA for Single Training Sample Face RecognitionYongyong Mei, Xingang Liu, Tao Yu, Cheng Dai, Jingren Yan. 618-621 [doi]
- The Measurement Coverage for Boolean Tomography with Limited End MonitorsShengli Pan. 622-626 [doi]
- Mind Your Step: Monitoring Pedestrian SidewalksMassimo Marchiori. 627-634 [doi]
- Video Based Action Recognition Using Spatial and Temporal FeatureCheng Dai, Xingang Liu, Luhao Zhong, Tao Yu. 635-638 [doi]
- EB-Boost: Medium-Long Term Forecasting Method of Supplies of Shared E-Cars in Smart Scenic SpotsHong Li, Xiaosheng Yang, Yao Xia, Lujie Zheng, Jie Wang, Guoqing Yang, Pan Lv. 639-643 [doi]
- Real-Time Object Recognition Based on NAO Humanoid RobotQianyuan Liu, Chengjin Zhang, Yong Song, Bao Pang. 644-650 [doi]
- A Hybrid Model of Empirical Wavelet Transform and Extreme Learning Machine for Dissolved Oxygen ForecastingWeijian Cao, Yuwan Gu, Juan Huan, Yilin Qin. 651-656 [doi]
- An Improved TFIDF Algorithm Based on Dual Parallel Adaptive Computing ModelYuwan Gu, Yaru Wang, Juan Huan, Yuqiang Sun, Weikuan Jia. 657-663 [doi]
- Application of Blockchain Technology to Smart City Service: A Case of RidesharingShuchih Ernest Chang, -and Chi-Yin Chang. 664-671 [doi]
- Global Stabilization of High-Order Stochastic Nonlinear Systems Disturbed by Unknown Covariance Noise and Time-Varying DelayHuifang Min, Jason Gu, Na Duan, Chengyang Luo. 672-676 [doi]
- Identification by Gait Using Convolutional Restricted Boltzmann Machine and Voting AlgorithmTao Yu, Xingang Liu, Yongyong Mei, Cheng Dai, Jingren Yan. 677-681 [doi]
- Design and Control of an Intelligent Wheeled RobotYong Song, Changshen Xu, Xing Fang, Caihong Li, Di Wang, Simon X. Yang. 682-686 [doi]
- Design and Evaluation of Jamming Resilient Cyber-Physical SystemsIvana Tomic, Michael J. Breza, Greg Jackson, Laksh Bhatia, Julie A. McCann. 687-694 [doi]
- Android Evaluation Methodology in Automotive ElectronicsHong Li, Huarui Zhang, Lei Huang, Kailai Shao, Guoqing Yang, Nenggan Zheng, Xufeng Jiang. 695-699 [doi]
- AMLT: A Mutual Authentication Scheme for Mobile Cloud ComputingSaurabh Dey, Qiang Ye, Srinivas Sampalli. 700-705 [doi]
- An Improved Automatic Thumbnail Generation Algorithm Based on Interpolation TechniqueGuifan Weng, Chun Yang, Jinyi Long, Shanying Chen. 706-711 [doi]
- Patch-Wise Normalization for Pose-Invariant Face Recognition from Single SampleJingren Yan, Yongyong Mei, Xingang Liu, Cheng Dai, Tao Yu. 712-715 [doi]
- Maximum Incremental Load Recursive Model Based on LS-SVM Considering Accumulated Temperature EffectTi Guan, Zheng Xu, Lin Lin, Guilin Zhang, Yujian Jia, Yawen Shi. 716-719 [doi]
- Energy-Aware Task Offloading for Ultra-Dense Edge ComputingJie Zhang, Hongzhi Guo, Jiajia Liu. 720-727 [doi]
- The Distribution of Transient Magnetic Field and Eddy Current Losses of Three-Phase Five-Legged Transformer Under DC BiasDong Xia. 728-732 [doi]
- Semi-Automatic Neuron Tracing in Electron Microscope Images: Preliminary ResultsDeli Wang, Weijie Liu, Nenggan Zheng, Ting Zhao. 733-738 [doi]
- Smooth 3D Trajectory Segmentation for Flying InsectsLei Zhao, Nenggan Zheng, Qian Ma. 739-745 [doi]
- Optimizing Rescheduling Intervals Through Using Multi-Armed Bandit AlgorithmsFuhua Lin, M. Ali Akber Dewan, Matthew Nguyen. 746-753 [doi]
- Representation and Computation Method for Bumblebee's Abdomen MovementsRuixia Guan, Yan Qi, Yi Jiang, Nenggan Zheng. 754-757 [doi]
- Achieving Real-Time Quality of Service with Software Defined NetworkingZhaoquan Gu, Yuexuan Wang, Xiao Lin. 758-765 [doi]
- An Overview on Smart Maintenance Service Scheduling System and Theoretical Basis for Agricultural MachineryYu Liu, Yaoguang Hu, Jingqian Wen, Yue Tang. 766-771 [doi]
- Dynamic Construction and Evolution Analysis of Manufacturing Service Network Supported by Machine Tools in Cloud Manufacturing EnvironmentXiaorong Gong, Chao Yin, Xiaobin Li. 772-779 [doi]
- The Complex Network Model Construction of Multi-Objective Job Shop Based on Data InformationXuesong Jiang, Jiarong Han, Xiumei Wei, QuanJun Li. 780-785 [doi]
- Research of Optimal Splitting Level of Splitting AlgorithmLiping Wang, Wenhui Fan. 786-790 [doi]
- A Blockchain Model for Industrial InternetLei Ren 0001, Sanbao Zheng, Lin Zhang. 791-794 [doi]
- A Testing Method of the Residual Information Clearance in Virtual Machine for the Cloud Operating SystemYan Chen, Jing Lai, Xiang Wei. 795-800 [doi]
- A Sharing Bike Scheduling Optimization Algorithm Based on Two-Dimensional Dynamic Model and Improved Genetic AlgorithmZhenheng Liu, Lei Ren. 801-806 [doi]
- A Finite Multi-Dimensional Generalized Gamma Mixture ModelBasim Alghabashi, Nizar Bouguila. 807-814 [doi]
- Convolution Recurrent Neural Networks for Short-Term Prediction of Atmospheric Sensing DataPeijiang Zhao, Koji Zettsu. 815-821 [doi]
- KD1: A Sampling-Based Clustering Scheme for Large Data SetsAfees Adegoke Odebode, Qiang Ye, Srinivas Sampalli, Saurabh Dey. 822-827 [doi]
- Period Detection and Future Trend Prediction Using Machine Learning TechniquesHaoye Lu, Anand Srinivasan, Amiya Nayak. 828-833 [doi]
- AI Enhanced Alarm Presentation for Quality MonitoringSatu Tamminen, Xiaoli Liu, Henna Tiensuu, Eija Ferreira, Esa Puukko, Juha Röning. 834-839 [doi]
- Featuring Real-Time Imbalanced Network Traffic ClassificationSi Saber Meriem Amina, Abdolkhalegh Bayati, Kim Khoa Nguyen, Mohamed Cheriet. 840-846 [doi]
- INGRIM: A Middleware to Enable Remote Method Invocation Routing in Multiple Group Device-To-Device NetworksMinh Le, Stephen W. Clyde. 847-857 [doi]
- Data Anomaly Detection with Parallelizing CDP AlgorithmYuan Wang, Vincent Ng. 858-863 [doi]
- Analysis of the Symmetry Properties of Large Periodic Magnetic Systems, to Reduce the Computation Time of the Calculation of the Magnetostatic Dipolar EnergyIvan Cabria. 864-871 [doi]
- Hybrid Relabeled Model for Network Intrusion DetectionBhumika Patel, Zaheenabanu Somani, Samuel A. Ajila, Chung-Horng Lung. 872-877 [doi]
- Path Planning in Support of Smart Mobility Applications Using Generative Adversarial NetworksMehdi Mohammadi, Ala I. Al-Fuqaha, Jun-Seok Oh. 878-885 [doi]
- ExperTwin: An Alter Ego in Cyberspace for Knowledge WorkersCarlos Toxtli, Claudia Flores-Saviaga, M. Maurier, A. Ribot, T. Bankole, A. Entrekin, M. Cantley, S. Singh, S. Reddy, R. Reddy. 886-891 [doi]
- STDP: Secure Privacy-Preserving Trajectory Data PublishingChris Soo-Hyun Eom, Wookey Lee, Carson Kai-Sang Leung. 892-899 [doi]
- Smart Data Analysis for Water Quality in Catchment Area MonitoringDi Wu, Hadi Mohammed, Hao Wang, Razak Seidu. 900-908 [doi]
- Visualization and Analysis of Breast Cancer DataSonal Bajaj, Waqar Haque. 909-915 [doi]
- An Analysis on User Searches EffectsNunziato Cassavia, Elio Masciari, Chiara Pulice, Domenico Saccà. 916-921 [doi]
- Correlation Analysis Using Customer's Actual Data and Prediction Method of Store PreferenceSo-Hyun Park, Young-Ho Park 0002. 922-924 [doi]
- Data Stream Analysis of Online ActivitiesKouki Kawabata, Yasuko Matsubara, Yasushi Sakurai. 925-926 [doi]
- DoOC: A Platform for Domain-Oriented Online Community System ConstructionBingyang Huang, Chaokun Wang, Jun Qian. 927-930 [doi]
- Real-Time Transmission of Secured PLCs Sensing DataBunrong Leang, Rock Won Kim, Kwan-Hee Yoo. 931-932 [doi]
- Robust Fault Analysis Using Sensors in Semiconductor Manufacturing ProcessesWoong-Kee Loh, Young-Kuk Kim. 933-934 [doi]
- Discussions on Subgraph Ranking for Keyworded SearchJustin JongSu Song, Inkyo Kang, Wookey Lee, Jinho Kim, Joo-Yeon Lee. 935-936 [doi]
- On the Designing of Popular PackagesYangjun Chen, Wei Shi. 937-944 [doi]
- Formal Requirement Enforcement on Smart Contracts Based on Linear Dynamic LogicNaoto Sato, Takaaki Tateishi, Shunichi Amano. 945-954 [doi]
- Security Vulnerabilities in Ethereum Smart ContractsArdit Dika, Mariusz Nowostawski. 955-962 [doi]
- Auto-Generation of Smart Contracts from Domain-Specific Ontologies and Semantic RulesOlivia Choudhury, Nolan Rudolph, Issa Sylla, Noor Fairoza, Amar Das. 963-970 [doi]
- Window Based BFT Blockchain ConsensusMohammad M. Jalalzai, Costas Busch. 971-979 [doi]
- Model-Checking of Smart ContractsZeinab Nehai, Pierre-Yves Piriou, Frédéric F. Daumas. 980-987 [doi]
- Smartsupply: Smart Contract Based Validation for Supply Chain BlockchainShuang Su, Ke Wang, Hyong S. Kim. 988-993 [doi]
- Identity Management in IoT Networks Using Blockchain and Smart ContractsAhmad Sghaier Omar, Otman Basir. 994-1000 [doi]
- A Cache Enhanced Endorser Design for Mitigating Performance Degradation in Hyperledger FabricFeng Lu, Lu Gan, Zhongli Dong, Wei Li, Hai Jin, Albert Y. Zomaya. 1001-1006 [doi]
- Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-BlockchainsGokhan Sagirlar, Barbara Carminati, Elena Ferrari, John D. Sheehan, Emanuele Ragnoli. 1007-1016 [doi]
- A Sybil Resistant IoT Trust Model Using BlockchainsSarah Asiri, Ali Miri. 1017-1026 [doi]
- BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTsRonghua Xu, Yu Chen, Erik Blasch, Genshe Chen. 1027-1034 [doi]
- A Cross-Chain Solution to Integration of IoT Tangle for Data Access ManagementYiming Jiang, Chenxu Wang, Ye Huang, Siyu Long, Yilun Huo. 1035-1041 [doi]
- Ensuring Proof-of-Authenticity of IoT Edge Devices Using Blockchain TechnologyUjjwal Guin, Pinchen Cui, Anthony Skjellum. 1042-1049 [doi]
- Chain Veri: Blockchain-Based Firmware Verification System for IoT EnvironmentJea-Min Lim, Young-Pil Kim, Chuck Yoo. 1050-1056 [doi]
- An Evaluation of the Security of the Bitcoin Peer-To-Peer NetworkJames Tapsell, Raja Naeem Akram, Konstantinos Markantonakis. 1057-1062 [doi]
- Secure Time Synchronization Scheme in IoT Based on BlockchainKai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, Yintang Yang. 1063-1068 [doi]
- When Can a Distributed Ledger Replace a Trusted Third Party?Thomas Locher, Sebastian Obermeier, Yvonne Anne Pignolet. 1069-1077 [doi]
- Physical Access Control Management System Based on Permissioned BlockchainSara Rouhani, Vahid Pourheidari, Ralph Deters. 1078-1083 [doi]
- ZoKrates - Scalable Privacy-Preserving Off-Chain ComputationsJacob Eberhardt, Stefan Tai. 1084-1091 [doi]
- Conifer: Centrally-Managed PKI with Blockchain-Rooted TrustYuhao Dong, Woojung Kim, Raouf Boutaba. 1092-1099 [doi]
- Distributed Data Vending on BlockchainJiayu Zhou, Fengyi Tang, He Zhu, Ning Nan, Ziheng Zhou. 1100-1107 [doi]
- Improving End-to-End Verifiable Voting Systems with Blockchain TechnologiesAnthony J. Perez, Ebrima N. Ceesay. 1108-1115 [doi]
- Distributed Public Key Infrastructure and PSK Exchange Based on Blockchain TechnologyElie F. Kfoury, David Kfoury. 1116-1120 [doi]
- IPFS for Reduction of Chain Size in EthereumRobert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Andrea J. Cullen. 1121-1128 [doi]
- A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed LedgerReza Soltani, Uyen Trang Nguyen, Aijun An. 1129-1136 [doi]
- Drugledger: A Practical Blockchain System for Drug Traceability and RegulationYan Huang, Jing Wu 0006, Chengnian Long. 1137-1144 [doi]
- Astraea: A Decentralized Blockchain OracleJohn Adler, Ryan Berryhill, Andreas G. Veneris, Zissis Poulos, Neil Veira, Anastasia Kastania. 1145-1152 [doi]
- Multi-Class Bitcoin-Enabled Service Identification Based on Transaction History SummarizationKentaroh Toyoda, Tomoaki Ohtsuki, P. Takis Mathiopoulos. 1153-1160 [doi]
- Routing Payments on the Lightning NetworkGiovanni Di Stasi, Stefano Avallone, Roberto Canonico, Giorgio Ventre. 1161-1170 [doi]
- B-FICA: BlockChain based Framework for Auto-Insurance Claim and AdjudicationChuka Oham, Raja Jurdak, Salil S. Kanhere, Ali Dorri, Sanjay K. Jha. 1171-1180 [doi]
- Improving the Process of Lending, Monitoring and Evaluating Through Blockchain Technologies: An Application of Blockchain in the Brazilian Development Bank (BNDES)Gladstone Moises Arantes, Jose Nogueira D'Almeida, Marcio Teruo Onodera, Suzana Mesquita De Borba Maranhao Moreno, Vanessa Da Rocha Santos Almeida. 1181-1188 [doi]
- Blockchained Post-Quantum SignaturesKonstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter. 1196-1203 [doi]
- Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health EnvironmentHarsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk. 1204-1211 [doi]
- Proposal of Proof-of-Lucky-Id(PoL) to Solve the Problems of PoW and PoSTakeshi Ogawa, Hayato Kima, Noriharu Miyaho. 1212-1218 [doi]
- A Strong Adaptive, Strategic Double-Spending Attack on BlockchainsGholamreza Ramezan, Cyril Leung, Z. Jane Wang. 1219-1227 [doi]
- CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion DetectionSteven Tug, Weizhi Meng, Yu Wang 0017. 1228-1235 [doi]
- IPchain: Securing IP Prefix Allocation and Delegation with BlockchainJordi Paillisse, Miquel Ferriol, Eric Garcia, Hamid Latif, Carlos Piris, Albert Lopez-Bresco, Brenden Kuerbis, Alberto Rodríguez Natal, Vina Ermagan, Fabio Maino, Albert Cabellos. 1236-1243 [doi]
- ChainChannels: Private Botnet Communication Over Public BlockchainsDavor Frkat, Robert Annessi, Tanja Zseby. 1244-1252 [doi]
- Economic Analyses of Security Investments on Cryptocurrency ExchangesBenjamin Johnson 0001, Aron Laszka, Jens Grossklags, Tyler Moore. 1253-1262 [doi]
- SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected CommunitiesScott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey. 1263-1272 [doi]
- Rethinking Blockchain Security: Position PaperVincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski. 1273-1280 [doi]
- Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium BlockchainKei-Léo Brousmiche, Antoine Durand, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida. 1281-1286 [doi]
- A Preliminary Research of Prediction Markets Based on Blockchain Powered Smart ContractsShuai Wang, Xiaochun Ni, Yong Yuan, Fei-Yue Wang, Xiao Wang, Liwei Ouyang. 1287-1293 [doi]
- Blockchain for Civil Engineering Practices in Smart CitiesRonald Chun Yu Lam, Alvin Junus, Joseph Yiu Wing Mak, Ronald Chun Yu Lam, Peter Kai Kwong Lee. 1294-1300 [doi]
- A Novel Heuristics for Validating Pairwise Transactions on CryptocurrenciesSaulo dos Q. Santos, Daniyal Khowaja, Muskan Vinayak, Ruppa K. Thulasiram, Parimala Thulasiraman. 1301-1307 [doi]
- BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency WalletsMordechai Guri. 1308-1316 [doi]
- V-Chain: A Blockchain-Based Car Lease PlatformKwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, Sandro Amofa, Kingsley Nketia Acheampong, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani. 1317-1325 [doi]
- BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICSSumanta Bose, Mayank Raikwar, Debdeep Mukhopadhyay, Anupam Chattopadhyay, Kwok-Yan Lam. 1326-1335 [doi]
- Deployment of a Blockchain-Based Self-Sovereign IdentityQuinten Stokkink, Johan Pouwelse. 1336-1342 [doi]
- Secure Credit Reporting on the BlockchainAmir Kafshdar Goharshady, Ali Behrouz, Krishnendu Chatterjee. 1343-1348 [doi]
- PRIDE: A Private and Decentralized Usage-Based Insurance Using BlockchainZhiguo Wan, Zhangshuang Guan, Xiuzhen Cheng. 1349-1354 [doi]
- IoT Meets Blockchain: Parallel Distributed Architecture for Data Storage and SharingShaowei Liu, Jing Wu 0006, Chengnian Long. 1355-1360 [doi]
- Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social NetworksXiaoyang Zhu, Youakim Badr. 1361-1366 [doi]
- Webchain: Verifiable Citations and References for the World Wide WebElias Rohrer, Steffen Heidel, Florian Tschorsch. 1367-1372 [doi]
- Blockchain Access Control Ecosystem for Big Data SecurityUchi Ugobame Uchibeke, Kevin A. Schneider, Sara Hosseinzadeh Kassani, Ralph Deters. 1373-1378 [doi]
- Blockchain Based Access Control ServicesDamiano Di Francesco Maesa, Paolo Mori, Laura Ricci. 1379-1386 [doi]
- Blockchain for the Common Good: A Digital Currency for Citizen Philanthropy and Social EntrepreneurshipShweta Jain, Rahul Simha. 1387-1394 [doi]
- Secure Fair and Efficient Data Trading Without Third Party Using BlockchainZhangshuang Guan, Xiaobei Shao, Zhiguo Wan. 1395-1401 [doi]
- Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security AnalyticsGeorge D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert 0001. 1402-1409 [doi]
- Blockchain-Enabled Peer-to-Peer Data Trading MechanismMoein Sabounchi, Jin Wei, Rigoberto Roche'. 1410-1416 [doi]
- Blockchain Use Cases in Digital Sectors: A Review of the LiteratureShiroq Al-Megren, Shada AlSalamah, Lina Altoaimy, Hessah A. Alsalamah, Leili Soltanisehat, Emad Almutairi, Alex Pentland. 1417-1424 [doi]
- Solving Global Cybersecurity Problems by Connecting Trust Using BlockchainChristopher Gorog, Terrance E. Boult. 1425-1432 [doi]
- Trust Management in Fog/Edge Computing by Means of Blockchain TechnologiesMarcello Cinque, Christian Esposito, Stefano Russo. 1433-1439 [doi]
- A Batch-Service Queueing System with General Input and Its Application to Analysis of Mining Process for Bitcoin BlockchainYoshiaki Kawase, Shoji Kasahara. 1440-1447 [doi]
- Niji: Autonomous Payment Bridge Between Bitcoin and Consortium BlockchainHiroki Watanabe, Shigenori Ohashi, Shigeru Fujimura 0002, Atsushi Nakadaira, Kota Hidaka, Jay Kishigami. 1448-1455 [doi]
- Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus ProtocolsChi-Ning Chou, Yu-Jing Lin, Ren Chen, Hsiu-Yao Chang, I-Ping Tu, Shih-Wei Liao. 1456-1462 [doi]
- UTXOs as a Proof of Membership for Byzantine Agreement Based CryptocurrenciesEmmanuelle Anceaume, Antoine Guellier, Romaric Ludinard. 1463-1468 [doi]
- ComChain: Bridging the Gap Between Public and Consortium BlockchainsGuillaume Vizier, Vincent Gramoli. 1469-1474 [doi]
- A Quantifiable Trust Model for Blockchain-Based Identity ManagementAndreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel. 1475-1482 [doi]
- A Practical Screening Method for Blockchain-Based SystemsYuki Kondo, Taku Shimosawa, Satoshi Oshima. 1483-1490 [doi]
- A Cybersecurity Case for the Adoption of Blockchain in the Financial IndustryMiroslav Kis, Bobby Singh. 1491-1498 [doi]
- Blockchain-Based, Decentralized Access Control for IPFSMathis Steichen, Beltran Fiz, Robert Norvill, Wazen M. Shbair, Radu State. 1499-1506 [doi]
- Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT SensorsOmnia Mahmoud, Henning Kopp, Amr T. Abdelhamid, Frank Kargl. 1507-1512 [doi]
- Design Patterns for Smart Contracts in the Ethereum EcosystemMaximilian Wohrer, Uwe Zdun. 1513-1520 [doi]
- ReviewChain: Smart Contract Based Review System with Multi-Blockchain GatewayKe Wang, Zhizhe Zhang, Hyong S. Kim. 1521-1526 [doi]
- LoC: Poverty Alleviation Loan Management System Based on Smart ContractsChaonian Guo, Shenglan Ma, Hao Wang, Shuhan Cheng, Tongsen Wang. 1527-1532 [doi]
- TM: A Secure Decentralized Medical Data Asset Management SystemSara Rouhani, Luke Butterworth, Adam D. Simmons, Darryl G. Humphery, Ralph Deters. 1533-1538 [doi]
- Secure Smart Contract System Built on SMPC Over BlockchainYan Zhu 0010, Xiaoxu Song, Shuai Yang, Yao Qin, Qiong Zhou. 1539-1544 [doi]
- Bridging Paxos and Blockchain ConsensusAleksey Charapko, Ailidani Ailijiang, Murat Demirbas. 1545-1552 [doi]
- Adjudicating Violations in Data Sharing Agreements Using Smart ContractsHarsh Bimal Desai, Kevin Liu, Murat Kantarcioglu, Lalana Kagal. 1553-1560 [doi]
- E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter PrivacyFreya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis. 1561-1567 [doi]
- A Survey on Blockchain-Based Identity Management Systems for the Internet of ThingsXiaoyang Zhu, Youakim Badr. 1568-1573 [doi]
- Internet of Blockchains: Techniques and Challenges AheadHoang Tam Vo, Ziyuan Wang, Dileban Karunamoorthy, John Wagner, Ermyas Abebe, Mukesh K. Mohania. 1574-1581 [doi]
- Blockchain Tradeoffs and Challenges for Current and Emerging Applications: Generalization, Fragmentation, Sidechains, and ScalabilityCarl R. Worley, Anthony Skjellum. 1582-1587 [doi]
- A Case Study of Execution of Untrusted Business Process on Permissioned BlockchainVahid Pourheidari, Sara Rouhani, Ralph Deters. 1588-1594 [doi]
- Blockchain-Based Supply Chain Traceability: Token Recipes Model Manufacturing ProcessesMartin Westerkamp, Friedhelm Victor, Axel Küpper. 1595-1602 [doi]
- A Mechanism Design Approach to Blockchain ProtocolsAbhishek Ray, Mario Ventresca, Hong Wan. 1603-1608 [doi]
- Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging StationsEnes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac. 1609-1615 [doi]
- RFID Based Verifiable Ownership Transfer Protocol Using Blockchain TechnologyS. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar. 1616-1621 [doi]
- Erasure Code-Based Low Storage Blockchain NodeDoriane Perard, Jérôme Lacan, Yann Bachy, Jonathan Detchart. 1622-1627 [doi]
- Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain NetworksShahzaib Tahir, Muttukrishnan Rajarajan. 1628-1633 [doi]
- Toward Privacy-Assured Health Insurance ClaimsXinchi He, Sarra M. Alqahtani, Rose F. Gamble. 1634-1641 [doi]
- Towards Anonymous, Unlinkable, and Confidential Transactions in BlockchainKalpana Singh, Nicolas Heulot, Elyes Ben Hamida. 1642-1649 [doi]
- Building Trust & Protecting Privacy: Analyzing Evidentiary Quality in a Blockchain Proof-of-Concept for Health Research Data Consent ManagementDarra Hofman, Casey P. Shannon, Bruce McManus, Victoria Lemieux, Karen K. Y. Lam, Sara Assadian, Raymond T. Ng. 1650-1656 [doi]
- Study on Integrity and Privacy Requirements of Distributed Ledger TechnologiesSachiko Yoshihama, Shin Saito. 1657-1664 [doi]
- Sharding BlockchainSherman S. M. Chow, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao 0001. 1665 [doi]
- The Blockchain of Things, Beyond Bitcoin: A Systematic ReviewFthi Arefayne Abadi, Joshua Ellul, George Azzopardi. 1666-1672 [doi]
- Macroprogramming the Blockchain of ThingsAdrian Mizzi, Joshua Ellul, Gordon J. Pace. 1673-1678 [doi]
- Streaming Data Payment Protocol (SDPP) for the Internet of ThingsRahul Radhakrishnan, Bhaskar Krishnamachari. 1679-1684 [doi]
- SmartEdge: A Smart Contract for Edge ComputingKwame-Lante Wright, Martin-Martinez, Uday Chadha, Bhaskar Krishnamachari. 1685-1690 [doi]
- Modeling the Energy Consumption of Blockchain Consensus AlgorithmsRyan Cole, Liang Cheng. 1691-1696 [doi]
- On M2M Micropayments: A Case Study of Electric Autonomous VehiclesDragos Strugar, Rasheed Hussain, Manuel Mazzara, Victor Rivera, Jooyoung Lee, Ruslan Mustafin. 1697-1700 [doi]
- Analyzing Financial Smart Contracts for BlockchainMuskan Vinayak, Amrit Pal Singh Panesar, Saulo dos Q. Santos, Ruppa K. Thulasiram, Parimala, Srimantoorao S. Appadoo. 1701-1706 [doi]
- A Novel Image Mosaic Method Based on Improved ORB and its Application in Police-UAVShuai Wang, Yingying Zhang, Wenshuang Wang, Yanqing Zhao, Shiwei Zhu. 1707-1713 [doi]
- Gray Image Reconstruction Algorithm Based 1p Optimization for Sparse RepresentationHaiying Liu, Junmei Guo, Fangzhou Xu, Lixia Deng, Hui Zhang. 1714-1718 [doi]
- Social Image Captioning with Tags-Based Attention ModelYiwei Wei, Chunlei Wu, Xiaoliang Chu, Weishan Zhang, Leiquan Wang. 1719-1724 [doi]
- Canny SLIC to Compute Content-Sensitive SuperpixelsYousef Abu Baker, Iker Gondra. 1725-1732 [doi]
- ECPUB: An Energy Efficiency Evaluation Metric in Wireless Sensor NetworkYuxin Liu, Weidong Fang, Wuxiong Zhang, Weiwei Gao, Haiguang Chen, Yuanyuan Zhu. 1733-1738 [doi]
- On the Torus Pairwise Disjoint-Path Routing ProblemAntoine Bossard, Keiichi Kaneko. 1739-1746 [doi]
- Passive CH Election Avoidance Protocol and CH Routing Protocol In VANETAhmad Abuashour, Michel Kadoch. 1753-1758 [doi]
- Research on Wireless Sensor Networks Routing Algorithms for Coal Mine Mobile SensingWei Chen, Yuequn, Ke Wang, Weidong Fang, Wuxiong Zhang, Tao Pan. 1759-1764 [doi]
- Energy-Efficient Improvements in Mod-LEACH Protocol on Optimal Cluster Heads SelectionZhenpeng Pang, Wuxiong Zhang, Shenghu Wang, Jufeng Luo, Haiguang Chen. 1765-1769 [doi]
- Automated Concept Extraction in Internet-of-ThingsYuanyuan Bao, Wai Chen. 1770-1776 [doi]
- Performance Evaluation of an IoV-Based Intersection Traffic Control ApproachIman Saeed, Mourad Elhadef. 1777-1784 [doi]
- Load Balancing in the Fog of Things Platforms Through Software-Defined NetworkingErnando Batista, Gustavo B. Figueiredo, Maycon Peixoto, Martin Serrano, Cassio V. S. Prazeres. 1785-1791 [doi]
- An Overview on the Applications and Security Issues of Fog ComputingFangming Bi, Xuzhi Miao, Wei Chen 0036, Weidong Fang, Wuxiong Zhang, Deyu Wang. 1792-1797 [doi]
- A Robust Protocol for Circumventing Censoring FirewallsJunLin Chen, Uyen Trang Nguyen. 1798-1805 [doi]
- A Novel Trust Management Scheme for Defending Against On-Off Attack Based on Gaussian DistributionNan Zhou, Weidong Fang, Wuxiong Zhang, Xiaoxiao Lv, JiFeng Huang. 1806-1811 [doi]
- License Plate Recognition Based On Adaptive ThresholdHuiyuan Zhou, Shubo Qiu, Haiying Liu, Chao Huang. 1812-1816 [doi]
- Non-Invasive Sleeping Posture Recognition and Body Movement Detection Based on RFIDXiaoxuan Hu, Kagome Naya, Peng Li, Toshiaki Miyazaki, Kun Wang, Yanfei Sun. 1817-1820 [doi]
- Domain Adaptation Transduction: An Algorithm for Autonomous Training with Applications to Activity Recognition Using Wearable DevicesYang Li, Yuanyuan Bao, Wai Chen. 1821-1828 [doi]
- DCNN Based Real-Time Adaptive Ship License Plate Recognition (DRASLPR)Weishan Zhang, Haoyun Sun, Jiehan Zhou, Xin Liu, Zhanmin Zhang, Guizhi Min. 1829-1834 [doi]
- LSTM-Based Service Migration for Pervasive Cloud ComputingHaifeng Jing, Yafei Zhang, Jiehan Zhou, Weishan Zhang, Xin Liu, Guizhi Min, Zhanmin Zhang. 1835-1840 [doi]
- Infinite Scaled Dirichlet Mixture Models for Spam Filtering via Bayesian and Variational Bayes LearningFahd Aldosari, Sami Bourouis, Nizar Bouguila, Hassen Sallay, Khalid M. Jamil Khayyat. 1841-1847 [doi]
- Method to Annotate Arrhythmias by Deep NetworkWeijia Lu, Jie Shuai, Shuyan Gu, Joel Xue. 1848-1851 [doi]
- Construction of a Software Measurement Tool Using Systematic Literature ReviewKarine Valença, Edna Dias Canedo, Rejane Maria da Costa Figueiredo. 1852-1859 [doi]
- Concept Extraction: A Modular Approach to Extraction of Source Code ConceptsRitu Chaturvedi, Veerpal Brar, Jai Geelal, Kelvin Kong. 1860-1866 [doi]
- Application of Birth Defect Prediction Model Based on C5.0 Decision Tree AlgorithmJunmei Guo, Haiying Liu, Yizhong Luan, Yun Wu. 1867-1871 [doi]
- Detecting Vulnerable Java Classes Based on the Analysis of Java Library Call GraphHyosung Park, Chulwoo Park, Sangbong Yoo, Kichang Kim. 1872-1879 [doi]
- Topological Response to Deadlock Detection and Resolution in Real-Time Database SystemsWaqar Haque, Adam Vezina, Matthew Fontaine. 1880-1887 [doi]
- A Collaborative Location Querying Method Based on Caching InformationXin Lyu, Juan Chen, Tao Zeng, Chenglong Li. 1888-1893 [doi]
- Evaluation on Applicability of Measurement-Based Join Cost Calculation Method Using Different Generation CPUsTsuyoshi Tanaka, Hiroshi Ishikawa. 1894-1901 [doi]
- Non-Contact Method of Heart Rate Using a WebcamJin Zhao, JiFeng Huang, Guoqing Jia, Xiaohong Ji, Lianhai Shan. 1902-1906 [doi]
- Quality of Service Aware Dynamic BBU-RRH Mapping Based on Load Prediction Using Markov Model in C-RANMostafa Mouawad, Zbigniew Dziong, Muhammad Khan. 1907-1912 [doi]
- Content Placement Aware Cache Decision: A Caching Policy Based on the Content Replacement Ratio for Information-Centric NetworkPaulo Sena, Igor Carvalho, Antonio Abelém. 1913-1920 [doi]
- Exploiting Buffer Overflow Vulnerabilities in Software Defined RadiosSeth D. Hitefield, Michael C. Fowler, T. Charles Clancy. 1921-1927 [doi]
- Revisiting Industry 4.0 with a Case StudyJiangning Chen, Jiehan Zhou. 1928-1932 [doi]
- Thin Implicit Utah Teapot: Design for Additive ManufacturingQuan Qi, Qingde Li. 1933-1940 [doi]
- Exploring Blockchain Technology for Capital Markets: A Case of Angel FundShuchih Ernest Chang, Siao Yin He. 1941-1948 [doi]