Abstract is missing.
- Regression-based network monitoring in swarm robotic systemsJosh Rands, Qi Han. 1-10 [doi]
- Efficient content caching for named data network nodesVirendra Singh Shekhawat, Ankur Vineet, Avinash Gautam. 11-19 [doi]
- A deep spatio-temporal attention-based neural network for passenger flow predictionYanling Cui, Beihong Jin, Fusang Zhang, Xingwu Sun. 20-30 [doi]
- Mobile augmented reality techniques for emergency responseAlexandre Campos, Nuno Correia 0001, Teresa Romão, Isabel L. Nunes, Mário Simões-Marques. 31-39 [doi]
- The impression of virtual experience: mobile augmented reality cloud solutionYing Zhao, Wenyuan Tao, Chung-Ming Own. 40-49 [doi]
- Jive: spatially-constrained encryption key sharing using visible light communicationJayanth Shenoy, Aditya Tyagi, Meha Halabe, Christine Julien 0001. 50-59 [doi]
- {P}Net: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networksChristian Meurisch, Sebastian Kauschke, Tim Grube, Bekir Bayrak, Max Mühlhäuser. 60-69 [doi]
- HEliOS: huffman coding based lightweight encryption scheme for data transmissionMazharul Islam, Novia Nurain, Mohammad Kaykobad, Sriram Chellappan, A. B. M. Alim Al Islam. 70-79 [doi]
- Indoor localization based on subcarrier parameter estimation of LoS with wi-fiBobai Zhao, Dali Zhu, Tong Xi, Siye Wang, Di Wu 0004. 80-89 [doi]
- Pushing smart caching to the edge with BayCacheDongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal. 90-99 [doi]
- MultiLock: biometric-based graded authentication for mobile devicesShravan Aras, Chris Gniady, Hari Venugopalan. 100-109 [doi]
- An intelligent optimization method for information recommendationShunan Ma, Xunbo Shuai, Yongcai Chai. 110-115 [doi]
- Quantifying location privacy in permissioned blockchain-based internet of things (IoT)Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj, Kia Makki, Edwin Aguilar. 116-125 [doi]
- A scheme for anomalous RFID trajectory detection based on improved clustering algorithm under digital-twin-drivenMengnan Cai, Siye Wang, Xinling Shen, Yijia Jin. 126-134 [doi]
- Adaptive robotic rehabilitation using muscle fatigue as a triggerVarun Kanal, Maher Abujelala, James Brady, Glenn Wylie, Fillia Makedon. 135-142 [doi]
- PatientSense: patient discrimination from in-bottle sensors dataMurtadha Aldeer, Jorge Ortiz, Richard E. Howard, Richard P. Martin. 143-152 [doi]
- A cost-effective and non-invasive system for sleep and vital signs monitoring using passive RFID tagsZawar Hussain, Subhash Sagar, Wei Emma Zhang, Quan Z. Sheng. 153-161 [doi]
- AugToAct: scaling complex human activity recognition with few labelsAbu Zaher Md Faridee, Md Abdullah Al Hafiz Khan, Nilavra Pathak, Nirmalya Roy. 162-171 [doi]
- PPCA: privacy-preserving conditional actions for IoT environments using smart contractsTam Le, Matt W. Mutka. 172-179 [doi]
- MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensorsJianchao Lu, Xi Zheng, Quan Z. Sheng, Zawar Hussain, Jiaxing Wang, Wanlei Zhou. 180-189 [doi]
- A trust architecture for blockchain in IoTVolkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri, Salil S. Kanhere. 190-199 [doi]
- Detecting malicious applications using system services request behaviorMajid Salehi, Morteza Amini, Bruno Crispo. 200-209 [doi]
- WiLay: building wi-fi-based human activity recognition system through activity hierarchical relationshipYongqiang Jiang, Hai-Miao Hu, Yanglin Pu, Haoran Jiang. 210-219 [doi]
- On optimization of ad-blocking lists for mobile devicesSaad Sajid Hashmi, Muhammad Ikram, Stephen Smith. 220-227 [doi]
- Impact of consensus on appendable-block blockchain for IoTRoben Castagna Lunardi, Regio A. Michelin, Charles V. Neu, Henry C. Nunes, Avelino F. Zorzo, Salil S. Kanhere. 228-237 [doi]
- Time-aware reactive storage in wireless edge environmentsJoão A. Silva, Hervé Paulino, João M. Lourenço, João Leitão 0001, Nuno M. Preguiça. 238-247 [doi]
- MicPrint: acoustic sensor fingerprinting for spoof-resistant mobile device authenticationYongwoo Lee, Jingjie Li, Younghyun Kim. 248-257 [doi]
- DeepLoc: deep neural network-based telco localizationYige Zhang, Yu Xiao, Kai Zhao, Weixiong Rao. 258-267 [doi]
- Smart discovery of periodic-frequent human routines for home automationAlejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon. 268-277 [doi]
- NextAct: a hybrid approach for high-resolution human activity predictionsChristian Meurisch, Artur Gogel, Bekir Bayrak, Max Mühlhäuser. 278-287 [doi]
- Understanding the impact of number of CPU cores on user satisfaction in smartphonesEmirhan Poyraz, Prethvi Kashinkunti, Matthew Schuchhardt, Michael Kishinevsky, Niranjan Soundararajan, Gokhan Memik. 288-297 [doi]
- Multi-destination vehicular route planning with parking and traffic constraintsAbeer Hakeem, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea. 298-307 [doi]
- Distances for wifi based topological indoor mappingBastian Schäfermeier, Tom Hanika, Gerd Stumme. 308-317 [doi]
- User-connection behaviour analysis in service management using bipartite labelled property graphMichael Y. Kpiebaareh, Wei-Ping Wu, Strato Bayitaa, Charles R. Haruna, Lawrence Tandoh. 318-327 [doi]
- FitAssist: virtual fitness assistant based on wifiYan Zhu, Dong Wang 0024, Run Zhao, Qian Zhang 0012, Anna Huang. 328-337 [doi]
- How smart your smartphone is in lie detection?Md. Mizanur Rahman, Atanu Shome, Sriram Chellappan, A. B. M. Alim Al Islam. 338-347 [doi]
- A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analyticsAtanu Shome, Md. Mizanur Rahman, Sriram Chellappan, A. B. M. Alim Al Islam. 348-357 [doi]
- SCARF: a scalable data management framework for context-aware applications in smart environmentsEun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian. 358-367 [doi]
- YanuX: pervasive distribution of the user interface by co-located devicesPedro Albuquerque Santos, Rui Neves Madeira, Nuno Correia 0001. 368-377 [doi]
- Simulation of a big number of microservices in a highly distributed vast networkT. Bosak, P. Jantos, K. Boryczko. 378-386 [doi]
- An augmented real-world interactive classroom for developing learning numbers and counting skills for preschool childrenIsmail Abumuhfouz, Yaser Mowafi. 387-393 [doi]
- DeepFit: deep learning based fitness center equipment use modeling and predictionAdita Kulkarni, Anand Seetharam, Arti Ramesh. 394-403 [doi]
- Examining the energy impact of sorting algorithms on android: an empirical studyAndreas Schuler, Gabriele Anderst-Kotsis. 404-413 [doi]
- A social-relation-based game model for distributed clustering in cooperative wireless networksBowen Li, Shunliang Zhang, Xu Shan, Yongming Wang, Zhenxiang Gao. 414-423 [doi]
- Participatory location fingerprinting through stationary crowd in a public or commercial indoor environmentA. K. M. Mahtab Hossain, George Loukas. 424-433 [doi]
- PerFlow: configuring the information flow in a pervasive middleware via visual scriptingJens Naber, Martin Pfannemüller, Janick Edinger, Christian Becker 0001. 434-443 [doi]
- Saving private addresses: an analysis of privacy issues in the bluetooth-low-energy advertising mechanismGuillaume Celosia, Mathieu Cunche. 444-453 [doi]
- Fuzzy clustering-based task allocation approach using bipartite graph in cloud-fog environmentAhmed A. A. Gad-ElRab, Amin Y. Noaman. 454-463 [doi]
- Learning trajectories as words: a probabilistic generative model for destination predictionYuhuan Lu, Zhaocheng He, Liangkui Luo. 464-472 [doi]
- MMLOC: multi-mode indoor localization system based on smart access pointsTuo Yu, Wenyu Ren, Klara Nahrstedt. 473-482 [doi]
- Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT deviceBrandon Tsao, Yuhong Liu, Behnam Dezfouli. 483-491 [doi]
- Channel prediction based on adaptive structure extreme learning machine for UAV mmWave communicationsHongxing Zhang, Hui Gao, Xin Su. 492-497 [doi]
- Performance evaluation of wi-fi for underground robotsLixiao Zhu, Xuejin Wen, Qi Han, Alex Fryer, Neil Suttora, Andrew J. Petruska. 498-503 [doi]
- Constructing 3d maps for dynamic environments using autonomous UAVsAhmed Abdelmoamen Ahmed, Abel Olumide, Adeoluwa Akinwa, Mohamed Chouikha. 504-513 [doi]
- A novel routing metric for IEEE 802.11s-based swarm-of-drones applicationsOscar G. Bautista, Nico Saputro, Kemal Akkaya, A. Selcuk Uluagac. 514-521 [doi]
- A game-theoretic framework for dynamic cyber deception in internet of battlefield thingsAhmed H. Anwar, Charles A. Kamhoua, Nandi Leslie. 522-526 [doi]
- An analysis of fog computing data placement algorithmsDaniel Maniglia A. da Silva, Godwin Asaamoning, Hector Orrillo, Rute C. Sofia, Paulo M. Mendes. 527-534 [doi]
- Lighter U-net for segmenting white matter hyperintensities in MR imagesJun Zhuang, Mingchen Gao, Mohammad A. I. Hasan. 535-539 [doi]