Abstract is missing.
- Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2018)Stefania Monica, Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid. 1-2 [doi]
- Adaptive Workflows of Home-Care ServicesClaudia Di Napoli, Marco Valentino, Luca Sabatucci, Massimo Cossentino. 3-8 [doi]
- Human Trust in Robots When Performing a ServiceKurt Byrne, Cesar Marin. 9-14 [doi]
- MAS-Based Approach for Scheduling Intensive Workflows in Cloud ComputingMarwa Mokni, Jalel Eddine Hajlaoui, Zaki Brahmi. 15-20 [doi]
- Track Chair's Report: Convergence of Distributed Clouds, Grids and Their Management (CDCGM 2018)Rao Mikkilineni, Giovanni Morana, Fabrizio Messina. 21-23 [doi]
- Towards Automated Penetration Testing for Cloud ApplicationsValentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano. 24-29 [doi]
- Survey on Architectual and Energetic Aspects on Fog Computing EnvironmentAmel Ksentini, Maha Jebalia, Sami Tabbane. 30-35 [doi]
- Coope4M: A Deployment Framework for Communication-Intensive Applications on MesosAlessandro Di Stefano, Antonella Di Stefano, Giovanni Morana, Daniele Zito. 36-41 [doi]
- Elastic Multi-Tenant Business Process Based on Temporal ConstraintsWael Sellami, Hatem Hadj Kacem, Ahmed Hadj Kacem. 42-47 [doi]
- Interference-Aware Virtual Machine Placement in Cloud Computing System Approach Based on Fuzzy Formal Concepts AnalysisWafa Ben Slama, Zaki Brahmi, Mohamed Mohsen Gammoudi. 48-53 [doi]
- A Fair Resource Allocation Approach in Cloud Computing EnvironmentsMaha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane. 54-57 [doi]
- Adaptive and Reconfigurable Systems and Architectures (AROSA 2018): Summary ReportIsmael Bouassida Rodriguez, Mohamed Jmaiel, Khalil Drira. 58-59 [doi]
- Hydle: A Deployment Framework for Efficient IoT Surveillance SystemsHichem Ben Abdallah, Takoua Abdellatif, Faouzi Chekir. 60-65 [doi]
- Using System of Systems' States for Identifying Emergent MisbehaviorsRymel Benabidallah, Salah Sadou, Mohamed Ahmed-Nacer. 66-71 [doi]
- Towards a Multi-Agent Approach for Distributed Decision Support SystemsSana Nadouri, Yassine Ouhammou, Zaïdi Sahnoun, Allel HadjAli. 72-77 [doi]
- Formalising the Requirements of an E-Voting Software Product Line Using Event-BAbderrahim Ait Wakrime, J. Paul Gibson, Jean-Luc Raffy. 78-84 [doi]
- Temporal Property Testing in Dynamic Networks: Application to Software-Defined Vehicular NetworksYessin M. Neggaz, Soufian Toufga. 85-90 [doi]
- Two-Layer Recommendation-Based Real Time Bidding (RTB)Sofiane Ait Arab, Karim Benouaret, Djamal Benslimane, Salim Berbar. 91-94 [doi]
- Decentralized Authentication for Secure Cloud Data SharingWaseem Iqbal, Subas Khan, Bilal Rauf, Imran Rashid. 95-99 [doi]
- A Key Management Scheme for IoT-Based Video Surveillance Systems Based on FingerprintsIhsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim. 100-105 [doi]
- A Multi-Classifier Framework for Open Source Malware ForensicsNaeem Amjad, Hammad Afzal, Muhammad Faisal Amjad, Farrukh Aslam Khan. 106-111 [doi]
- A New Approach of Information System Security Governance: A Proposition of the Continuous Improvement Process Model of Information System Security Risk Management: 4D-ISSMounia Zaydi, Bouchaib Nassereddine. 112-118 [doi]
- Report of Collaborative Modeling and Simulation (CoMetS) track of WETICE 2018Andrea D'Ambrogio, Gregory Zacharewicz. 119-120 [doi]
- A Model-Driven Method to Enable the Distributed Simulation of BPMN ModelsAlfredo Garro, Alberto Falcone, Andrea D'Ambrogio, Andrea Giglio. 121-126 [doi]
- Unifying Model- and Screen SharingYentl Van Tendeloo, Hans Vangheluwe. 127-132 [doi]
- Functional and Non-Functional BPMN M&S at Design TimeKawtar Ougaabal, Gregory Zacharewicz, Yves Ducq, Saïd Tazi 0002. 133-138 [doi]
- Summary Report for the Data Exploration in the Web 3.0 Age (DEW) TrackMaurizio Atzori, Barbara Pes. 139-141 [doi]
- Discovering Stable Communities in Dynamic Multilayer Social NetworksWala Rebhi, Nesrine Ben Yahia, Narjès Bellamine-Ben Saoud. 142-147 [doi]
- Investigating Plausible Reasoning Over Knowledge Graphs for Semantics-Based Health Data AnalyticsHossein Mohammadhassanzadeh, Samina Raza Abidi, William Van Woensel, Syed Sibte Raza Abidi. 148-153 [doi]
- Scalable Exploratory Search on Knowledge Graphs Using Apache SparkAvimanyu Mukhopadhyay, HyeongSik Kim, Kemafor Anyanwu. 154-159 [doi]
- Respecting Data Privacy in Educational Data Mining: An Approach to the Transparent Handling of Student Data and Dealing with the Resulting Missing Value ProblemAlexander Askinadze, Stefan Conrad 0001. 160-164 [doi]
- Evaluating the Influence of User Searches on NeighborsNunziato Cassavia, Elio Masciari, Chiara Pulice, Domenico Saccà, Irina Trubitsyna. 165-170 [doi]
- A Text Mining Approach for Evaluating Event Credibility on TwitterDoaa Hassan. 171-174 [doi]
- Case-Based Reasoning Model for Personalized Learning Path Recommendation in Example-Based Learning ActivitiesHaris Supic. 175-178 [doi]
- Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018)Layth Sliman, Hachemi Nabil Dellys. 179-180 [doi]
- Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of ThingsJaweher Zouari, Mohamed Hamdi, Tai-Hoon Kim. 181-186 [doi]
- Scalable Key Management for Elastic Security Domains in Fog NetworksYacine Challal, Fatima-Zohra Benhamida, Omar Nouali. 187-192 [doi]
- READ: Reliable Event and Anomaly Detection System in Wireless Sensor NetworksAymen Yahyaoui, Takoua Abdellatif, Rabah Attia. 193-198 [doi]
- Secured Distributed IoT Based Supply Chain ArchitectureMarwa Chamekh, Mohamed Hamdi, Sadok El Asmi, Tai-Hoon Kim. 199-202 [doi]
- Multi-Shot Human Re-Identification for the Security in Video Surveillance SystemsBassem Hadjkacem, Walid Ayedi, Mohamed Abid, Hichem Snoussi. 203-208 [doi]
- Fast and Compact Cover Extraction from Big Formal ContextsHaifa Gmati, Amira Mouakher. 209-212 [doi]
- Configuring RESTful Web Services for Personalized Trip PlanningMarwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele. 213-216 [doi]
- Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local ComputationsEmna Taktak, Mohamed Tounsi 0001, Mohamed Mosbah, Ahmed Hadj Kacem. 217-222 [doi]
- Information Flow Analysis of Combined Simulink/Stateflow ModelsMarcus Mikulcak, Paula Herber, Thomas Göthel, Sabine Glesner. 223-228 [doi]
- Improving Test Suites Via a Novel Testing with Model Learning ApproachLuigi Novella, Manuela Tufo, Giovanni Fiengo. 229-234 [doi]
- Efficient and Safe Control Flow Recovery Using a Restricted Intermediate LanguageTobias F. Pfeffer, Paula Herber, Lucas Druschke, Sabine Glesner. 235-240 [doi]
- Detecting Android Malware According to Observations on User ActivitiesAndrea Di Stefano, Andrea Fornaia, Emiliano Tramontana, Gabriella Verga. 241-246 [doi]
- Safety Critical Systems Formal Verification Using Execution TracesFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini. 247-250 [doi]
- Web2Touch 2018: Semantic Technologies in Smart Information Sharing and Web CollaborationRodrigo Bonacin, Mariagrazia Fugini, Riccardo Martoglia, Olga Nabuco. 251-253 [doi]
- Ease or Privacy? A Comprehensive Analysis of Android Embedded AdwareAnum Javaid, Imran Rashid, Haider Abbas, Mariagrazia Fugini. 254-260 [doi]
- Exploring Ontologies to Improve the Empathy of Interactive BotsAndrey Victor Justo, Júlio Cesar dos Reis, Ivo Calado, Rodrigo Bonacin, Felipe Rodrigues Jensen. 261-266 [doi]
- Innovative Big Data Analytics: A System for Document ManagementMariagrazia Fugini, Jacopo Finocchi. 267-274 [doi]
- Argumentation-Based Explanation of Linked Data FusionFatiha Saïs, Rallou Thomopoulos, Anderson Carlos Ferreira Da Silva. 275-280 [doi]
- A Framework for Designing Cognitive Assistants to Support Agricultural Production SystemsJúlio Cesar dos Reis, Rodrigo Bonacin, Andreiwid Correa, Francisco Edeneziano D. Pereira, Ivo Pierozzi Jr., Sergio A. Torquato, Jarbas L. Cardoso, Katia R. E. Jesus, Olga Fernanda N. Araujo. 281-284 [doi]