Abstract is missing.
- Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2019)Stefania Monica, Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid. 1-2 [doi]
- A Survey of the Use of Software Agents in Digital FactoriesNicola Bicocchi, Giacomo Cabri, Letizia Leonardi, Giulio Salierno. 3-8 [doi]
- A Hybrid Recommendation Approach for Agent Organizational StructuresWissem Eljaoued, Nesrine Ben Yahia, Narjès Bellamine-Ben Saoud, Chihab Hanachi. 9-14 [doi]
- Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 ConferenceValentina Casola, Alessandra De Benedictis, Umberto Villano. 14-15 [doi]
- Robotic Entertainments as Personalizable Workflow of Services: a Home-Care Case StudyClaudia Di Napoli, Emanuela Del Grosso, Silvia Rossi. 15-20 [doi]
- Meaning Extraction in a Domotic Assistant Agent Interacting by Means of Natural LanguageCarmelo Fabio Longo, Corrado Santoro, Federico Fausto Santoro. 21-26 [doi]
- A Decentralized Marketplace for M2M Economy for Smart CitiesStefano Musso, Guido Perboli, Mariangela Rosano, Alessandro Manfredi. 27-30 [doi]
- Towards Automated and Fine-Grain Reuse of Configurable Business Process ModelsMarwa Mdimagh, Sami Bhiri. 31-36 [doi]
- On the Fly Reconfiguration of BPaaS Based on SaaS Services Federation and SAT Solving TechniquesMouna Rekik, Abderrahim Ait Wakrime, Nasredine Cheniki, Yacine Sam. 37-42 [doi]
- Machine Learning Based Approach for Context Aware SystemZakaria Afkir, Hatim Guermah, Mahmoud Nassar, Sophie Ebersold. 43-48 [doi]
- Track Chair's Report of CDCGM2019 - Convergence of Distributed Clouds, Grids and their Management WETICE-2019Fabrizio Messina, Rao Mikkilineni, Giovanni Morana. 49-51 [doi]
- A Cloud Immune Security Model Based on Alert Correlation and Software Defined NetworkRoberto Melo, Douglas Macedo. 52-57 [doi]
- PUF-Enabled Authentication-as-a-Service in Fog-IoT SystemsMario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca. 58-63 [doi]
- A Data Warehouse Approach for Business IntelligenceGeorgia Garani, Andrey Chernov, Ilias K. Savvas, Maria Butakova. 70-75 [doi]
- Evaluating Technology Innovation for E-MobilitySalvatore Venticinque, Rocco Aversa, Beniamino Di Martino, Marit K. Natvig, Shanshan Jiang, Regina Enrich Sard. 76-81 [doi]
- Post-Turing Computing, Hierarchical Named Networks and a New Class of Edge ComputingRao Mikkilineni, Giovanni Morana. 82-87 [doi]
- Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit APIDorian Knoblauch, Christian Banse. 88-92 [doi]
- Towards Policy-Driven Monitoring of Fog ApplicationsEnrico Russo, Luca Verderame, Alessio Merlo. 93-97 [doi]
- Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the CloudLuciano Ocone, Massimiliano Rak, Umberto Villano. 98-103 [doi]
- Report of Collaborative Modeling and Simulation (CoMetS) Track of WETICE 2019Andrea D'Ambrogio, Gregory Zacharewicz. 104-105 [doi]
- Using Patterns to Parameterize the Execution of Collaborative TasksMamadou Lakhassane Cisse, Hanh Nhi Tran, Samba Diaw, Bernard Coulette, Alassane Bah. 106-111 [doi]
- A Collaborative Decision Approach for Alignment of Heterogeneous ModelsSaloua Bennani, Sophie Ebersold, Mahmoud El Hamlaoui, Bernard Coulette, Mahmoud Nassar. 112-117 [doi]
- A BPMN/HLA-Based Methodology for Collaborative Distributed DESJalal Joseph Possik, Andrea D'Ambrogio, Gregory Zacharewicz, Aicha Anne Amrani, Bruno Vallespir. 118-123 [doi]
- Complex Networks Monitoring and Security and Fraud Detection for EnterprisesKrzysztof Juszczyszyn, Grzegorz Kolaczek. 124-125 [doi]
- Architecture of Anomaly Detection Module for the Security Operations CenterPiotr Bienias, Grzegorz Kolaczek, Arkadiusz Warzynski. 126-131 [doi]
- The Applicability of a SIEM Solution: Requirements and EvaluationHassan Mokalled, Rosario Catelli, Valentina Casola, Daniele Debertol, Ermete Meda, Rodolfo Zunino. 132-137 [doi]
- DEW 2019: Data Exploration in the Web 3.0 AgeMaurizio Atzori, Barbara Pes. 138-139 [doi]
- Web of Things Data Visualization: From Devices to Web Via Fog and Cloud ComputingGeorge Pacheco Pinto, Cássio V. S. Prazeres. 140-145 [doi]
- MMoveT15: A Twitter Dataset for Extracting and Analysing Migration-Movement Data of the European Migration Crisis 2015Stefanie Urchs, Lorenz Wendlinger, Jelena Mitrovic, Michael Granitzer. 146-149 [doi]
- Handling Class Imbalance in High-Dimensional Biomedical DatasetsBarbara Pes. 150-155 [doi]
- Machine Learning of SPARQL Templates for Question Answering Over LinkedSpendingRoberto Cocco, Maurizio Atzori, Carlo Zaniolo. 156-161 [doi]
- An Open Source Plugin for Image Analysis in BiologyGiorgia Campanile, Cecilia Di Ruberto, Andrea Loddo. 162-167 [doi]
- Track Report of Future Internet Services and Applications (FISA'2019)Mohamed Sellami, Hatem Hadj Kacem, Anderson Santana de Oliveira. 168-169 [doi]
- A GDPR Controller for IoT Systems: Application to e-HealthMouna Rhahla, Takoua Abdellatif, Rabah Attia, Wassel Berrayana. 170-173 [doi]
- SoS Paradigm Benefits SaaS Integration: Novel Approach and First ResultsWided Mathlouthi, Chahrazed Labba, Walid Gaaloul, Narjès Bellamine-Ben Saoud. 174-179 [doi]
- Autonomous Cars, 5G Mobile Networks and Smart Cities: Beyond the HypeFatma Raissi, Sami Yangui, Frédéric Camps. 180-185 [doi]
- Blockchain's Fame Reaches the Execution of Personalized Touristic ItinerariesAmina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, Thomas Devogele, Walid Gaaloul. 186-191 [doi]
- A Linked Open Data Based Approach for Trip RecommendationNasredine Cheniki, Marwa Boulakbech, Hamza Labbaci, Yacine Sam, Nizar Messai, Thomas Devogele. 192-195 [doi]
- Security Safety and Trust Management (SSTM' 19)Haider Abbas, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan. 196-197 [doi]
- Scanclave: Verifying Application Runtime Integrity in Untrusted EnvironmentsMathias Morbitzer. 198-203 [doi]
- Toward a Trustless Smart City: the #SmartME ExperienceAbhinav Khare, Giovanni Merlino, Francesco Longo 0001, Antonio Puliafito, Om Prakash Vyas. 204-207 [doi]
- Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and ChallengesMourad Benmalek, Yacine Challal, Abdelouahid Derhab. 208-213 [doi]
- Using Trust in Collaborative Filtering for RecommendationsFarah Saleem, Naima Iltaf, Hammad Afzal, Mobeena Shahzad. 214-222 [doi]
- Validation of Safety Critical Collaboration Systems (VSC) at WETICE 2019: Track ReportEmiliano Tramontana, Andrea Calvagna, Andrea Fornaia. 223-224 [doi]
- I/O Interaction Analysis of Binary CodeKonstantin Scherer, Tobias F. Pfeffer, Sabine Glesner. 225-230 [doi]
- Real-Time SCADA Attack Detection by Means of Formal MethodsFrancesco Mercaldo, Fabio Martinelli, Antonella Santone. 231-236 [doi]
- JSCAN: Designing an Easy to use LLVM-Based Static Analysis FrameworkAndrea Fornaia, Stefano Scafiti, Emiliano Tramontana. 237-242 [doi]
- Mitigating Privacy-Related Risks for Android UsersEmiliano Tramontana, Gabriella Verga. 243-248 [doi]
- Formal Verification of Radio Communication Management in Railway Systems Using Model Checking TechniqueAntonio Borrelli, Giuseppe Antonio Di Lucca, Vittoria Nardone, Antonella Santone. 249-254 [doi]
- Web2Touch 2019: Semantic Technologies for Smart Information Sharing and Web CollaborationMariagrazia Fugini, Rodrigo Bonacin, Riccardo Martoglia, Olga Nabuco, Fatiha Saïs. 255-258 [doi]
- A Semantic Approach to Support the Analysis of Abstracts in a Bibliographical ReviewMarbilia Possagnolo Sergio, Talita de Souza Costa, Marcelo Schneck de Paula Pessôa, Paulo S. M. Pedro. 259-264 [doi]
- Improving Interaction in Integrated Chronic Care ManagementNabil Georges Badr, Maddalena Sorrentino, Marco de Marco, Mariagrazia Fugini. 265-270 [doi]
- A Text Analytics Architecture for Smart CompaniesMariagrazia Fugini, Jacopo Finocchi, Filippo Leccardi, Paolo Locatelli, Alfredo Lupi. 271-276 [doi]
- Mining Developer's Behavior from Web-Based IDE LogsPasquale Ardimento, Mario Luca Bernardi, Marta Cimitile, Giuseppe De Ruvo. 277-282 [doi]
- Ontology Design Patterns for Representing Knowledge in the Disaster Risk DomainAllan Mazimwe, Imed Hammouda, Anthony Gidudu. 283-288 [doi]
- Soft Ontologies as Fuzzy RDF StatementsLuma Oliveira Lombello, Júlio Cesar dos Reis, Rodrigo Bonacin. 289-294 [doi]
- An Effective Retrieval Approach for Documents Related to Past Civil Engineering ProjectsChristian Esposito, Oscar Tamburis. 295-300 [doi]
- Empirical Analysis of Semantic Metadata Extraction from Video Lecture SubtitlesMarcos Vinicius Macedo Borges, Júlio Cesar dos Reis, Guilherme Pereira Gribeler. 301-306 [doi]
- An Ontology-Based Monitoring System in Vineyards of the Burgundy RegionAmira Mouakher, Rami Belkaroui, Aurélie Bertaux, Ouassila Labbani, Clémentine Hugol-Gential, Christophe Nicolle. 307-312 [doi]
- A Deep Learning Framework to Predict Rating for Cold Start Item Using Item MetadataFahad Anwar, Naima Iltaf, Hammad Afzal, Haider Abbas. 313-319 [doi]
- WETICE 2019 - General TrackMassimiliano Rak. 320 [doi]
- Privacy Preserving Intrusion Detection Via Homomorphic EncryptionLuigi Sgaglione, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Domenico Cotroneo, Andrea Scognamiglio. 321-326 [doi]
- 2GesturePIN: Securing PIN-Based Authentication on SmartwatchesMeriem Guerar, Luca Verderame, Mauro Migliardi, Alessio Merlo. 327-333 [doi]
- A First Step Towards an ISO-Based Information Security Domain OntologyValentina Casola, Rosario Catelli, Alessandra De Benedictis. 334-339 [doi]
- Industrial Internet of Things: Persistence for Time Series with NoSQL DatabasesSergio Di Martino, Luca Fiadone, Adriano Peron, Alberto Riccabone, Vincenzo Norman Vitale. 340-345 [doi]
- How Much Enhancing Confidentiality and Integrity on Data Can Affect Mobile Multi-Cloud: The "ARIANNA" ExperienceRiccardo Di Pietro, Marco Scarpa, Antonio Puliafito. 346-350 [doi]