Abstract is missing.
- Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2020)Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid. 1-2 [doi]
- Agent-mediated application emergence through reinforcement learning from user feedbackWalid Younes, Françoise Adreit, Sylvie Trouilhet, Jean-Paul Arcangeli. 3-8 [doi]
- A FIPA-ACL based communication utility for UnityAlejandro Rodríguez-Arias, Bertha Guijarro-Berdiñas, Noelia Sánchez-Maroño. 9-13 [doi]
- SANDMAN: a Self-Adapted System for Anomaly Detection in Smart Buildings Data StreamsMaxime Houssin, Stéphanie Combettes, Marie Pierre Gleizes, Bérangère Lartigue. 14-19 [doi]
- PEA: Predicting Expert Agents approachAfef Selmi, Zaki Brahmi, Mohamed Mohsen Gammoudi. 20-23 [doi]
- Immunizer: A Scalable Loosely-Coupled Self-Protecting Software Framework using Adaptive Microagents and Parallelized MicroservicesOmar Iraqi, Hanan El Bakkali. 24-27 [doi]
- Adaptive and Reconfigurable Systems and Architectures (AROSA 2020) : Summary ReportKhalil Drira, Mohamed Jmaiel, Ismael Bouassida Rodriguez, Nesrine Khabou. 28-29 [doi]
- Autonomic Coordination of IoT Device Management PlatformsEmna Mezghani, Samuel Berlemont, Marc Douet. 30-35 [doi]
- An Unsupervised Feature Selection Method for Data-Driven Anomaly Detection SystemsNaif Almusallam. 36-41 [doi]
- Towards an Automatic Identification of Microservices from Business ProcessesMohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, Aziz El Fazziki. 42-47 [doi]
- iPaaS in Agriculture 4.0: An Industrial CaseRafael Huang Cestari, Sebastien Ducos, Ernesto Exposito. 48-53 [doi]
- Secure Data Analytics for IoT Cloud-enabled Framework Using Intel SGXAbdulatif Alabdulatif. 54-57 [doi]
- Representation and Evolution of Knowledge Structures to Detect Anomalies in Financial StatementsChip Venters, Rao Mikkilineni. 58-63 [doi]
- Group Instance: Flexible Co-Location Resistant Virtual Machine Placement in IaaS CloudsVu Duc Long, Ta Nguyen Binh Duong. 64-69 [doi]
- Cloud interoperability based on a generic cloud service description: Mapping OWL-S to GCSDNour El Houda Bouzerzour, Souad Ghazouani, Yahya Slimani. 70-75 [doi]
- Auto-scaling Applications in the Cloud by Simple Indexes with Complex LoadsMarta Catillo, Luciano Ocone, Massimiliano Rak, Umberto Villano. 76-81 [doi]
- Ananke: A framework for Cloud-Native Applications smart orchestrationAlessandro Di Stefano, Antonella Di Stefano, Giovanni Morana. 82-87 [doi]
- Rethinking Simulation Engineering Process for MSaaSPaolo Bocciarelli, Andrea D'Ambrogio, Umut Durak, Tommaso Panetti. 88-93 [doi]
- DRACeo: A smart simulator to deploy energy saving methods in microservices based networksHernán Humberto Álvarez-Valera, Marc Dalmau, Philippe Roose, Jorge Larracoechea, Christina Herzog. 94-99 [doi]
- IoT-aware Business Process: comprehensive survey, discussion and challengesNajla Fattouch, Imen Ben Lahmar, Khouloud Boukadi. 100-105 [doi]
- Maintaining Security and Quality in Mobile and Network Systems - CoNeSec Track SummaryGrzegorz Kolaczek, Krzysztof Juszczyszyn. 106 [doi]
- Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users' Location Coordinates for Privacy EnhancementAnum Arshad, Haider Abbas, Waleed Bin Shahid, Anique Azhar. 107-112 [doi]
- Communication management for reliable service based IoT systemsPatryk Schauer, Lukasz Falas. 113-118 [doi]
- Application and preliminary evaluation of Anontool applied in the anomaly detection modulePiotr Bienias, Arkadiusz Warzynski, Grzegorz Kolaczek. 119-123 [doi]
- A Learning based Secure Anomaly Detection for Healthcare ApplicationsFrikha Hounaida, Wided Ben Daoud, Meddeb-Makhoulf Amel, Zarai Faouzi. 124-130 [doi]
- Methods for effective and reliable resource allocation in service-oriented systemsLukasz Falas, Patryk Schauer. 131-134 [doi]
- Track report of Future Internet Services and Applications (FISA'2020)Abderrahim Ait Wakrime, Riadh Ben Halima, Mohamed Sellami. 135-136 [doi]
- Discovering Business Processes And Activities From Messaging Systems: State-Of-The ArtMarwa Elleuch, Nassim Laga, Oumaima Alaoui Ismaili, Walid Gaaloul. 137-142 [doi]
- QoE Influence Factors (IFs) classification Survey focusing on User Behavior/Engagement metricsFatima Laiche, Asma Ben Letaifa, Taoufik Aguili. 143-146 [doi]
- Thingsourcing to Enable IoT CollaborationZakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, Said Elnaffar. 147-152 [doi]
- FADI - A Deployment Framework for Big Data Management and AnalyticsRami Sellami, Faiez Zalila, Alexandre Nuttinck, Sébastien Dupont, Jean-Christophe Deprez, Stéphane Mouton. 153-158 [doi]
- Privacy Preserving Statistical Detection of Adversarial InstancesMina Sheikhalishahi, Nicola Zannone. 159-164 [doi]
- RFMC: a spending-category segmentationSahar Allegue, Takoua Abdellatif, Khalil Bannour. 165-170 [doi]
- IoT-based Occupants Counting with Smart Building State VariablesJongMoon Choi, Hangli Ge, Noboru Koshizuka. 171-176 [doi]
- Fog-enabled Industrial IoT Network Slicing model based on ML-enabled Multi-objective OptimizationAmel Ksentini, Maha Jebalia, Sami Tabbane. 177-180 [doi]
- Resolving Multi-user Conflicts in a Smart Building using RBACHamida Belkhiria, Fairouz Fakhfakh, Ismael Bouassida Rodriguez. 181-186 [doi]
- STCMS: A Smart Thermal Comfort Monitor For Senior PeopleKaterina Katsarou, Chahinez Ounoughi, Amira Mouakher, Christophe Nicolle. 187-192 [doi]
- A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning ApproachSanaa Kaddoura, Omar Alfandi, Nadia Dahmani. 193-198 [doi]
- An Enrolment Gateway for Data Security in Heterogeneous Industrial Internet of ThingsFergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. 199-202 [doi]
- On the Challenges of Automated Testing of Web VulnerabilitiesLuis F. de Lima, Matheus C. Horstmann, David N. Neto, André Ricardo Abed Grégio, Fabiano Silva, Letícia M. Peres. 203-206 [doi]
- +: A Case StudyGiulio Salierno, Sabatino Morvillo, Letizia Leonardi, Giacomo Cabri. 207-212 [doi]
- Automatic Generation of Effective Unit Tests based on Code BehaviourAndrea Fornaia, Alessandro Midolo, Giuseppe Pappalardo, Emiliano Tramontana. 213-218 [doi]
- A Two-Step Heuristic Algorithm for Generating Constrained Detecting Arrays for Combinatorial Interaction TestingHao Jin, Tatsuhiro Tsuchiya. 219-224 [doi]
- Optimized Hardware/Software Co-Verification using the UCLID Satisfiability Modulo Theory SolverSimon Schwan, Paula Herber. 225-230 [doi]
- A Preliminary Study of the Energy Impact of Software in Raspberry Pi devicesKamar Kesrouani, Houssam Kanso, Adel Noureddine. 231-234 [doi]
- Web2Touch 2020-21 : Semantic Technologies for Smart Information Sharing and Web CollaborationRodrigo Bonacin, Mariagrazia Fugini, Riccardo Martoglia, Olga Nabuco, Fatiha Saïs. 235-238 [doi]
- Capturing and Exploiting Citation Knowledge for Recommending Recently Published PapersAnita Khadka, Iván Cantador, Miriam Fernández. 239-244 [doi]
- A Model-Driven Approach for Semantic Data-as-a-Service GenerationHela Taktak, Khouloud Boukadi, Michael Mrissa, Chirine Ghedira Guegan, Faiez Gargouri. 245-250 [doi]
- Dissimilarity-based approach for Identity Link InvalidationAnderson Carlos Ferreira Da Silva, Fatiha Saïs, Emmanuel Waller, Frédéric Andrès. 251-256 [doi]
- An End-to-End Framework for Integrating and Publishing Linked Open Government DataRabeb Abida, Emna Hachicha Belghith, Anthony Cleve. 257-262 [doi]
- LODMF: A Linked Open Data Maintenance FrameworkAndré Gomes Regino, Júlio Cesar dos Reis, Rodrigo Bonacin. 263-268 [doi]
- Duplicate record detection approach based on sentence embeddingsHafsa Lattar, Aicha Ben Salem, Henda Hajjami Ben Ghezala. 269-274 [doi]
- A Review on Cyber-Physical Systems: Models and ArchitecturesMohamed Anis Aguida, Samir Ouchani, Mourad Benmalek. 275-278 [doi]
- Gesture Recognition using Dynamic Time WarpingMariagrazia Fugini, Jacopo Finocchi, Giulia Trasa. 279-282 [doi]
- Tracing patient PLOD by mobile phones Mitigation of epidemic risks based on patient locational open dataIkki Ohmukai, Yasunori Yamamoto, Maori Ito, Takashi Okumura. 283-286 [doi]
- Managing and recommending resources in web-based collaborative working environmentsSiying Li, Marie-Hélène Abel, Elsa Negre. 287-290 [doi]