Abstract is missing.
- Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2021)Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid. [doi]
- Web2Touch 2021, Semantic Technologies for Smart Information Sharing and Web CollaborationRodrigo Bonacin, Mariagrazia Fugini, Riccardo Martoglia, Olga Nabuco, Fatiha Saïs. [doi]
- Report of Collaborative Modeling and Simulation (CoMetS) track of WETICE 2021Andrea D'Ambrogio, Paolo Bocciarelli, Gregory Zacharewicz. [doi]
- An Adaptive Approach for the Coordination of Autonomous Vehicles at IntersectionsNicholas Glorio, Stefano Mariani 0001, Giacomo Cabri, Franco Zambonelli. 1-6 [doi]
- Quality-Based Reinforcement Learning in Intelligent Opportunistic Software CompositionK. Hacid, Sylvie Trouilhet, Françoise Adreit, Jean-Paul Arcangeli. 7-12 [doi]
- Heterogeneous Anchor Nodes Deployment in Large Scale Outdoor Application for Wireless Sensor NetworksMarwa Afnouch, Dhouha El Houssaini, Olfa Gaddour, Olfa Kanoun. 13-16 [doi]
- A Review of Container level Autoscaling for Microservices-based ApplicationsMohamed Hedi Fourati, Soumaya Marzouk, Mohamed Jmaiel. 17-22 [doi]
- Multi-Objective Whale Optimization for Network Interface Selection in HWNsBrahim Mefgouda, Hanen Idoudi. 23-26 [doi]
- Prometheus and AIOps for the orchestration of Cloud-native applications in AnankeAlessandro Di Stefano, Antonella Di Stefano, Giovanni Morana, Daniele Zito. 27-32 [doi]
- CloudNPlay: Resource Optimization for A Cloud-Native Gaming SystemAngelus Wibowo, Ta Nguyen Binh Duong. 33-38 [doi]
- A genetic-based requirements-aware approach for reliable IoT applications in the FogHouda Chouat, Imed Abbassi, Mohamed Graiet. 39-44 [doi]
- Automatic Generation of Access Control for Permissionless Blockchains: Ethereum Use CaseInsaf Achour, Hanen Idoudi, Samiha Ayed. 45-50 [doi]
- Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin 0001. 51-56 [doi]
- Towards a Uniform Description Language for Smart ContractWafa Ben Slama Souei, Chiraz El Hog, Layth Sliman, Raoudha Ben Djemaa, Ikram Amous Ben Amor. 57-62 [doi]
- Tangle the Blockchain: Towards Connecting Blockchain and DAGHoussein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito. 63-68 [doi]
- A Solidity-to-CPN Approach Towards Formal Verification of Smart ContractsIkram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul. 69-74 [doi]
- DART: Towards a role-based trust management system on blockchainLuca Franceschi, Andrea Lisi, Andrea De Salve, Paolo Mori, Laura Ricci. 75-80 [doi]
- A Meta-heuristic-based Scheduling of Transactions for Medical Blockchain SystemsDorsaf Salah, Hanen Idoudi. 81-84 [doi]
- Privacy-Preserving Initial Public Offering using SCALE-MAMBA and Hyperledger FabricLucas Benmouffok, Kalpana Singh, Nicolas Heulot, Daniel Augot. 85-88 [doi]
- Research on Value Based Heuristics Miner for Product Service SystemXuequan Zhou, Yi Tan, Gregory Zacharewicz, Yuqi Liu, Kexin Tan, David Chen 0001. 89-94 [doi]
- Process over Things (PoT): an Ontology Based Approach for IoT-Aware Business ProcessesTommaso Panetti, Andrea D'Ambrogio, Paolo Bocciarelli. 95-100 [doi]
- IoT Botnet Detection using Black-box Machine Learning Models: the Trade-off between Performance and InterpretabilityNourhène Ben Rabah, Bénédicte Le Grand, Manuele Kirsch-Pinheiro. 101-106 [doi]
- Regional Center of Cybersecurity anomaly detection module efficiency in network monitoring scenariosArkadiusz Warzynski, Patryk Schauer, Lukasz Falas. 107-112 [doi]
- SAT vs. Substitution Boxes of DES like CiphersSylwia Stachowiak, Miroslaw Kurkowski, Artur Sobon. 113-118 [doi]
- Android Malware Detection Using Deep Learning MethodsRobert Lukas, Grzegorz Kolaczek. 119-124 [doi]
- A Malware Evasion Technique for Auditing Android Anti-Malware SolutionsSamrah Mirza, Haider Abbas, Waleed Bin Shahid, Narmeen Shafqat, Mariagrazia Fugini, zafar iqbal, Muhammad Zia. 125-130 [doi]
- Excess-Mass and Mass-Volume anomaly detection algorithms applicability in unsupervised intrusion detection systemsArkadiusz Warzynski, Lukasz Falas, Patryk Schauer. 131-136 [doi]
- Semantic composition of cloud servicesMouna Rekik 0001, Khouloud Boukadi, Rima Grati. 137-142 [doi]
- Towards modeling a Service-Oriented application managing a Smart City using UML 2.xMariam Chaabane, Khouloud Zaafouri, Ismael Bouassida Rodriguez. 143-148 [doi]
- Collaborative Internet of Things (C-IoT) Data Analysis for Enhancing Activity Recognition and Preventing Serious Health ProblemsImad Belkacem, Aymen Gammoudi, Nasredine Cheniki, Yacine Sam, Nizar Messai. 149-152 [doi]
- Improving Activity Recognition while Reducing Misclassification of Unknown ActivitiesAndrea Fasciglione, Maurizio Leotta, Alessandro Verri. 153-158 [doi]
- A (Reverse) Mutation Testing Approach to Automatically generate parallel C/C++ CodeCalanna Salvatore, Andrea Calvagna, Salvatore Campisi, Andrea Fornaia, Giuseppe Pappalardo, Riccardo Torrisi, Emiliano Tramontana. 159-164 [doi]
- A Multidimensional Framework for Semantic Electronic Health Records in Oncology DomainElaine Barbosa de Figueiredo, Mariangela Dametto, Ferrucio de Franco Rosa, Rodrigo Bonacin. 165-170 [doi]
- Semantic rule-based device recommendation for service-migration in multiple-device contextsDimeth Nouicer, Nizar Messai, Yacine Sam, Ikbal Chammakhi Msadaa. 171-176 [doi]
- OntoSAMSEI: Interactive ontology engineering for supporting simulation-based training in MedicineShadi Baghernezhad-Tabasi, Loïc Druette, Fabrice Jouanot, Celine Meurger, Marie-Christine Rousset. 177-182 [doi]
- WECRAFT: a Platform for Networking Rural Craftsmen in Co-Production of Artisanal CraftsPilar Maria Guerrieri, Sara Comai, Mariagrazia Fugini. 183-188 [doi]