Abstract is missing.
- Enhancing Augmented Reality Performance: An Exploration of Edge Computing and Code Offloading in Collaborative AR SystemsDaliton da Silva, Dimas Cassimiro, Camila Dantas, Paulo Maciel 0001. 1-6 [doi]
- Experiments on Accurate Indoor Positioning Using the Whale Optimization AlgorithmSimone Dallospedale, Mattia Alex Leoni, Stefania Monica, Federico Bergenti. 1-6 [doi]
- A Maude-Based Formal Approach to Control and Analyze Time-Resource Aware Missioned Systems-of-SystemsCharaf Eddine Dridi, Nabil Hameurlain, Faiza Belala. 1-6 [doi]
- An Hybridization of LSTM and Random Forest Model to Predict Road SituationOlfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes. 1-7 [doi]
- An Approach for Software Development Effort Estimation Using ChatGPTAla Arman, Emiliano Di Reto, Massimo Mecella, Giuseppe Santucci. 1-7 [doi]
- A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical SystemsSalah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia, Mimoune Malki. 1-6 [doi]
- Enhancing Cyber Threat Intelligence Through Supervised Machine Learning: A Comprehensive Classification ApproachJihen Bennaceur, Wissem Zouaghi, Ali Mabrouk. 1-8 [doi]
- Performance Evaluation of Container Management Tasks in OS-Level Virtualization PlatformsPedro Melo, Lucas Gama, Jamilson Dantas, David Beserra, Jean Araujo 0001. 1-6 [doi]
- waterFSA: A Contact-Less Water Flow Source Analyzer for the Household to Enable HAR and ADL RecognitionFabio Salice, Federico Simoni, Giovanni Castiglioni, Andrea Masciadri, Mariagrazia Fugini, Sara Comai. 1-6 [doi]
- Security-based Multipath Route Switching Protocol for Quality-of-Service Enhancement in VANETs using Wiedemann Car-Following ModelMa'en Saleh. 1-6 [doi]
- DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE SystemJoseph Merhej, Hassan Harb, Abdelhafid Abouaissa, Lhassane Idoumghar. 1-6 [doi]
- Bitcoin Transactions Types and Their Impact on Storage ScalabilityDavid Melo, Saúl E. Pomares Hernández, Lil María Rodríguez-Henríquez, Julio Cesar Perez Sansalvador. 1-6 [doi]
- Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature ReviewFidma Mohamed Abdelillah, Hamour Nora, Samir Ouchani, Sidi Mohamed Benslimane. 1-6 [doi]
- QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 PatientsFrikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai. 1-6 [doi]
- LWN Simulator - A LoRaWAN Network SimulatorCorrado Santoro, Federico Fausto Santoro. 1-6 [doi]
- Unraveling Spatio-Temporal Behavior in Collaborative Cyber-Physical Systems Inspired by Social InsectsHouda Khlif, Hatem Hadj Kacem, Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio Cesar Perez Sansalvador, Lil María Rodríguez-Henríquez. 1-6 [doi]
- Formal Verification of Smart Contracts Based on Model Checking: An OverviewRim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Salma Bradai. 1-6 [doi]
- Applying Fuzzy Logic to Efficiently Manage Shared Edge InfrastructureTidiane Sylla, Mohamed Aymen Chalouf, Léo Mendiboure, Francine Krief, Hasnaâ Aniss, Lylia Alouache. 1-6 [doi]
- DLSTM-SCM- A Dynamic LSTM-Based Framework for Smart Supply Chain ManagementSeyf Eddine Hasnaoui, Mohammed Amine Boudouaia, Samir Ouchani, Abdelatif Rahmoun. 1-6 [doi]
- Intelligent UAS-Edge-Server Collaboration and Orchestration in Disaster Response ManagementChengyi Qu, Chaise Ballotti, Daniel De Sousa, Jiaqing Liu. 1-6 [doi]
- Synergize Multidisciplinary Research via Research Data ManagementDeepak Sharma 0005, Muhammad Asif Suryani, Steffen Strohm, Matthias Renz. 1-6 [doi]
- On Safety of Decentralized Unmanned Aircraft System Traffic Management Using BlockchainAsma Hamissi, Amine Dhraief, Layth Sliman. 1-6 [doi]
- Securing the Software Supply Chain: A New Taxonomy for Attack ClassificationKawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa, Wissem Zouaghi. 1-8 [doi]
- COVID-19 Patient Secure Classification Based on ANN and Risk AnalysisFrikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai. 1-7 [doi]
- A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical SystemsSalah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia, Mimoune Malki. 1-6 [doi]
- Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature ReviewFidma Mohamed Abdelillah, Hamour Nora, Samir Ouchani, Sidi Mohamed Benslimane. 1-6 [doi]
- A Federated Learning Architecture for Anomaly Detection on the Edge Using Deep AutoencodersDavid Novoa-Paradela, Oscar Fontenla-Romero, Bertha Guijarro-Berdiñas, Diego Orellana-Cañás. 1-6 [doi]
- Study on Poisoning Attacks: Application Through an IoT Temperature DatasetFloribert Katembo Vuseghesa, Mohamed-Lamine Messai. 1-6 [doi]
- Unveiling the Software Supply Chain Paradigm: Architecture, Actors, Challenges, and Security PerspectivesKawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa. 1-7 [doi]
- Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs VerificationMd Masum Musfique, Tanvir Ahmed Aadeef, Md. Samiur Rahman, Monosij Kanti Sarkar, Md Fahad Monir. 1-6 [doi]
- Harmonic Pollution in Distribution Transformers: Evaluating the Effects of Pv Solar Installations in Jordan's Electrical GridEyad K. Almaita. 1-5 [doi]
- Design Thinking Evidence in Software Development: Results from a Systematic MappingFelipe Jesus, Rodrigo Rocha, Igor Medeiros Vanderlei, Jean Araujo 0001, Fred Freitas. 1-6 [doi]
- Unlocking the Power of Reinforcement Learning: Investigating Optimal Q-Learning Parameters for Routing in Flying Ad Hoc NetworksMariem Bousaid, Safa Kaabi, Amine Dhraief, Khalil Drira. 1-6 [doi]
- A Hybrid-DLT Based Trustworthy AI FrameworkAndrea Pelosi, Claudio Felicioli, Andrea Canciani, Fabio Severino. 1-6 [doi]
- Virtual Collaborative Assembly System Based on UnityZicheng Xu, Liu Ao. 1-6 [doi]
- Collisions-Resistant Hash Function Based on a Logistics MapNassim Zaouia, Kheyreddine Djouzi, Mehammed Daoui. 1-6 [doi]
- Flying to the Rescue: UAV-Assisted Urgent Alert Transmission in VANETLeila Bouchrit, Sajeh Zairi, Ikbal Chammakhi Msadaa, Amine Dhraief, Kahlil Drira. 1-6 [doi]
- HYASM: A Tool to Verify Hierarchical SystemsAngelo Ferrando 0001, Vadim Malvone, Aniello Murano, Silvia Stranieri. 1-6 [doi]