default search action
DASC/PiCom/CBDCom/CyberSciTech 2019: Fukuoka, Japan
- 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019. IEEE 2019, ISBN 978-1-7281-3024-8
The 4th IEEE Cyber Science and Technology Congress (CyberSciTech 2019)
CyberSciTech 2019 Regular Papers
- Boyu Sun, Min Dong, Kaihong Yang, Sheng Bi:
A Design of High-Performance Streetlights Management System. 1-6 - Sarah Fallmann, Liming Chen, Feng Chen:
A Home-Based IoT-Enabled Framework for Sleep Behaviour Assessment. 7-15 - Xiaoheng Deng, Huan Chen, Ruting Cai, Feng Zeng, Guangquan Xu, Honggang Zhang:
A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks. 16-21 - Sen Liu, Liwen Liu, Xuyan Liu, Yuping Wang, Baoming Bai:
A New Evolutionary Algorithm Based on Self-Adaptive Grouping and Efficient Resource Allocation. 22-27 - Shihan Bao, Ao Lei, Haitham S. Cruickshank, Zhili Sun, Philip Michael Asuquo, Waleed Hathal:
A Pseudonym Certificate Management Scheme Based on Blockchain for Internet of Vehicles. 28-35 - Fan Zhou, Zhongyang Han, Jun Zhao, Wei Wang:
A Spark-Based Approach for High-Efficiency Embedded Feature Selection. 36-43 - Lai Tu, Zhen Ma, Benxiong Huang:
Analysis and Prediction of Differential Parking Behaviors. 44-49 - Jossie Murcia Triviño, Sebastián Moreno Rodríguez, Daniel O. Díaz López, Félix Gómez Mármol:
C3-Sex: a Chatbot to Chase Cyber Perverts. 50-57 - Kenichi Kourai, Yuji Shiota:
Consistent Offline Update of Suspended Virtual Machines in Clouds. 58-65 - Bo Wu, Shoji Nishimura, Qun Jin, Yishui Zhu:
Culture-Based Color Influence Paths Analysis by Using Eye-Tracking Devices. 66-71 - Ke Yan, Jun Hua:
Deep Learning Technology for Chiller Faults Diagnosis. 72-79 - Mahbub Murshed, M. Ali Akber Dewan, Fuhua Oscar Lin, Dunwei Wen:
Engagement Detection in e-Learning Environments using Convolutional Neural Networks. 80-86 - Hairui Zou, Chaoxian Chen, Changjian Zhao, Bo Yang, Zhongfeng Kang:
Hybrid Collaborative Filtering with Semi-Stacked Denoising Autoencoders for Recommendation. 87-93 - Wei He, Jing Wang, Beng Wu, Hui Luan, Huaqing Liang, Chong Chen:
IoT Nodes Equipment Selection Based on MADM: A Case Study of Groundwater Quality Detection Equipment. 94-100 - Jiandong Li, Runhe Huang, Kevin I-Kai Wang, Jiannong Cao:
KID Model Realization Using Memory Networks for Text-Based Q/A Analyses and Learning. 101-108 - Xiangjie Kong, Linyan Wen, Jing Ren, Mingliang Hou, Minghao Zhang, Kang Liu, Feng Xia:
Many-to-Many Collaborator Recommendation Based on Matching Markets Theory. 109-114 - Linjing Wei, Wenke Dong, Yangping Wang, Shirun Gan:
Multi-trait Selection Model of Dairy Cow Based on the Mixed Leapfrog Algorithm. 115-120 - Masato Shimokubo, Runhe Huang, Kevin I-Kai Wang:
Pop-up Recommended Illustrations for E-Book Readers Using Text Analysis Techniques. 121-127 - Xu Yuan, Jianing Zhang, Zhikui Chen, Jing Gao, Peng Li:
Privacy-Preserving Deep Learning Models for Law Big Data Feature Learning. 128-134 - Yangping Wang, Xinlei Ren, Zhengping Zhu, Decheng Gao:
Research on Temporary Building Monitoring of Railway Construction Based on Remote Sensing Image. 135-141 - Chenlei Liu, Wenhan Tao, Chencong Zhao, Xinwan Li, Yaning Su, Zhixin Sun:
Research on Vehicle Routing Problem with time Windows Based on the Dragonfly Algorithm. 142-148 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching. 149-156 - Linjing Wei, Wenke Dong, Yangping Wang, Shirun Gan:
Study on Quantization Decision Algorithm for Feature Matching of Turf Grass Introducing. 157-162 - Linjing Wei, Wenke Dong, Shirun Gan, Yangping Wang:
Study on the Matching Algorithm of Turf Grass Introduction Features Based on Big Data Analysis. 163-169 - Riku Anegawa, Masayoshi Aritsugi:
Text Detection on Books Using CNN Trained with Another Domain Data. 170-176 - Nicolas Tsapatsoulis, Vasiliki Anastasopoulou, Klimis S. Ntalianis:
The Central Community of Twitter ego-Networks as a Means for Fake Influencer Detection. 177-184 - Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
Towards Integrative Personal Character Modeling Using Multi-strategy Fusion Across Scenarios and Periods. 185-192 - Hanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu:
Two-Layer Group Signature and Application to E-Cash. 193-200 - Qun Jin, Zhi Li:
Visualization Design Based on Personal Health Data and Persona Analysis. 201-206 - Jintak Park, King Ma, Henry Leung:
Prediction of Stock Prices with Sentiment Fusion and SVM Granger Causality. 207-214
CyberSciTech 2019 Work-in-Progress Papers
- Abdelkarim Ben Sada, Mohammed Amine Bouras, Jianhua Ma, Runhe Huang, Huansheng Ning:
A Distributed Video Analytics Architecture Based on Edge-Computing and Federated Learning. 215-220 - Marat Zhanikeev:
A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge. 221-227 - Yalan Jiang, Lingzhi Yi, Lu Zhu, Zhenkun Jin, Xianjun Deng, Minghua Wang, Yong Liu, Xiangyang Li:
A Novel Strategy for Barrier Confident Information Coverage in Sensor Networks. 228-231 - Chenlei Liu, Feng Xiang, Pan Wang, Zhixin Sun:
A Review of Issues and Challenges in Fog Computing Environment. 232-237 - Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. 238-244 - Eduardo Manuel Silva Machado, Ivan Carrillo, David Saldana, Liming Chen:
An Assistive Augmented Reality-based Smartglasses Solution for Individuals with Autism Spectrum Disorder. 245-249 - Xize Liu, Tie Qiu, Chen Chen, Huansheng Ning, Ning Chen:
An Incremental Broad Learning Approach for Semi-Supervised Classification. 250-254 - Sornxayya Phetlasy, Satoshi Ohzahata, Celimuge Wu, Toshihito Kato:
Applying SMOTE for a Sequential Classifiers Combination Method to Improve the Performance of Intrusion Detection System. 255-258 - Karoline Moholth McClenaghan, Ole Christian Moholth:
Computational Model for Wearable Hardware Commodities. 259-265 - Shiquan Dong, Fadi Farha, Shan Cui, Jianhua Ma, Huansheng Ning:
CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication. 266-270 - Khawla Alhasan, Suleiman Onimisi Aliyu, Liming Chen, Feng Chen:
ICA-Based EEG Feature Analysis and Classification of Learning Styles. 271-276 - Chengxin Zhang, Huiquan Zhang, Di He, Fei Hao:
Evaluation Approach Based upon Knowledge Delivery Process in Smart Teaching Environment. 277-281 - Cheng Wang, Xin Liu, Xiaokang Zhou, Rui Zhou, Dong Lv, Qingquan Lv, Mingsong Wang, Qingguo Zhou:
FalconEye: A High-Performance Distributed Security Scanning System. 282-288 - Hongbiao Gao, Jianbin Li, Jingde Cheng:
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic. 289-294 - Bidi Ying, Amiya Nayak:
Location Privacy Protection Method Based on a Proxy in Un-Trusted Mobile Social Networks. 295-300 - Yayuan Tang:
Minimizing Energy for Caching Resource Allocation in Information-Centric Networking with Mobile Edge Computing. 301-304 - Shuo Yu, Yuanhu Liu, Jing Ren, Hayat Dino Bedru, Teshome Megersa Bekele, Liangtian Wan, Feng Xia:
Mining Key Scholars via Collapsed Core and Truss. 305-308 - Yilin Hu, Hang Yin, Binbin Yong, Yunshan Cao, Xing Zhou, Rui Zhou, Qingquan Lv, Mingsong Wang:
Online Ventricular Segmentation System Based on Machine Learning. 309-314 - Masato Kikuchi, Takao Okubo:
Power of Communication Behind Extreme Cybersecurity Incidents. 315-319 - Reza Soltani, Uyen Trang Nguyen, Aijun An:
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets. 320-325 - Kai Su, Qiangfu Zhao, Po Chun Lien:
Product Surface Defect Detection Based on CNN Ensemble with Rejection. 326-331 - Mehrdad Sharbaf:
Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management. 332-337 - Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. 338-343 - Hanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu:
Traceable Decentralized Anonymous E-Cash System Against Active Attackers. 344-349 - Keisuke Abe:
Data Mining and Machine Learning Applications for Educational Big Data in the University. 350-355
CyberSciTech 2019 Poster Papers
- Shusei Narumi, Mitsuharu Matsumoto:
A Proposal of Music-Based Personal Authentication System. 356-359 - Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, Takuo Suganuma, Masahiro Hiji:
Policy Management Technique Using Blockchain for Cloud VM Migration. 360-362 - Radmila Juric:
Semantic Model for Creating an Instance of the IoT. 363-366 - Ho-Ting Wu, Kai-Wei Ke, Song-Ferng Wang, Po-Hung Chen, Guan-Dee Lee, Chen-Yu Tseng, Chen-Yu Ho:
The Implementation of Wireless Industrial Internet of Things (IIoT) Based Upon IEEE 802.15.4-2015 TSCH Access Mode. 367-369
The 2nd International Workshop on Healthcare with Intelligent Sensing, System, and Data (HISSD)
- Changrui Zhu, Wasim Ahmad:
Emotion Recognition from Speech to Improve Human-Robot Interaction. 370-375 - Jaeyong Jung, Jeonghun Cho, Daejin Park:
Energy-Efficient Signal Processors with Silent Mirror Tracer for Long-Term Activity Monitoring. 376-379 - Xinyun Jiang, Wasim Ahmad:
Hand Gesture Detection Based Real-Time American Sign Language Letters Recognition using Support Vector Machine. 380-385 - Hua Li, Cheng Yang, Zhilin He, Muhammad Ali Imran, Wasim Ahmad:
Health Activities Monitoring and Warning System for Geriatric Daily Living in Extra Care Homes. 386-391 - Whenhao Cheng, Yuxiang Guo, Pengting Chen, Yue Pang, Xinyun Jiang, Wasim Ahmad:
Inertial Sensors to Detect Multiple Gait Disorders. 392-396 - Jiaye Yang, Yanjun Liu, Yanjun Chen, Huiyang Nie, Zhanqiu Wang, Xu Liu, Muhammad Ali Imran, Wasim Ahmad:
Assistive and Monitoring Multifunctional Smart Crutch for Elderly. 397-401 - Abdoalbaset Abohmra, Sophia Ramani, Abubakar Sharif, Muhammad Ali Imran, Qammer H. Abbasi, Wasim Ahmad:
Novel Flexible and Wearable 2.4 GHz Antenna for Body-Centric Applications. 402-405
The 1st International Workshop on Big Data Analytics for Cyber Security and Defence (BCSec)
- Yuanming Zhang, Shuo Zhang, Yuchao Zhang, Jing Tao, Pinghui Wang:
A Large-Scale Empirical Study of Internet Users' Privacy Leakage in China. 406-411 - Chengling Chen, Zhou Su, Weiwei Li, Yuntao Wang:
Big Data Driven Computing Offloading Scheme with Driverless Vehicles Assistance. 412-416 - Ting Han, Yuanming Zhang, Hezhen Li, Xiaoyu Zhang, Jing Tao:
Large-Scale Network Traffic Analysis and Retrieval System Using CFS Algorithm. 417-421 - Jingyuan Liu, Wei Li, Tao Qin, Liang Zhao, Yuli Gao, Wenqiang Ma:
User Identification Cross Multiple Social Media Platform with Revised Input Output Network Embedding Framework. 422-426
Special Session on Cyber Social Computing and Cyber-EnabledApplications (CSC&CEA)
- Yongze Lin, Xinyuan Zhang, Liting Xia, Yue Ren, Weimin Li:
A Hybrid Algorithm for Influence Maximization of Social Networks. 427-431 - Dehua Chen, Chuang Ma, Yunying Wu:
Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment Recommendation. 432-436 - Guijiang Wang, Jiulei Jiang, Weimin Li, Can Wang:
Influence Maximization Based on Node Attraction Model. 437-441 - Furong Chang, Bofeng Zhang, Songxian Wu, Yue Zhao, Bingchun Li, Jiarila Maimaitiriyimu:
OCDAD: An Overlapping Community Detecting Algorithm using Attention Degree in Directed Ex-EgoNet. 442-448 - Panqing Zhang, Jiulei Jiang, Zhanyou Ma, Heng Zhu:
Quantitative µ-Calculus Model Checking Algorithm Based on Generalized Possibility Measures. 449-453
Special Session on Computing and Applications for Cyber Internet of Things (CyberIoT)
- Bahman A. Sassani Sarrafpour, Andrew David, Xiaosong Li, Farhad Mehdipour:
AgentPi: An IoT Enabled Motion CCTV Surveillance System. 454-458 - Yuxiang Lv, Hao Qin, Zhiwei Liu, Yawen Dong, Wenjiang Feng, Weiyang Xu:
An Efficient Synchronization Algorithm in OFDM-Based NB-IoT Systems. 459-464 - Jian Zhou, Yu Su, Penglin Li:
An Emergency Mobile Communication System Based on Fixed-Wing Drone and Satellite Transmission Access. 465-470 - Wenjiang Feng, Yuxiang Lv, Qing Wu, Yajuan Guo, Zhiwei Liu, Xiaolong Bao:
Joint Power Control and Pilot Assignment Algorithm in Multi-cell Multi-user Massive MIMO Systems. 471-477
Special Session on Cyber System Security and Intelligence (CSSI)
- Kaiqiang Liu, Bin Wang, Yuan Liu, Ranfeng Wu, Xun Zhang, Xin Liu, Qiang Zhang, Zhixiang Yin:
An IGS Algorithm Applied to DNA Sequence Design. 478-482 - Chuan Luo, Tianrui Li, Zhang Yi:
An Incremental Feature Selection Approach Based on Information Entropy for Incomplete Data. 483-488 - Kexiong Dong, Weiwei Luo, Xiaohua Pan, Jianwei Yin:
An Internet Medical Care-Oriented Service Security Open Platform. 489-492 - Bahman A. Sassani Sarrafpour, Rosario Del Pilar Soria Choque, Blake Mitchell Paul, Farhad Mehdipour:
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques. 493-498 - Yanlin Yang, Zhonglin Ye, Haixing Zhao, Lei Meng:
Link Prediction Based on Gravitational Field of Complex Network. 499-504 - Yuechao Zhang, Jianxin Zhang, Chao Che, Kai Lin, Dongsheng Zhou, Qiang Zhang, Xiaopeng Wei:
Pulmonary Nodule Detection Based on Multi-branch 3D Squeeze-and-Excitation Network. 505-509 - Yudai Xue, Jinsong Wang, Yuemin Ding, Honghao Zhang:
Research on Security Testing and Simulation Platform of Smart Grid Substation System. 510-515 - Xiaorong Pu, Kun Long, Kecheng Chen, Mei Xie, Jiancheng Lv, Dezhong Peng:
A Semantic-Based Short-Text Fast Clustering Method on Hotline Records in Chengdu. 516-521 - Jixiang Guo, Lei Zhang, Yuanyuan Chen, Wei Tang:
An Interactive System for Detection and Analysis of Mandibular Cystic Lesions. 522-526 - Lei Shi, Kunpeng Wang, Zhen Liu:
Design, Development and Testing of a Wearable sEMG Acquisition System. 527-532
Special Session on the Impact of Internet of Things on the Future Elderly Care (IoTonFEC)
- Bo Wu, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi:
A Study on the Reduction of Mowing Work Burden for Maintaining Landscapes in Rural Areas: Experiment Design for Mowing Behaviors Analyze. 533-536 - Wenjie Diao, Zhigang Gao, Ruichao Xu, Yunfeng Xie, Ke Yan, Hongyi Guo:
Life Assistants for the Elderly Based on Mobile Devices. 537-542 - Hong Chen:
Ubi-Care: a Decentralized Ubiquitous Sensing Healthcare System for the Elderly Living Support. 543-547
The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019)
DASC 2019 Regular Papers
- Chih-Wen Ou, Fu-Hau Hsu, Chia-Min Lai:
Keep Rogue IoT Away: IoT Detector Based on Diversified TLS Negotiation. 548-555 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. 556-563 - Linus Karlsson, Nicolae Paladi:
Privacy-Enabled Recommendations for Software Vulnerabilities. 564-571 - Tomonori Morikawa, Kenichi Kourai:
Low-Cost and Fast Failure Recovery Using In-VM Containers in Clouds. 572-579 - Fabio Martinelli, Mina Sheikh Alishahi:
Distributed Data Anonymization. 580-586 - Md. Arafatur Rahman, Marufa Yeasmin Mukta, Abu Yousuf, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan, Che Yahaya Yaakub:
IoT Based Hybrid Green Energy Driven Highway Lighting System. 587-594 - Richard McWilliam, Philipp Schiefer, Alan Purvis, Samir Khan:
Stuck-at Fault Resilience using Redundant Transistor Logic Gates. 595-601 - Rabeya Bosri, Abdur Razzak Uzzal, Abdullah Al Omar, A. S. M. Touhidul Hasan, Md. Zakirul Alam Bhuiyan:
Towards a Privacy-Preserving Voting System Through Blockchain Technologies. 602-608 - Gerardo Iovane, Michele Nappi, Marta Chinnici, Alfredo Petrosino, Aniello Castiglione, Silvio Barra:
A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding. 609-618 - Aniello Castiglione, Giovanni Cozzolino, Vincenzo Moscato, Giancarlo Sperlì:
Analysis of Community In Social Networks Based on Game Theory. 619-626
DASC 2019 Work-in-Progress
- Hyeongyun Moon, Jeonghun Cho, Daejin Park:
Reconfigurable Fault-Safe Processor Platform Based on RISC-V for Large-Scaled IoT-Driven Applications. 627-632 - Kousuke Uemura, Satoshi Yamane:
SMT-Based Bounded Model Checking of Embedded Assembly Program with Interruptions. 633-639 - Seong-Kyun Mok, Eun-Sun Cho:
TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code. 640-645 - Mohammad Tahir, Qazi Mamoon Ashraf, Mohammad Dabbagh:
Towards Enabling Autonomic Computing in IoT Ecosystem. 646-651 - Paola Barra, Carmen Bisogni, Antonio Rapuano, Andrea Francesco Abate, Gerardo Iovane:
HiMessage: An Interactive Voice Mail System with the Humanoid Robot Pepper. 652-656
The 18th International Workshop on Assurance in Distributed Systems and Networks (ADSN 2019)
- Masaki Aida, Yuya Kakizawa:
Structural Change Models of Online Social Networks Caused by External Factors Like Mass Media. 657-662 - Yukikazu Nakamoto:
Some Technology Issues in a Connected World. 663-666 - Shinnosuke Murakami, Tomoyuki Ohta, Jürgen Dunkel, Yoshiaki Kakuda:
Evaluation Framework Using Simulator and Mobile Device for Developing Evacuation Route Guidance in MANET-Based Building Evacuation System. 667-671 - Koichi Shin, Haruka Kodama, Masahiro Nishi:
Development of Local Landslide Danger-Related Information Notification System on TV Set for Early Evacuation. 672-676 - Kazuki Uyama, Shinji Inoue, Yoshiaki Kakuda:
A Dynamic System for Forming Convoys Consisting of Connected Vehicles. 677-680 - Eiji Utsunomiya:
Information Propagation that Induces Evacuation Behavior at the Time of Disaster. 681-686 - Arun Adiththan, Kaliappa Ravindran:
Model-Based Methods for Quality Evaluation of Cloud Services. 687-692
The 1st International Workshop on Dependable Intelligent Systems (DeIS 2019)
- Xiaoyi Zhang, Junjun Zheng:
A Framework for Localizing Aging-Related Bugs in a Random and Dynamic Way. 693-698 - Yanjie Liu, Zheng Zheng, Jiantao Zhang:
Markov Model of Web Services for Their Performance Based on Phase-Type Expansion. 699-704 - Yang Liu, Jiantao Zhang, Yizhi Zeng, Haonan Yao, Jiankang Li, Jing Zhang:
An Experimental Study for Optimal Homotopy Property of Motion Planning Algorithms. 705-709 - Elena Troubitsyna:
Multi-Concern Integrated Engineering of Dependable Intelligent Systems. 710-715 - Minyang Kang, Yizhi Zeng, Haonan Yao, Jing Zhang, Yanjie Liu:
RRT* Algorithm Under Holonomic Conditions for UAVs. 716-720 - Wei-Ting Chen, Shih-Lun Chen, Yih-Shyh Chiou, Ting-Lan Lin, Fu-Jung Wen, Yang-Ke Lin:
FPGA-Based Implementation of Reduced-Complexity Filtering Algorithm for Real-Time Location Tracking. 721-726 - Jia Song, Kai Zhao, Huiyan Weng, Xu Wang, Yang Liu:
Research on Reliable Path Planning of Manipulator Based on Artificial Beacons. 727-732
The 17th IEEE International Conference on PervasiveIntelligence and Computing (PICom 2019)
PICom 2019 Regular Papers
- Leandro Santiago de Araújo, Victor da Cruz Ferreira, Brunno Figueiroa Goldstein, Alexandre Solon Nery, Leandro Augusto Justen Marzulo, Sandip Kundu, Felipe Maia Galvão França:
Hardware-Accelerated Similarity Search with Multi-Index Hashing. 733-740 - Joel Reijonen, Miljenko Opsenica, Roberto Morabito, Miika Komu, Mohammed Elmusrati:
Regression Training using Model Parallelism in a Distributed Cloud. 741-747 - Ahmad Shahrizan Abdul Ghani, Ahmad Fakhri Ab. Nasir:
Superposition of Dual Image Fusion with Improved Dehazing Methods for high Visibility of Underwater Image. 748-753 - Yixin Hu, Qiangfu Zhao, Yoichi Tomioka:
A Novel Algorithm for Efficient Labeling and Its Application to On-Road Risk Detection. 754-760 - Lu Liu, Wuyang Zhou, Sihai Zhang, Wei Cai:
Composite Gaussian Function Modeling of Mobility Prediction Accuracy for Wireless Users. 761-767 - Zilu Liang, Mario Alberto Chapa Martell:
Achieving Accurate Ubiquitous Sleep Sensing with Consumer Wearable Activity Wristbands Using Multi-class Imbalanced Classification. 768-775 - Mi-Gyung Cho, Uram Ko, Hyekyung Lee, Hwan-Gue Cho:
Improved Medical Image Segmentation Algorithm Using Two-Step CNN Architecture. 776-781 - Bruno Dzogovic, Bernardo Santos, Thanh Van Do, Boning Feng, Van Thuan Do, Niels Jacot:
Bringing 5G Into User's Smart Home. 782-787 - Ting-Han Chen, Sok-Ian Sou, Yinman Lee:
WiTrack: Human-to-Human Mobility Relationship Tracking in Indoor Environments Based on Spatio-Temporal Wireless Signal Strength. 788-795 - Sok-Ian Sou, Ciao-Ling Lou, Yinman Lee:
Exploiting Spatial Locality for Content Placement in Roadside-Unit Caching with Delay Constraint. 796-802 - Yi Liu, Yunchun Li, Honggang Zhou, Hailong Yang, Wei Li:
Generative Model for Probabilistic Inference. 803-810 - François Portet, Sybille Caffiau, Fabien Ringeval, Michel Vacher, Nicolas Bonnefond, Solange Rossato, Benjamin Lecouteux, Thierry Desot:
Context-Aware Voice-Based Interaction in Smart Home - VocADom@A4H Corpus Collection and Empirical Assessment of Its Usefulness. 811-818 - Junho Kwak, Seungmin Lee, Jeonghun Cho, Daejin Park:
Lightweight Polygonal Approximation-Based ECG Signal Processing Platform. 819-824 - Yulong Zhang, Yuxin Ding, Rui Wu, Fuxing Xue:
A Denoising Framework for Image Caption. 825-832 - Oscal Tzyh-Chiang Chen, Yu-Cheng Zhang, Zheng Kuan Lin, Pei-I Kuo, Yi Lun Lee:
Camera-in-Hand Robotic Arm Using a Deep Neural Network to Realize Unmanned Store Service. 833-839 - Claudio M. de Farias, Flávia Coimbra Delicato, Giancarlo Fortino:
A Density-Based Decision-Making Data Fusion Method for Multiapplication Wireless Sensor Networks. 840-847 - Nathavuth Kitbutrawat, François Portet, Hirozumi Yamaguchi, Teruo Higashino:
Automatic Localization of Passive Infra-Red Binary Sensors in Home: from Dense to Scattered Network. 848-853 - Md Shafiqul Islam, Tsuyoshi Okita, Sozo Inoue:
Evaluation of Transfer Learning for Human Activity Recognition Among Different Datasets. 854-859 - Edgar Ramos, Roberto Morabito:
Intelligence Stratum for IoT. Architecture Requirements and Functions. 860-867
PICom 2019 Poster Papers
- Shin-Ichi Ito, Momoyo Ito, Minoru Fukumi:
A Method of Classifying Japanese Sign Language using Gathered Image Generation and Convolutional Neural Networks. 868-871 - Lu Liu, Sihai Zhang, Wuyang Zhou, Wei Cai, Qimei Cui:
Diffusion Kernel Based Mobility Prediction for Wireless Users. 872-875 - Yuansheng Luo, Shi Qiu:
Optimal Resource Reservation Scheme for Maximizing Profit of Service Providers in Edge Computing Federation. 876-879 - Yiming He, Qiang Wang, Hailong Chen, Chuanqi Gao:
Metro Passenger and Freight Transport: A Framework for Underground Logistics System. 880-882 - Mitsuaki Saito, Kaori Fujinami:
Extensible On-Body Smartphone Localization: A Project Overview and Preliminary Experiment. 883-884 - Kaori Fujinami, Trang Thuy Vu, Koji Sato:
A Framework for Human-Centric Personalization of Context Recognition Models on Mobile Devices. 885-888 - Lambros Lambrinos:
Internet of Things in Agriculture: A Decision Support System for Precision Farming. 889-892
The 3rd International Workshop on Secure and Sustainable Computing and Communication Technologies for Smart Communities
- Vikas Agnihotri, Munish Sabharwal, Vinay Goyal:
The Extraction of key Distinct Features for Identification and Classification of Helicopters using Micro-Doppler Signatures. 893-896 - Yao Zhang, Haotong Cao, Meng Zhou, Shengchen Wu, Longxiang Yang:
Rate Maximization for Cell-Free Massive MIMO with Low-Resolution ADCs. 897-900 - Arnab Bose, Gagangeet Singh Aujla, Maninderpal Singh, Neeraj Kumar, Haotong Cao:
Blockchain as a Service for Software Defined Networks: A Denial of Service Attack Perspective. 901-906 - Sahil Vashisht, Sushma Jain, Ravinder Singh Mann:
Software Defined UAV-Based Location Aware Deployment Scheme for Optimal Wireless Coverage. 907-912 - Qin Wang, Feng Zhang:
IPTV Video Hardware Encryption Transmission System Analysis. 913-917
The 1st International Workshop on Intelligence Big Data Processing Infrastructure and Its Applications
- Xianxian Li, Chunfeng Luo, Peng Liu, Li-e Wang:
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory. 918-923 - Hanghang Deng, Qiang Wang, Jingtao Sun:
Improved SLAM Merged 2D and 3D Sensors for Mobile Robots. 924-929 - Jing Jiang, Chengyao Zhao, Minquan Cheng, Hongyan Dong:
Combinatorial Properties of Multimedia IPP Codes of Length 2. 930-935 - Zhixuan Huang, Junfeng Yin:
Symmetric and Positive Splitting Iteration for Space Fractional Diffusion Equation. 936-940 - Shuxuan Lu, Qiang Wang, Jingtao Sun:
A Threshold-Based Visual Odometry in a Composite Environment Using Edges and Points. 941-945
The 5th IEEE International Conference on Cloud and Big Data Computing (CBDCom 2019)
CBDCom 2019 Regular Papers
- Xin You, Hailong Yang, Zhongzhi Luan, Depei Qian:
L-DAG: Enabling Loopy Workflow in Scientific Application with Automatic DAG Transformation. 946-953 - Yu Wang, Michael Conrad Meyer, Junbo Wang:
Base Station Allocation for Users with Overlapping Coverage in Wirelessly Networked Disaster Areas. 954-960 - Chen Li, Xu Zhang, Mahboob Qaosar, Saleh Ahmed, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Multi-factor Based Stock Price Prediction Using Hybrid Neural Networks with Attention Mechanism. 961-966 - Jiaqian Li, Chengrong Wu, Jiawei Ye, Jiong Ding, Qinwei Fu, Jiatao Huang:
The Comparison and Verification of Some Efficient Packet Capture and Processing Technologies. 967-973 - Hsung-Pin Chang, Chien-Neng Liao, Da-Wei Chang:
A Page Cache Management Scheme in Cloud Computing Environments. 974-979 - Biao Han, Xiangrui Yang, Xiaoyan Wang:
Dynamic Controller-Switch Mapping Assignment with Genetic Algorithm for Multi-controller SDN. 980-986 - Ken T. Murata, Praphan Pavarangkoon, Somnuk Phon-Amnuaisuk, Takamichi Mizuhara, Kazunori Yamamoto, Kazuya Muranaga, Toshiki Aoki:
A Programming Environment for Visual IoT on Raspberry Pi. 987-992 - Syed Muhammad Asim Ali Rizvi, Weifeng Lv, Bowen Du, Haiquan Wang, Runhe Huang:
Predicting Food POI Attractions for Smart Business using Passenger Commuting Patterns. 993-1000 - Xianfu Chen, Celimuge Wu, Tao Chen, Nan Wu, Honggang Zhang, Yusheng Ji:
Age of Information-Aware Multi-tenant Resource Orchestration in Network Slicing. 1001-1007 - Zhihui Lu, Xiaoli Wan, Jian Yang, Jie Wu, Cheng Zhang, Patrick C. K. Hung, Shih-Chia Huang:
Bis: A Novel Blockchain Based Bank-Tax Interaction System in Smart City. 1008-1014 - Patamawadee Leepaisomboon, Mizuho Iwaihara:
Utilizing Latent Posting Style for Authorship Attribution on Short Texts. 1015-1022 - Jingyi Shen, Olga Baysal, M. Omair Shafiq:
Evaluating the Performance of Machine Learning Sentiment Analysis Algorithms in Software Engineering. 1023-1030 - Jui-Chieh Kao, Chun-Chih Lo, Chin-Shiuh Shieh, Yu-Cheng Liao, Jun-Wei Liu, Mong-Fong Horng:
Hybrid Machine Learning Approach for Electric Load Forecasting. 1031-1037 - Shailendra Singh, Abdulsalam Yassine, Rachid Benlamri:
Consumer Segmentation: Improving Energy Demand Management through Households Socio-Analytics. 1038-1045 - Zhanhong He, Junhao Zhou, Hong-Ning Dai, Hao Wang:
Gold Price Forecast Based on LSTM-CNN Model. 1046-1053
CBDCom 2019 Work-in-Progress Papers
- Ken T. Murata, Kohei Mizutani, Yoshiaki Muroyama, Kazunori Yamamoto, Kazuya Muranaga, Takamichi Mizuhara, Praphan Pavarangkoon, Kazuki Kobayashi:
LoRa Communication Maps of Medium-Sized Rural City in Japan via Community Bus Services. 1054-1059 - Carson K. Leung, Abhishek Kajal, Yeyoung Won, Justin M. C. Choi:
Big Data Analytics for Personalized Recommendation Systems. 1060-1065 - James Ho, Dominik Ondusko, Brandon Roy, D. Frank Hsu:
Sentiment Analysis on Tweets Using Machine Learning and Combinatorial Fusion. 1066-1071 - Yuhang Li, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji:
Traffic Flow Prediction with Compact Neural Networks. 1072-1076 - Yi-En Tan, Chun-Chih Lo, Chin-Shiuh Shieh, Denis Miu, Mong-Fong Horng:
Adaptive Confidence Evaluation Scheme for Periodic Activity Recognition in Smart Home Environments. 1077-1081
CBDCom 2019 Poster Papers
- Cho-Chin Lin, Wei-Ping Goh, Shyi-Tsong Wu:
A Framework of Page Synchronization for Adaptable Virtual Machine Live Migration. 1082-1085 - Praphan Pavarangkoon, Takeshi Nanri, Ken T. Murata, Kazunori Yamamoto, Kazuya Muranaga, Takamichi Mizuhara, Keiichiro Fukazawa, Ryusuke Egawa, Takahiro Katagiri, Masao Ogino:
Performance Improvement of High-Speed File Transfer Over JHPCN. 1086-1089 - Di Wu, Hao Wang, Razak Seidu:
A Tensor Model for Quality Analysis in Industrial Drinking Water Supply System. 1090-1092 - Yu-Ju Chen, Wan-Chi Chang, Pi-Chung Wang:
Dynamic Replication Scheduling for Cloud Datacenters Based on Workload Statistics. 1093-1096
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.