


default search action
35th AINA 2021: Toronto, ON, Canada
- Leonard Barolli, Isaac Woungang, Tomoya Enokido:

Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2. Lecture Notes in Networks and Systems 226, Springer 2021, ISBN 978-3-030-75074-9 - Bashar Chreim, Jad Nassar, Carol Habib:

RADAR - Regression Based Energy-Aware DAta Reduction in WSN: Application to Smart Grids. 1-14 - Tales Heimfarth, João Carlos Giacomin:

A Probabilistic Preamble Sampling Anycast Protocol for Low-Power IoT. 15-27 - Mateus Gonçalo do Nascimento, Regina M. M. Braga, José Maria N. David, Mário Antônio Ribeiro Dantas, Fernando Antonio Basile Colugnati:

Towards an IoT Architecture to Pervasive Environments Through Design Science. 28-39 - Gabriel Di Iorio Silva, Wagno Leão Sergio, Victor Ströele

, Mario A. R. Dantas:
ASAP - Academic Support Aid Proposal for Student Recommendations. 40-53 - Eriko Shibamoto, Kosuke Takano:

A Method of Expanding Photo-Based User Preference Profile for the Recommendation of Sightseeing Places. 54-65 - Dharmendra Prasad Mahato, Van Huy Pham

:
Antlion Optimizer Based Load-Balanced Transaction Scheduling for Maximizing Reliability. 66-79 - Omar Saad Alqahtani

, Tom Altman:
An Adaptive Large-Scale Trajectory Index for Cloud-Based Moving Object Applications. 80-94 - Emna Taktak

, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
High-Level Approach for the Reconfiguration of Distributed Algorithms in Wireless Sensor Networks. 95-106 - Paramvir Singh, Venkatesh Srinivasan, Alex Thomo:

Fast and Scalable Triangle Counting in Graph Streams: The Hybrid Approach. 107-119 - Himanshu Gupta, Tanmay Girish Kulkarni, Lov Kumar, Lalita Bhanu Murthy Neti, Aneesh Krishna

:
An Empirical Study on Predictability of Software Code Smell Using Deep Learning Models. 120-132 - Isabelle M. Anderson-Grégoire, Kaitlyn A. Horner, Carson K. Leung

, Delica S. Leboe-McGowan, Anifat M. Olawoyin
, Beni Reydman, Alfredo Cuzzocrea:
A Big Data Science Solution for Analytics on Moving Objects. 133-145 - Chun Liu, Xin Li:

Mining Method Based on Semantic Trajectory Frequent Pattern. 146-159 - Aly Ahmed, Keanelek Enns

, Alex Thomo:
Triangle Enumeration for Billion-Scale Graphs in RDBMS. 160-173 - Zakaria Maamar

, Mohammed Al-Khafajiy
, Murtada Dohan
:
An IoT Application Business-Model on Top of Cloud and Fog Nodes. 174-186 - Masafumi Katoh, Tomonori Kubota, Akiko Yamada, Yuji Nomura, Yuji Kojima, Yuuichi Yamagishi:

Network Architecture for Agent Communication in Cyber Physical System. 187-199 - Euripides G. M. Petrakis

, Ilias Kontochristos, Karina Rastsinskagia:
Fi-SWoT: Secure Federated Service Oriented Architecture for the Semantic Internet of Things. 200-214 - Mehdi Houichi

, Faouzi Jaïdi
, Adel Bouhoula
:
A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques. 215-228 - Kentaro Hayashi, Hikaru Hamase, Yuki Tanaka, Takuya Fujihashi, Shunsuke Saruwatari, Takashi Watanabe:

Integration of Localization and Wireless Power Transfer Using Microwave. 229-239 - Frank Yeong-Sung Lin, Wen-Yao Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Hao-Jyun Yang:

A Usage-Based Insurance Policy Bidding and Support Platform Using Internet of Vehicles Infrastructure and Blockchain Technology. 240-249 - Ferdews Tlili, Rim Haddad, Ridha Bouallegue

, Raed M. Shubair
:
Shoulder and Trunk Posture Monitoring System Over Time for Seating Persons. 250-260 - Adil Chekati

, Meriem Riahi, Faouzi Moussa:
Agent-Based Modelling Approach for Decision Making in an IoT Framework. 261-272 - Salma Saidani, Rim Haddad, Ridha Bouallegue

, Raed M. Shubair
:
A New Proposal of a Smart Insole for the Monitoring of Elderly Patients. 273-284 - Kawtar Lasri, Yann Ben Maissa, Loubna Echabbi, Oana Iova, Fabrice Valois:

A New Distributed and Probabilistic Approach for Traffic Control in LPWANs. 285-297 - Thiago G. Thomé, Victor Ströele

, Hélady Pinheiro, Mario A. R. Dantas:
A Fog Computing Simulation Approach Adopting the Implementation Science and IoT Wearable Devices to Support Predictions in Healthcare Environments. 298-309 - Robert R. Chodorek, Agnieszka Chodorek, Krzysztof Wajda:

Benefits of Using WebRTC Technology for Building of Flying IoT Systems. 310-322 - Chayma Werghui, Amine Kchiche, Noureddine Ben Othman, Farouk Kamoun

:
A Neural Network Model for Fuel Consumption Estimation. 323-332 - Sirojiddin Komolov, Youssef Youssry Ibrahim, Manuel Mazzara:

TeleML: Deploying Trained Machine Learning Models in Cross-Platform Applications. 333-344 - Ahmed Moustafa, Muhammad Asad

, Saima Shaukat
, Alexander Norta:
PPCSA: Partial Participation-Based Compressed and Secure Aggregation in Federated Learning. 345-357 - Anna Bryniarska:

Granulation of Technological Diagnosis in the Algebra of the n-Pythagorean Fuzzy Sets. 358-369 - Chiu-Han Hsiao, Ming-Chi Tsai, Frank Yeong-Sung Lin, Ping-Cherng Lin, Feng-Jung Yang

, Shao-Yu Yang
, Sung-Yi Wang, Pin-Ruei Liu, Yennun Huang:
Automatic Kidney Volume Estimation System Using Transfer Learning Techniques. 370-381 - Lukas Ehrmann

, Marvin Stolle, Eric Klieme, Christian Tietz, Christoph Meinel:
Detecting Interaction Activities While Walking Using Smartphone Sensors. 382-393 - Anastasia Pustozerova

, Andreas Rauber
, Rudolf Mayer
:
Training Effective Neural Networks on Structured Data with Federated Learning. 394-406 - Abir Masmoudi, Hatem Bellaaj, Mohamed Jmaiel:

A Multi-view Active Learning Approach for the Hierarchical Multi-label Classification of Research Papers. 407-420 - Piotr Milczarski

, Michal Beczkowski
, Norbert Borowski
:
Blue-White Veil Classification of Dermoscopy Images Using Convolutional Neural Networks and Invariant Dataset Augmentation. 421-432 - Panagiotis Giannakopoulos

, Euripides G. M. Petrakis
:
Smilax: Statistical Machine Learning Autoscaler Agent for Apache FLINK. 433-444 - Tetsu Joh, Takayuki Warabino, Masaki Suzuki, Yusuke Suzuki, Tomohiro Otani:

Application Relocation Method for Distributed Cloud Environment Considering E2E Delay and Cost Variation. 445-457 - Muhammad I. H. Sukmana, Justus Cöster, Wenzel Pünter

, Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems. 458-471 - Spyridon Chouliaras

, Stelios Sotiriadis:
Detecting Performance Degradation in Cloud Systems Using LSTM Autoencoders. 472-481 - Wafa Hidri, Riadh Hadj M'tir

, Narjès Bellamine Ben Saoud:
An Ontology for Composite Cloud Services Description. 482-494 - Nikolai J. Podlesny, Anne V. D. M. Kayem

, Christoph Meinel:
GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data. 495-508 - Wenchao Liu, Yingnan Zhang, Xu An Wang

, Zhong Wang:
Improvement of the Matrix for Simple Matrix Encryption Scheme. 509-521 - Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi:

Lifestyle Authentication Using a Correlation Between Activity and GPS/Wi-Fi Data. 522-535 - Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman:

Identify Encrypted Packets to Detect Stepping-Stone Intrusion. 536-547 - Marek R. Ogiela, Lidia Ogiela:

Visual Paths in Creation of User-Oriented Security Protocols. 548-551 - Ayane Sano, Yukiko Sawaya, Akira Yamada

, Ayumu Kubota:
SeBeST: Security Behavior Stage Model and Its Application to OS Update. 552-566 - Bin Cheng, Tsubasa Kikuta, Yoshinao Toshimitsu, Takamichi Saito:

Investigation of Power Consumption Attack on Android Devices. 567-579 - Maksim Iavich, Sergiy Gnatyuk

, Roman Odarchenko, Razvan Bocu
, Sergei Simonov:
The Novel System of Attacks Detection in 5G. 580-591 - Wataru Taguchi, Kazumasa Omote:

Risk Analysis for Worthless Crypto Asset Networks. 592-602 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:

Human Centered Protocols in Transformative Computing. 603-607 - Diletta Cacciagrano, Flavio Corradini, Gianmarco Mazzante, Leonardo Mostarda, Davide Sestili:

Off-Chain Execution of IoT Smart Contracts. 608-619 - Ruixiao Li

, Hayato Yamana:
Fast and Accurate Function Evaluation with LUT over Integer-Based Fully Homomorphic Encryption. 620-633 - Hiroaki Kikuchi:

Reidentification Risk from Pseudonymized Customer Payment History. 634-645 - Bacem Mbarek

, Mouzhi Ge, Tomás Pitner:
Trust-Based Detection Strategy Against Replication Attacks in IoT. 646-656 - Harkeerat Kaur, Rohit Kumar, Isao Echizen:

Reinforcement Learning Based Smart Data Agent for Location Privacy. 657-671 - Radoslaw Bulat

, Marek R. Ogiela:
Comparison of Personal Security Protocols. 672-678 - Yohei Watanabe, Naoto Yanai

, Junji Shikata:
Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices. 679-690 - Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:

An Efficient and Privacy-Preserving Billing Protocol for Smart Metering. 691-702 - Lucio Agostinho Rocha

:
Intra Data Center MultiPath Optimization with Emulated Software Defined Networks. 703-714 - Rodrigo Moreira

, Pedro Frosi Rosa, Rui Luis Andrade Aguiar
, Flávio de Oliveira Silva
:
Deploying Scalable and Stable XDP-Based Network Slices Through NASOR Framework for Low-Latency Applications. 715-726 - Oussama Soualah, Omar Houidi

, Djamal Zeghlache:
A Monitoring Aware Strategy for 5G Core Slice Embedding. 727-744 - Houda Hassen, Soumaya Meherzi, Safya Belghith:

Performance Analysis of POX and OpenDayLight Controllers Based on QoS Parameters. 745-756 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa, Jacir Luiz Bordim, Eduardo Alchieri:

DoSSec: A Reputation-Based DoS Mitigation Mechanism on SDN. 757-770 - Hugo Gustavo Valin Oliveira da Cunha, Rodrigo Moreira

, Flávio de Oliveira Silva
:
A Comparative Study Between Containerization and Full-Virtualization of Virtualized Everything Functions in Edge Computing. 771-782 - Alisson O. Chaves

, Pedro Frosi Rosa, Flávio Oliveira Silva
:
A Proposal for Application-to-Application Network Addressing in Clean-Slate Architectures. 783-793

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














