


default search action
14th BWCCA 2019: Antwerp, Belgium
- Leonard Barolli, Peter Hellinckx, Tomoya Enokido:

Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 14th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2019, Antwerp, Belgium, November 7-9, 2019. Lecture Notes in Networks and Systems 97, Springer 2020, ISBN 978-3-030-33505-2
The 14th International Conference on Broad-Band andd Wireless Computing, Communication and Applications (BWCCA-2019)
- Yi Liu, Kevin Bylykbashi

, Leonard Barolli:
A Fuzzy-Based Decision System for Sightseeing Spots Considering Hot Spot Access as a New Parameter. 3-11 - Toshiyuki Haramaki

, Hiroaki Nishino:
A Multi-sensor Based Physical Condition Estimator for Home Healthcare. 12-21 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:

Performance Evaluation of WMNs WMN-PSOHC System Considering Constriction and Linearly Decreasing Inertia Weight Replacement Methods. 22-31 - Miralda Cuka, Donald Elmazi

, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Simulation System for IoT Node Selection in Opportunistic Networks and Testbed Implementation. 32-43 - Tehreem Ashfaq, Muhammad Ahmed Younis

, Shahzad Rizwan, Zahid Iqbal, Shahid Mehmood, Nadeem Javaid
:
Consensus Based Mechanism Using Blockchain for Intensive Data of Vehicles. 44-55 - Hassan Farooq, Muhammad Usman Arshad, Muhammad Faraz Akhtar, Shahid Abbas

, Bilal Zahid, Nadeem Javaid
:
Block-VN: A Distributed Blockchain-Based Efficient Communication and Storage System. 56-66 - Omaji Samuel

, Nadeem Javaid
, Faisal Shehzad, Muhammad Sohaib Iftikhar, Muhammad Zohaib Iftikhar, Hassan Farooq, Muhammad Ramzan
:
Electric Vehicles Privacy Preserving Using Blockchain in Smart Community. 67-80 - Ryuji Oma, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
A Nodes Selection Algorithm for Fault Recovery in the GTBFC Model. 81-92 - Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
A TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT. 93-104 - Evjola Spaho

, Klodian Dhoska
, Leonard Barolli, Vladi Kolici
, Makoto Takizawa:
Enhancement of Binary Spray and Wait Routing Protocol for Improving Delivery Probability and Latency in a Delay Tolerant Network. 105-113 - Yinzhe Guo, Ryuji Oma, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Data Exchange Algorithm at Aggregate Level in the TWTBFC Model. 114-124 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:

Trust-Based Game-Theoretical Decision Making for Food-Energy-Water Management. 125-136 - Tomoya Enokido, Makoto Takizawa:

Energy-Efficient Purpose Ordering Scheduler. 137-149 - Hadil Abukwaik, Christian Groß, Markus Aleksy

:
NFC-Based Commissioning of Adaptive Sensing Applications for the 5G IIoT. 150-161 - Wael Ayoub, Mohamad Mroué

, Abed Ellatif Samhat
, Fabienne Nouvel, Jean-Christophe Prévotet:
SCHC-Based Solution for Roaming in LoRaWAN. 162-172 - Atia Javaid, Maheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Nadeem Javaid

:
Reputation System for IoT Data Monetization Using Blockchain. 173-184 - Maheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Atia Javaid, Nadeem Javaid

:
Blockchain Based Balancing of Electricity Demand and Supply. 185-198 - Takeru Kurokawa, Naohiro Hayashibara:

Data Replication Based on Cuckoo Search in Mobile Ad-Hoc Networks. 199-209 - Besfort Shala

, Ulrich Trick
, Armin Lehmann
, Bogdan V. Ghita
, Stavros Shiaeles
:
Trusted, Decentralized and Blockchain-Based M2M Application Service Provision. 210-221 - Natsuki Matsumoto, Tetsuya Shigeyasu:

A New Mobile Agent System for Sharing Disaster Information Under Unstable Network Conditions. 222-230 - Chunyan Zeng

, Songnan Lv, Shangli Zhou, Zhifeng Wang
:
A Deep Hybrid Collaborative Filtering Based on Multi-dimension Analysis. 231-240 - Christos Bouras, Georgios Diles, Rafail Kalogeropoulos:

An Energy Efficient Mechanism for Downlink and Uplink Decoupling in 5G Networks. 241-252 - Christos Bouras, Vasileios Kokkinos

, Evangelos Michos
:
Efficient 5G Network Decoupling Using Dynamic Modulation and Coding Scheme Selection. 253-265 - Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:

A Probabilistic Offloading Approach in Mobile Edge Computing. 266-278 - Sanjay K. Dhurandher, Jagdeep Singh

, Isaac Woungang, Makoto Takizawa, Geetanshu Gupta, Raghav Kumar:
Fuzzy Geocasting in Opportunistic Networks. 279-292 - Shinji Sugawara

:
Digital Content Refinement by Collecting Partly Unreliable Attributes over a Network. 293-302 - Yoshihiro Okada:

Web Version of IntelligentBox (WebIB) and Its Extension for Web-Based VR Applications - WebIBVR. 303-314 - Tianhan Gao, Qingwei Mi

:
Enemy Attack Management Algorithm for Action Role-Playing Games. 315-326 - Kuang-Yen Tai, Dai-Lun Chiang, Chun-Yen Chuang, Tzer-Shyong Chen

, Frank Yeong-Sung Lin:
Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System. 327-337 - Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki

:
Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails. 338-351 - Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:

Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock. 352-362 - Adnan Sabovic

, Carmen Delgado
, Jan Bauwens, Eli De Poorter, Jeroen Famaey
:
Accurate Online Energy Consumption Estimation of IoT Devices Using Energest. 363-373 - Christos Bouras, Apostolos Gkamas

, Spyridon Aniceto Katsampiris Salgado, Vasileios Kokkinos
:
Comparison of LoRa Simulation Environments. 374-385 - Amal Kammoun, Nabil Tabbane, Gladys Diaz

, Nadjib Achir, Abdulhalim Dandoush
:
Proactive Network Slices Management Algorithm Based on Fuzzy Logic System and Support Vector Regression Model. 386-397 - Chen Yuan, Minoru Uehara:

An Optimal Route Recommendation Method for a Multi-purpose Travel Route Recommendation System. 398-408 - Zia Ullah

, Mohamed R. Elkadeem
, Shaorong Wang:
Artificial Intelligence Technique for Optimal Allocation of Renewable Energy Based DGs in Distribution Networks. 409-422 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:

Impact of Sharing Algorithms for Cloud Services Management. 423-427 - Marek R. Ogiela, Lidia Ogiela:

Application of Cognitive Protocols in Transformative Computing. 428-432 - Fabricio Landero Cristobal, Miguel A. Wister, Pablo Payró Campos:

Analyzing Mobile Cycling Applications for Monitoring Workouts. 433-444 - Yoshitaka Shibata, Goshi Sato, Noriki Uchida:

Road State Information Platform Based on Multi-sensors and Bigdata Analysis. 445-454 - Jin Zhu:

A New Discounting Approach to Conflict Information Fusion Using Multi-criteria of Reliability in Dempster-Shafer Evidence Theory. 455-467
The 21th International Symposium on Multimedia Network Systems and Applications (MNSA-2019)
- Takumi Saito, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS System. 471-482 - Hazuki Ishii, Ryuji Oma, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption Model. 483-493 - Kosuke Gima, Ryuji Oma, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Parallel Data Transmission Protocols in the Mobile Fog Computing Model. 494-503 - Goshi Sato, Yoshitaka Shibata, Noriki Uchida:

Recovery of Fiber Networks C/M-Plane via an IoT-Based Narrow-Band Links System Based on LoRa Mesh Platform. 504-511 - Na Deng, Xu Chen, Caiquan Xiong:

Clustering Analysis and Visualization of TCM Patents Based on Deep Learning. 512-520 - Muhammad Zohaib Iftikhar, Muhammad Sohaib Iftikhar, Muhammad Jawad

, Annas Chand, Zain Ahmad Khan, Abdul Basit Majeed Khan, Nadeem Javaid
:
Efficient Resource Utilization Using Blockchain Network for IoT Devices in Smart City. 521-534 - Tianhan Gao, Lei Jiang, Xibao Wang:

Recommendation System Based on Deep Learning. 535-543 - Kazuma Ikenoue, Kazunori Ueda:

Routing Method Based on Data Transfer Path in DTN Environments. 544-552
The 12th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2019)
- Seiji Ohara, Heidi Durresi, Admir Barolli

, Shinji Sakamoto, Leonard Barolli:
A Hybrid Intelligent Simulation System for Node Placement in WMNs Considering Load Balancing: A Comparison Study for Exponential and Normal Distribution of Mesh Clients. 555-569 - Nan Zhao

, Menglin Fan, Chao Tian, Pengfei Fan, Xiao He:
Multi-dimensional Contract Incentive Design for Mobile Crowdsourcing Networks. 570-578 - Ningling Jiang, Elis Kulla:

Evaluation and Comparison of CO2 and Fuel Consumption for Different Car Following Models. 579-588 - Myoungsu Kim, Kangbin Yim:

Individually Separated Wireless Access Point to Protect User's Private Information. 589-596 - Hsing-Chung Chen, Mei-He Jiang, Tzu-Ya Chen:

Long-Term Care (LTC) Monitoring System for Caregivers Based on Wireless Sensing Technology. 597-605
The 10th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2019)
- Kazunori Uchida, Leonard Barolli:

Concatenated Path Domain for Dijkstra's Algorithm Based Ray Tracing to Enhance Computational Areas. 609-620 - Naoki Higashinaka, Hiroshi Maeda

:
Routing of Optical Baseband Signal Depending on Wavelength in Periodic Structure. 621-629 - Nan Zhao

, Pengfei Fan, Xiao He, Menglin Fan, Chao Tian:
Two-Stage Dynamic Contract Design Under Asymmetric Information in Cooperative Communication. 630-637 - Soushi Morita, Elis Kulla:

Minimizing Control Overhead of Routing Protocols in Wireless Multihop Networks: Simulation Evaluation. 638-645 - Kiyotaka Fujisaki, Yuki Yoshigai:

Effect of Parasitic Element on Communication Performance of 13.56 MHz RFID System. 646-654
The 10th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2019)
- Yanjing Hu, Xu An Wang

:
Perception Mining of Network Protocol's Stealth Attack Behaviors. 657-669 - Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng

, Ching-Cheng Liu:
Digital Image Anti-counterfeiting Technology. 670-677 - Wei-Sheng Chen, Fang-Yie Leu, Heru Susanto

:
System Implementation of AUSF Fault Tolerance. 678-687 - Zhi-Qian Hong, Fang-Yie Leu, Heru Susanto

:
News Collection and Analysis on Public Political Opinions. 688-697 - Ping-Jui Chiang, Heru Susanto

, Fang-Yie Leu, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-Term Care. 698-707
The 8th International Workshop on Robot and Vehicle Interaction, Control, Communication and Cooperation (RVI3C-2019)
- Shogo Nakasaki, Makoto Ikeda, Leonard Barolli:

A Message Relaying Method with Enhanced Dynamic Timer Considering Decrease Rate of Neighboring Nodes for Vehicular-DTN. 711-720 - Keita Matsuo, Leonard Barolli:

Prediction of RSSI by Scikit-Learn for Improving Position Detecting System of Omnidirectional Wheelchair Tennis. 721-732 - Zain Abubaker, Muhammad Usman Gurmani, Tanzeela Sultana, Shahzad Rizwan, Muhammad Azeem Sarwar, Muhammad Zohaib Iftikhar, Nadeem Javaid

:
Decentralized Mechanism for Hiring the Smart Autonomous Vehicles Using Blockchain. 733-746 - Ermioni Qafzezi

, Kevin Bylykbashi
, Evjola Spaho
, Leonard Barolli:
An Intelligent Approach for Resource Management in SDN-VANETs Using Fuzzy Logic. 747-756 - Takahiro Uchiya, Kodai Shimano, Ichi Takumi:

Tutorial Educating Developer of Reinforcement Learning Agent Using IDEAL. 757-762
The 5th International Workshop on Advanced Techniques and Algorithms for Security and Privacy (ATASP-2019)
- Hafiza Syeda Zainab Kazmi, Faiza Nazeer, Sahrish Mubarak, Seemab Hameed, Aliza Basharat, Nadeem Javaid

:
Trusted Remote Patient Monitoring Using Blockchain-Based Smart Contracts. 765-776 - Songyin Zhao, Xu An Wang

:
A Survey of Malicious HID Devices. 777-786 - Zeyu Wang, Wei Zhang, Peng Ma, Xu An Wang

:
Power Consumption Attack Based on Improved Principal Component Analysis. 787-799 - Takamichi Saito, Tsubasa Kikuta, Rikita Koshiba:

How Securely Are OAuth/OpenID Connect Implemented in Japan? 800-811
The 2nd International Workshop on Bio-Sensing, Processing, Application and Networking (BioSPAN-2019)
- Asad Ullah Khan

, Affaf Shahid, Fatima Tariq, Abdul Ghaffar, Abid Jamal
, Shahid Abbas
, Nadeem Javaid
:
Enhanced Decentralized Management of Patient-Driven Interoperability Based on Blockchain. 815-827 - Na Deng, Xu Chen, Caiquan Xiong:

Design and Construction of Intelligent Decision-Making System for Marine Protection and Law Enforcement. 828-837 - Xu Chen, Deliang Zhong, Yingzhou Zheng, Shudong Liu, Yipeng Li, Na Deng:

Data Authenticity Analysis for Online O2O Data: A Case Study of Second-Hand Houses Posting Data. 838-845 - Tianhan Gao, Hui An:

A Brief Survey: 3D Face Reconstruction. 846-854 - Linlin Zhang, Kin Fun Li:

A Feasibility Study on Wrist Rehabilitation Using the Leap Motion. 855-864 - Yuhan Jiang, Song Cai, Chunyan Zeng

, Zhifeng Wang
:
Classification of Cotton and Flax Fiber Images Based on Inductive Transfer Learning. 865-871

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














