default search action
5th CIC 2019: Los Angeles, CA, USA
- 5th IEEE International Conference on Collaboration and Internet Computing, CIC 2019, Los Angeles, CA, USA, December 12-14, 2019. IEEE 2019, ISBN 978-1-7281-6739-8
- Kilian Ros, Elena Mocanu, Christin Seifert:
Airport Restroom Cleanliness Prediction Using Real Time User Feedback Data. 1-10 - Alexander Tobias Neumann, Peter de Lange, Ralf Klamma:
Collaborative Creation and Training of Social Bots in Learning Communities. 11-19 - Filipi Rydzi, Hong-Linh Truong:
Sharing Blockchain Performance Knowledge for Edge Service Development. 20-29 - Daiki Yamada, Norihiko Shinomiya:
A Solving Method for Computing and Network Resource Minimization Problem in Service Function Chain Against Multiple VNF Failures. 30-38 - Sunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, Surya Nepal, Ryszard Kowalczyk:
Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines. 39-48 - Richard Price, Lakshmish Ramaswamy:
Challenges and Approaches to Teaching Data Science Technologies in an Information Technology Program with Non-Traditional Students. 49-56 - Pinata Winoto, Jane Jie Chen, Hangzhi Guo, Tiffany Ya Tang:
An Interactive Play Environment on Mathematics and Cognitive Training with Behavioral Tracking for Children with Autism. 57-60 - Maryam Bahojb Imani, Latifur Khan, Bhavani Thuraisingham:
Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages. 61-70 - Kimberley Hemmings-Jarrett, Julian Jarrett, M. Brian Blake:
A Taxonomy for Classifying User Group Activity in Online Political Discourse. 71-80 - Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang, Guanhua Yan, Shiyong Lu:
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. 81-90 - Anh-Tu Hoang, Barbara Carminati, Elena Ferrari:
Cluster-Based Anonymization of Directed Graphs. 91-100 - Sean Rooney, Daniel Bauer, Luis Garcés-Erice, Peter Urbanetz, Florian Froese, Sasa Tomic:
Experiences with Managing Data Ingestion into a Corporate Datalake. 101-109 - Xiaozhong Zhang, Xiaoyu Ge, Panos K. Chrysanthis:
Leveraging Data-Analysis Session Logs for Efficient, Personalized, Interactive View Recommendation. 110-119 - Cui Yu, Allen Lu, Steven Cassidy, Wenjin Zhang:
ActionTime: App to Help Develop Execution Skill. 120-126 - Cindy Kim, Christoph U. Lehmann, Dupree Hatch, Jonathan S. Schildcrout, Daniel J. France, You Chen:
Provider Networks in the Neonatal Intensive Care Unit Associate with Length of Stay. 127-134 - Aayush Goyal, Curtis E. Dyreson:
Temporal JSON. 135-144 - Nazli Siasi, Adrian Jaesim, Nasir Ghani:
Tabu Search for Efficient Service Function Chain Provisioning in Fog Networks. 145-150 - Ricardo Anderson:
An Assessment of the Impacts of Workflow Management Systems on Knowledge Management Process Activities. 151-157 - Ronak Razavisousan, Karuna P. Joshi:
Two Tier Analysis of Social Media Collaboration for Student Migration. 158-167 - Abhijit Suprem, Calton Pu:
Event Detection in Noisy Streaming Data with Combination of Corroborative and Probabilistic Sources. 168-177 - Li Liu, Dragos Guta, Shuo Niu:
Integration of User Emotion and Self-Awareness in Text Messaging. 178-183 - Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. 184-190 - Pinata Winoto, Tiffany Ya Tang:
Collaborative Online Educational Games for Children with Learning Disabilities: Lessons Learned. 191-195 - Elisa Bertino:
IoT Security A Comprehensive Life Cycle Framework. 196-203 - Indrajit Ray, Diptendu Mohan Kar, Jordan Peterson, Steve Goeringer:
Device Identity and Trust in IoT-sphere Forsaking Cryptography. 204-213 - Dimitrios Georgakopoulos:
A Global IoT Device Discovery and Integration Vision. 214-221 - Thomas W. Pusztai, Christos Tsigkanos, Schahram Dustdar:
Engineering Heterogeneous Internet of Things Applications: From Models to Code. 222-231 - Adrienne Jeanisha Raglin, Dijiang Huang, Huan Liu, James McCabe:
Smart CCR IoT: Internet of Things Testbed. 232-235 - Eve M. Schooler, David Zage, Hassnaa Moustafa, Jeff Sedayao:
A Marauder's Map for the IoT Edge. 236-245 - Anton V. Uzunov, Surya Nepal, Mohan Baruwal Chhetri:
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge. 246-255 - Balaji Palanisamy, Chao Li:
Self-Emerging Data Infrastructures. 256-265 - Dawn A. Lott, Adrienne Raglin, Somiya Metu:
On the Use of Operations Research for Decision Making with Uncertainty for IoT Devices in Battlefield Situations. 266-297 - Jelena Mirkovic, Simon S. Woo:
Designing for Fallible Humans. 298-305 - Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, L. Jean Camp:
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. 306-313 - Alan Colman, Mohammad Jabed Morshed Chowdhury, Mohan Baruwal Chhetri:
Towards a Trusted Marketplace for Wearable Data. 314-321 - Joshua Streiff, Sanchari Das, Joshua Cannon:
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. 322-329 - Jongkil Jay Jeong, Marthie Grobler, M. A. P. Chamikara, Carsten Rudolph:
Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity. 330-337 - Jongkil Jeong, Joanne Mihelcic, Gillian C. Oliver, Carsten Rudolph:
Towards an Improved Understanding of Human Factors in Cybersecurity. 338-345 - Kimberly Ferguson-Walter, Maxine Major, Dirk Van Bruggen, Sunny Fugate, Robert S. Gutzwiller:
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment. 346-353 - Kamrul Hasan, Sachin Shetty, Sharif Ullah:
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities. 354-359 - Wenjia Li, Neha Bala, Aemun Ahmar, Fernanda Tovar, Arpit Battu, Prachi Bambarkar:
A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks. 360-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.