default search action
30th WETICE 2021: Bayonne, France
- 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2021, Bayonne, France, October 27-29, 2021. IEEE 2021, ISBN 978-1-6654-2789-0
- Rodrigo Bonacin, Mariagrazia Fugini, Riccardo Martoglia, Olga Nabuco, Fatiha Saïs:
Web2Touch 2021, Semantic Technologies for Smart Information Sharing and Web Collaboration. xxv-xxvii - Andrea D'Ambrogio, Paolo Bocciarelli, Gregory Zacharewicz:
Report of Collaborative Modeling and Simulation (CoMetS) track of WETICE 2021. xxiii-xxiv - Federico Bergenti, M. Brian Blake, Giacomo Cabri, Usman Wajid:
Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2021). xxi-xxii - Nicholas Glorio, Stefano Mariani, Giacomo Cabri, Franco Zambonelli:
An Adaptive Approach for the Coordination of Autonomous Vehicles at Intersections. 1-6 - K. Hacid, Sylvie Trouilhet, Françoise Adreit, Jean-Paul Arcangeli:
Quality-Based Reinforcement Learning in Intelligent Opportunistic Software Composition. 7-12 - Marwa Afnouch, Dhouha El Houssaini, Olfa Gaddour, Olfa Kanoun:
Heterogeneous Anchor Nodes Deployment in Large Scale Outdoor Application for Wireless Sensor Networks. 13-16 - Mohamed Hedi Fourati, Soumaya Marzouk, Mohamed Jmaiel:
A Review of Container level Autoscaling for Microservices-based Applications. 17-22 - Brahim Mefgouda, Hanen Idoudi:
Multi-Objective Whale Optimization for Network Interface Selection in HWNs. 23-26 - Alessandro Di Stefano, Antonella Di Stefano, Giovanni Morana, Daniele Zito:
Prometheus and AIOps for the orchestration of Cloud-native applications in Ananke. 27-32 - Angelus Wibowo, Ta Nguyen Binh Duong:
CloudNPlay: Resource Optimization for A Cloud-Native Gaming System. 33-38 - Houda Chouat, Imed Abbassi, Mohamed Graiet:
A genetic-based requirements-aware approach for reliable IoT applications in the Fog. 39-44 - Insaf Achour, Hanen Idoudi, Samiha Ayed:
Automatic Generation of Access Control for Permissionless Blockchains: Ethereum Use Case. 45-50 - Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0. 51-56 - Wafa Ben Slama Souei, Chiraz El Hog, Layth Sliman, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Towards a Uniform Description Language for Smart Contract. 57-62 - Houssein Hellani, Layth Sliman, Abed Ellatif Samhat, Ernesto Exposito:
Tangle the Blockchain: Towards Connecting Blockchain and DAG. 63-68 - Ikram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul:
A Solidity-to-CPN Approach Towards Formal Verification of Smart Contracts. 69-74 - Luca Franceschi, Andrea Lisi, Andrea De Salve, Paolo Mori, Laura Ricci:
DART: Towards a role-based trust management system on blockchain. 75-80 - Dorsaf Salah, Hanen Idoudi:
A Meta-heuristic-based Scheduling of Transactions for Medical Blockchain Systems. 81-84 - Lucas Benmouffok, Kalpana Singh, Nicolas Heulot, Daniel Augot:
Privacy-Preserving Initial Public Offering using SCALE-MAMBA and Hyperledger Fabric. 85-88 - Xuequan Zhou, Yi Tan, Gregory Zacharewicz, Yuqi Liu, Kexin Tan, David Chen:
Research on Value Based Heuristics Miner for Product Service System. 89-94 - Tommaso Panetti, Andrea D'Ambrogio, Paolo Bocciarelli:
Process over Things (PoT): an Ontology Based Approach for IoT-Aware Business Processes. 95-100 - Nourhène Ben Rabah, Bénédicte Le Grand, Manuele Kirsch-Pinheiro:
IoT Botnet Detection using Black-box Machine Learning Models: the Trade-off between Performance and Interpretability. 101-106 - Arkadiusz Warzynski, Patryk Schauer, Lukasz Falas:
Regional Center of Cybersecurity anomaly detection module efficiency in network monitoring scenarios. 107-112 - Sylwia Stachowiak, Miroslaw Kurkowski, Artur Sobon:
SAT vs. Substitution Boxes of DES like Ciphers. 113-118 - Robert Lukas, Grzegorz Kolaczek:
Android Malware Detection Using Deep Learning Methods. 119-124 - Samrah Mirza, Haider Abbas, Waleed Bin Shahid, Narmeen Shafqat, Mariagrazia Fugini, Zafar Iqbal, Muhammad Zia:
A Malware Evasion Technique for Auditing Android Anti-Malware Solutions. 125-130 - Arkadiusz Warzynski, Lukasz Falas, Patryk Schauer:
Excess-Mass and Mass-Volume anomaly detection algorithms applicability in unsupervised intrusion detection systems. 131-136 - Mouna Rekik, Khouloud Boukadi, Rima Grati:
Semantic composition of cloud services. 137-142 - Mariam Chaabane, Khouloud Zaafouri, Ismael Bouassida Rodriguez:
Towards modeling a Service-Oriented application managing a Smart City using UML 2.x. 143-148 - Imad Belkacem, Aymen Gammoudi, Nasredine Cheniki, Yacine Sam, Nizar Messai:
Collaborative Internet of Things (C-IoT) Data Analysis for Enhancing Activity Recognition and Preventing Serious Health Problems. 149-152 - Andrea Fasciglione, Maurizio Leotta, Alessandro Verri:
Improving Activity Recognition while Reducing Misclassification of Unknown Activities. 153-158 - Calanna Salvatore, Andrea Calvagna, Salvatore Campisi, Andrea Fornaia, Giuseppe Pappalardo, Riccardo Torrisi, Emiliano Tramontana:
A (Reverse) Mutation Testing Approach to Automatically generate parallel C/C++ Code. 159-164 - Elaine Barbosa de Figueiredo, Mariangela Dametto, Ferrucio de Franco Rosa, Rodrigo Bonacin:
A Multidimensional Framework for Semantic Electronic Health Records in Oncology Domain. 165-170 - Dimeth Nouicer, Nizar Messai, Yacine Sam, Ikbal Chammakhi Msadaa:
Semantic rule-based device recommendation for service-migration in multiple-device contexts. 171-176 - Shadi Baghernezhad-Tabasi, Loïc Druette, Fabrice Jouanot, Celine Meurger, Marie-Christine Rousset:
OntoSAMSEI: Interactive ontology engineering for supporting simulation-based training in Medicine. 177-182 - Pilar Maria Guerrieri, Sara Comai, Mariagrazia Fugini:
WECRAFT: a Platform for Networking Rural Craftsmen in Co-Production of Artisanal Crafts. 183-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.