default search action
FNC/MobiSPC 2018: Gran Canaria, Spain
- Ansar-Ul-Haque Yasar, Elhadi M. Shakshuki:
The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, Gran Canaria, Spain, August 13-15, 2018. Procedia Computer Science 134, Elsevier 2018 - Preface. 1-3
- Preface. 4-5
- Domingo Benitez:
Keynote I. 6 - Jamal Bentahar:
Keynote II. 7-8 - Nawaz Mohamudally, Mahejabeen Peermamode-Mohaboob:
Building An Anomaly Detection Engine (ADE) For IoT Smart Applications. 10-17 - Felix Beierle, Vinh Thuy Tran, Mathias Allemand, Patrick Neff, Winfried Schlee, Thomas Probst, Rüdiger Pryss, Johannes Zimmermann:
Context Data Categories and Privacy Model for Mobile Data Collection Apps. 18-25 - Meryem El Moulat, Olivier Debauche, Saïd Mahmoudi, Lahcen Aït Brahim, Pierre Manneback, Frédéric Lebeau:
Monitoring System Using Internet of Things For Potential Landslides. 26-34 - Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet:
Trust-based Context-aware Authentication System for Ubiquitous Systems. 35-42 - Jeong-A Kim, Jongpil Jeong:
On PMIPv6-based Cost-Effective Function-distributed Mobility Management Scheme for Industrial Future Internet. 43-50 - Tahsin C. M. Dönmez, Ethiopia Nigussie:
Security of LoRaWAN v1.1 in Backward Compatibility Scenarios. 51-58 - Uneb Gazder, Elhadi M. Shakshuki, Muhammad Adnan, Ansar-Ul-Haque Yasar:
Artificial Neural Network Model to relate Organization Characteristics and Construction Project Delivery Methods. 59-66 - Kevin Andrews, Michael Zimoch, Manfred Reichert, Miles Tallon, Ulrich Frick, Rüdiger Pryss:
A Smart Mobile Assessment Tool for Collecting Data in Large-Scale Educational Studies. 67-74 - Koray Inçki, Ismail Ari:
Model-Based Runtime Monitoring of Smart City Systems. 75-82 - Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad:
A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing. 83-90 - Illkyun Im, Dong Ryeol Shin, Jongpil Jeong:
Components for Smart Autonomous Ship Architecture Based on Intelligent Information Technology. 91-98 - Marcel Tresanchez, Alex Pujol, Tomàs Pallejà, Dani Martínez, Eduard Clotet, Jordi Palacín:
A proposal of low-cost and low-power embedded wireless image sensor node for IoT applications. 99-106 - Slimane Ouhmad, Abderrahim Beni Hssane, Abdelmajid Hajami:
The hybrid neural model to strengthen the e-nose restricted in real complex conditions. 107-113 - Hamza Elkhoukhi, Y. Nait Malek, Anass Berouine, Mohamed Bakhouya, D. Elouadghiri, Mohammed Essaaidi:
Towards a Real-time Occupancy Detection Approach for Smart Buildings. 114-120 - Boubaker Soltani, Afifa Ghenai, Nadia Zeghib:
Towards Distributed Containerized Serverless Architecture in Multi Cloud Environment. 121-128 - Carmela Comito:
Human Mobility Prediction Through Twitter. 129-136 - Igor Haman Tchappi, Stéphane Galland, Vivient Corneille Kamla, Jean-Claude Kamgang:
A Brief Review of Holonic Multi-Agent Models for Traffic and Transportation Systems. 137-144 - Kushal Agrawal, Muntazir Mehdi, Manfred Reichert, Franz J. Hauck, Winfried Schlee, Thomas Probst, Rüdiger Pryss:
Towards Incentive Management Mechanisms in the Context of Crowdsensing Technologies based on TrackYourTinnitus Insights. 145-152 - Michael Stach, Tim Mohring, Rüdiger Pryss, Manfred Reichert:
Towards a Beacon-based Situational Prioritization Framework for Process-Aware Information Systems. 153-160 - Soonsung Hwang, Jongpil Jeong:
On Hierarchical Crossing-layer Binding Update Scheme for Industrial Mobile Networking. 161-168 - Changyong Um, Jongpil Jeong:
On Microcell-Macrocell Handoff Queueing scheme in Heterogeneous Industrial Networks. 169-176 - Asha G. R., Gowrishankar:
Energy efficient clustering and routing in a wireless sensor networks. 178-185 - Peter Krammer, Marcel Kvassay, Ján Mojzis, Ivana Budinska, Ladislav Hluchý, Marek Jurkovic:
Clustering analysis of online discussion participants. 186-195 - Pavol Salík, Rastislav Róka, Tomás Gorazd:
Simulation Platform of Optical Transmission System in Matlab Simulink. 196-203 - Tahsin C. M. Dönmez, Ethiopia Nigussie:
Security of Join Procedure and its Delegation in LoRaWAN v1.1. 204-211 - Ling Chen, Mingchu Li, Ling Qin, Yingmo Jie:
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise. 212-218 - Franco Milicchio, Marco Oliva, Christina Boucher, Mattia Prosperi:
Third-generation sequencing data analytics on mobile devices: cache oblivious and out-of-core approaches as a proof-of-concept. 219-226 - Ayoub Bahnasse, Abdelmajid Badri, Mohamed Talea, Fatima Ezzahraa Louhab, Azeddine Khiat:
Towards a New approach for automating the simulation of QoS mechanisms in a smart digital environment. 227-234 - Dae Jun Ahn, Jongpil Jeong:
A PMIPv6-based User Mobility Pattern Scheme for SDN-defined Smart Factory Networking. 235-242 - Chadha Zrari, Flavien Balbo, Khaled Ghédira:
Multi-Agent based platform dedicated to C-ITS. 243-250 - Mingchu Li, Yuanpeng Cao:
Optimally Protecting Elections with Uncertainty about Voter Preferences. 251-258 - Trung Chi Ngo, Quy Lam Hoang, Hoon Oh:
Evaluation of a Compound Node Selection Function for a Greedy Routing in Urban Vehicular Ad Hoc Networks. 259-266 - John P. Baugh, Jinhua Guo:
A Per-Face Popularity Scheme to Increase Cache Robustness in Information-Centric Networks. 267-274 - Jun Peng:
Network State Conservation in Dynamic Spectrum Access: the IEEE 802.11 DCF Case. 275-282 - Abderrahmane Sokri:
Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach. 283-288 - Tarek R. Sheltami, Essa Q. Shahra, Elhadi M. Shakshuki:
Fog Computing: Data Streaming Services for Mobile End-Users. 289-296 - Mourad Messaadia, Samir Ouchani, Anne Louis:
A Recursive K-means towards trade-off between PLM Competences, Positions, and Offers. 297-302 - Ahmad Nahar Quttoum, Hassan AlSaraireh, Olbi Khadjiev, Marwa Alqudaimat:
SMS: Smart Management Scheme via Software Defined Networks. 303-308 - Liguo Chen, Yuedong Zhang, Qi Zhao, Guanggang Geng, Zhiwei Yan:
Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark. 310-315 - Younes Asimi, Ahmed Asimi, Azidine Guezzaz, Zakariae Tbatou, Yassine Sadqi:
Unpredictable cryptographic primitives for the Robust Wireless Network Security. 316-321 - Ziani Said, Atman Jbari, Larbi Bellarbi, Yousef Farhaoui:
Blind Maternal-Fetal ECG Separation Based on the Time-Scale Image TSI and SVD - ICA Methods. 322-327 - El Balmany Chawki, Ahmed Asimi, Zakariae Tbatou:
IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors. 328-333 - Hicham Medromi, Laila Moussaid, Laila FAL:
Analysis of the allocation of classes, threads and CPU used in embedded systems for Java applications. 334-339 - Hassana Nassiri, Mustapha Machkour, Mohamed Hachimi:
One query to retrieve XML and Relational Data. 340-345 - Oumayma Boulaalam, Badraddine Aghoutane, Driss El Ouadghiri, Aniss Moumen, Mahamed Laghdaf Cheikh Malinine:
Proposal of a Big data System Based on the Recommendation and Profiling Techniques for an Intelligent Management of Moroccan Tourism. 346-351 - Haddaoui Abdelwahab, Laila Moussaid, Fouad Moutaouakkil, Hicham Medromi:
Energy Efficiency: Improving the renewable energy penetration in a smart and green community. 352-357 - Ahlem Boudellioua, Nasser Alzeidi:
PentaNoc: A New Scalable and self-similar NoC Architecture. 358-364 - Dharmalingam Ramalingam, Shivasankarappa Arun, Neelamegam Anbazhagan:
A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoM. 365-370 - Qussai M. Yaseen, Monther Aldwairi:
An Enhanced AODV Protocol for Avoiding Black Holes in MANET. 371-376 - Benjamin Feldner, Paula Herber:
A Qualitative Evaluation of IPv6 for the Industrial Internet of Things. 377-384 - Pauline Sia Wen Shieng, Jack Jansen, Steven Pemberton:
Fine-grained Access Control Framework for Igor, a Unified Access Solution to The Internet of Things. 385-392 - Roberto Casado-Vara, Javier Prieto, Fernando de la Prieta, Juan M. Corchado:
How blockchain improves the supply chain: case study alimentary supply chain. 393-398 - Subha P. Eswaran, Sridhar Sripurushottama, Manoj Jain:
Multi Criteria Decision Making (MCDM) based Spectrum Moderator for Fog-Assisted Internet of Things. 399-406 - Vittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè:
Mobile Systems applied to Traffic Management and Safety: a state of the art. 407-414 - Nicola Berloco, Pasquale Colonna, Paolo Intini, Giuseppe Masi, Vittorio Ranieri:
Low-cost smartphone-based speed surveying methods in proximity to traffic calming devices. 415-420 - Francesco Piras, Eleonora Sottile, Daniele Calli, Italo Meloni:
Automatic data collection for detecting travel behavior: the IPET platform. 421-426 - Vittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè, Giuseppe Guido, Alessandro Vitale:
The use of Smartphones to assess the Feasibility of a Cooperative Intelligent Transportation Safety System based on Surrogate Measures of Safety. 427-432 - Vittorio Astarita, Demetrio Carmine Festa, Vincenzo Pasquale Giofrè, Giuseppe Guido, Giulio Stefano:
Mobile for emergencies M4EM: a cooperative software tool for emergency management operations. 433-438 - Vincenzo Barone, Demetrio Carmine Festa, Domenico Walter Edvige Mongelli, Antonio Tassitani:
Comfort Index CI(bus): A methodology to measure the comfort on board. 439-444 - Muntazir Mehdi, Guido Mühlmeier, Kushal Agrawal, Rüdiger Pryss, Manfred Reichert, Franz J. Hauck:
Referenceable mobile crowdsensing architecture: A healthcare use case. 445-451 - Hichem Ben Abdallah, Takoua Abdellatif, Faouzi Chekir:
AMSEP: Automated Multi-level Security Management for Multimedia Event Processing. 452-457 - Olivier Brun, Yonghua Yin, Erol Gelenbe:
Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments. 458-463 - YeongKyun Lee, Jongpil Jeong:
Design and Implementation of Monitoring System Architecture for Smart Bicycle Platform. 464-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.