Skip to main content

Page of 16
and
  1. No Access

    Chapter and Conference Paper

    Data Sharing and Privacy for Patient IoT Devices Using Blockchain

    Once a fitness fad, wearable and other related Internet of Things (IoT) devices are fast becoming common place in many different smart city applications such as healthcare. However, IoT devices, particularly i...

    Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha in Smart City and Informatization (2019)

  2. Chapter and Conference Paper

    Research on the Key Techniques of Semantic Mining of Information Digest in the Field of Agricultural Major Crops Based on Deep Learning

    Nowadays application scopes of deep learning research in the machine learning subfield have been gradually expanded, mainly in the field of computer vision and natural language processing. However, in the latt...

    Hao G. J. M. Gong, Yunpeng Cui, ** Qian in Computer and Computing Technologies in Agr… (2019)

  3. No Access

    Chapter and Conference Paper

    Key Retrieval from AES Architecture Through Hardware Trojan Horse

    The study of Hardware Trojan and its impact is a cutting edge research topic today. Hardware Trojan Horses (HTH) are inserted by an adversary either during design or fabrication phase of IC which does the mali...

    Sivappriya Manivannan, N. Nalla Anandakumar in Security in Computing and Communications (2019)

  4. No Access

    Chapter and Conference Paper

    Trends and Opportunities for Traffic Engineering Paradigms Across Mobile Cellular Network Generations

    Traffic engineering is at the heart of telecommunications engineering. In telecommunication engineering, we have recently experienced a revolution in the form of mobile cellular network generations. History sh...

    Khadija Mkocha, Mussa M. Kissaka in Information and Communication Technologies… (2019)

  5. No Access

    Chapter and Conference Paper

    Communication Design for the Dissemination of Scientific Knowledge. Languages, Tools, Technologies, Collaborative Processes for Museum Education

    This paper sets out to report an articulated research-action process, which started with some educational-scientific experiments carried out in a collaborative effort between the disciplines of design, multime...

    V. M. Viviana Trapani in Proceedings of the 1st International and I… (2019)

  6. No Access

    Chapter and Conference Paper

    Data Imputation with an Improved Robust and Sparse Fuzzy K-Means Algorithm

    Missing data may be one of the biggest problems hindering modern research science. It occurs frequently, for various reasons, and slows down crucial data analytics required to answer important questions relate...

    Connor Scully-Allison, Rui Wu in 16th International Conference on Informati… (2019)

  7. No Access

    Chapter and Conference Paper

    The Pollicina Project: A Collaborative and Educational Social Suite to Build Cultural Itineraries

    The Pollicina project is aimed at defining a collaborative coordinated learning environment, called Educational Social Network, to allow students to elaborate thematic cultural paths on the territory. The topi...

    S. Calegari, M. Dominoni in Proceedings of the 1st International and I… (2019)

  8. No Access

    Chapter and Conference Paper

    A Revocable Outsourcing Attribute-Based Encryption Scheme

    Attribute-Based Encryption (ABE) is a generalized cryptographic primitive from normal public key encryption. It provides an access control mechanism over encrypted message using access policies and ascribed at...

    Zoe L. Jiang, Ruoqing Zhang, Zechao Liu in Cloud Computing, Security, Privacy in New … (2018)

  9. No Access

    Chapter and Conference Paper

    Investigating the Recognition of Non-articulatory Sounds by Using Statistical Tests and Support Vector Machine

    People with articulation and phonological disorders need training to plan and to execute sounds of speech. Compared to other children, children with Down Syndrome have significantly delayed speech development ...

    Francisco Carlos M. Souza in Information Technology - New Generations (2018)

  10. No Access

    Chapter and Conference Paper

    Hardware Assisted Randomization of Data

    Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space ...

    Brian Belleville, Hyungon Moon in Research in Attacks, Intrusions, and Defen… (2018)

  11. No Access

    Chapter and Conference Paper

    Position Paper on Blockchain Technology: Smart Contract and Applications

    Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component...

    Weizhi Meng, Jianfeng Wang, **anmin Wang, Joseph Liu in Network and System Security (2018)

  12. Chapter and Conference Paper

    Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security

    Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the f...

    Reza M. Parizi, Amritraj, Ali Dehghantanha in Blockchain – ICBC 2018 (2018)

  13. No Access

    Chapter and Conference Paper

    Climbing Ranking Position via Long-Distance Backlinks

    The best attachment consists in finding a good strategy that allows a node inside a network to achieve a high rank. This is an open issue due to its intrinsic computational complexity and to the giant dimension o...

    V. Carchiolo, M. Grassia, A. Longheu in Internet and Distributed Computing Systems (2018)

  14. No Access

    Chapter and Conference Paper

    An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games

    In this paper, an approach based on Possibilistic WorkFlow nets is proposed to model mutiplayer game scenarios. In a multiplayer game scenario, the actions of a player may influence, directly or indirectly, th...

    Franciny M. Barreto in Information Technology - New Generations (2018)

  15. No Access

    Chapter and Conference Paper

    Exploiting Long Distance Connections to Strengthen Network Robustness

    Network fault tolerance (also known as resilience or robustness) is becoming a highly relevant topic, expecially in real networks, where it is essential to know to what extent it is still working notwithstandi...

    V. Carchiolo, M. Grassia, A. Longheu in Internet and Distributed Computing Systems (2018)

  16. No Access

    Chapter and Conference Paper

    Design and Performance Analysis of Load Balancing Strategies for Cloud-Based Business Process Management Systems

    Business Process Management Systems (BPMS) provide automated support for the execution of business processes in modern organisations. With the advent of cloud computing, the deployment of BPMS is shifting from...

    Michael Adams, Chun Ouyang in On the Move to Meaningful Internet Systems… (2018)

  17. No Access

    Chapter and Conference Paper

    Mixed Membership Sparse Gaussian Conditional Random Fields

    Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...

    Jie Yang, Henry C. M. Leung, S. M. Yiu in Advanced Data Mining and Applications (2017)

  18. No Access

    Chapter and Conference Paper

    Mining Textual Reviews with Hierarchical Latent Tree Analysis

    Collecting feedback from customers is an important task of any business if they hope to retain customers and improve their quality of service. Nowadays, customers can enter reviews on many websites. The vast n...

    Leonard K. M. Poon, Chun Fai Leung, Nevin L. Zhang in Data Mining and Big Data (2017)

  19. Chapter and Conference Paper

    Facilitating Social Harmony Through ICTs

    Social Harmony involves the peaceful interaction of people in a social setting. In this keynote address I briefly examine the historical antecedents of social harmony and identify some of the salient barriers ...

    Robert M. Davison in Information and Communication Technologies for Development (2017)

  20. No Access

    Chapter and Conference Paper

    Protecting Document Outside Enterprise Network: A Confirmed Framework

    Sharing e-documents are important components of any enterprise workflow. Kee** these e-documents secure is fundamental to enterprise security, especially in multi-site enterprises or when sharing e-documents...

    Zeyad S. Aaber, Gary B. Wills, Richard M. Crowder in Enterprise Security (2017)

Page of 16