default search action
38th AINA 2024: Kitakyushu, Japan
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 2. Lecture Notes on Data Engineering and Communications Technologies 200, Springer 2024, ISBN 978-3-031-57852-6 - Koji Sakai, Yu Ohara, Yosuke Maehara, Takeshi Takahashi, Kei Yamada:
A Method for Estimating the Number of Diseases in Computed Tomography Reports of the Japanese Medical Image Database (J-MID): Variations Among Facilities. 1-8 - Jakkarin Lapmoon, Thunpisit Kosolsriwiwat, Sirinyaporn Jiraporn, Somchart Fugkeaw:
Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph. 9-21 - Alberto Tuti Soki, Frank Siqueira:
Discovery of RESTful Web Services Based on the OpenAPI 3.0 Standard with Semantic Annotations. 22-34 - Marcelo Almeida Silva, Muriel Figueredo Franco, Eder John Scheid, Luciano Zembruzki, Lisandro Zambenedetti Granville:
PerfResolv: A Geo-Distributed Approach for Performance Analysis of Public DNS Resolvers Based on Domain Popularity. 35-47 - Mouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah, Ronan Champagnat:
DARS: Empowering Trust in Blockchain-Based Real-World Applications with a Decentralized Anonymous Reputation System. 48-61 - Yong Zheng:
An Empirical Comparison of Outlier Detection Methods for Identifying Grey-Sheep Users in Recommender Systems. 62-73 - Kshitij Mandyal, Dharmendra Prasad Mahato:
Adaptive Consensus: Enhancing Robustness in Dynamic Environments. 74-84 - Janaína F. B. Duarte, Gilson S. Junior, Gabriel F. C. da Silva, Maurício A. Pillon, Guilherme P. Koslovski, Charles Christian Miers:
COTTONTRUST: Reliability and Traceability in Cotton Supply Chain Using Self-sovereign Identity. 85-97 - Alessandro Bigiotti, Leonardo Mostarda, Alfredo Navarra, Andrea Pinna, Roberto Tonelli, Matteo Vaccargiu:
Interoperability Between EVM-Based Blockchains. 98-109 - Quentin Bramas, Hirotsugu Kakugawa, Sayaka Kamei, Anissa Lamani, Fukuhito Ooshita, Masahiro Shibata, Sébastien Tixeuil:
Stand-Up Indulgent Gathering on Lines for Myopic Luminous Robots. 110-121 - Samson Kahsay Gebresilassie, Joseph Rafferty, Liming Chen, Zhan Cui, Mamun I. Abu-Tair:
IoT Identity Management Systems: The State-of-the-Art, Challenges and a Novel Architecture. 122-135 - Rania Mkhinini Gahar, Olfa Arfaoui, Adel Hidri, Suleiman Ali Alsaif, Minyar Sassi Hidri:
STARM: STreaming Association Rules Mining in High-Dimensional Data. 136-146 - Mamun I. Abu-Tair, Aftab Ali, Samson Kahsay Gebresilassie, Joseph Rafferty, Zhan Cui:
Regulation Compliance System for IoT Environments: GDPR Compliance as a Use-Case. 147-160 - Orhan Gemikonakli, Eser Gemikonakli, Enver Ever:
Two-Dimensional Models of Markov Processes for System Availability. 161-172 - Ankit Agrawal, Bhaskar Mangal, Ashutosh Bhatia, Kamlesh Tiwari:
Enabling AI in Agriculture 4.0: A Blockchain-Based Mobile CrowdSensing Architecture. 173-186 - Fernando de Almeida Silva, João Pedro de Souza Jardim da Costa, José Maria N. David, Mario A. R. Dantas:
HPC-SBC: An Experimental Effort to Evaluate Storage in High-Performance Computing Configurations Using a Context Approach. 187-198 - Sohaib Soualah, Mohamed Khalgui, Allaoua Chaoui:
Effective Parallel Formal Verification of Reconfigurable Discrete-Event Systems Formalizing with Isabelle/HOL. 199-212 - Alexandre Pham, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida:
Data Poisoning Attacks in Gossip Learning. 213-224 - Wei-Yuan Ho, Hsing-Chung Chen:
The Home-Delivery Analysis of Prescription Drugs for Chronic Diseases in the Post-Pandemic Era-An Example of Local Community Pharmacy. 225-234 - Orestes Papanastassiou, Alex Thomo:
A Language-Agnostic Compression Framework for the Bitcoin Blockchain. 235-249 - Maryam Kamal, Gianfranco Romani, Giuseppe Ricciuti, Aris Anagnostopoulos, Ioannis Chatzigiannakis:
Analyzing Topic Models: A Tourism Recommender System Perspective. 250-262 - Kevin Wang, Bill Wong, Mohammad Ali Khoshkholghi, Purav Shah, Ranesh Naha, Aniket Mahanti, Jong-Kyou Kim:
Dissecting the Hype: A Study of WallStreetBets' Sentiment and Network Correlation on Financial Markets. 263-273 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Intelligence in Data Analysis and Knowledge Exploration. 274-281 - Dahlan Nariman:
Enhancing Effectiveness and Efficiency of Customers Reviews Data Collection Through Multithreaded Web Scraping Approach. 282-291 - Bathini Sai Akash, Vikram Singh, Aneesh Krishna, Lalita Bhanu Murthy Neti, Lov Kumar:
Investigating BERT Layer Performance and SMOTE Through MLP-Driven Ablation on Gittercom. 292-302 - Abir Gorrab, Nourhène Ben Rabah, Bénédicte Le Grand, Rébecca Deneckère, Thomas Bonnerot:
Detecting Signs of Depression in Social Networks Users: A Framework for Enhancing the Quality of Machine Learning Models. 303-315 - Wiem Baazouzi, Marouen Kachroudi, Sami Faïz:
Sweeping Knowledge Graphs with SPARQL Queries to Palliate Q/A Problems. 316-330 - Tanveer Khan, Fahad Sohrab, Antonis Michalas, Moncef Gabbouj:
Trustworthiness of $\mathbb {X}$ Users: A One-Class Classification Approach. 331-343 - Bundit Manaskasemsak, Natthakit Netsiwawichian, Arnon Rungsawang:
Entity Co-occurrence Graph-Based Clustering for Twitter Event Detection. 344-355 - Brett E. Downey, Carson K. Leung, Adam G. M. Pazdor, Ryan A. L. Petrillo, Denys Popov, Benjamin R. Schneider:
Anomaly Detection with Generalized Isolation Forest. 356-368 - Sabrine Benzarti, Wafa Tebourski, Wahiba Ben Abdessalem Karaa:
Toward a Deep Multimodal Interactive Query Expansion for Healthcare Information Retrieval Effectiveness. 369-379 - Connor C. J. Hryhoruk, Carson K. Leung, Jingyuan Li, Brandon A. Narine, Felix Wedel:
Multi-level Frequent Pattern Mining on Pipeline Incident Data. 380-392 - Mayssa Trabelsi, Samir Ben Ahmed:
Real-Time Task Scheduling and Dynamic Resource Allocation in Fog Infrastructure. 393-403 - Tran Viet Xuan Phuong, Tho Thi Ngoc Le, Huy Le Ngoc:
Secure Lightweight Data Communication Between the IoT Devices and Cloud Service. 404-415 - Yoshitaka Shibata, Yasushi Bansho, Shoichi Noguchi:
IoT Based Road State Sensing System Toward Autonomous Driving in Snow Country. 416-423 - João B. F. Sequeiros, Francisco Tchissaquila Chimuco, Tiago M. C. Simões, Mário M. Freire, Pedro R. M. Inácio:
An Approach to Attack Modeling for the IoT: Creating Attack Trees from System Descriptions. 424-436 - Gabriel Iuhasz, Silviu Panica, Florin Fortis, Alecsandru Duma:
A Distributed Platform for Cycle Detection and Analysis in Cyber-Physical Systems. 437-450 - Luís Nascimento, André Luíz de Oliveira, Regina Villela, Ran Wei, Richard Hawkins, Tim Kelly:
From Fault Tree Analysis to Runtime Model-Based Assurance Cases. 451-464 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Energy Consumption Model to Change the TBFC Model of the IoT. 465-475 - Zaineb Sakhrawi, Taher Labidi, Asma Sellami, Nadia Bouassida:
Automotive User Interface Based on LSTM-Grid Search Deep Learning Model for IoT Security Change Request Classification. 476-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.