


default search action
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: Guangzhou, China
- Guojun Wang, Qi Han, Md. Zakirul Alam Bhuiyan, Xiaoxing Ma, Frédéric Loulergue, Peng Li, Manuel Roveri, Lei Chen:

2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018. IEEE 2018, ISBN 978-1-5386-9380-3
4th IEEE Smart World Congress (SmartWorld 2018)
Track 1: Smart World Theories and Models (SWTM)
- Lichen Zhang:

Modeling Smart Cyber Physical Systems Based on ModelicaML. 1-8 - Hussain Al-Aqrabi

, Richard Hill
:
A Secure Connectivity Model for Internet of Things Analytics Service Delivery. 9-16 - Hussain Al-Aqrabi

, Richard Hill
:
A Scalable Model for Secure Multiparty Authentication. 17-22 - Mingming Wang, Li Wang, Xinyue Xu

, Yong Qin:
Characteristics Analysis and Impact Cluster on Urban Rail Transit Perturbations: A Real Case in Beijing. 23-28
Track 2: Smart World Technologies (SWT)
- Jing Li, Hao Peng

, Lin Liu, Guixi Xiong, Bowen Du, Hongyuan Ma, Lihong Wang, Md. Zakirul Alam Bhuiyan:
Graph CNNs for Urban Traffic Passenger Flows Prediction. 29-36 - Ashutosh Shivakumar, Miteshkumar Vasoya, Sean Morrison, Yong Pei:

Individualized Smart Charging to Mitigate the Growing Electrical Peak Demand from EVs as Home Appliances. 37-44 - Jiasong Zhu, Weidong Lin, Ke Sun, Xianxu Hou, Bozhi Liu, Guoping Qiu

:
Behavior Recognition of Moving Objects Using Deep Neural Networks. 45-52 - Syed Muhammad Asim Ali Rizvi

, Weifeng Lv, Bowen Du, Zhipu Xie, Runhe Huang:
Optimization of Bus Lines Based on Passenger Group Moving Behaviors. 53-60
Work-in-Progress Papers (WiP)
- Junwei Zhang, Jiaxiang Ou, Chao Ding, Wenbin Shi:

An Abnormal Behavior Detection Based on Deep Learning. 61-65 - Damien Hanyurwimfura

, Eric Nizeyimana
, Faustine Ndikumana
, Didacienne Mukanyiligira
, Abubakar Bakar Diwani, Florence Mukamanzi:
Monitoring System to Strive against Fall Armyworm in Crops Case Study: Maize in Rwanda. 66-71 - Monisha Bhattacharya, Dhruva Gupta, Shantanu Biswas, Gunjan Bansal:

Designing Recommender System for Corporate Education WiP+32. 72-76 - Ho-Jin Heo, Namgi Kim, Byoung-Dai Lee:

Multicast Tree Generation Technique Using Reinforcement Learning in SDN Environments. 77-81 - Stephanie Haynes, Paul Wooderson

:
Smart Vehicles: The Data Privacy Smog. 82-87 - Christopher Prentice, Georgios Karakonstantis:

Smart Office System with Face Detection at the Edge. 88-93
2018 International Workshop on Assistive Engineering and Information Technology (AEIT 2018)
Regular Papers
- Hongyu Wang, Ping Zhu

, Xueqiang Zou, Su-Juan Qin:
An Ensemble Learning Framework for Credit Card Fraud Detection Based on Training Set Partitioning and Clustering. 94-98 - Zhenghui Liu, Bin Wang, Changjun Zhou, Xiaopeng Wei, Qiang Zhang

, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng:
An Improved Iterated Hybrid Search for DNA Codes Design. 99-105 - Wenjun Yang, Shuzhen Fan, Huaibin Wang:

An Item-Diversity-Based Collaborative Filtering Algorithm to Improve the Accuracy of Recommender System. 106-110 - Gang Ma, Wenliang Zhu, Jun Zhong, Teng Tong, Jie Zhang, Lirong Wang:

Wearable Ear Blood Oxygen Saturation and Pulse Measurement System Based on PPG. 111-116 - Miao Zhang, Cong Wang, Meng Gan, Na Yang, Ting Yang, Lirong Wang:

Automated Segmentation of Esophagus Layers from OCT Images Using Fast Marching Method. 117-122 - Kongpeng Xing, Jun Zhong, Wenliang Zhu, Gang Ma, Teng Tong, Lirong Wang:

A Wearable High-Precision Skin Resistance Acquisition System. 123-127 - Jie Zhang, Wenliang Zhu, Gang Ma, Teng Tong, Jun Zhong, Lirong Wang:

Design of a Portable Physiological Signal Data Storage System. 128-132 - Teng Tong, Lishen Qiu, Jun Zhong, Chongsen Zang, Bin Chen, Lirong Wang:

Wearable Arteriovenous Fistula Murmur Monitoring System Based on Embedded Wi-Fi Technology. 133-138 - Lishen Qiu, Wanyue Li, Wenqiang Cai, Miao Zhang, Wenliang Zhu, Lirong Wang:

Heartbeat Classification Using Convolution Neural Network and Wavelet Transform to Extract Features. 139-143 - Longfei Niu, Wenliang Zhu, Lirong Wang:

Design of Remote Database Service System for Wearable Devices. 144-149 - Lei Shi:

Model-Based Active Impedance Controller Development of the Exoskeleton Rehabilitation Robot (ERRobot) for Lower-Extremity. 150-155 - Haicheng Chi, Zhen Liu:

Maximum Frequent Itemsets Discovery Algorithm Based on Granular Computing. 156-161
2018 Special Session on Advanced Information Systems Engineering (AISE 2018)
Regular Papers
- Zhenzhen Wang:

A Naïve Construction Model of Membership Function. 162-167 - Hongbiao Gao, Jianbin Li, Jingde Cheng:

Measuring Interestingness of Theorems in Automated Theorem Finding by Forward Reasoning: A Case Study in Tarski's Geometry. 168-173 - Yohei Kamata, Yuichi Goto

:
Improvement of Data Portability of ENQUETE-BAISE: A General-Purpose E-Questionnaire Server for Ubiquitous Questionnaire. 174-179 - Takumi Otsuka, Kentaro Fukushi, Yuichi Goto

, Jingde Cheng:
FreeEnCal Web: A Web Service of Automated Forward Reasoning for General-Purpose. 180-185 - Tomoya Yamazaki, Atomu Sakuma, Yuichi Goto

:
An Implementation of Theory Grid with Linked Data Technologies. 186-191 - Sho Ishibashi, Jingchen Yan, Yuichi Goto

, Jingde Cheng:
Primitive Constituent Elements of Cryptographic Protocols. 192-197 - Yuan Zhou

, Daisuke Matsuura, Yuichi Goto
, Jingde Cheng:
Evaluation about the Descriptive Power of QSL: A Specification Language for E-Questionnaire, E-Testing, and E-Voting Systems. 198-203 - Da Bao, Wen Sun, Yuichi Goto

, Jingde Cheng:
Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045. 204-209 - Jingchen Yan, Sho Ishibashi, Yuichi Goto

, Jingde Cheng:
A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning. 210-215 - Jun Cao, Zhong Fan:

Deep Learning-Based Online Small Signal Stability Assessment of Power Systems with Renewable Generation. 216-221 - Yuichi Goto

, Takuya Ito:
An Epistemic Programming Approach for Automated Nonmonotonic Reasoning Based on Default Logic. 222-227 - Yanhong Liu, Hui Lv, Changjun Zhou, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng, Qiang Zhang

:
Stability Analysis and Hopf Bifurcation Research for DNA Strand Displacement with Time Delay. 228-233 - Jingde Cheng, Runhe Huang, Qun Jin, Jianhua Ma, Yi Pan

:
An Undergraduate Curriculum Model for Intelligence Science and Technology. 234-239 - Haibo Yu, Xi Jia, Tsunenori Mine, Jianjun Zhao:

Type Conversion Sequence Recommendation Based on Semantic Web Technology. 240-245
2018 Special Session on Blockchain and Its Applications (BlockChain 2018)
Regular Papers
- Mark Hanley, Hitesh Tewari

:
Managing Lifetime Healthcare Data on the Blockchain. 246-251 - Zijian Bao, Bin Wang, Wenbo Shi:

A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol. 252-256 - Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:

Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. 257-262 - Yanxue Jia, Lei Fan:

Generate Public Randomness Based on Blockchain. 263-270 - Hirotsugu Seike

, Takeo Hamada, Takahiro Sumitomo, Noboru Koshizuka:
Blockchain-Based Ubiquitous Code Ownership Management System without Hierarchical Structure. 271-276
15th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2018)
Track 1: Intelligent/Smart Objects & Interactions (ISOI)
- Hai-Feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi:

A Dynamic Multi-Objective Evolutionary Algorithm for Nontrivial Upper Bounds of Real-Time Tasks in Embedded System Design. 277-286 - Jing Long, Dafang Zhang, Wei Liang

, Kuan-Ching Li
:
A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol. 287-292 - Qi Liu, Wei Yang, Yang Xu, Yahui Hu, Qijian He, Liusheng Huang:

DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition. 293-300 - Songyou Xie, Wei Liang

, Jianbo Xu, Mingdong Tang, Tien-Hsiung Weng, Kuan-Ching Li
:
A Novel Bidirectional RFID Identity Authentication Protocol. 301-307 - Shun Wang, Xiaojuan Li, Yong Guan, Rui Wang, Jie Zhang:

Executable Micro-Architecture Modeling and Automatic Verification of EtherCAT. 308-315 - Zhenchao Ouyang

, Yu Liu, Jianwei Niu
:
Mining the Critical Conditions for New Hypotheses of Materials from Historical Reaction Data. 316-322 - Xinhua Zhu, Qingsong Guo, Bo Zhang:

A Wikipedia Two-Way Link Vector Model for Measuring Semantic Relatedness. 323-330 - Yongqiang Kong

, Jianhui Huang, Shanshan Huang, Zhengang Wei, Shengke Wang:
Dynamic Representation Learning for Video Action Recognition Using Temporal Residual Networks. 331-337 - Shao-yi Zhu, Siye Wang

, Fangtao Zhang, Yanfang Zhang, Yue Feng, Weiqing Huang:
Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario. 338-345 - Bobo Zhao, Zhu Wang

, Zhiwen Yu
, Bin Guo
:
EmotionSense: Emotion Recognition Based on Wearable Wristband. 346-355 - Zhimin Liu, Guihua Duan, Guojun Wang:

Scheduling Algorithm for Area Coverage Problem in Directional Sensor Networks. 356-363 - Jianfei Shen, Yiqiang Chen

, Zhiqi Shen, Siyuan Liu:
A Two-Stage Incremental Update Method for Fall Detection with Wearable Device. 364-371 - Yang Gao, Zhengyu Pan, Honghao Wang, Guanling Chen:

Alexa, My Love: Analyzing Reviews of Amazon Echo. 372-380 - Yingchao Cheng

, Zhifeng Hao, Ruichu Cai, Wen Wen, Lijuan Wang, Zhongrun Zhou:
Resource-Aware Stream Processing in High Performance Cloud Environment. 381-388 - Trupil Limbasiya

, Debasis Das
:
Secure and Effective Geo-Data Transmission Scheme for Vehicle-to-Vehicle Communication. 389-396 - Qiaoxiang Xiao, Buqing Cao, Xiangping Zhang, Jianxun Liu, Rong Hu, Bing Li:

Web Services Clustering Based on HDP and SOM Neural Network. 397-404 - Jie Chen, Junjie Peng, Yingtao Wang, Gan Chen:

An Implicit Information Based Movie Recommendation Strategy. 405-410 - Wei Ren

, Simin Li, Ruiyang Xiao, Wei Bi:
Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers. 411-416 - Lei Zhang, Weiqing Cheng, Yinglin Hou:

A Synchronous Gossip Algorithm with Exponential Backoff. 417-424 - Dejiao Niu, Tianquan Liu, Zheng Xia, Tao Cai

, Yawen Liu, Yongzhao Zhan:
APRNN: A New Active Propagation Training Algorithm for Distributed RNN. 425-431 - Udsanee Pakdeetrakulwong

:
Semantic Web-Based Approach to Support Rational Unified Process Software Development. 432-438
Track 2: Intelligent/Smart Systems & Services (ISSS)
- Aitor Almeida, Gorka Azkune

, Aritz Bilbao
:
Embedding-Level Attention and Multi-Scale Convolutional Neural Networks for Behaviour Modelling. 439-445 - Miao Ma

, Ziang Gao, Jie Wu, Yuli Chen, Xue Zheng:
A Smile Detection Method Based on Improved LeNet-5 and Support Vector Machine. 446-451 - Jia Xie, Zhu Wang

, Zhiwen Yu
, Bin Guo
:
Enabling Efficient Stroke Prediction by Exploring Sleep Related Features. 452-461 - Wei Zhou, Yiying Li, Shuhui Chen, Bo Ding:

Real-Time Data Processing Architecture for Multi-Robots Based on Differential Federated Learning. 462-471 - Rui-dong Qi, Jiantao Zhou, Xiaoyu Song:

A Synergistic Cloud Service Approach for Cold Start Problems. 472-479 - Nic Volanschi, Adrien Carteron, Charles Consel:

A Domain-Specific Approach to Unifying the Many Dimensions of Context-Aware Home Service Development. 480-489 - Jiantao Zhou, Xianyang Li, Yan Wang, Xiaoyu Song:

A Cloud Workflow Model Based on Resources Selection. 490-495 - Yao Shu, Chong Chen, Kuang-I Shu, Heng Zhang:

Research on Human Motion Recognition Based on Wi-Fi and Inertial Sensor Signal Fusion. 496-504 - Qiang Lin, Xinshuai Liu, Weilan Wang:

GPS Trajectories Based Personalized Safe Geofence for Elders with Dementia. 505-514 - Junqi Ning, Rong Chen, Zhifeng Zhou:

Improving Large Scale Real-Time Ridesharing with Heuristics for Road Networks. 515-521 - Jianwei Niu

, Zheng Li, Shasha Mo, Boyu Fan:
CIGAN: A Novel GANs Model Based on Category Information. 522-529 - Shengjie Li, Xiang Li, Qin Lv, Guiyu Tian, Daqing Zhang:

WiFit: Ubiquitous Bodyweight Exercise Monitoring with Commodity Wi-Fi Devices. 530-537 - Letian Kang, Zhi-Jie Wang, Zhe Quan, Weigang Wu, Song Guo, Kenli Li, Keqin Li:

An Efficient Method for Optimizing PETSc on the Sunway TaihuLight System. 538-545 - Junyi He, Di Zhang, Yuezhi Zhou, Xiang Lan, Yaoxue Zhang:

Towards a Truthful Online Auction for Cooperative Mobile Task Execution. 546-553 - Chunyan An

, Jiantao Zhou:
Resource Demand Forecasting Approach Based on Generic Cloud Workload Model. 554-563 - Lin Jia, Zhi Zhou, Hai Jin:

Optimizing the Performance-Cost Tradeoff in Cross-Edge Analytics. 564-571 - Yufei Chen, Huihui Chen, Ziyang He

, Cong Yang, Yangjie Cao:
Multi-Channel Lightweight Convolution Neural Network for Anterior Myocardial Infarction Detection. 572-578 - Jian He, Zihao Zhang, Weiguo Yu:

Interrupt-Driven Fall Detection System Realized via a Kalman Filter and kNN Algorithm. 579-584 - Yalan Wu, Jigang Wu, Gangqiang Zhou, Long Chen:

A Direction-Based Vehicular Network Model in Vehicular Fog Computing. 585-589 - Qirong Bu

, Gang Yang, Jun Feng, Xingxia Ming:
Wi-Fi Based Gesture Recognition Using Deep Transfer Learning. 590-595 - Guangle Yao, Jiandan Zhong, Tao Lei, Xianyuan Liu

:
Constructing Hierarchical Spatiotemporal Information for Action Recognition. 596-602 - Ruimin Zhao, Jin Wang, Kejie Lu, Jianping Wang, Xiumin Wang, Jingya Zhou, Chunming Cao:

Weakly Secure Coded Distributed Computing. 603-610 - Jingbin Zhang, Peikai Zheng, Meng Ma, Ping Wang:

Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition. 611-618 - Guorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang, Pengfei Yin:

A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing. 619-626 - Jie Xu, Wei Ding, Xiaoyan Hu

:
Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation. 627-634 - Yinglong Dai, Xiangyong Liu, Guojun Wang:

A Body Simulator with Delayed Health State Transition. 635-641 - Jiaye Shao, Yanqin Zhu, Qijin Ji:

Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing. 642-649 - Jie Ren:

A QoE-Based Governor for Web Browsing on Heterogeneous Mobile Systems. 650-655 - Haixiang Hou, Hai Jin, Xiaofei Liao, Deze Zeng:

Stochastic Analysis on Fog Computing Empowered Mobile Crowdsensing with D2D Communications. 656-663 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xiaofei Xing:

Towards Wi-Fi Radar in Collapsed Structures. 664-670 - Hailiang Zhao

, Wei Du, Wei Liu, Tao Lei, Qiwang Lei:
QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices. 671-678 - Xiaomin Kang, Baoqi Huang, Runze Yang

, Guodong Qi:
Accurately Counting Steps of the Pedestrian with Varying Walking Speeds. 679-686 - Huiying Wang, Dianxi Shi, Bingnan Song:

A Dynamic Role Assignment Formation Control Algorithm Based on Hungarian Method. 687-696
Track 3: Intelligent/Smart Environments & Applications (ISEA)
- Ling Kuang, Lichen Zhang:

Hierarchy Value Density - A Priority Algorithm for Task Scheduling on Cloud. 697-704 - Miao Li, Beihong Jin, Hongyin Tang, Fusang Zhang:

Clustering Large-Scale Origin-Destination Pairs: A Case Study for Public Transit in Beijing. 705-712 - Liang Ge, Junling Liu, Aoli Zhou, Hang Li:

Crime Rate Inference Using Tensor Decomposition. 713-717 - Xiaoyang Wu, Chun Yu, Yuanchun Shi:

Multi-Depth-Camera Sensing and Interaction In Smart Space. 718-725 - Valère Plantevin, Abdenour Bouzouane, Bruno Bouchard, Sébastien Gaboury:

A Novel and Distributed Approach for Activity Recognition Inside Smart Homes. 726-733 - Bang Wang:

CRNet: Corner Recognition from Trajectories Based on Convolutional and Recurrent Neural Networks. 734-740 - Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. 741-747 - Xiaoliang Wang, Jianming Jiang, Liang Bai, Baowei Wang:

SWATS: A Lightweight VANET Anonymous Traceback System Based on Random Superposition Watermarking. 748-755 - Linjiang Zheng, Li Chen, Yadong Liu, Jing Huang, Mujun He, Weining Liu:

Urban Road Traffic Congestion Detection Using RFID Data of Vehicles. 756-763 - Jing Wei

, Jin Zhang, Jennifer Boger:
What Wrist Temperature Tells Us When We Sleep Late: A New Perspective of Sleep Health. 764-771 - Hafiz ur Rahman, Guojun Wang, Jianer Chen, Hai Jiang:

Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance. 772-779 - Wei Wang, Chunyan Miao

:
Multi-Resident Activity Recognition with Unseen Classes in Smart Homes. 780-787 - Hongjia Wu, Gaocai Wang, Xiaotong Xu, Jintian Hu:

A Cache Placement Strategy for Energy Savings in CCN. 788-795 - Qing-Yong Wang

, Liang-Yong Xia
, Hua Chai, Yun Zhou:
Semi-Supervised Learning with Ensemble Self-Training for Cancer Classification. 796-803 - Siyang Wang, Jian Deng, Weigang Wu, Jieying Zhou:

RSU Controlled Named Data Networking for Traffic Information Dissemination in Vehicular Networks. 804-811
Track 4: Personalization and Social Aspects (P&SA)
- Walaa Alajali

, Wanlei Zhou
, Sheng Wen:
Traffic Flow Prediction for Road Intersection Safety. 812-820 - Bin Yang, Guangquan Xu, Xianjiao Zeng, Jia Liu, Yao Zhang:

A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid. 821-827 - Tian Wang, Hui Tian

, Wenxian Jiang:
Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks. 828-833 - Xi Han, Yang Liu, Zhixin Liu, Yuanai Xie

, Tian Wang:
Power Control in D2D-Based Vehicle Communication with Delayed CSI Feedback. 834-840 - Tong Guo, Bin Guo

, Yi Ouyang, Zhiwen Yu:
Mining and Analyzing User Feedback from App Reviews: An Econometric Approach. 841-848 - Jianwei Niu

, Shijie Li, Shasha Mo, Sen Yang, Boyu Fan:
Affective Content Analysis of Online Video Clips with Live Comments in Chinese. 849-856 - Wenda Tang, Shu Li, Wajid Rafique

, Wanchun Dou, Shui Yu
:
An Offloading Approach in Fog Computing Environment. 857-864 - Feng Gao, Kai Han, Ke Xu:

Utility-Aware Trip Planning. 865-872 - Shiwei Song, Yan Lei, Kang Yang, Tianzhang Xing, Jinping Niu, Feng Chen, Dingyi Fang:

DeepAid: A Mobile Cognitive Aid System with Compacted Deep Learning. 873-880 - Hui Cao, Shubo Liu

, Zhitao Guan, Longfei Wu, Haonan Deng, Xiaojiang Du:
An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid. 881-886 - Hao Zhang, Kai Liu, Feiyu Jin, Chao Chen, Chen Zhan, Jianjun Li, Liang Feng:

An Annulus Local Search Based Localization (ALSL) Algorithm in Indoor Wi-Fi Environments. 887-892 - Jiahao Zhang, Kai Han, Junxiao Han, Feiyang Li, Shasha Li:

Attributed Community Search in Dynamic Networks. 893-900 - Zhiwei Zhao, Zifei Zhao, Geyong Min, Chang Shu, Zhe Wang, Hancong Duan:

Non-Intrusive Biometric Identification for Personalized Computing Using Wireless Big Data. 901-908 - Shuang Li, Yanghui Yan, Chao Wu, Kaichuan Zhao, Yuezhi Zhou, Yaoxue Zhang:

Deep Collaborative Filtering Incorporating Auxiliary Multi-Media Information. 909-916 - Xiangting Hou, Linbo Luo, Wentong Cai

, Masatoshi Hanai:
Fast Online Map Matching for Recovering Travelling Routes from Low-Sampling GPS Data. 917-924 - Feiyang Li, Kai Han, Yue Li, Jiahao Zhang:

Exploiting Implicit Trust and Geo-Social Network for Recommendation. 925-931 - Jie Zhang, Lianyong Qi, Yuan Yuan, Xiaolong Xu, Wanchun Dou:

A Workflow Scheduling Method for Cloudlet Management in Mobile Cloud. 932-937 - Jianghua Huang, Changjian Wang, Majing Su, Qiong Dai, Md. Zakirul Alam Bhuiyan:

Inspecting Influences on Likes and Comments of Photos in Instagram. 938-945 - Shaobo Zhang

, Qing Peng, Xiong Li
, Gengming Zhu, Jing Liao:
A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle Recognition. 946-953 - Xiaofei Ding, Wenjun Jiang, Jiawei He:

Generating Expert's Review from the Crowds': Integrating a Multi-Attention Mechanism with Encoder-Decoder Framework. 954-961 - Qiang Zhang, Guihua Duan, Guojun Wang:

Personalized Search with Secure Updates in Educational Resources. 962-969 - Feng Wang, Wenjun Jiang, Guojun Wang:

Low-Dimensional Vectors Learning for Influence Maximization. 970-976 - Shengli Pan, Chun Liu, Deze Zeng, Hong Yao, Zhuzhong Qian:

Fine-Grained Task-Dependency Offloading in Mobile Cloud Computing. 977-982 - Steven Mudda, Defu Lian

, Silvia Giordano
, Danyang Liu, Xing Xie
:
Spatial-Aware Deep Recommender System. 983-990 - Saqib Ali

, Guojun Wang, Md. Zakirul Alam Bhuiyan, Hai Jiang:
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts. 991-998 - Yajun Dai, Wenjun Jiang, Kenli Li:

Group-Based Competitive Influence Maximization. 999-1006 - Xiangjie Kong

, Mengyi Mao, Jiaying Liu, Bo Xu, Ruihe Huang, Qun Jin:
TNERec: Topic-Aware Network Embedding for Scientific Collaborator Recommendation. 1007-1014 - Jie Yao, Wenjun Jiang:

Utilizing the Bidirectional Effect of Evolutive Trust-Rating for Recommendation in E-Commerce. 1015-1022 - Liying Zhang, Longbing Cao

, Sheng Luo
, Lei Gu, Yijin Chen, Yuanfeng Lian:
Coupled Collective Matrix Factorization. 1023-1030 - Yongxuan Lai, Hailin Lin, Xing Gao, Fan Yang, Shaoyi Yin:

Request Answering in Vehicular Ad-Hoc Networks Based on Adaptive Filters. 1031-1038 - Bin Jiang, Hefeng Zhang, Chao Lv, Chao Yang:

Sentiment Classification Based on Clause Polarity and Fusion via Convolutional Neural Network. 1039-1044 - Mingfeng Su

, Pin Liu, Guojun Wang:
Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds. 1045-1051
Work-in-Progress Papers (WiP)
- Florentin Thullier

, Valère Plantevin, Abdenour Bouzouane, Sylvain Hallé
, Sébastien Gaboury:
A Comparison of Inertial Data Acquisition Methods for a Position-Independent Soil Types Recognition. 1052-1056 - Xiaohui Peng, Lu Chao, Yifan Wang, Zhiwei Xu:

T-Suite: A RESTful Distributed Development and Runtime Environment on Things Devices. 1057-1062 - Wei Lv, Zhuo Tang, Kenli Li, Keqin Li:

An Adaptive Partition Method for Handling Skew in Spark Applications. 1063-1070 - Mengling Xiao, Binbin Qiu, Deyang Zhang, Mingzhi Mao, Yunong Zhang

:
Simulation Verifications of ZND Control for Dynamics-Included Robot Systems Extended from One Link to Multiple Links. 1071-1076 - Tongwei Lu, Shihui Ai, Yongyuan Jiang, Yudian Xiong, Feng Min:

Deep Optical Flow Feature Fusion Based on 3D Convolutional Networks for Video Action Recognition. 1077-1080 - Jian Deng, Siyang Wang, Weigang Wu:

Vehicular Named Data Networking Based on Efficient Incremental Route Update. 1081-1086 - Rong Hu, Jianxun Liu:

An Operation-Level Collaborative Filtering Approach Based on Logistic Function for Web Services Recommendation. 1087-1094 - Chen Hong, Dianxi Shi:

A Control System Architecture with Cloud Platform for Multi-UAV Surveillance. 1095-1097 - Hao Wang, Haiyong Luo, Fang Zhao, Yanjun Qin, Zhongliang Zhao, Yiqu Chen:

Detecting Transportation Modes with Low-Power-Consumption Sensors Using Recurrent Neural Network. 1098-1105 - Yanfang Liu, Jianwei Niu

, Qingjuan Zhao, Jianghua Lv, Shilong Ma:
A Novel Text Classification Method for Emergency Event Detection on Social Media. 1106-1111 - Yujia Zhu, Xuejin Yan, Shuqi Li, Yuyou Fan, Li Kuang:

An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing. 1112-1117 - Pengfei Wang, Ruiyun Yu:

Catalyze Sharing Economy: Optimized Multi-Task Allocation for Urban Transport Crowdsourcing. 1118-1123 - Ruiyun Yu, Xingyou Xia, Yan Zhou:

Compressed Sensing and Implicit Cooperativity Based Data Gathering Algorithm in Mobile Crowdsensing Systems. 1124-1129 - Weiping Zhu, Jiangbo Qin, Ruoshan Kong, Hai Lin, Zongjian He:

A System Framework for Efficiently Recognizing Web Crawlers. 1130-1133 - Chun Chen, Lu Zhang, Xiaopeng Fan, Yang Wang, Chengzhong Xu

, Renkai Liu:
A Epilepsy Drug Recommendation System by Implicit Feedback and Crossing Recommendation. 1134-1139 - Lingfang Zeng

, Wei Shi
, Fan Ni, Song Jiang, Xiaopeng Fan, Cheng-Zhong Xu
, Yang Wang:
SHAstor: A Scalable HDFS-Based Storage Framework for Small-Write Efficiency in Pervasive Computing. 1140-1145 - Radhia Toujani, Jalel Akaichi

:
GHHP: Genetic Hybrid Hierarchical Partitioning for Community Structure in Social Medias Networks. 1146-1153 - Rongrong Shi, Yiming Wang, Yifeng Chen, Cheng Wu:

An Efficient Recognition Method for Incomplete Iris Image Based on CNN Model. 1154-1159 - Xinyi Chen:

Human Action Recognition: A Feature Point Trajectory and Space-Time Interest Point Based Approach. 1160-1164 - Xiaohan Liu:

Testbed for Wide-Area Environment Observation. 1165-1168 - Bo Li, Keyue Wang, Duan Xue, Yijian Pei:

K-Means Based Edge Server Deployment Algorithm for Edge Computing Environments. 1169-1174 - Khawla Alhasan

, Liming Chen
, Feng Chen:
Mining Learning Styles for Personalised eLearning. 1175-1180 - Yingchao Cheng

, Zhongrun Zhou:
Autonomous Resource Scheduling for Real-Time and Stream Processing. 1181-1184 - Tian-Xiang Chen, Rong-Shue Hsiao, Chun-Hao Kao, Ding-Bing Lin, Bo-Ru Yang:

Bed-Exit Prediction Based on 3D Convolutional Neural Network. 1185-1188 - Kun Ma

, Xuewei Niu
, Ziqiang Yu, Ke Ji:
POMon: From Simple Keyword Matching to Stream-Based Live Probabilistic Topic Matching. 1189-1192 - Pengfei Yang, Quan Wang, Tao Guo, Wei Li, Zhiqiang Zhang

:
Adaptive Optimization Design of Vector Error Diffusion Algorithm and IP Core for FPGA. 1193-1198
6th International Workshop on Network Optimization and Performance Evaluation (NOPE 2018)
Regular Papers
- Samer Akiki, Zhiliu Yang, Chen Liu

, Jie Tang, Shaoshan Liu:
Energy-Aware Automatic Tuning of Many-Core Platform via Gradient Descent. 1199-1203 - Muskan, Teena Khandelwal, Manisha Khandelwal, Purnendu Shekhar Pandey

:
Women Safety Device Designed Using IoT and Machine Learning. 1204-1210 - Fangsu Wang, Gaocai Wang:

Study on Energy Minimization Data Transmission Strategy in Mobile Cloud Computing. 1211-1218 - Hongyun Xu, Yaohui Zheng, Jian Zeng, Cheng Xu:

Location-Semantic Aware Privacy Protection Algorithms for Location-Based Services. 1219-1224 - Huanchang Huang, Min Yang

, Binbin Qiu, Ziyu Yin, Yunong Zhang
:
Theoretical Analyses and Results of Taylor-Zhang Discretization Formula and ZeaD4Ig2_Y Formula Generating Discrete-Time Solutions of ODE Dynamic Systems. 1225-1230 - Zongtao Duan, Yingjuan Lei, Yishui Zhu, Lei Tang, Na Fan, Jinhui Tang:

Research on Multi-Dimensional Opportunistic Communication Routing Protocol in Vehicular Ad-Hoc Networks. 1231-1236 - Harsha Vasudev

, Debasis Das
:
A Lightweight Authentication Protocol for V2V Communication in VANETs. 1237-1242
2nd International Workshop on Cyberspace Security (IWCSS 2018)
Regular Papers
- Fuzhong Nian, Yaqiong Zhang, Xinmeng Liu:

A Human Flesh Search Algorithm Based on Information Puzzle. 1243-1248 - Zhenchuan Li

, Guanjun Liu, Shuo Wang, Shiyang Xuan, Changjun Jiang:
Credit Card Fraud Detection via Kernel-Based Supervised Hashing. 1249-1254 - Wanggen Xie, Jinchang Hu

, Patrick Kwaku Kudjo, Lei Yu, Zhifeng Zeng:
A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party Component. 1255-1259 - Xiaoming Chen, Weiqing You, Meng Jiao, Kejun Zhang, Shuang Qing, Zhiqiang Wang:

A New Cryptosystem Based on Positive Braids. 1260-1264
2018 International Symposium on Smart City and Informatization (iSCI 2018)
Regular Papers
- Linyu Wang, Bo Yin, Ke Gu

:
Resource Transaction Framework Based on Block Chain in Social Community. 1265-1270 - Lichen Zhang:

Modeling Methods for Cloud Based Cyber Physical Systems. 1271-1276 - Zhaoyu Shou, Xiawei Cheng, Simin Li:

A Privacy Preserving Outlier Detection Algorithm Based on Connected Domain. 1277-1282 - Xiaolong Xu, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Xuyun Zhang

, Wanchun Dou:
Load Aware Management of Cloudlets for a Wireless Area Metropolitan Network. 1283-1288 - Wei Zheng, Shichao Cao, Zhiqian Gao, Xiaoxue Wu, Qian Ding:

The Performance Evaluation Model of Intel SGX-Based Data Protection. 1289-1292 - Jiguo Liu

, Rui Sun, Haitao Yu:
Road Speed Fusion Model Based on Wavelet Neural Network Optimized by Genetic Algorithm. 1293-1298 - Dingding Li, Wande Chen, Zhengyang Wu, Hai Liu, Yong Tang:

VJournaling: Improving the Write Performance of a Virtualized Journaling File System. 1299-1304 - Zou Zhene, Hao Peng

, Liu Lin, Guixi Xiong, Bowen Du, Md. Zakirul Alam Bhuiyan, Yuntao Long, Da Li:
Deep Convolutional Mesh RNN for Urban Traffic Passenger Flows Prediction. 1305-1310 - Zuoxi Yang, Dingding Li, Ronghua Lin, Yong Tang, Weiling Li, Hai Liu:

An Academic Social Network Friend Recommendation Algorithm Based on Decision Tree. 1311-1316 - Danqi Xu, Wenyin Yang, Li Ma:

Repurchase Prediction Based on Ensemble Learning. 1317-1322 - Dong Liu, Wenjun Jiang:

Personalized App Recommendation Based on Hierarchical Embedding. 1323-1328 - Chunli Huang, Wenjun Jiang:

Aspect-Based Personalized Review Ranking. 1329-1334 - Peike Xia, Wenjun Jiang:

Understanding the Evolution of Fine-Grained User Opinions in Product Reviews. 1335-1340 - Zhikang Xu, Jing Feng, Zhizheng Zhang, Chaofan Duan:

Water Level Estimation Based on Image of Staff Gauge in Smart City. 1341-1345 - Huigui Rong, Xudong Zhang, Qin Liu, Qiaoyue Yang, Jiewei Gu:

A Mokov Decision Process Approach to Optimizing Waiting for Taxis. 1346-1351 - Deze Zeng, Lin Gu, Yunsong Chen, Shengli Pan, Zhuzhong Qian:

Cost Efficient State-Aware Function Placement and Flow Scheduling for NFV Networks. 1352-1357 - Xiaoxue Wu, Dan Tang, Liu Tang, Jianping Man, Sijia Zhan, Qin Liu:

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation. 1358-1363 - Amir Javadpour, Guojun Wang, Samira Rezaei, Shuhong Chen:

Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation. 1364-1370 - Amir Javadpour, Niusha Adelpour, Guojun Wang, Tao Peng:

Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks. 1371-1377 - Siqi Li, Cheng Xu, Lipei Chen, Zhenmin Liu:

Speed Regulation of Overhead Catenary System Inspection Robot for High-Speed Railway through Reinforcement Learning. 1378-1383 - Watipatsa W. Nsunza, A.-Q. Ransford Tetteh, Xiaojun Hei

:
Accelerating a Secure Programmable Edge Network System for Smart Classroom. 1384-1389 - Oana Geman, Iuliana Chiuchisan

, Ioan Ungurean
, Marius Hagan, Muhammad Arif:
Ubiquitous Healthcare System Based on the Sensors Network and Android Internet of Things Gateway. 1390-1395 - Yunong Zhang

, Ruifeng Wang, Mengling Xiao, Jinjin Guo, Chengxu Ye:
Using Data Till 1996, 2008 and 2017 via Full-Traversal Addition-Subtraction Frequency (ASF) Method with Consistent Analysis to Predict Possible M6.6-or-Above Earthquakes in Sichuan-Yunnan Region of China. 1396-1401 - Yunong Zhang

, Jiatu Wu, Ruifeng Wang, Chengxu Ye, Yingbiao Ling:
From Historical Data through ASF Method of Equal-Type Half Traversal to Predict USA Presidential Parties from 2021 to 2041. 1402-1407 - Zhilong Lu, Weifeng Lv, Zhipu Xie, Tongyu Zhu:

Highway Traffic Volume Prediction via Stacking KNN, SVR, MLP, RNN. 1408-1413 - Karim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo, Mumbere Muyisa Forrest

:
Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph. 1414-1421
2018 International Workshop on Evolutionary Computation and Its Applications (ECIA 2018)
Regular Papers
- Tiantian Cheng, Jinghui Zhong

:
An Efficient Cooperative Co-Evolutionary Gene Expression Programming. 1422-1427 - Zhou Wu

, Nian Ao, Chengran Xu, Liang Feng, Jiepeng Liu:
Automated Optimization of Longitudinal Tensile Reinforcement in RC Beam Using Binary PSO Algorithm. 1428-1431 - Nan Mu, Xin Xu, Xiaolong Zhang:

Ant Colony Optimization Based Salient Object Detection for Weak Light Images. 1432-1437 - Dongrui Li, Yongliang Chen:

An Efficient Ant Colony Programming Approach. 1438-1443 - Hao Zhang, Yusheng Xia, Kai Liu, Feiyu Jin, Chao Chen, Yong Liao:

A Kalman Filter Based Indoor Tracking System via Joint Wi-Fi/PDR Localization. 1444-1449 - Kai Zhang, Yulin Lv:

A Multiobjective RNA Secondary Structure Prediction Algorithm Based on NSGAII. 1450-1454
2018 Special Session on Collaborative Computing with Cloud and Client Workshop (C4W 2018)
Regular Papers
- Dandan Lai, Lichen Zhang, Bingqing Xu, Chunyao Liu:

Task Scheduling for Cloud Based Cyber-Physical Systems. 1455-1460 - Xiancheng Wu, Shunquan Tan:

An Optimization Strategy for Improving Security in Steganography. 1461-1466 - Ying Wu, Wei Zheng, Baolei Mao

, Xiaoxue Wu:
Leaks or Not: A Framework for Evaluating Cache Timing Side Channel Attacks in SGX. 1467-1470 - Qingcheng Li, Heng Cao, Guangming Zheng, Ye Lu:

Calligraphy: A Mobile Device Based Annotation Tool Supporting Learner Crowdsourcing. 1471-1478 - Zhipeng Gao, Jie Meng, Qian Wang, Yang Yang:

Data Offloading for Deadline-Varying Tasks in Mobile Edge Computing. 1479-1484 - Peini Liu

, Xinjun Mao, Fu Hou, Shuai Zhang
:
Generalized Nash Equilibrium Model of the Service Provisioning Problem in Multi-Cloud Competitions. 1485-1490 - Xuewei Niu

, Kun Ma
:
Toward an Efficient Cache Management Framework. 1491-1496 - Yong-yan Cui, Sheng Zhang, Zhi Ma:

Distributed Data Collection in a Cyclic MobiSpace. 1497-1502 - Vasileios Kouliaridis

, Konstantia Barmpatsalou, Georgios Kambourakis, Guojun Wang:
Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns. 1503-1508
15th IEEE International Conference on Advanced and Trusted Computing (ATC 2018)
Regular Papers
- Jean Frédéric Myoupo, Yannick Florian Yankam, Vianney Kengne Tchendji

:
A Centralized and Conflict-Free Routing Table Update Method through Triplets' Lists Vector in SDN Architectures. 1509-1515 - Frédéric Loulergue

, Christopher D. Whitney:
Verified Programs for Frequent Itemset Mining. 1516-1523 - Weiyu Ye, Yanxiang Tong, Chun Cao:

A Kalman Filter Based Hill-Climbing Strategy for Application Server Configuration. 1524-1531 - Zhaoxu Wang, Huachun Zhou, Bohao Feng, Wei Quan, Shui Yu

:
MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks. 1532-1539 - Fabio D'Andreagiovanni

, Hicham Lakhlef, Antonella Nardin:
A Hybrid MIP-Based Heuristic for the Optimal Design of DVB-T2 Networks. 1540-1546 - Dun Zhang, Xiang Chen, Zhanqi Cui

, Xiaolin Ju
:
Software Defect Prediction Model Sharing Under Differential Privacy. 1547-1554 - Haibo Ye, Xuansong Li, Kai Dong:

Crowdsensing Based Barometer Sensor Calibration Using Smartphones. 1555-1562 - Yan Wang, Xiaohong Chen:

Monitoring and Predicating Accidents for Interlocking Systems Based on SHA. 1563-1570 - Eiji Utsunomiya, Yuya Minami:

Consideration on Propagation of Disaster Information Among Different Types of Terminals for Grass-Roots Information Distribution System Using MANET. 1571-1576
Work-in-Progress Papers (WiP)
- Xuansong Li, Wei Song, Haibo Ye:

ALChecker: A Tool for Checking Mobile Ambients. 1577-1581 - Chia-Yu Chen, Chien-Yi Liu, Hsung-Pin Chang

:
A Prefetching Scheme for Multi-Tiered Storage Systems. 1582-1586 - Annadil Alinani, Karim Alinani:

Real-Time Push-Based Data Forwarding for Target Tracking in Vehicular Named Data Networking. 1587-1592 - Julien Tesson, Frédéric Loulergue

:
Interactive Bulk Synchronous Parallel Functional Programming in a Browser. 1593-1598
17th International Workshop on Assurance in Distributed Systems and Networks (ADSN 2018)
Regular Papers
- Masahiro Nishi, Haruki Kozato, Yusuke Ota, Koichi Shin:

Development of Disaster Monitoring Techniques in the Grass-Root Information Distribution System for Detecting Landslide Dangers. 1599-1604 - Junichi Funasaka:

Adaptability Enhancement for Progressive Download Methods Based on Timer-Driven Requesting Schemes Using Multiple TCP Flows on Multiple Paths. 1605-1610 - Yuya Minami, Nobuhiro Kajikawa, Ryohei Saka, Yuma Nakao, Eitaro Kohno, Yoshiaki Kakuda:

Arbitration-Based Deadlock Mitigation Mechanism for Fast Connection Establishment in Autonomous Self-Organized Bluetooth MANETs. 1611-1616 - Toru Sakon, Yukikazu Nakamoto:

Structured Policy-Based Design Method for Cybersecurity of Automotive E/E System. 1617-1622 - Hiroyuki Toyota, Shinji Inoue, Yoshiaki Kakuda:

A Proposal and Evaluation of Mobility Model Which Derives Various Node Mobility Scenarios. 1623-1627
18th IEEE International Conference on Scalable Computing and Communications (ScalCom 2018)
Regular Papers
- Baozi Chen:

Optimizing Network I/O Virtualization for Scale-Out Processor. 1628-1635 - Weihua Huang, Zhong Ma, Xinfa Dai, Mingdi Xu:

Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic Networks. 1636-1642 - Yamin Li, Wanming Chu:

MiKANT: A Mirrored K-Ary N-Tree for Reducing Hardware Cost and Packet Latency of Fat-Tree and Clos Networks. 1643-1650 - Kostas Kolomvatsos, Panagiotis Oikonomou

, Maria G. Koziri, Thanasis Loukopoulos:
A Distributed Data Allocation Scheme for Autonomous Nodes. 1651-1658 - Amin Majd:

Optimal Placement for Smart Mobile Access Points. 1659-1667 - Wen-Kang Jia, Yi Wu:

Performance Evaluation of In-Packet Membership Querying Algorithm for Large-Scale Networks. 1668-1675 - Liqiu Ma, Yuanyuan Bao, Wai Chen:

An Autonomous Model Construction Mechanism in Dynamic Sensor Networks. 1676-1683 - Nikos Tziritas, Thanasis Loukopoulos, Samee Khan

, Cheng-Zhong Xu
, Albert Y. Zomaya
:
A Communication-Aware Energy-Efficient Graph-Coloring Algorithm for VM Placement in Clouds. 1684-1691
Work-in-Progress Papers (WiP)
- Wen-Kang Jia, Yi Wu:

A Fast and Accurate Replica Selection Mechanism Using Explicit Multicast for CDNs. 1692-1696 - Xiang Gao, Weizhan Zhang, Junquan Liu, Qinghua Zheng:

Deploying Structured Media Server Cluster in Media Cloud Using Ant Colony Optimization. 1697-1704 - Wenyin Yang, Li Ma, Ruchun Cui, Guojun Wang:

Hypergraph Partitioning for Big Data Applications. 1705-1710
4th IEEE International Conference on Cloud and Big Data Computing (CBDCom 2018)
Regular Papers
- Hong Qi, Panpan Liu:

Mining Taxi Pick-Up Hotspots Based on Spatial Clustering. 1711-1717 - Zhiqiang Zou, Xu He, Xingyu Xie, Qunying Huang:

Enhancing the Impression on Cities: Mining Relations of Attractions with Geo-Tagged Photos. 1718-1724 - Rui Cao, Kehua Guo, Jianhua Ma, Jian Kang:

A Deep Convolutional Neural Network-Based Label Completion and Correction Strategy for Supervised Medical Image Learning. 1725-1730 - Xiucai Ye, Hongmin Li, Tetsuya Sakurai, Zhi Liu:

Large Scale Spectral Clustering Using Sparse Representation Based on Hubness. 1731-1737 - Weishan Zhang

, Bing Xue, Jiehan Zhou, Xin Liu, Hao Lv:
A Scalable and Efficient Multi-Label CNN-Based License Plate Recognition on Spark. 1738-1744 - Baichuan Liu, Huawei Huang, Song Guo, Wuhui Chen, Zibin Zheng

:
Joint Computation Offloading and Routing Optimization for UAV-Edge-Cloud Computing Environments. 1745-1752 - Yifan Zhang, Zhechao Li, Weigang Wu, Lei Yang:

Fast VM Startup by Cooperative Image Caching for Cloud Data Centers. 1753-1760 - Qiang Pu, Hao Qin, Hu Han, Yuanyi Xia, Zhihao Li, Kejun Xie, Wenqing Wang:

Detection Mechanism of FDI Attack Feature Based on Deep Learning. 1761-1765 - Liang Guo, Weijian Li, Han Hu, Chunlin Chen, Junfeng Zhao, Zhenghai Cong:

Backward Mining Technology Research on Continuous Attacks in Wide Time Domain. 1766-1770 - Hiroya Matsumoto, Bo Gu

, Xiaoyan Wang, Osamu Mizuno:
A Routing Protocol Considering Turning Behavior of Vehicles in VANETs. 1771-1776 - Hong Xiao, Rongyue Zhang, Hao Wang

, Feng Zhu, Cheng Zhang, Hongning Dai
, YuBin Zhou:
R-PCNN Method to Rapidly Detect Objects on THz Images in Human Body Security Checks. 1777-1782 - Eihab SaatiAlsoruji, Shikharesh Majumdar:

A Video Segmentation Strategy for Video Processing Applications on Hadoop Clusters. 1783-1790 - Jianhui Miao, Zhiyang Li, Wenyu Qu, Zeyan Zhou, Zhaobin Liu, Weijiang Liu:

Approximate Nearest Neighbor Search Based on Hierarchical Multi-Index Hashing. 1791-1796 - Weipeng Zhou, Pan Wang

, Xuejiao Chen, Feng Ye:
An Improved Bloom Filter in Distributed Crawler. 1797-1802 - Hanwen Wang, Biao Han

, Jinshu Su
, Xiaoyan Wang:
A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning. 1803-1810 - Depeng Shi, Jiehan Zhou, Jirui Xu, Jun Yang, Xuekun Li, Zeming Zhao, Junchuang Chen, Yiming Rong:

Machine Vision-Based Segmentation and Classification Method for Intelligent Roller Surface Monitoring. 1811-1817 - Huijuan Lu, Li Wang, Minchao Ye, Ke Yan

, Qun Jin:
DNN-Based Image Classification for Software GUI Testing. 1818-1823 - Xudong Chai, Baocun Hou, Ping Zou, Jinle Zeng, Jiehan Zhou:

INDICS: An Industrial Internet Platform. 1824-1828 - Xin Liu, Xiaomiao Zhang, Weishan Zhang

, Wei Wei, Yongjun Zhao, Yongke Xi, Shuai Cao:
Data Mining from Haier Air-Conditioner Equipment Running Data for Fault Prediction. 1829-1836 - Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:

Individual Analysis Model and Related Research in Social Networks. 1837-1843 - Shenglan Ma, Hao Wang

, Botong Xu, Hong Xiao, Fangkai Xie, Hong-Ning Dai
, Ran Tao, Ruihua Yi, Tongsen Wang:
Banking Comprehensive Risk Management System Based on Big Data Architecture of Hybrid Processing Engines and Databases. 1844-1851 - Li Zeng, Zili Li, Zhao Zhao, Meixin Mao:

Landscapes and Emerging Trends of Virtual Reality in Recent 30 Years: A Bibliometric Analysis. 1852-1858
Work-in-Progress Papers (WiP)
- Xin Li, Xianzhong Long, Guozi Sun, Geng Yang, Huakang Li:

Overdue Prediction of Bank Loans Based on LSTM-SVM. 1859-1863 - Bohu Li, Xudong Chai, Baocun Hou, Lin Zhang, Jiehan Zhou, Yang Liu:

New Generation Artificial Intelligence-Driven Intelligent Manufacturing (NGAIIM). 1864-1869 - Ran Duo, Celimuge Wu

, Tsutomu Yoshinaga, Yusheng Ji:
SDN-Based Handover Approach in IEEE 802.11p and LTE Hybrid Vehicular Networks. 1870-1875 - Zhaoyang Du

, Celimuge Wu
, Tsutomu Yoshinaga, Yusheng Ji:
A Prophet-Based DTN Protocol for VANETs. 1876-1879
4th IEEE International Conference on Internet of People (IoP 2018)
Regular Papers
- Sahraoui Dhelim

, Huansheng Ning
, Mohammed Amine Bouras
, Jianhua Ma:
Cyber-Enabled Human-Centric Smart Home Architecture. 1880-1886 - Ismini Psychoula

, Deepika Singh, Liming Chen
, Feng Chen, Andreas Holzinger, Huansheng Ning
:
Users' Privacy Concerns in IoT Based Applications. 1887-1894 - M. Ali Akber Dewan, Fuhua Oscar Lin

, Dunwei Wen, Mahbub Murshed, Zia Uddin:
A Deep Learning Approach to Detecting Engagement of Online Learners. 1895-1902 - Xingyou Xia, Lingbing Zeng, Ruiyun Yu:

HMM of Telecommunication Big Data for Consumer Churn Prediction. 1903-1910 - Binbin Yong, Xin Liu

, Yan Liu, Hang Yin, Liang Huang, Qingguo Zhou:
Web Behavior Detection Based on Deep Neural Network. 1911-1916 - Wen-Bo Huang, Dunwei Wen, M. Ali Akber Dewan, Yang Yan, Ke Wang:

Automatic Detection of Optic Disc in Retina Image Using CNN and CRF. 1917-1922 - Sedat Akleylek, Bok-Min Goi, Wun-She Yap, Denis Chee-Keong Wong, Wai-Kong Lee:

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era. 1923-1928 - Weifeng Wang, Hao Chen, Bing Lou, Ning Jin, Xizhong Lou, Ke Yan

:
Data-Driven Intelligent Maintenance Planning of Smart Meter Reparations for Large-Scale Smart Electric Power Grid. 1929-1935 - Kosuke Takagi, Kiichi Tago, Kenichi Ito, Qun Jin:

Comparison of Measurements by the Betweenness Centrality and Subjective Experiment on the Word Priority of Tweets. 1936-1941 - Yan Song, Qun Jin, Ke Yan

, Huijuan Lu, Julong Pan:
Vote Parallel SVM: An Extension of Parallel Support Vector Machine. 1942-1947 - Jianguo Chen, Wai K. Yeap, Huijuan Lu, Hangxia Zhou, Yongxia Zhou:

Trust Model and Anti-Attack Analysis for Social Computing. 1948-1955 - Luqing Luo, Lulu Tang, Zhi-Xin Yang

:
Learning Combinatorial Global and Local Features on 3D Point Clouds. 1956-1961 - Rui-Dong Xi, Zhixin Yang

, Lulu Tang, Zhigang Wang:
Robust GA Based Global Path Planning for IoP Oriented Mobil Robot. 1962-1969 - Hui Wu, Yufeng Wang:

Socially-Inspired Peer Discovery for D2D Communications. 1970-1975 - Mengqi Gao, Jianmin Han, Jianfeng Lu, Hao Peng, Zhao-Long Hu:

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation. 1976-1981 - Yang Xu, Quanrun Zeng, Guojun Wang, Hao Min, Ju Ren, Yaoxue Zhang:

A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing. 1982-1987
Work-in-Progress Papers (WiP)
- Ahmed Raad Al-Sudani, Wanlei Zhou

, Sheng Wen, Haider Adeeb Kassem:
Hiding RFID in the Image Matching Based Access Control to a Smart Building. 1988-1993 - Jianhua Ma:

Wear-I: A Multi-Wearable Organic System for Smarter Individual Services. 1994-1996 - Ilesanmi Olade

, Hai-Ning Liang
, Charles Fleming:
A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and Their Application in Head Mounted Displays. 1997-2004 - Xue Wu, Han-Teng Liao

:
Everyday Life Approach for Smart Health: A People-Centered Design Process for Co-Creating Self-Tracking Systems. 2005-2010 - Katarzyna Romanowska, Gurpreet Singh, M. Ali Akber Dewan, Fuhua Oscar Lin

:
Towards Developing an Effective Algorithm Visualization Tool for Online Learning. 2011-2016 - Lanlan Huang, Fuhua Lin

, Zengxiang Wang
:
Online Vocabulary QuizMASter Game for College English Test Band 4. 2017-2021 - Hyun-Seong Lee, Jae-Gwang Lee, Jae-Pil Lee, Jae-Kwang Lee:

Design of Automatic Identification Gateway System for Different IoT Devices and Services. 2022-2025
2018 Special Session on IoP Basic Models and Methods (IPBMM 2018)
Regular Papers
- Xinxin Liu, Xiaofeng Wang:

A Representation Method and Optimization of Network Flow Based on Coalgebra. 2026-2029 - Yizhuo Yang, Hongtao Yu, Ruiyang Huang, Tuosiyu Ming:

A Fusion Information Embedding Method for User Identity Matching Across Social Networks. 2030-2035 - Zhibao Mian

, Leonardo Bottaci, Jiulei Jiang, Jun He, Qiancheng Yu, Xiaofeng Wang:
A Dependability Modeling and Analysis Approach for an IoP-Based Service System. 2036-2041 - Qiancheng Yu, Zhiwen Yu

, Xiao-Feng Wang:
Constructing the Community Assignment Matrix for Overlapping Community Detection. 2042-2047 - Hanxu Wang, Jiulei Jiang, Weimin Li:

A Dynamic Trust Model Based on Time Decay Factor. 2048-2051 - Ninglin Xu, Zhanyou Ma, Jiulei Jiang, Panqing Zhang:

Model Checking Instance Based on NuSMV. 2052-2056 - Zhongwen Qian, Xudong Zhang, Xiaoming Ju, Bo Li:

An Online Data Deduplication Approach for Virtual Machine Clusters. 2057-2062 - Fenghua Wang, Jia Shi, Xiaoming Ju, Bo Li:

An Efficient Graph Data Processing Framework for Power Grid Systems. 2063-2067
2nd IEEE International Conference on Smart City Innovations (SCI 2018)
Regular Papers
- Liang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Jingzhe Zhang, Huayang Cao, Fei Xu:

A General Testing Framework Based on Veins for Securing VANET Applications. 2068-2073 - Jingtao Yao, Xiangbin Kong, Rattan Lal:

Using Particle Swarm Optimization Method to Optimize the Carbon Sequestration Potential of Agricultural Afforestation in Beijing, China. 2074-2081 - Bernardo Santos

, Van Thuan Do, Boning Feng, Thanh Van Do:
Towards a Standardized Identity Federation for Internet of Things in 5G Networks. 2082-2088 - Ying Xu, Qinghe Du, Houbing Song

:
Security-Enhanced Wireless Multicast via Adaptive Fountain Codes over Distributed Caching Network. 2089-2096 - Ziling Zeng

, Taixun Li:
A Quantitative Model of the Urban Rail Congestion Propagation under Oversaturated Conditions. 2097-2102
Work-in-Progress Papers (WiP)
- Mu Hu, Pengcheng Dai, Huiping Lin, Guanlan Kong:

Improving the Station-Level Demand Prediction by Using Feature Engineering in Bike Sharing Systems. 2103-2108 - Claudio Badii

, Elefelious G. Belay, Pierfrancesco Bellini, Daniele Cenni
, Mino Marazzini, Marco Mesiti, Paolo Nesi, Gianni Pantaleo
, Michela Paolucci
, Stefano Valtolina, Mirco Soderi
, Imad Zaza:
Snap4City: A Scalable IOT/IOE Platform for Developing Smart City Applications. 2109-2116 - Sabeeh Safdar, Mujahid Mohsin, Liaqat Ali Khan, Mian Muhammad Waseem Iqbal

:
Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for Pakistan. 2117-2124
2018 International Workshop on Smart and Resilient Transportation Systems (SRTS 2018)
Regular Papers
- Jingchao Quan, Haiying Lu, Xinyue Xu

:
Evaluation of Operation Status of Urban Rail Transit Stations Based on Historical Data. 2125-2129 - Luyao Wang, Xi Jiang, Chunxiao Li:

A SVR-Based Passenger Route Choice Model in Urban Rail Transit Network. 2130-2135

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














