


default search action
WETICE 2023: Paris, France
- IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2023, Paris, France, December 14-16, 2023. IEEE 2023, ISBN 979-8-3503-5043-2

- Fidma Mohamed Abdelillah

, Hamour Nora
, Samir Ouchani
, Sidi Mohamed Benslimane
:
Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature Review. 1-6 - Leila Bouchrit

, Sajeh Zairi, Ikbal Chammakhi Msadaa
, Amine Dhraief, Khalil Drira:
Flying to the Rescue: UAV-Assisted Urgent Alert Transmission in VANET. 1-6 - Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk:

Enhancing Cyber Threat Intelligence Through Supervised Machine Learning: A Comprehensive Classification Approach. 1-8 - Seyf Eddine Hasnaoui, Mohammed Amine Boudouaia

, Samir Ouchani, Abdellatif Rahmoun:
DLSTM-SCM- A Dynamic LSTM-Based Framework for Smart Supply Chain Management. 1-6 - Kawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa:

Unveiling the Software Supply Chain Paradigm: Architecture, Actors, Challenges, and Security Perspectives. 1-7 - Nassim Zaouia

, Kheyreddine Djouzi, Mehammed Daoui:
Collisions-Resistant Hash Function Based on a Logistics Map. 1-6 - Floribert Katembo Vuseghesa

, Mohamed-Lamine Messai:
Study on Poisoning Attacks: Application Through an IoT Temperature Dataset. 1-6 - Charaf Eddine Dridi, Nabil Hameurlain, Faiza Belala:

A Maude-Based Formal Approach to Control and Analyze Time-Resource Aware Missioned Systems-of-Systems. 1-6 - Daliton da Silva, Dimas Cassimiro Nascimento Filho, Camila Dantas, Paulo Maciel:

Enhancing Augmented Reality Performance: An Exploration of Edge Computing and Code Offloading in Collaborative AR Systems. 1-6 - David Novoa-Paradela, Oscar Fontenla-Romero, Bertha Guijarro-Berdiñas, Diego Orellana-Cañás:

A Federated Learning Architecture for Anomaly Detection on the Edge Using Deep Autoencoders. 1-6 - Ma'en Saleh:

Security-based Multipath Route Switching Protocol for Quality-of-Service Enhancement in VANETs using Wiedemann Car-Following Model. 1-6 - Zicheng Xu, Ao Liu:

Virtual Collaborative Assembly System Based on Unity. 1-6 - Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:

COVID-19 Patient Secure Classification Based on ANN and Risk Analysis. 1-7 - Eyad K. Almaita:

Harmonic Pollution in Distribution Transformers: Evaluating the Effects of Pv Solar Installations in Jordan's Electrical Grid. 1-5 - Houda Khlif, Hatem Hadj Kacem, Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio Cesar Perez Sansalvador, Lil María Rodríguez-Henríquez:

Unraveling Spatio-Temporal Behavior in Collaborative Cyber-Physical Systems Inspired by Social Insects. 1-6 - Fabio Salice

, Federico Simoni, Giovanni Castiglioni, Andrea Masciadri
, Mariagrazia Fugini
, Sara Comai
:
waterFSA: A Contact-Less Water Flow Source Analyzer for the Household to Enable HAR and ADL Recognition. 1-6 - Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes:

An Hybridization of LSTM and Random Forest Model to Predict Road Situation. 1-7 - Andrea Pelosi, Claudio Felicioli, Andrea Canciani, Fabio Severino:

A Hybrid-DLT Based Trustworthy AI Framework. 1-6 - Tidiane Sylla, Mohamed Aymen Chalouf, Léo Mendiboure, Francine Krief, Hasnaâ Aniss, Lylia Alouache:

Applying Fuzzy Logic to Efficiently Manage Shared Edge Infrastructure. 1-6 - Mariem Bousaid, Safa Kaabi, Amine Dhraief, Khalil Drira:

Unlocking the Power of Reinforcement Learning: Investigating Optimal Q-Learning Parameters for Routing in Flying Ad Hoc Networks. 1-6 - Fidma Mohamed Abdelillah

, Hamour Nora
, Samir Ouchani
, Sidi Mohamed Benslimane
:
Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature Review. 1-6 - Chengyi Qu, Chaise Ballotti, Daniel De Sousa, Jiaqing Liu

:
Intelligent UAS-Edge-Server Collaboration and Orchestration in Disaster Response Management. 1-6 - Corrado Santoro

, Federico Fausto Santoro:
LWN Simulator - A LoRaWAN Network Simulator. 1-6 - Kawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa, Wissem Zouaghi:

Securing the Software Supply Chain: A New Taxonomy for Attack Classification. 1-8 - Joseph Merhej, Hassan Harb, Abdelhafid Abouaissa, Lhassane Idoumghar:

DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE System. 1-6 - Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:

QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients. 1-6 - Md Masum Musfique, Tanvir Ahmed Aadeef, Md. Samiur Rahman

, Monosij Kanti Sarker
, Md Fahad Monir:
Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification. 1-6 - Rim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Salma Bradai:

Formal Verification of Smart Contracts Based on Model Checking: An Overview. 1-6 - Angelo Ferrando, Vadim Malvone, Aniello Murano, Silvia Stranieri:

HYASM: A Tool to Verify Hierarchical Systems. 1-6 - David Melo, Saúl E. Pomares Hernández, Lil María Rodríguez-Henríquez, Julio Cesar Perez Sansalvador:

Bitcoin Transactions Types and Their Impact on Storage Scalability. 1-6 - Salah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia

, Mimoune Malki:
A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical Systems. 1-6 - Ala Arman

, Emiliano Di Reto, Massimo Mecella, Giuseppe Santucci:
An Approach for Software Development Effort Estimation Using ChatGPT. 1-7 - Simone Dallospedale

, Mattia Alex Leoni, Stefania Monica, Federico Bergenti:
Experiments on Accurate Indoor Positioning Using the Whale Optimization Algorithm. 1-6 - Felipe Jesus, Rodrigo Rocha

, Igor Medeiros Vanderlei
, Jean Araujo, Fred Freitas:
Design Thinking Evidence in Software Development: Results from a Systematic Mapping. 1-6 - Asma Hamissi

, Amine Dhraief, Layth Sliman
:
On Safety of Decentralized Unmanned Aircraft System Traffic Management Using Blockchain. 1-6 - Pedro Melo, Lucas Gama

, Jamilson Dantas, David Beserra, Jean Araujo:
Performance Evaluation of Container Management Tasks in OS-Level Virtualization Platforms. 1-6 - Deepak Sharma

, Muhammad Asif Suryani
, Steffen Strohm
, Matthias Renz
:
Synergize Multidisciplinary Research via Research Data Management. 1-6 - Salah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia, Mimoune Malki

:
A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical Systems. 1-6 - Camila Dantas, Pablo Pessoa do Nascimento

, João Ferreira
, Paulo Maciel, Jamilson Dantas:
DDoS Detection Based on Hardware Performance Counters Selection. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














