default search action
37th AINA 2023: Juiz de Fora, Brazil
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 2. Lecture Notes in Networks and Systems 654, Springer 2023, ISBN 978-3-031-28450-2 - Anderson Melo de Morais, Fernando Antônio Aires Lins, Nelson Souto Rosa:
Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments. 1-13 - Isidoros Paterakis, Euripides G. M. Petrakis:
Nexus: Proxy Service for the Web of Things. 14-25 - Gianluca Rizzo, Alberto Franzin, Miia Lillstrang, Guillermo del Campo, Moisés Silva-Muñoz, Lluc Bono, Mina Aghaei Dinani, Xiaoli Liu, Joonas Tuutijärvi, Satu Tamminen, Edgar Saavedra, Asunción Santamaria, Xiang Su, Juha Röning:
ABIDI: A Reference Architecture for Reliable Industrial Internet of Things. 26-39 - Mayank Vyas, Garv Anand, Ram Narayan Yadav, Sanjeet Kumar Nayak:
DASA: An Efficient Data Aggregation Algorithm for LoRa Enabled Fog Layer in Smart Agriculture. 40-52 - Aliah Majed, Hassan Harb, Abbass Nasser, Benoit Clement:
FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic Systems. 53-66 - Oumayma Jouini, Kaouthar Sethom:
A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0. 67-76 - Admir Barolli, Shinji Sakamoto, Elis Kulla, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh Clients. 77-85 - Renato Dilli, Renata Reiser, Adenauer C. Yamin, Hélida Salles Santos, Giancarlo Lucca:
Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource Classification. 86-98 - Miki Amano, Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi:
An Analysis of Representative Works of Japanese Literature Based on Emotions and Topics. 99-112 - Théodore Simon, Jianfei Zhang, Shengrui Wang:
Analysis and Comparison of Machine Learning Models for Glucose Forecasting. 113-123 - Rodrigo Moreira, Joberto S. B. Martins, Tereza Cristina M. B. Carvalho, Flávio de Oliveira Silva:
On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration Architecture. 124-136 - Julio Costella Vicenzi, Guilherme Korol, Michael Guilherme Jordan, Mateus Beck Rutzig, Antonio Carlos Schneider Beck Filho:
Adaptive Inference on Reconfigurable SmartNICs for Traffic Classification. 137-148 - Belal Alsinglawi, Khaled M. Rabie:
eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of Things. 149-158 - Davinder Kaur, Suleyman Uslu, Arjan Durresi:
A Model for Artificial Conscience to Control Artificial Intelligence. 159-170 - Francisco R. P. da Ponte, Emanuel B. Rodrigues, César L. C. Mattos:
A Vulnerability Risk Assessment Methodology Using Active Learning. 171-182 - Kyohei Toyoshima, Chihiro Yukawa, Yuki Nagai, Genki Moriya, Sora Asada, Tetsuya Oda, Leonard Barolli:
A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring System. 183-191 - Chihiro Yukawa, Kyohei Toyoshima, Yuki Nagai, Masahiro Niihara, Yuma Yamashita, Tetsuya Oda, Leonard Barolli:
An Anomaly Detection System for Intelligent Robot Vision Using LSTM. 192-198 - Estêvão F. C. Silva, Nícolas Naves, Silvio E. Quincozes, Vagner Ereno Quincozes, Juliano F. Kazienko, Omar Cheikhrouhou:
GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search. 199-210 - Amar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar:
Multi-agent Deep Q-Learning Based Navigation. 211-221 - Filipe da Silva de Oliveira, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piêgas Koslovski:
Identifying Network Congestion on SDN-Based Data Centers with Supervised Classification. 222-234 - Rhayane da Silva Monteiro, Leonardo Sampaio Rocha:
Detection of Malicious Sites Using Graph Machine Learning. 235-246 - Aleksander Maksimoski, Isaac Woungang, Issa Traoré, Sanjay K. Dhurandher:
Bonet Detection Mechanism Using Graph Neural Network. 247-257 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Object Placement Algorithm with Information Flow Control in Fog Computing Model. 258-267 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing Model. 268-278 - Agmar A. Torres, Flávio de Oliveira Silva:
SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-Time. 279-291 - Ludmila Ribeiro Bôscaro Yung, Victor Ströele, Mário Antônio Ribeiro Dantas:
A Polystore Proposed Environment Supported by an Edge-Fog Infrastructure. 292-302 - Nikolaos Lagogiannis, Nikolaos Mainas, Chrisa Tsinaraki, Euripides G. M. Petrakis:
OASL: SPARQL Query Language for OpenAPI Ontologies. 303-317 - Daniel E. Macedo, Marcus M. Bezerra, Danilo F. S. Santos, Angelo Perkusich:
Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks Problem. 318-329 - Rajendra Prajapat, Ram Narayan Yadav:
Profit Maximization for Resource Providers Using Dynamic Programming in Edge Computing. 330-342 - Gerard Christopher Aloysius, Ashutosh Bhatia, Kamlesh Tiwari:
Stability and Availability Optimization of Distributed ERP Systems During Cloud Migration. 343-354 - Katja Assaf, Alexander Mühle, Daniel Köhler, Christoph Meinel:
Prison Break: From Proprietary Data Sources to SSI Verifiable Credentials. 355-366 - Maksim Iavich, Tamari Kuchukhidze, Razvan Bocu:
A Post-quantum Cryptosystem with a Hybrid Quantum Random Number Generator. 367-378 - Miguel S. Rocha, Gustavo D. G. Bernardo, Luan Mundim, Bruno Bogaz Zarpelão, Rodrigo Sanches Miani:
Supervised Machine Learning and Detection of Unknown Attacks: An Empirical Evaluation. 379-391 - Ahmed Ramzi Bahlali, Abdelmalik Bachir:
Machine Learning Anomaly-Based Network Intrusion Detection: Experimental Evaluation. 392-403 - Wei Lu:
Applied Machine Learning for Securing the Internet of Medical Things in Healthcare. 404-416 - Filippo Coglio, Ahmed Lekssays, Barbara Carminati, Elena Ferrari:
Early-Stage Ransomware Detection Based on Pre-attack Internal API Calls. 417-429 - Marek R. Ogiela, Urszula Ogiela:
User-Oriented Cybersecurity Systems. 430-433 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Cybersecurity of Distributed Systems and Dispersed Computing. 434-438 - Eduardo K. Viegas, Everton de Matos, Paulo Roberto de Oliveira, Altair O. Santin:
A Dynamic Machine Learning Scheme for Reliable Network-Based Intrusion Detection. 439-451 - Adel Khwaji, Yaser Alsahafi, Farookh Khadeer Hussain:
A Roadmap to Blockchain Technology Adoption in Saudi Public Hospitals. 452-460 - Emanuele Scala, Changyu Dong, Flavio Corradini, Leonardo Mostarda:
Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption. 461-472 - Max Körber, Leo V. Dessani, Ronald Petrlic:
MTA Extension for User-Friendly Enforcement of Mandatory TLS Encryption. 473-486 - Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna:
Secure and Privacy Preserving Proxy Biometric Identities. 487-500 - Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu:
Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy. 501-512 - Isis de O. Pereira, Cristina K. Dominicini, Rafael S. Guimarães, Rodolfo da Silva Villaça, Lucas R. Almeida, Gilmar L. Vassoler:
MPolKA-INT: Stateless Multipath Source Routing for In-Band Network Telemetry. 513-524 - Xiaofeng Chi, Bingquan Wang, Jingling Zhao, Baojiang Cui:
A Vulnerability Detection Method for SDN with Optimized Fuzzing. 525-536 - Sudha Dubba, Balaprakasa Rao Killi:
Energy Efficient Virtual Network Function Placement in NFV Enabled Networks. 537-548 - Abhirath Anupam Joshi, K. Haribabu:
Rational Identification of Suitable Classification Models for Detecting DDoS Attacks in Software-Defined Networks. 549-561 - Victor M. Garcia Martinez, Rafael S. Guimarães, Ricardo C. de Mello, Alexandre Pereira do Carmo, Raquel Frizera Vassallo, Rodolfo da Silva Villaça, Moisés R. N. Ribeiro, Magnos Martinello:
Make Before Degrade: A Context-Aware Software-Defined WiFi Handover. 562-572
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.