Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FICLOUDW
FICLOUDW 2017
Generate Citations
2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud)
Aug. 21 2017 to Aug. 23 2017
Prague
Table of Contents
Table of contents
Freely available from IEEE.
pp. v-x
Distributed Knowledge Acquisition Basing on Integration of Data Mining and Text Mining Methods and Their Usage with AT-TECHNOLOGY Workbench
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Galina V. Rybina
,
Yury M. Blokhin
,
Elena S. Sergienko
Security Intelligence Centers for Big Data Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-13
by
Natalia Miloslavskaya
Big Data, Cost and Emission Reporting in Process Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Esa Hämäläinen
,
Elen Twrdy
Use of Data Mining Algorithms while Determining Threshold Values of Economic Security Indices
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
by
A.N. Zhukov
,
P.Y. Leonov
,
K.V. Evsikov
,
J.V. Domashova
,
N.V. Morozov
Investigation of Money Laundering and Extremism Indicators Relationship
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Alina A. Aidaralieva
,
Grigory O. Krylov
A Systematic Approach to Describing the Source Code of a Cloud Platform with Assured Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Dmitry Demidov
Deriving Cognitive Map Concepts on the Basis of Social Media Data Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-40
by
Vasiliy S. Kireev
The Use of Clustering Algorithms Ensemble with Variable Distance Metrics in Solving Problems of Web Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Pyotr V. Bochkaryov
,
Anna I. Guseva
The Use of Entropy Measure for Higher Quality Machine Learning Algorithms in Text Data Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Anna I. Guseva
,
Igor A. Kuznetsov
The Analysis of Big Data and the Accuracy of Financial Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Viktor P. Suyts
,
Alexander S. Shadrin
,
Pavel Y. Leonov
Adaptation of Cluster Analysis Methods in Respect to Vector Space of Social Network Analysis Indicators for Revealing Suspicious Government Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Davydenko V.I.
,
Morozov N.V.
,
Burmistrov M.I.
Building an IoT Data Hub with Elasticsearch, Logstash and Kibana
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Marcin Bajer
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Chang-Hoi Hur
,
Seong-Pyo Kim
,
Yoon-Soo Kim
,
Jung-Ho Eom
SLAs for Industrial IoT: Mind the Gap
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Alessandro Vittorio Papadopoulos
,
Sara Abbaspour Asadollah
,
Mohammad Ashjaei
,
Saad Mubeen
,
Hongyu Pei-Breivold
,
Moris Behnam
Context-Aware Enterprise Modelling towards Agile Models Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-87
by
Julia Bilinkis
,
Anastasia Zueva
,
Elina Zaytseva
Sensing for the Internet of Things and Its Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Salha M. Alzahrani
Adopting Formal Approaches for Monitoring Sensors of Intercloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Andreea Buga
,
Sorana Tania Nemes
Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-107
by
Kevin Wallis
,
Florian Kemmer
,
Eugen Jastremskoj
,
Christoph Reich
WPTE: Weight-Based Probabilistic Trust Evaluation Scheme for WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Adnan Ahmed
,
Ali Raza Bhangwar
Dynamic Network Analysis of the Euro2016 Final: Preliminary Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Pavlina Kröckel
,
Alexander Piazza
,
Kathrin Neuhofer
Generating Cultural Personas from Social Data: A Perspective of Middle Eastern Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-125
by
Joni Salminen
,
Sercan Sengün
,
Haewoon Kwak
,
Bernard Jansen
,
Jisun An
,
Soon-Gyo Jung
,
Sarah Vieweg
,
D. Fox Harrell
Detecting Communities by Integrating Perspective Communities as Semantic Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-131
by
Loubna Boujlaleb
,
Ali Idarrou
,
Driss Mammass
Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Ema Kušen
,
Giuseppe Cascavilla
,
Kathrin Figl
,
Mauro Conti
,
Mark Strembeck
A Data Streaming Approach to Link Mining in Criminal Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Giacomo Marciani
,
Michele Porretta
,
Matteo Nardelli
,
Giuseppe F. Italiano
Towards an Intelligent Systems to Predict Nosocomial Infections in Intensive Care
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Daniela Oliveira
,
Filipe Portela
,
Manuel Santos
,
Fernando Rua
Importance of Statistics for Data Mining and Data Science
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Vitor Ribeiro
,
André Rocha
,
Rui Peixoto
,
Filipe Portela
,
Manuel Filipe Santos
Leveraging Edge Computing through Collaborative Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Kurt Portelli
,
Christos Anagnostopoulos
Improving Maternity Care with Business Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-177
by
Patrícia Loreto
,
Francisca Fonseca
,
Ana Morais
,
Hugo Peixoto
,
António Abelha
,
José Machado
Continuous Ambulatory Peritoneal Dialysis: Business Intelligence Applied to Patient Monitoring: CAPD Study and Statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Catarina Peixoto
,
Cláudia Brito
,
Mariana Fontainhas
,
António Abelha
,
Hugo Peixoto
,
José Machado
Business Intelligence for Cardiovascular Disease Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Cristiana Silva
,
Joana Pereira
,
Luís Costa
,
Hugo Peixoto
,
José Machado
,
António Abelha
Improving Nursing Practice through Interoperability and Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Daniela Oliveira
,
Júlio Duarte
,
António Abelha
,
José Machado
Handover Key Management in an LTE-based Unmanned Aerial Vehicle Control Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Gicheol Wang
,
Kwangjae Lim
,
Byoung-Sun Lee
,
Jae Young Ahn
Secrecy Analysis of Cooperative Network with Untrustworthy Relays Using Location-Based Multicasting Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-210
by
Michael Atallah
,
Georges Kaddoum
Performance Modeling of SDN with NFV under or aside the Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Ahmed Fahmin
,
Yuan-Cheng Lai
,
Md. Shohrab Hossain
,
Ying-Dar Lin
,
Dipon Saha
Opportunistic Relaying Protocol for Device-to-Device Communication with Cognitive Radio Capability
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Ahmed Musa
,
Israa Alkhshainy
,
Haythem Bany Salameh
,
Yaser Jararweh
A Security Framework for Mobile Health Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-226
by
Geethapriya Thamilarasu
,
Christopher Lakin
IntelliMeet: Collaborative Mobile Framework for Automated Participation Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-232
by
Mohammed Ghazal
,
Ashraf Khalil
,
Tara Al Hadithy
,
Anas Al Tarabsheh
,
Samr Ali
Towards Remote Monitoring of Vital Signs without Body Instrumentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-239
by
Yaser Othman
,
Montasir Qasymeh
,
Ashraf Khalil
,
Mohammed Ghazal
A Mobile-Programmable Smart Mirror for Ambient IoT Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-245
by
Mohammed Ghazal
,
Tara Al Hadithy
,
Yasmina Al Khalil
,
Muhammad Akmal
,
Hassan Hajjdiab
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Aysha K. Alharam
,
Wael Elmedany
A DSL for the Development of Heterogeneous Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-257
by
Darwin Alulema
,
Luis Iribarne
,
Javier Criado
Showing 42 out of 42