Default Cover Image

2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud)

Aug. 21 2017 to Aug. 23 2017

Prague

Table of Contents

Table of contentsFreely available from IEEE.pp. v-x
Security Intelligence Centers for Big Data ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 7-13
Big Data, Cost and Emission Reporting in Process IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Investigation of Money Laundering and Extremism Indicators RelationshipFull-text access may be available. Sign in or learn about subscription options.pp. 25-30
A Systematic Approach to Describing the Source Code of a Cloud Platform with Assured SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Deriving Cognitive Map Concepts on the Basis of Social Media Data ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 37-40
The Use of Clustering Algorithms Ensemble with Variable Distance Metrics in Solving Problems of Web MiningFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
The Use of Entropy Measure for Higher Quality Machine Learning Algorithms in Text Data ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
The Analysis of Big Data and the Accuracy of Financial ReportsFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Building an IoT Data Hub with Elasticsearch, Logstash and KibanaFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial RevolutionFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
SLAs for Industrial IoT: Mind the GapFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
Context-Aware Enterprise Modelling towards Agile Models DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 79-87
Sensing for the Internet of Things and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Adopting Formal Approaches for Monitoring Sensors of Intercloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 93-100
Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0Full-text access may be available. Sign in or learn about subscription options.pp. 101-107
WPTE: Weight-Based Probabilistic Trust Evaluation Scheme for WSNFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Dynamic Network Analysis of the Euro2016 Final: Preliminary ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Detecting Communities by Integrating Perspective Communities as Semantic InformationFull-text access may be available. Sign in or learn about subscription options.pp. 126-131
Identifying Emotions in Social Media: Comparison of Word-Emotion LexiconsFull-text access may be available. Sign in or learn about subscription options.pp. 132-137
A Data Streaming Approach to Link Mining in Criminal NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 138-143
Towards an Intelligent Systems to Predict Nosocomial Infections in Intensive CareFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Importance of Statistics for Data Mining and Data ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Leveraging Edge Computing through Collaborative Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
Improving Maternity Care with Business IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
Business Intelligence for Cardiovascular Disease AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
Improving Nursing Practice through Interoperability and IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Handover Key Management in an LTE-based Unmanned Aerial Vehicle Control NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Secrecy Analysis of Cooperative Network with Untrustworthy Relays Using Location-Based Multicasting TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 206-210
Performance Modeling of SDN with NFV under or aside the ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
A Security Framework for Mobile Health ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 221-226
IntelliMeet: Collaborative Mobile Framework for Automated Participation AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Towards Remote Monitoring of Vital Signs without Body InstrumentationFull-text access may be available. Sign in or learn about subscription options.pp. 233-239
A Mobile-Programmable Smart Mirror for Ambient IoT EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
A DSL for the Development of Heterogeneous ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 251-257
Showing 42 out of 42