Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIC
CIC 2019
Generate Citations
2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)
Dec. 12 2019 to Dec. 14 2019
Los Angeles, CA, USA
ISBN: 978-1-7281-6739-8
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-9
Message from the General Chairs and PC Chairs
Freely available from IEEE.
pp. 10-11
Organizing Committee
Freely available from IEEE.
pp. 12-12
Technical Program Committee
Freely available from IEEE.
pp. 13-14
Steering Committee
Freely available from IEEE.
pp. 15-15
Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
Airport Restroom Cleanliness Prediction Using Real Time User Feedback Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kilian Ros
,
Elena Mocanu
,
Christin Seifert
Collaborative Creation and Training of Social Bots in Learning Communities
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-19
by
Alexander Tobias Neumann
,
Peter de Lange
,
Ralf Klamma
Sharing Blockchain Performance Knowledge for Edge Service Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-29
by
Filipi Rydzi
,
Hong-Linh Truong
A Solving Method for Computing and Network Resource Minimization Problem in Service Function Chain Against Multiple VNF Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-38
by
Daiki Yamada
,
Norihiko Shinomiya
Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-48
by
Sunil Singh Samant
,
Mohan Baruwal Chhetri
,
Quoc Bao Vo
,
Surya Nepal
,
Ryszard Kowalczyk
Challenges and Approaches to Teaching Data Science Technologies in an Information Technology Program with Non-Traditional Students
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-56
by
Richard Price
,
Lakshmish Ramaswamy
An Interactive Play Environment on Mathematics and Cognitive Training with Behavioral Tracking for Children with Autism
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Pinata Winoto
,
Jie Chen Jane
,
Hangzhi Guo
,
Tiffany Y. Tang
Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Maryam Bahojb Imani
,
Latifur Khan
,
Bhavani Thuraisingham
A Taxonomy for Classifying User Group Activity in Online Political Discourse
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-80
by
Kimberley Hemmings-Jarrett
,
Julian Jarrett
,
M. Brian Blake
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-90
by
Dinuni Fernando
,
Siddharth Kulshrestha
,
J. Dinal Herath
,
Nitin Mahadik
,
Yanzhe Ma
,
Changxin Bai
,
Ping Yang
,
Guanhua Yan
,
Shiyong Lu
Cluster-Based Anonymization of Directed Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-100
by
Anh-Tu Hoang
,
Barbara Carminati
,
Elena Ferrari
Experiences with Managing Data Ingestion into a Corporate Datalake
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-109
by
Sean Rooney
,
Daniel Bauer
,
Luis Garcés-Erice
,
Peter Urbanetz
,
Florian Froese
,
Sasa Tomic
Leveraging Data-Analysis Session Logs for Efficient, Personalized, Interactive View Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-119
by
Xiaozhong Zhang
,
Xiaoyu Ge
,
Panos K. Chrysanthis
ActionTime: App to Help Develop Execution Skill
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-126
by
Cui Yu
,
Allen Lu
,
Steven Cassidy
,
Wenjin Zhang
Provider Networks in the Neonatal Intensive Care Unit Associate with Length of Stay
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-134
by
Cindy Kim
,
Christoph U. Lehmann
,
Dupree Hatch
,
Jonathan S. Schildcrout
,
Daniel J France
,
You Chen
Temporal JSON
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-144
by
Aayush Goyal
,
Curtis Dyreson
Tabu Search for Efficient Service Function Chain Provisioning in Fog Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Nazli Siasi
,
Adrian Jaesim
,
Nasir Ghani
An Assessment of the Impacts of Workflow Management Systems on Knowledge Management Process Activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-157
by
Ricardo Anderson
Two Tier Analysis of Social Media Collaboration for Student Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-167
by
Ronak Razavisousan
,
Karuna P. Joshi
Event Detection in Noisy Streaming Data with Combination of Corroborative and Probabilistic Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-177
by
Abhijit Suprem
,
Calton Pu
Integration of User Emotion and Self-Awareness in Text Messaging
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Li Liu
,
Dragos Guta
,
Shuo Niu
Named Entity Recognition for Nepali Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-190
by
Oyesh Mann Singh
,
Ankur Padia
,
Anupam Joshi
Collaborative Online Educational Games for Children with Learning Disabilities: Lessons Learned
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-195
by
Pinata Winoto
,
Tiffany Y. Tang
IoT Security A Comprehensive Life Cycle Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-203
by
Elisa Bertino
Device Identity and Trust in IoT-sphere Forsaking Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-213
by
Indrajit Ray
,
Diptendu M. Kar
,
Jordan Peterson
,
Steve Goeringer
A Global IoT Device Discovery and Integration Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Dimitrios Georgakopoulos
Engineering Heterogeneous Internet of Things Applications: From Models to Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-231
by
Thomas W. Pusztai
,
Christos Tsigkanos
,
Schahram Dustdar
Smart CCR IoT: Internet of Things Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-235
by
Adrienne J. Raglin
,
Dijiang Huang
,
Huan Liu
,
James McCabe
A Marauder's Map for the IoT Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-245
by
Eve M. Schooler
,
David Zage
,
Hassnaa Moustafa
,
Jeff Sedayao
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-255
by
Anton V. Uzunov
,
Surya Nepal
,
Mohan Baruwal Chhetri
Self-Emerging Data Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-265
by
Balaji Palanisamy
,
Chao Li
On the Use of Operations Research for Decision Making with Uncertainty for IoT Devices in Battlefield Situations
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-297
by
Dawn A. Lott
,
Adrienne Raglin
,
Somiya Metu
Designing for Fallible Humans
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-305
by
Jelena Mirkovic
,
Simon Woo
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-313
by
Sanchari Das
,
Andrew Kim
,
Shrirang Mare
,
Joshua Streiff
,
L. Jean Camp
Towards a Trusted Marketplace for Wearable Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-321
by
Alan Colman
,
M. Jabed Morshed Chowdhury
,
Mohan Baruwal Chhetri
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-329
by
Joshua Streiff
,
Sanchari Das
,
Joshua Cannon
Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-337
by
Jongkil Jay Jeong
,
Marthie Grobler
,
M.A.P. Chamikara
,
Carsten Rudolph
Towards an Improved Understanding of Human Factors in Cybersecurity
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-345
by
Jongkil Jeong
,
Joanne Mihelcic
,
Gillian Oliver
,
Carsten Rudolph
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-353
by
Kimberly Ferguson-Walter
,
Maxine Major
,
Dirk Van Bruggen
,
Sunny Fugate
,
Robert Gutzwiller
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-359
by
Kamrul Hasan
,
Sachin Shetty
,
Sharif Ullah
A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Wenjia Li
,
Neha Bala
,
Aemun Ahmar
,
Fernanda Tovar
,
Arpit Battu
,
Prachi Bambarkar
Author Index
Freely available from IEEE.
pp. 367-368
Showing 51 out of 51