Default Cover Image

2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)

Dec. 12 2019 to Dec. 14 2019

Los Angeles, CA, USA

ISBN: 978-1-7281-6739-8

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-9
Message from the General Chairs and PC ChairsFreely available from IEEE.pp. 10-11
Organizing CommitteeFreely available from IEEE.pp. 12-12
Technical Program CommitteeFreely available from IEEE.pp. 13-14
Steering CommitteeFreely available from IEEE.pp. 15-15
KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Airport Restroom Cleanliness Prediction Using Real Time User Feedback DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Collaborative Creation and Training of Social Bots in Learning CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 11-19
Sharing Blockchain Performance Knowledge for Edge Service DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 20-29
A Taxonomy for Classifying User Group Activity in Online Political DiscourseFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Cluster-Based Anonymization of Directed GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
Experiences with Managing Data Ingestion into a Corporate DatalakeFull-text access may be available. Sign in or learn about subscription options.pp. 101-109
Leveraging Data-Analysis Session Logs for Efficient, Personalized, Interactive View RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 110-119
ActionTime: App to Help Develop Execution SkillFull-text access may be available. Sign in or learn about subscription options.pp. 120-126
Temporal JSONFull-text access may be available. Sign in or learn about subscription options.pp. 135-144
Tabu Search for Efficient Service Function Chain Provisioning in Fog NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
An Assessment of the Impacts of Workflow Management Systems on Knowledge Management Process ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 151-157
Two Tier Analysis of Social Media Collaboration for Student MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 158-167
Event Detection in Noisy Streaming Data with Combination of Corroborative and Probabilistic SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 168-177
Integration of User Emotion and Self-Awareness in Text MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Named Entity Recognition for Nepali LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 184-190
Collaborative Online Educational Games for Children with Learning Disabilities: Lessons LearnedFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
IoT Security A Comprehensive Life Cycle FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 196-203
Device Identity and Trust in IoT-sphere Forsaking CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 204-213
A Global IoT Device Discovery and Integration VisionFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Engineering Heterogeneous Internet of Things Applications: From Models to CodeFull-text access may be available. Sign in or learn about subscription options.pp. 222-231
Smart CCR IoT: Internet of Things TestbedFull-text access may be available. Sign in or learn about subscription options.pp. 232-235
A Marauder's Map for the IoT EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 236-245
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 246-255
Self-Emerging Data InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 256-265
Designing for Fallible HumansFull-text access may be available. Sign in or learn about subscription options.pp. 298-305
Towards a Trusted Marketplace for Wearable DataFull-text access may be available. Sign in or learn about subscription options.pp. 314-321
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their ChildrenFull-text access may be available. Sign in or learn about subscription options.pp. 322-329
Fuzzy Logic Application to Link National Culture and Cybersecurity MaturityFull-text access may be available. Sign in or learn about subscription options.pp. 330-337
Towards an Improved Understanding of Human Factors in CybersecurityFull-text access may be available. Sign in or learn about subscription options.pp. 338-345
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power UtilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 354-359
Author IndexFreely available from IEEE.pp. 367-368
Showing 51 out of 51