Advances in Internet, Data & Web Technologies : The 12th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2024) — 1st ed. 2024. (Englisch)
- Neue Suche nach: Barolli, Leonard
2024
-
ISBN:
- Buch / Elektronische Ressource
-
Titel:Advances in Internet, Data & Web Technologies : The 12th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2024)
-
Beteiligte:Barolli, Leonard ( Herausgeber:in )
-
Erschienen in:
-
Ausgabe:1st ed. 2024.
-
Verlag:
- Neue Suche nach: Springer Nature Switzerland
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2024
-
Format / Umfang:1 Online-Ressource(XXII, 651 p. 317 illus., 262 illus. in color.)
-
ISBN:
-
DOI:
-
Medientyp:Buch
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 620.00285
- Weitere Informationen zu Dewey Decimal Classification
-
Schlagwörter:
-
Klassifikation:
DDC: 620.00285 -
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Few Shot NER on Augmented Unstructured Text from Cardiology RecordsFerraro, Antonino / Galli, Antonio / La Gatta, Valerio / Minocchi, Mario / Moscato, Vincenzo / Postiglione, Marco et al. | 2024
- 2
-
The Influence of Financial Literacy and Financial Technology on SMEs’ SustainabilityWinarsih / Noviyanti, Desy / Mutoharoh et al. | 2024
- 3
-
The Effect of Digital and Human Capital Transformation on SME Performance with Accounting Information Systems as an Intervening VariableWinarsih / Kholida / Suhendi, Chrisna et al. | 2024
- 4
-
OpenVSLAM-Based Development Framework for Web-Based VR Tours Using 360VR Videos and Its ExtensionsOkada, Yoshihiro / Shi, Wei / Kaneko, Kosuke et al. | 2024
- 5
-
Implementation of a Fuzzy-Based System for Assessment of Logical Trust Considering Reliability as a New ParameterHigashi, Shunya / Ampririt, Phudit / Qafzezi, Ermioni / Ikeda, Makoto / Matsuo, Keita / Barolli, Leonard et al. | 2024
- 6
-
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention MechanismsSun, Yiran / Wang, Ziqi / Liu, Kewei / Cui, Baojiang et al. | 2024
- 7
-
An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial TestingWang, Siyuan / Cui, Zhiwei / Xu, Jie / Cui, Baojiang et al. | 2024
- 8
-
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal FeaturesGuo, Qing / Yang, Wenchuan / Cui, Baojiang et al. | 2024
- 9
-
Fuzzing IoT Devices via Android App Interfaces with Large Language ModelMa, Wenxing / Cui, Baojiang et al. | 2024
- 10
-
Towards the Automated Population of Thesauri Using BERT: A Use Case on the Cybersecurity DomainCardillo, Elena / Portaro, Alessio / Taverniti, Maria / Lanza, Claudia / Guarasci, Raffaele et al. | 2024
- 11
-
Network Scanning Detection Based on Spatiotemporal BehaviorZhang, Pengyuan / Cui, Baojiang et al. | 2024
- 12
-
IoTaint: An Optimized Static Taint Analysis Method in Embedded FirmwareYu, Huan / Cui, Baojiang et al. | 2024
- 13
-
An Innovative Approach to Real-Time Concept Drift Detection in Network SecurityUccello, Federica / Pawlicki, Marek / D’Antonio, Salvatore / Kozik, Rafał / Choraś, Michał et al. | 2024
- 14
-
Formal Analysis of 5G EAP-TLS 1.3Zhu, Naiguang / Xu, Jie / Cui, Baojiang et al. | 2024
- 15
-
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social EngineeringNumada, Kota / Nozaki, Shinnosuke / Takaiwa, Takumi / Ohki, Tetsushi / Nishigaki, Masakatsu et al. | 2024
- 16
-
Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal CryptographyShi, LiPing et al. | 2024
- 17
-
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data CentersMastroianni, Michele / Ficco, Massimo / Palmieri, Francesco / Martone, Vincenzo Emanuele et al. | 2024
- 18
-
A Method for Estimating the Number of Diseases in J-MID Database: Application to CT ReportSakai, Koji / Ohara, Yu / Maehara, Yosuke / Takahashi, Takeshi / Yamada, Kei et al. | 2024
- 19
-
Text Mining with Finite State Automata via Compound Words OntologiesPostiglione, Alberto et al. | 2024
- 20
-
Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding NetworkTian, Feng / Cui, Baojiang / Chen, Chen et al. | 2024
- 21
-
Probing Cross-lingual Transfer of XLM Multi-language ModelGuarasci, Raffaele / Silvestri, Stefano / Esposito, Massimo et al. | 2024
- 22
-
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint AnalysisLuo, Yifan / Cui, Baojiang et al. | 2024
- 23
-
A Method for Calculating Degree of Deviation of Posts on Social Media for Public Opinion in Flaming PredictionYoshida, Yusuke / Takano, Kosuke et al. | 2024
- 24
-
Systematic Review of Eye-Tracking StudiesHaveriku, Alba / Paci, Hakik / Kote, Nelda / Meçe, Elinda Kajo et al. | 2024
- 25
-
TPLUG: An Efficient Framework Through Token Pair Linking and Undirected Graph for Chinese Event ExtractionHu, Ting / Deng, Fang / Chu, Zhiqiang et al. | 2024
- 26
-
Usability and Effectiveness of a Developed IoT-Based Smart Beverage Dispenserdela Cruz, Dennis R. / Rodriguez, Dyan G. / Caparas, Hazel A. et al. | 2024
- 27
-
An Algorithm to Change the TBFC Model to Reduce the Energy Consumption of the IoTDuolikun, Dilawaer / Enokido, Tomoya / Takizawa, Makoto et al. | 2024
- 28
-
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz TestingLiu, Huipeng / Cui, Baojiang / Xu, Jie / Niu, Lihua et al. | 2024
- 29
-
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement LearningLiu, Rui / Cui, Baojiang / Chen, Chen / Ma, Jinxin et al. | 2024
- 30
-
Implementation of a Fuzzy-Based Testbed for Selection of Radio Access Technologies in 5G Wireless Networks and Its Performance EvaluationAmpririt, Phudit / Higashi, Shunya / Kraikritayakul, Paboth / Qafzezi, Ermioni / Matsuo, Keita / Barolli, Leonard et al. | 2024
- 31
-
A Fuzzy-Based System for Assessment of Recognition Error in VANETs Considering Inattentive Driving as New ParameterQafzezi, Ermioni / Bylykbashi, Kevin / Higashi, Shunya / Ampririt, Phudit / Matsuo, Keita / Barolli, Leonard et al. | 2024
- 32
-
Performance Evaluation of BLX-\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\alpha $$\end{document} Crossover Method for Different Instances of WMNs Considering FC-RDVM Router Replacement Method and Subway Distribution of Mesh ClientsBarolli, Admir / Sakamoto, Shinji / Barolli, Leonard / Takizawa, Makoto et al. | 2024
- 33
-
A Measurement System for Improving Riding Comfortability of Omnidirectional Wheelchair RobotMatsuo, Keita / Barolli, Leonard et al. | 2024
- 34
-
A Comparative Study of Four YOLO-Based Models for Distracted Driving DetectionTanaka, Naoki / Tanaka, Hibiki / Ikeda, Makoto / Barolli, Leonard et al. | 2024
- 35
-
An Intelligent System Based on CCM, SA and FDTD for Sensor Node Placement Optimization in Wireless Visual Sensor NetworksNagai, Yuki / Oda, Tetsuya / Yukawa, Chihiro / Wakabayashi, Kyohei / Barolli, Leonard et al. | 2024
- 36
-
Performance Evaluation of a Cuckoo Search Based System for Node Placement Problem in Wireless Mesh Networks: Evaluation Results for Computation Time and Different Numbers of NestsSakamoto, Shinji / Barolli, Leonard / Takizawa, Makoto et al. | 2024
- 37
-
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-MiddleMa, Menglin / Cui, Baojiang et al. | 2024
- 38
-
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle ModelChen, Ziyang / Cui, Baojiang / Cheng, Zishuai et al. | 2024
- 39
-
Energy Sharing System Among Vehicles on a Vehicular NetworkBalzano, Walter / Lanuto, Antonio / Prosciutto, Erasmo / Covella, Biagio Scotto di et al. | 2024
- 40
-
Proposal of Indoor AR Navigation System Using SLAM for Location SearchGotoh, Yusuke / Tsunetomo, Ryusei / Adhinugraha, Kiki et al. | 2024
- 41
-
A Fuzzy-Based System for Real-Time Volume Control of Electric Bass GuitarsMoriya, Genki / Wakabayashi, Kyohei / Nagai, Yuki / Yukawa, Chihiro / Oda, Tetsuya / Barolli, Leonard et al. | 2024
- 42
-
Implementation of a Low-Cost and Intelligent Driver Monitoring System for Engine Locking in the Presence of Alcohol Detection or Drowsiness in DriversSpaho, Evjola / Jaupi, Orjola / Cala, Anxhela et al. | 2024
- 43
-
An Accident Detection System for Private Lavatories Using Fuzzy Control and Thermal CameraMatsui, Tomoaki / Oda, Tetsuya / Wakabayashi, Kyohei / Nagai, Yuki / Yukawa, Chihiro / Barolli, Leonard et al. | 2024
- 44
-
A Fuzzy-Based System for Decision of Compressed Image Degree Using Cluster Load LevelOkage, Kenya / Oda, Tetuya / Nagai, Yuki / Yukawa, Chihiro / Wakabayashi, Kyohei / Barolli, Leonard et al. | 2024
- 45
-
A Fuzzy Control Based Method for Imaging Position Decision and Its Performance EvaluationYukawa, Chihiro / Oda, Tetsuya / Nagai, Yuki / Wakabayashi, Kyohei / Barolli, Leonard et al. | 2024
- 46
-
Comparative Analysis of 1D-CNN and 2D-CNN for Network Intrusion Detection in Software Defined NetworksAlsaadi, Sami / Anande, Tertsegha J. / Leeson, Mark S. et al. | 2024
- 47
-
Analysis and Development of a New Method for Defining Path Reliability in WebGIS Based on Fuzzy Logic and Dispersion IndicesBalzano, Walter / Lanuto, Antonio / Prosciutto, Erasmo / di Covella, Biagio Scotto et al. | 2024
- 48
-
Object Detection and Speech Recognition Based Motion Analysis System for Pointing and CallingWakabayashi, Kyohei / Yukawa, Chihiro / Nagai, Yuki / Oda, Tetsuya / Barolli, Leonard et al. | 2024
- 49
-
Trust Zone Model with the Mandatory Access Control ModelNakamura, Shigenari / Takizawa, Makoto et al. | 2024
- 50
-
A DPI-Based Network Traffic Feature Vector Optimization ModelZhao, Yuqing / Cui, Baojiang / Yang, Jun / Jiang, Meiyi et al. | 2024
- 51
-
A Hill Climbing System for Optimizing Component Selection of Multirotor UAVsSaito, Nobuki / Oda, Tetsuya / Nagai, Yuki / Wakabayashi, Kyohei / Yukawa, Chihiro / Barolli, Leonard et al. | 2024
- 52
-
Optimization of Deer Repellent Devices Placement Based on Hill Climbing and Acoustic Ray TracingAsada, Sora / Nagai, Yuki / Wakabayashi, Kyohei / Yukawa, Chihiro / Oda, Tetsuya / Barolli, Leonard et al. | 2024
- 53
-
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees AlgorithmCong, Peixin / Cui, Baojiang et al. | 2024
- 54
-
Star Point Target Extraction with High Noise Background Based on MorphologyLi, Zhen-zhen et al. | 2024
- 55
-
Toward Detection of Fake News Using Sentiment Analysis for Albanian News ArticlesMuraku, Besjana / Xiao, Lu / Meçe, Elinda Kajo et al. | 2024
- 56
-
Proposal of My Hazard Map System for Disaster Prevention EducationMorita, Toshiya / Ishida, Tomoyuki et al. | 2024
- 57
-
Automated Storytelling Technologies for Cultural HeritageColucci Cante, Luigi / Di Martino, Beniamino / Graziano, Mariangela / Branco, Dario / Pezzullo, Gennaro Junior et al. | 2024
- 58
-
Support for Automated Story Telling Using Natural Language Processing Techniques Aimed at Recognizing Narrative ElementsDi Martino, Beniamino / Pezzullo, Gennaro Junior / Grassia, Emanuela et al. | 2024
- 59
-
Travel Air IQ: A Tool for Air Quality-Aware TouristsMulla, Divya Pragna / Calo, Antonella / Longo, Antonella et al. | 2024
- 60
-
Advanced IT Technologies Applied to Archaeological Park of Norba (Latium, Italy)Branco, Dario / Coppa, Antonio / D’Angelo, Salvatore / Gigli, Stefania Quilici / Renda, Giuseppina / Venticinque, Salvatore et al. | 2024
- 61
-
XR Theater: An ExperienceBochicchio, Mario Alessandro / Miccoli, Eleonora et al. | 2024