


default search action
6th CIC 2020: Atlanta, GA, USA
- 6th IEEE International Conference on Collaboration and Internet Computing, CIC 2020, Atlanta, GA, USA, December 1-3, 2020. IEEE 2020, ISBN 978-1-7281-4146-6

- Gong Su:

cVM: Containerized Virtual Machine. 1-7 - Dimitrios Georgakopoulos

, Prem Prakash Jayaraman
, Anas Dawod
:
SenShaMart: A Trusted loT Marketplace for Sensor Sharing. 8-17 - Abdallah Lakhdari

, Amani Abusafia
, Athman Bouguettaya:
Crowdsharing Wireless Energy Services. 18-24 - Flávia Coimbra Delicato, Paulo F. Pires:

Challenges in developing collaborative IoT systems. 25-33 - Wei Emma Zhang

, Quan Z. Sheng
, Adnan Mahmood
, Dai Hoang Tran
, Munazza Zaib, Salma Abdalla Hamad, Abdulwahab Aljubairy
, Ahoud Abdulrahmn F. Alhazmi
, Subhash Sagar, Congbo Ma:
The 10 Research Topics in the Internet of Things. 34-43 - Harindu Korala

, Ali Yavari
, Dimitrios Georgakopoulos
, Prem Prakash Jayaraman
:
Design and Implementation of a Platform for Managing Time-Sensitive IoT Applications. 44-53 - Kimberly García

, Simon Mayer, Alessandro Ricci
, Andrei Ciortea:
Proactive Digital Companions in Pervasive Hypermedia Environments. 54-59 - Jingzhe Wang, Balaji Palanisamy, Jinlai Xu

:
Sustainability-aware Resource Provisioning in Data Centers. 60-69 - Ruijun Wang, Liangkai Liu, Weisong Shi:

HydraSpace: Computational Data Storage for Autonomous Vehicles. 70-77 - Semih Sahin, Ling Liu, Wenqi Cao, Qi Zhang, Juhyun Bae, Yanzhao Wu

:
Memory Abstraction and Optimization for Distributed Executors. 78-87 - Lin Meng, Ning Yan, Masood S. Mortazavi, Jiawei Zhang:

Discovering Localized Information for Heterogeneous Graph Node Representation Learning. 88-96 - Joshua Kimball, Rodrigo Alves Lima, Yasuhiko Kanemasa, Calton Pu:

PerfDB: A Data Management System for Fine-Grained Performance Anomaly Detection. 97-106 - Abdullah S. Al-Alaj

, Ram Krishnan, Ravi S. Sandhu:
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions. 107-116 - Joffrey L. Leevy

, Taghi M. Khoshgoftaar:
A Short Survey of LSTM Models for De-identification of Medical Free Text. 117-124 - Alem Fitwi, Yu Chen, Sencun Zhu:

PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service. 125-134 - Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:

Cyber Attacks on Smart Farming Infrastructure. 135-143 - Justin M. Johnson, Taghi M. Khoshgoftaar:

Hcpcs2Vec: Healthcare Procedure Embeddings for Medicare Fraud Prediction. 145-152 - Sanchari Das, Shrirang Mare, L. Jean Camp:

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability. 153-160 - Nirosha Holton, Steven Furnell:

Assessing the provision of public-facing cybersecurity guidance for end-users. 161-168 - Josiah Dykstra, Rohan Mathur, Alicia Spoor:

Cybersecurity in Medical Private Practice: Results of a Survey in Audiology. 169-176 - Fariha Tasmin Jaigirdar

, Carsten Rudolph, Gillian C. Oliver, David Watts, Chris Bain:
What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future Challenges. 177-183 - Josiah Dykstra:

Invisible Security: Protecting Users with No Time to Spare. 184-190

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














