


default search action
1st IML 2017: Liverpool, UK
- Hani Hamdan, Djallel Eddine Boubiche, Fanny Klett:

Proceedings of the 1st International Conference on Internet of Things and Machine Learning, IML 2017, Liverpool, United Kingdom, October 17-18, 2017. ACM 2017 - Rustem Dautov, Salvatore Distefano:

Three-level hierarchical data fusion through the IoT, edge, and cloud computing. 1:1-1:5 - Chrystinne Oliveira Fernandes, Felipe Baldino Moreira

, Simone Diniz Junqueira Barbosa
, Carlos José Pereira de Lucena:
What your EEG wearable sensors can tell about you? 2:1-2:10 - Konstantin Hopf

, Michael Kormann, Mariya A. Sodenkamp, Thorsten Staake:
A decision support system for photovoltaic potential estimation. 3:1-3:10 - Gregory Tsipenyuk, Jon Crowcroft:

An email attachment is worth a thousand words, or is it? 4:1-4:10 - Shaista Sabir, Usman Qamar, Tanveer Ahmed, Mubashir Ali:

A preconception gender assessment using data mining techniques based on implementation of natural laws & favoring factors. 5:1-5:8 - R. Amith, V. N. Manjunath Aradhya:

Linear projective approach for moving object detection in video. 6:1-6:4 - Arindam Giri, Subrata Dutta

, Sarmistha Neogy, Keshav P. Dahal, Zeeshan Pervez
:
Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges. 7:1-7:12 - Yanguo Jing, Mark Eastwood, Bo Tan

, Alexandros Konios
, Abdul Hamid, Mark Collinson:
An intelligent well-being monitoring system for residents in extra care homes. 8:1-8:6 - José Ángel Concepción-Sánchez, Pino Caballero-Gil

, Jonay Suárez-Armas, Néstor Álvarez-Díaz:
Mobile application for elderly assistance in public transport. 9:1-9:7 - Hao-Ting Pai

, Hung-Wei Lai, Shuli Wang, Mei-Fang Wu, Yung-Ting Chuang:
Recommendations for mobile applications: facilitating commerce in google play. 10:1-10:6 - Nitin Mishra

, Vimal Mishra, Saumya Chaturvedi
:
Tools and techniques for solving cold start recommendation. 11:1-11:6 - Annalisa Cenci, Daniele Liciotti, Emanuele Frontoni, Primo Zingaretti, Virgilio Paolo Carnielli:

Movements analysis of preterm infants by using depth sensor. 12:1-12:9 - Nikolas Stege, Christoph Wegener, Tobias Basse, Frederik Kunze:

Mapping interest rate projections using neural networks under cointegration: an application from stress testing approaches. 13:1-13:5 - Mohamed Saouabi

, Abdellah Ezzati
:
A comparative between hadoop mapreduce and apache Spark on HDFS. 14:1-14:4 - Arindam Chaudhuri

:
Hierarchical support vector regression for QoS prediction of network traffic data. 15:1-15:6 - Satyanarayana Vollala, Indrajeet S, B. Shameedha Begum, N. Ramasubramanian:

Evaluation of password encrypted key exchange authentication techniques: design approach perspective: evaluation of PAKE protocol. 16:1-16:9 - D. W. Russell:

Faults and flaws in the internet of things in manufacturing systems in small to medium enterprises: Panel discussion. 17:1-17:4 - Roberto Saia

, Salvatore Carta:
A fourier spectral pattern analysis to design credit scoring models. 18:1-18:10 - Dalal F. Aljebry, Sabeen Tahir

:
Internet of things routing technique survey. 19:1-19:7 - Ignacio Rodríguez-Rodríguez

, Miguel Ángel Zamora, José-Víctor Rodríguez:
On predicting glycaemia in type 1 diabetes mellitus patients by using support vector machines. 20:1-20:2 - Ayhan Demiriz

, Fatma Cantas:
Analyzing used-car web listings via text mining. 21:1-21:7 - Davide Bacciu, Stefano Chessa, Claudio Gallicchio, Alessio Micheli

:
On the need of machine learning as a service for the internet of things. 22:1-22:8 - Prodromos Kolyvakis, Min-Jung Yoo, Dimitris Kiritsis:

Knowledge as a service in the IoT era. 23:1-23:6 - Koppala Guravaiah

, Thivyavignesh Ramasamy Gurumurthy
, R. Leela Velusamy:
Vehicle monitoring using internet of things. 24:1-24:7 - Rahim Rahmani

, Theo Kanter:
Autonomous cooperative decision-making in massively distributed IoT via heterogenous networks. 25:1-25:5 - Haoyue Xue, Yuhong Li, Rahim Rahmani

, Theo Kanter, Xirong Que:
A mechanism for mitigating DoS attack in ICN-based internet of things. 26:1-26:10 - Amit Kushwaha, Shubham Chaudhary:

Review highlights: opinion mining on reviews: a hybrid model for rule selection in aspect extraction. 27:1-27:6 - Bin Xiao:

Self-evolvable knowledge-enhanced IoT data mobility for smart environment. 28:1-28:14 - Joël Colloc

, Relwendé Aristide Yameogo
, Peter F. Summons, Ying Shen
, Mira Park
, Janine E. Aronson:
EPICE an emotion fuzzy vectorial space for time modeling in medical decision. 29:1-29:7 - Francesco Lo Conti, Gabriele Minucci, Naser Derakhshan:

A regularized deep learning approach for image de-blurring. 30:1-30:5 - Rhishi Pratap Singh, Jitender Grover, Garimella Rama Murthy:

Self organizing software defined edge controller in IoT infrastructure. 31:1-31:7 - Aaron Boddy, William Hurst

, Michael Mackay, Abdennour El Rhalibi:
A study into data analysis and visualisation to increase the cyber-resilience of healthcare infrastructures. 32:1-32:7 - Seyyed Aref Razavi, Masoud Asadpour

:
Word embedding-based approach to aspect detection for aspect-based summarization of persian customer reviews. 33:1-33:10 - Piotr Potiopa

, Michal Karwatowski
, Jerzy Duda
, Pawel Sasor, Maciej Wielgosz
, Bartlomiej Muzykiewicz:
Semantic search extension based on polish wordnet relations in business document exploration. 34:1-34:7 - Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. 35:1-35:8 - Ranjith Dinakaran, Graham Sexton, Huseyin Seker

, Ahmed Bouridane, Richard Jiang
:
Image resolution impact analysis on pedestrian detection in smart cities surveillance. 36:1-36:8 - Hong Wang

, H. M. Abdul Aziz, Stanley E. Young, Sagar Patil:
Control of networked traffic flow distribution: a stochastic distribution system perspective. 37:1-37:7 - Witold Dzwinel

, Rafal Wcislo
, Magdalena Strzoda:
ivga: visualization of the network of historical events. 38:1-38:7 - Jonay Suárez-Armas, Pino Caballero-Gil

, Cándido Caballero-Gil:
Video surveillance robot powered by raspberry pi. 39:1-39:4 - Andres Azqueta-Gavaldon:

Financial investment and economic policy uncertainty in the UK. 40:1-40:4 - Sarmistha Neogy:

Information security: course. 41:1-41:8 - Hanaa F. Mahmood

, Baihua Li, Eran A. Edirisinghe:
Text localization in natural images through effective re-identification of the MSER. 42:1-42:9 - Partha Maji, Daniel Bates

, Alexandra W. Chadwick
, Robert Mullins
:
ADaPT: optimizing CNN inference on IoT and mobile devices using approximately separable 1-D kernels. 43:1-43:12 - Mohammed Nazeer, Garimella Rama Murthy, Rhishi Pratap Singh:

Leveling sectoring algorithm: lattice point problem quantification of energy saving. 44:1-44:7 - Moisés Lodeiro-Santiago, Cándido Caballero-Gil, Pino Caballero-Gil

:
Collaborative SQL-injections detection system with machine learning. 45:1-45:5 - Aparana Gupta, Anshul Garg, Namrata Rawat, Sandeep Chigurupati, U. Dinesh Kumar:

Every drop counts: unleashing the prospective locations for water harvesting using geospatial analytics. 46:1-46:13 - S. P. K. Karri, Debjani Chakraborty

, Ajoy Kumar Ray, Jyotirmoy Chatterjee:
Learning representations through ensemble of fuzzy c-means for identification of retinal pathologies. 47:1-47:6 - Filippo Malandra

, Steven Rochefort, Pascal Potvin, Brunilde Sansò:
A case study for M2M traffic characterization in a smart city environment. 48:1-48:9 - Hailah Al-Ballaa, Hmood Al-Dossari, Abdulrahman A. Mirza

:
Research area classification using wikipedia and information retrieval. 49:1-49:4 - Ahmad Khalil, Nader Mbarek, Olivier Togni:

Service level guarantee framework for IoT environments: full paper. 50:1-50:8 - AbdulMalik Al-Salman

, Haifa Alyahya
:
Arabic online handwriting recognition: a survey. 51:1-51:4 - Constantinos Mavridis, Ioannis N. Athanasiadis

:
Spatial classification with fuzzy lattice reasoning. 52:1-52:7 - Workneh Yilma Ayele, Gustaf Juell-Skielse

:
Social media analytics and internet of things: survey. 53:1-53:11 - Hemalatha Karnan

, Natarajan Sivakumaran
, M. Rajajeya kumar:
Classification of ventricular arrhythmias using feature ranking score algorithm. 54:1-54:7 - Hamid Mcheick

, Lokman Saleh, Hicham Ajami, Hafedh Mili:
HCES: helper context engine system to predict relevant state of patients in COPD domain using naïve bayesian. 55:1-55:10 - Asmaa Berdigh, Khalid El Yassini

:
Connected car overview: solutions, challenges and opportunities. 56:1-56:7 - Roman Ferrando, Paul Stacey

:
Classification of device behaviour in internet of things infrastructures: towards distinguishing the abnormal from security threats. 57:1-57:7 - Seema F. Al Raisi, Eran A. Edirisinghe:

A machine learning based approach to human observer behaviour analysis in CCTV video analytics & forensics. 58:1-58:10 - Lamyaa Sadouk, Taoufiq Gadi

, El Hassan Essoufi
:
Handwritten tifinagh character recognition using deep learning architectures. 59:1-59:11 - William Oliff, Avgoustinos Filippoupolitis, George Loukas

:
Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. 60:1-60:10 - Pramod Kumar Singh, Kanaparthy Sai Vivek, Shirisha Kodimala:

Stylometric analysis of E-mail content for author identification. 61:1-61:8 - Sarah Osama

, Essam H. Houssein
, Aboul Ella Hassanien, Aly A. Fahmy:
Forecast of wind speed based on whale optimization algorithm. 62:1-62:9 - De-Thu Huynh, Dung Ong Mau

, Chu Hong Hai:
EEO-AGA: energy efficiency optimisation in D2D communications using adaptive genetic algorithm. 63:1-63:6 - Vincent A. Balogun, Omonigho B. Otanocha, Bankole I. Oladapo

:
Development of smart linear velocity measuring device by embedding sensors with the arduino microcontroller. 64:1-64:5 - Leticia Arco

, Gladys Casas, Ann Nowé
:
Clustering methodology for smart metering data based on local and global features. 65:1-65:13 - Ehizojie Ojie, Ella Pereira

:
Simulation tools in internet of things: a review. 66:1-66:7 - Adnan Ullah, Usman Qamar

, Farhan Hassan Khan
, Saba Bashir
:
Dimensionality reduction approaches and evolving challenges in high dimensional data. 67:1-67:8 - Kamer Vishi

, Audun Jøsang
:
A new approach for multi-biometric fusion based on subjective logic. 68:1-68:9 - Jamal Benrabha, Farid Meziane

:
Automatic ROI detection and classification of the achilles tendon ultrasound images. 69:1-69:7 - Mohammed Zaki Shbier, Ku Ruhana Ku-Mahamud

, Mahmod Othman
:
SWGARCH model for time series forecasting. 70:1-70:5 - Artus Krohn-Grimberghe, Akriti Gupta

, Aman Chadha
, Ranjana Vyas:
Cloud computing in optimizing supply chain management of automotive component industry. 71:1-71:3 - Kaizhu Huang, Haochuan Jiang, Xu-Yao Zhang:

Field support vector machines. 72:1-72:12 - Néstor Álvarez-Díaz, Jordi Herrera-Joancomartí

, Pino Caballero-Gil
:
Smart contracts based on blockchain for logistics management. 73:1-73:8 - Aya Salama, Aboul Ella Hassanien, Aly A. Fahmy:

Iris features segmentation for arabian horses identification. 74:1-74:5 - Yasser Baeshen, Wafi Al-Karaghouli, Ahmad Ghoneim:

Investigating the effect of website quality on eWOM and customer purchase decision: third parties hotel websites. 75:1-75:5 - Hani Hamdan, Pierre Vigier, Frédéric Wantiez:

Data representation in sentiment analysis task. 76:1-76:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














