


default search action
34th AINA 2020: Caserta, Italy - Workshops
- Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa:

Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, AINA Workshops 2020, Caserta, Italy, 15-17 April. Advances in Intelligent Systems and Computing 1150, Springer 2020, ISBN 978-3-030-44037-4
The 16th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2020)
- Fangrong Zhou, Yi Ma, Yutang Ma, Hao Pan:

Infrared Image Fault Identification of Power Equipment Based on Residual Network. 3-13 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet. 14-23 - James Robertson, Jianhua Yang, W. Scott Gunter

, Peter Keres, Thomas Wingate, Anthony Obando:
Educational Microclimate Mesonet System Design. 24-33 - Ziyad Elbanna, Ilya Afanasyev, Luiz Jonatã Pires de Araújo, Rasheed Hussain

, Mansur Khazeev, Joseph Lamptey, Manuel Mazzara, Swati Megha, Diksha Moolchandani
, Dragos Strugar
:
A Machine to Machine Framework for the Charging of Electric Autonomous Vehicles. 34-45 - Zakaria Maamar

, Mohamed Sellami, Thar Baker
, Said Elnaffar, Maj Alshibly:
Atomicity in the Internet of Transactional Things (Io2T). 46-55 - Junke Nie, Xu An Wang, Yang Su, Bo Wang:

Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder. 56-64 - Andreas Grüner, Alexander Mühle, Michael Meinig, Christoph Meinel:

A Taxonomy of Trust Models for Attribute Assurance in Identity Management. 65-76 - Qian Du, Bo Zhang, Jiuru Wang, Wenyin Zhang, Weifa Liu:

Design and Development of a New Tea-Making Ecosystem. 77-82 - Amna Fekih, Sonia Gaied Fantar, Habib Youssef:

SDN-Based Replication Management Framework for CCN Networks. 83-99 - Marcelo Silva Freitas, Pedro Frosi Rosa, Flávio de Oliveira Silva

:
ConForm: In-Band Control Flows Self-establishment with Integrated Topology Discovery to SDN-Based Networks. 100-109 - Olli Väänänen

, Mikhail Zolotukhin, Timo Hämäläinen
:
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets. 110-121 - Farhan Amin

, Jin-Ghoo Choi, Gyu Sang Choi:
Community Detection Based on Social Influence in Large Scale Networks. 122-137 - Kaiyang Zhao, Xu An Wang

, Yao Liu, Jiasen Liu, Songyin Zhao:
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing. 138-148 - Bacem Mbarek

, Nafaâ Jabeur
, Tomás Pitner:
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme. 149-158 - Tesnim Mekki, Issam Jabri, Lamia Chaari

, Abderrezak Rachedi:
A Survey on Vehicular Fog Computing: Motivation, Architectures, Taxonomy, and Issues. 159-168 - Hao-Hsiang Ku:

Design of an Ontology-Oriented Hand Rehabilitation Service Platform for Rheumatoid Arthritis Patients. 169-177 - Raj Sanjay Shah, Ashutosh Bhatia:

Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics Framework. 178-189 - Sandhya Rathee, K. Haribabu

, Parth Patel, Ashutosh Bhatia, Ujjwal Gandhi:
Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDN. 190-200 - Di Huang, Zhan Xu, Zhigang Tian:

Deployment of NRF in the Docker and Kubernetes - Based NFV Platform. 201-213 - Annibale Elia, Alessandro Maisto

, Giandomenico Martorelli, Serena Pelosi, Pierluigi Vitale:
Textual Statistics and Named Entity Recognition Applied to Game of Thrones Novels. 214-222 - Kamrun Nahar, Asif Qumer Gill

:
A Review Towards the Development of Ontology Based Identity and Access Management Metamodel. 223-232 - El-hacen Diallo

, Khaldoun Al Agha, Omar Dib, Alexandre Laubé, Hafedh Mohamed-Babou:
Toward Scalable Blockchain for Data Management in VANETs. 233-244 - Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah

:
A New SDN Architecture Based on Trust Management and Access Control for IoT. 245-254 - Masataka Akasaka, Hiroyoshi Miwa:

Efficient Method for Link Protection Under Multiple Constraints Using ZDD. 255-264
The 16th International Workshop on Heterogeneous Wireless Networks (HWISE-2020)
- Fatima Tariq, Maria Anwar, Abdul Rehman Janjua, Muhammad Haseeb Khan, Asad Ullah Khan, Nadeem Javaid

:
Blockchain in WSNs, VANets, IoTs and Healthcare: A Survey. 267-279 - Razvan Bocu

:
A Constructive Review Regarding the Significance of 5G Networks for the Internet of Things. 280-298 - Rahma Gantassi, Bechir Ben Gouissem, Jalel Ben-Othman:

Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor Network. 299-309 - Eirini Barri, Christos Bouras:

Efficient Mechanism of eNB Bandwidth in D2D Communication in 5G. 310-319 - Mubariz Rehman, Zahoor Ali Khan, Muhammad Umar Javed

, Muhammad Zohaib Iftikhar, Usman Majeed, Imam Bux, Nadeem Javaid
:
A Blockchain Based Distributed Vehicular Network Architecture for Smart Cities. 320-331 - Makoto Ikeda, Shogo Nakasaki, Yoshiki Tada, Leonard Barolli:

Performance Evaluation of a Message Relaying Method with Enhanced Dynamic Timer in Vehicular DTN. 332-340 - M. Hamza Bin Waheed

, Rao Naveed Bin Rais
, Hassan Khan, Mukhtiar Bano, Syed Sherjeel A. Gilani:
Indoor Mobile Localization Using Wireless Sensor Networks (WSNs). 341-351 - Dardouri Soumaya, Samia Dardouri

, Ridha Bouallegue
:
Performance Evaluation of Routing Protocols for Vehicular AD-HOC Networks Using NS2/SUMO. 352-365 - Mukhtiar Bano, Rao Naveed Bin Rais

, Syed Sherjeel A. Gilani, Amir Qayyum:
SDNHybridMesh: A Hybrid Routing Architecture for SDN Based Wireless Mesh Networks. 366-375 - Khaoula Ammar, Oussama Ben Haj Belkacem, Ridha Bouallegue

:
DSSS Transmission Technique to Joint Radar Sensing and Wireless Communications in V2V System. 376-385
The 13th International Symposium on Mining and Web (MAW-2020)
- Nathanael Mercaldo, Wei Lu

:
Classification of Web Applications Using AiFlow Features. 389-399 - Sergey Koziakov, Manuel Mazzara:

Proximity-Based Context Information Retrieval for Bluetooth Enabled Devices. 400-409 - Ariel Rodríguez, Koji Okamura:

Cybersecurity Text Data Classification and Optimization for CTI Systems. 410-419 - Alessandro Maisto

:
LG-Starship: A Framework for Text Analysis. 420-428 - Reda A. Zayed

, Lamiaa Fattouh Ibrahim
, Hesham A. Hefny, Hesham Abou El Fetouh Salman:
Shilling Attacks Detection in Collaborative Recommender System: Challenges and Promise. 429-439 - Hiroakik Fuma, Kosuke Takano:

A Face and Posture Recognition Model Using CNN for Adapting Different Resolution Images. 440-446 - Linlin Zhang, Kin Fun Li:

Factors for Academic Performance Prediction. 447-457
The 13th International Workshop on Bio and Intelligent Computing (BICom-2020)
- Fangrong Zhou, Yi Ma, Yutang Ma, Hao Pan:

Infrared Image Fault Identification Method Based on YOLO Target Detection Algorithm. 461-470 - Arooj Arif, Nadeem Javaid

, Mubbashra Anwar, Afrah Naeem, Hira Gul, Sahiba Fareed:
Electricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A Survey. 471-483 - Seyed M.-H. Mansourbeigi:

Recurrent Neural Networks Analysis Application Effect of Economy Sentiment on Car Manufacturing. 484-493 - Tong Zhang, Caiquan Xiong:

Person Re-identification Based on Camera Style Adaptation. 494-503 - Seiji Ohara, Admir Barolli, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:

A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent System. 504-515
The 13th International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2020)
- Wei Hsu, Jung-Shan Lin, Yi-Chi Chen, Chun-Yen Wang, Chun-Tuan Huang:

An Automatic Software Quality and Function Assurance Case Study for Agile. 519-525 - Kiana Dziubinski

, Masaki Bandai
:
Your Neighbor Knows What You're Doing: Defending Smart Home IoT Device Traffic from Privacy LAN Attacks. 526-534 - Arisa Sekine, Masaki Bandai

:
Tile Quality Selection Method in 360-Degree Tile-Based Video Streaming. 535-544 - Jan Feng, Bing-Kai Hong, Shin-Ming Cheng

:
DDoS Attacks in Experimental LTE Networks. 545-553 - Shih-Hao Chang, Yan Pei

, Ping-Tsai Chung:
Hash Flow: An Access Control Mechanism for Software Defined Network. 554-565 - Yuma Morino, Hiroyoshi Miwa:

Method by Protection to Reduce Probability of Cascade Failure. 566-575
The 11th International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2020)
- Yudai Taniguchi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata:

Proposal of a Self-help Support System in a Mega Disaster. 579-586 - Yoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Yoshiya Saito, Jun Hakura:

Road State Information Platform for Automotive EV in Snow Country. 587-594 - Akira Sakuraba, Yoshitaka Shibata, Goshi Sato, Noriki Uchida, Toshihiro Tamura:

Social Experimental Evaluation of Road State Information System in Snow Country. 595-604 - Noriki Uchida, Misaki Fukumoto, Tomoyuki Ishida, Yoshitaka Shibata:

Static Body Detecting Methods by Locational and Rotational Sensors on Smartphone for DTN Based Disaster Information System. 605-613
The 8th International Workshop on Collaborative Emerging Systems (COLLABES-2020)
- WenChuan Yang, Jing Peng:

Research on EVM-Based Smart Contract Runtime Self-protection Technology Framework. 617-627 - Maroua Nouioua, Adel Alti, Belhassen Zouari:

Document Business Process Model Extension for Modeling Secure Ubiquitous Documents. 628-639 - François Aïssaoui, Samuel Berlemont, Marc Douet, Emna Mezghani:

A Semantic Model Toward Smart IoT Device Management. 640-650 - Kenshiro Mitsugi, Keita Matsuo, Leonard Barolli:

A Comparison Study of Control Devices for an Omnidirectional Wheelchair. 651-661 - Yiyi Wang, Koji Okamura:

Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing Techniques. 662-670 - Faisal Shehzad, Nadeem Javaid

, Usman Farooq, Hamza Tariq, Israr Ahmad, Sadia Jabeen:
IoT Enabled E-Business via Blockchain Technology Using Ethereum Platform. 671-683
The 8th International Workshop on Cloud Computing Project and Initiatives (CCPI-2020)
- Marta Catillo, Massimiliano Rak, Umberto Villano:

2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. 687-696 - Alfonso Marino

, Paolo Pariso
:
Digital Divide vs e-Government: Analyzing Italian Public Service. 697-708 - Beniamino Di Martino, Antonio Esposito, Stefania Nacchia

, Salvatore Augusto Maisto, Uwe Breitenbücher:
An Ontology for OASIS TOSCA. 709-719 - Giuseppe Ferretti, Gianluigi Renzi:

Unconventional Usage of a Web-Based Survey: Gathering Quality Data for Green Awareness in Lawmaking. 720-729 - Fiammetta Marulli, Emanuele Bellini, Stefano Marrone:

A Security-Oriented Architecture for Federated Learning in Cloud Environments. 730-741
The 7th International Workshop on Privacy and Security Intricacies on the Web (INTRICATE-SEC-2020)
- Motoharu Takahashi, Masaki Narita, Toshimitsu Inomata, Eiji Sugino:

Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication. 745-755 - Linhua Ding, Jiuru Wang, Yingkui Li, Wenyin Zhang:

On Security Information Interaction Model of Smart Grid Emergency System. 756-765 - Bacem Mbarek

, Stanislav Chren
, Bruno Rossi
, Tomás Pitner:
An Enhanced Blockchain-Based Data Management Scheme for Microgrids. 766-775 - Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:

Colluding Android Apps Detection via Model Checking. 776-786 - Swati Megha, Joseph Lamptey, Hamza Mohamed Salem, Manuel Mazzara:

A Survey of Blockchain-Based Solutions for Energy Industry. 787-797 - Hadda Ben Elhadj, Rihab Jmal

, Hajer Chelligue, Lamia Chaari Fourati
:
A2ISDIoT: Artificial Intelligent Intrusion Detection System for Software Defined IoT Networks. 798-809 - Stefania Loredana Nita

, Marius Iulian Mihailescu:
A Searchable Encryption Scheme Based on Elliptic Curves. 810-821 - Albandari Alsumayt

:
Control of DoS Attacks During Merging Process Over the Internet of Things. 822-833 - Hisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:

Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG. 834-844
The 7th International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe-2020)
- Massimo Ficco:

Comparing API Call Sequence Algorithms for Malware Detection. 847-856 - Nicola Cibin

, Meriem Guerar
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Towards a SIP-based DDoS Attack to the 4G Network. 857-866 - Luca Verderame

, Davide Caputo
, Mauro Migliardi
, Alessio Merlo:
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems. 867-876 - Navid Shaghaghi

, Zach Cameron, Nicholas Kniveton, Jesse Mayer, Will Tuttle, Peter Ferguson
:
ÂB: An Energy Aware Communications Protocol (EACP) for the Internet of Things (IoT). 877-889 - Lelio Campanile

, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni
, Francesco Mercaldo, Antonella Santone:
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources. 890-901
The 6th International Workshop on Engineering Energy Efficient Internet Worked Smart seNsors (E3WSN-2020)
- Zaib Ullah, Roberto Gagliardi, Orhan Gemikonakli

, Fadi Al-Turjman:
Network Lifetime Efficiency Based on Equal and Unequal Size Clustering Strategies. 905-916 - Matteo Micheletti, Roberto Gagliardi, Fausto Marcantoni, Alessandro Aloisio

:
Unequal Rotating Energy Efficient Clustering for Heterogeneous Devices (UREECHD). 917-925 - Serafino Cicerone

:
On Building Networks with Limited Stretch Factor. 926-936 - Alessandro Aloisio

:
Coverage Subject to a Budget on Multi-Interface Networks with Bounded Carving-Width. 937-946 - Renato De Leone, Leonardo Mostarda:

Optimal Cluster Head Rotation for Heterogeneous WSNs. 947-955
The 5th International Workshop on Big Data Processing in Online Social Network (BOSON-2020)
- Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone:

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques. 959-969 - Alessandra Amato

, Marco Giacalone
:
Analysis of Data for SCAN Project. 970-977 - Alessandra Amato

, Marco Giacalone
:
Data Management in the European Project SCAN. 978-983 - Antonino Ferraro

, Marco Giacalone
:
Representing Knowledge on the European Small Claims Procedure. 984-992 - Alessandra Amato

, Marco Giacalone
:
Quality Control in the Process of Data Extraction. 993-1002 - Roberto Canonico

, Giovanni Cozzolino, Antonino Ferraro
, Vincenzo Moscato, Antonio Picariello, Fabio Raimondo Sorrentino, Giancarlo Sperlì:
A Smart ChatBot for Specialist Domains. 1003-1010 - Francesca Esposito, Mariacristina Falco, Pierluigi Vitale:

Experiencing Museums A Qualitative and Quantitative Description About Igers' Narration of an Exhibit Space. 1011-1018 - Marco Balzano

, Walter Balzano, Loredana Sorrentino, Silvia Stranieri:
Smart Destination-Based Parking for the Optimization of Waiting Time. 1019-1027 - Walter Balzano, Chiara Pellecchia, Marco Balzano

:
Lectures Retrieval: Improving Students' E-learning Process with a Search Engine Based on ASR Model. 1028-1034
The 3rd International Workshop on Internet of Everything and Machine Learning Applications (IOEMLA-2020)
- Omar Darwish, Christopher M. Stone, Ola Karajeh, Belal Alsinglawi

:
Survey of Educational Cyber Ranges. 1037-1045 - Anderson B. de Lima, Bibek Gurung, Sardar M. Farhad:

Efficient App Based Smart Door Lock System Using Bluetooth. 1046-1055 - Hamza Malik, Sabin Sapkota, Sardar M. Farhad:

Reliable and Convenient Smart Light Control System Using Mobile App. 1056-1064 - Anju Rana

, Farshid Hajati:
A Survey on Privacy and Security in Mobile Cloud Computing. 1065-1076 - Mahmoud Elkhodr

, Jay K. Patel, Mehregan Mahdavi, Ergun Gide:
Prevention of Cross-Site Scripting Attacks in Web Applications. 1077-1086 - Alaa M. Allakany

, Geeta Yadav
, Kolin Paul, Koji Okamura:
Detection and Mitigation of LFA Attack in SDN-IoT Network. 1087-1096 - Maede Fotros, Javad Rezazadeh, Omid Ameri Sianaki

:
A Survey on VANETs Routing Protocols for IoT Intelligent Transportation Systems. 1097-1115
The 2nd International Workshop on Multi-Clouds and Mobile Edge Computing (M2EC-2020)
- Yiannis Verginadis

, Ioannis Patiniotakis, Marcin Prusinski, Marta Rózanska, Sebastian Thomas Schork
, Gregoris Mentzas:
A Security and Privacy-Preserving Path for Enhancing Information Systems that Manage Cross-Cloud Applications. 1119-1132 - Evgenia Psarra, Yiannis Verginadis

, Ioannis Patiniotakis, Dimitris Apostolou
, Gregoris Mentzas:
A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare Domain. 1133-1142 - Thomas Dreibholz

:
Flexible 4G/5G Testbed Setup for Mobile Edge Computing Using OpenAirInterface and Open Source MANO. 1143-1153 - Simon Kollberg, Ewnetu Bayuh Lakew, Petter Svärd, Erik Elmroth, Johan Tordsson:

Spreading the Heat: Multi-cloud Controller for Failover and Cross-Site Offloading. 1154-1164
The 2nd International Workshop on Artificial Intelligence and Machine Learning (AIMAL-2020)
- Afrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Nadeem Javaid

:
Short-Term Load Forecasting Using EEMD-DAE with Enhanced CNN in Smart Grid. 1167-1180 - Zahoor Ali Khan, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Nadeem Javaid

:
Short Term Electricity Price Forecasting Through Convolutional Neural Network (CNN). 1181-1188 - Muhammad Adil, Nadeem Javaid, Nazia Daood, Muhammad Asim, Irfan Ullah, Muhammad Bilal:

Big Data Based Electricity Price Forecasting Using Enhanced Convolutional Neural Network in the Smart Grid. 1189-1201 - Lei Zhou, Caiquan Xiong, Na Deng, Li Shen:

Personalized Recommendation Algorithm Based on User Preference and User Profile. 1202-1211 - Nazia Daood, Zahoor Ali Khan, Ashraf Ullah, Muhammad Jaffar Khan, Muhammad Adil, Nadeem Javaid

:
Electricity Price Forecasting Based on Enhanced Convolutional Neural Network in Smart Grid. 1212-1226 - Xi Chen, Caiquan Xiong, Na Deng:

Research on Friend Recommendation Based on Topic Model and Association Rules. 1227-1236
The 2nd International Workshop on Intelligent Computing and Measurements (InCM-2020)
- Shigeru Kato

, Tomomichi Kagawa, Naoki Wada, Takanori Hino, Hajime Nobuhara:
Citrus Brand Classification by CNN Considering Load and Sound. 1239-1249 - Cuong Nguyen Cong, Ricardo Rodríguez Jorge

, Nghien Nguyen Ba, Chuong Trinh Trong, Nghia Nguyen Anh:
Design of Optimal PI Controllers Using the Chemical Reaction Optimization Algorithm for Indirect Power Control of a DFIG Model with MPPT. 1250-1260 - Krzysztof Zatwarnicki

:
Intelligent HTTP Request Distribution Strategies in One and Two-Layer Architectures of Cloud-Based Web Systems. 1261-1273 - Piotr Milczarski

, Zofia Stawska
:
Classification of Skin Lesions Shape Asymmetry Using Machine Learning Methods. 1274-1286 - Agnieszka Landowska, Ben Robins:

Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism. 1287-1297 - Jolanta Wrzuszczak-Noga

, Leszek Borzemski
:
Prediction of Load Time for Different Agent Locations and Browsers. 1298-1307 - Jolanta Mizera-Pietraszko

, Jolanta Tancula, Ireneusz Jozwiak:
Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers. 1308-1320 - Michal Szczepanik

, Ireneusz J. Józwiak
, Piotr P. Józwiak
, Michal Kedziora
, Jolanta Mizera-Pietraszko
:
Android Hook Detection Based on Machine Learning and Dynamic Analysis. 1321-1329 - Martin Tabakov

, Bartosz Jablonski:
A New Region Growing Medical Image Segmentation Algorithm Based on Interval Type-2 Fuzzy Sets. 1330-1340
The 1st International Workshop on Smart and Sustainable Mobility (SSUM-2020)
- Rocco Aversa, Dario Branco

, Beniamino Di Martino, Salvatore Venticinque:
GreenCharge Simulation Tool. 1343-1351 - Marilisa Botte, Ilaria Tufano, Luca D'Acierno

:
Infrastructure Access Policies to Promote Sustainable Driving Behaviours in Railway Contexts. 1352-1361 - Mariano Gallo, Mario Marinelli

, Ivan Cavaiuolo:
The Effects of Accessibility on the Location of Manufacturing Companies: The Italian Case Study. 1362-1372 - Geir Horn

, Tomasz Przezdziek
, Monika Büscher
, Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino, Antonio Esposito, Pawel Skrzypek, Mark Leznik:
An Event-Driven Multi Agent System for Scalable Traffic Optimization. 1373-1382 - Armando Cartenì, Ilaria Henke

, Clorinda Molitierno, Assunta Errico:
Towards E-mobility: Strengths and Weaknesses of Electric Vehicles. 1383-1393 - Marit K. Natvig, Shanshan Jiang, Svein O. Hallsteinsen:

Stakeholder Motivation Analysis for Smart and Green Charging for Electric Mobility. 1394-1407 - Luigi Pariota, Luca Di Costanzo

, Francesco Spera, Gennaro Nicola Bifulco
:
Simulation Experiments for an Approximate Definition of the Macroscopic Fundamental Diagram. 1408-1417 - Walter Balzano, Aniello Murano

, Loredana Sorrentino, Silvia Stranieri:
Behavioral Clustering: A New Approach for Traffic Congestion Evaluation. 1418-1427

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














