


default search action
1st IML 2017: Liverpool, UK
- Hani Hamdan, Djallel Eddine Boubiche, Fanny Klett:
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, IML 2017, Liverpool, United Kingdom, October 17-18, 2017. ACM 2017 - Rustem Dautov, Salvatore Distefano:
Three-level hierarchical data fusion through the IoT, edge, and cloud computing. 1:1-1:5 - Chrystinne Oliveira Fernandes, Felipe Baldino Moreira
, Simone Diniz Junqueira Barbosa
, Carlos José Pereira de Lucena:
What your EEG wearable sensors can tell about you? 2:1-2:10 - Konstantin Hopf
, Michael Kormann, Mariya A. Sodenkamp, Thorsten Staake:
A decision support system for photovoltaic potential estimation. 3:1-3:10 - Gregory Tsipenyuk, Jon Crowcroft:
An email attachment is worth a thousand words, or is it? 4:1-4:10 - Shaista Sabir, Usman Qamar, Tanveer Ahmed, Mubashir Ali:
A preconception gender assessment using data mining techniques based on implementation of natural laws & favoring factors. 5:1-5:8 - R. Amith, V. N. Manjunath Aradhya:
Linear projective approach for moving object detection in video. 6:1-6:4 - Arindam Giri, Subrata Dutta, Sarmistha Neogy, Keshav P. Dahal, Zeeshan Pervez
:
Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges. 7:1-7:12 - Yanguo Jing, Mark Eastwood, Bo Tan
, Alexandros Konios
, Abdul Hamid, Mark Collinson:
An intelligent well-being monitoring system for residents in extra care homes. 8:1-8:6 - José Ángel Concepción-Sánchez, Pino Caballero-Gil
, Jonay Suárez-Armas, Néstor Álvarez-Díaz:
Mobile application for elderly assistance in public transport. 9:1-9:7 - Hao-Ting Pai
, Hung-Wei Lai, Shuli Wang, Mei-Fang Wu, Yung-Ting Chuang:
Recommendations for mobile applications: facilitating commerce in google play. 10:1-10:6 - Nitin Mishra
, Vimal Mishra, Saumya Chaturvedi
:
Tools and techniques for solving cold start recommendation. 11:1-11:6 - Annalisa Cenci, Daniele Liciotti, Emanuele Frontoni, Primo Zingaretti, Virgilio Paolo Carnielli:
Movements analysis of preterm infants by using depth sensor. 12:1-12:9 - Nikolas Stege, Christoph Wegener, Tobias Basse, Frederik Kunze:
Mapping interest rate projections using neural networks under cointegration: an application from stress testing approaches. 13:1-13:5 - Mohamed Saouabi
, Abdellah Ezzati
:
A comparative between hadoop mapreduce and apache Spark on HDFS. 14:1-14:4 - Arindam Chaudhuri:
Hierarchical support vector regression for QoS prediction of network traffic data. 15:1-15:6 - Satyanarayana Vollala, Indrajeet S, B. Shameedha Begum, N. Ramasubramanian:
Evaluation of password encrypted key exchange authentication techniques: design approach perspective: evaluation of PAKE protocol. 16:1-16:9 - D. W. Russell:
Faults and flaws in the internet of things in manufacturing systems in small to medium enterprises: Panel discussion. 17:1-17:4 - Roberto Saia
, Salvatore Carta:
A fourier spectral pattern analysis to design credit scoring models. 18:1-18:10 - Dalal F. Aljebry, Sabeen Tahir
:
Internet of things routing technique survey. 19:1-19:7 - Ignacio Rodríguez-Rodríguez
, Miguel Ángel Zamora, José-Víctor Rodríguez:
On predicting glycaemia in type 1 diabetes mellitus patients by using support vector machines. 20:1-20:2 - Ayhan Demiriz
, Fatma Cantas:
Analyzing used-car web listings via text mining. 21:1-21:7 - Davide Bacciu, Stefano Chessa, Claudio Gallicchio, Alessio Micheli
:
On the need of machine learning as a service for the internet of things. 22:1-22:8 - Prodromos Kolyvakis, Min-Jung Yoo, Dimitris Kiritsis:
Knowledge as a service in the IoT era. 23:1-23:6 - Koppala Guravaiah
, Thivyavignesh Ramasamy Gurumurthy
, R. Leela Velusamy:
Vehicle monitoring using internet of things. 24:1-24:7 - Rahim Rahmani
, Theo Kanter:
Autonomous cooperative decision-making in massively distributed IoT via heterogenous networks. 25:1-25:5 - Haoyue Xue, Yuhong Li, Rahim Rahmani
, Theo Kanter, Xirong Que:
A mechanism for mitigating DoS attack in ICN-based internet of things. 26:1-26:10 - Amit Kushwaha, Shubham Chaudhary:
Review highlights: opinion mining on reviews: a hybrid model for rule selection in aspect extraction. 27:1-27:6 - Bin Xiao:
Self-evolvable knowledge-enhanced IoT data mobility for smart environment. 28:1-28:14 - Joël Colloc
, Relwendé Aristide Yameogo
, Peter F. Summons, Ying Shen
, Mira Park
, Janine E. Aronson:
EPICE an emotion fuzzy vectorial space for time modeling in medical decision. 29:1-29:7 - Francesco Lo Conti, Gabriele Minucci, Naser Derakhshan:
A regularized deep learning approach for image de-blurring. 30:1-30:5 - Rhishi Pratap Singh, Jitender Grover, Garimella Rama Murthy:
Self organizing software defined edge controller in IoT infrastructure. 31:1-31:7 - Aaron Boddy, William Hurst
, Michael Mackay, Abdennour El Rhalibi:
A study into data analysis and visualisation to increase the cyber-resilience of healthcare infrastructures. 32:1-32:7 - Seyyed Aref Razavi, Masoud Asadpour:
Word embedding-based approach to aspect detection for aspect-based summarization of persian customer reviews. 33:1-33:10 - Piotr Potiopa
, Michal Karwatowski
, Jerzy Duda
, Pawel Sasor, Maciej Wielgosz
, Bartlomiej Muzykiewicz:
Semantic search extension based on polish wordnet relations in business document exploration. 34:1-34:7 - Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. 35:1-35:8 - Ranjith Dinakaran, Graham Sexton, Huseyin Seker, Ahmed Bouridane, Richard Jiang
:
Image resolution impact analysis on pedestrian detection in smart cities surveillance. 36:1-36:8 - Hong Wang
, H. M. Abdul Aziz, Stanley E. Young, Sagar Patil:
Control of networked traffic flow distribution: a stochastic distribution system perspective. 37:1-37:7 - Witold Dzwinel
, Rafal Wcislo
, Magdalena Strzoda:
ivga: visualization of the network of historical events. 38:1-38:7 - Jonay Suárez-Armas, Pino Caballero-Gil
, Cándido Caballero-Gil:
Video surveillance robot powered by raspberry pi. 39:1-39:4 - Andres Azqueta-Gavaldon:
Financial investment and economic policy uncertainty in the UK. 40:1-40:4 - Sarmistha Neogy:
Information security: course. 41:1-41:8 - Hanaa F. Mahmood
, Baihua Li, Eran A. Edirisinghe:
Text localization in natural images through effective re-identification of the MSER. 42:1-42:9 - Partha Maji, Daniel Bates
, Alexandra W. Chadwick
, Robert D. Mullins
:
ADaPT: optimizing CNN inference on IoT and mobile devices using approximately separable 1-D kernels. 43:1-43:12 - Mohammed Nazeer, Garimella Rama Murthy, Rhishi Pratap Singh:
Leveling sectoring algorithm: lattice point problem quantification of energy saving. 44:1-44:7 - Moisés Lodeiro-Santiago, Cándido Caballero-Gil, Pino Caballero-Gil
:
Collaborative SQL-injections detection system with machine learning. 45:1-45:5 - Aparana Gupta, Anshul Garg, Namrata Rawat, Sandeep Chigurupati, U. Dinesh Kumar:
Every drop counts: unleashing the prospective locations for water harvesting using geospatial analytics. 46:1-46:13 - S. P. K. Karri, Debjani Chakraborty
, Ajoy Kumar Ray, Jyotirmoy Chatterjee:
Learning representations through ensemble of fuzzy c-means for identification of retinal pathologies. 47:1-47:6 - Filippo Malandra
, Steven Rochefort, Pascal Potvin, Brunilde Sansò:
A case study for M2M traffic characterization in a smart city environment. 48:1-48:9 - Hailah Al-Ballaa, Hmood Al-Dossari, Abdulrahman A. Mirza
:
Research area classification using wikipedia and information retrieval. 49:1-49:4 - Ahmad Khalil, Nader Mbarek, Olivier Togni:
Service level guarantee framework for IoT environments: full paper. 50:1-50:8 - AbdulMalik Al-Salman
, Haifa Alyahya
:
Arabic online handwriting recognition: a survey. 51:1-51:4 - Constantinos Mavridis, Ioannis N. Athanasiadis
:
Spatial classification with fuzzy lattice reasoning. 52:1-52:7 - Workneh Yilma Ayele, Gustaf Juell-Skielse
:
Social media analytics and internet of things: survey. 53:1-53:11 - Hemalatha Karnan
, Natarajan Sivakumaran
, M. Rajajeya kumar:
Classification of ventricular arrhythmias using feature ranking score algorithm. 54:1-54:7 - Hamid Mcheick
, Lokman Saleh, Hicham Ajami, Hafedh Mili:
HCES: helper context engine system to predict relevant state of patients in COPD domain using naïve bayesian. 55:1-55:10 - Asmaa Berdigh, Khalid El Yassini
:
Connected car overview: solutions, challenges and opportunities. 56:1-56:7 - Roman Ferrando, Paul Stacey
:
Classification of device behaviour in internet of things infrastructures: towards distinguishing the abnormal from security threats. 57:1-57:7 - Seema F. Al Raisi, Eran A. Edirisinghe:
A machine learning based approach to human observer behaviour analysis in CCTV video analytics & forensics. 58:1-58:10 - Lamyaa Sadouk, Taoufiq Gadi
, El Hassan Essoufi
:
Handwritten tifinagh character recognition using deep learning architectures. 59:1-59:11 - William Oliff, Avgoustinos Filippoupolitis, George Loukas
:
Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems. 60:1-60:10 - Pramod Kumar Singh, Kanaparthy Sai Vivek, Shirisha Kodimala:
Stylometric analysis of E-mail content for author identification. 61:1-61:8 - Sarah Osama
, Essam H. Houssein
, Aboul Ella Hassanien, Aly A. Fahmy:
Forecast of wind speed based on whale optimization algorithm. 62:1-62:9 - De-Thu Huynh, Dung Ong Mau
, Chu Hong Hai:
EEO-AGA: energy efficiency optimisation in D2D communications using adaptive genetic algorithm. 63:1-63:6 - Vincent A. Balogun, Omonigho B. Otanocha, Bankole I. Oladapo
:
Development of smart linear velocity measuring device by embedding sensors with the arduino microcontroller. 64:1-64:5 - Leticia Arco
, Gladys Casas, Ann Nowé
:
Clustering methodology for smart metering data based on local and global features. 65:1-65:13 - Ehizojie Ojie, Ella Pereira
:
Simulation tools in internet of things: a review. 66:1-66:7 - Adnan Ullah, Usman Qamar
, Farhan Hassan Khan
, Saba Bashir
:
Dimensionality reduction approaches and evolving challenges in high dimensional data. 67:1-67:8 - Kamer Vishi
, Audun Jøsang
:
A new approach for multi-biometric fusion based on subjective logic. 68:1-68:9 - Jamal Benrabha, Farid Meziane
:
Automatic ROI detection and classification of the achilles tendon ultrasound images. 69:1-69:7 - Mohammed Zaki Shbier, Ku Ruhana Ku-Mahamud
, Mahmod Othman
:
SWGARCH model for time series forecasting. 70:1-70:5 - Artus Krohn-Grimberghe, Akriti Gupta
, Aman Chadha
, Ranjana Vyas:
Cloud computing in optimizing supply chain management of automotive component industry. 71:1-71:3 - Kaizhu Huang, Haochuan Jiang, Xu-Yao Zhang:
Field support vector machines. 72:1-72:12 - Néstor Álvarez-Díaz, Jordi Herrera-Joancomartí
, Pino Caballero-Gil
:
Smart contracts based on blockchain for logistics management. 73:1-73:8 - Aya Salama, Aboul Ella Hassanien, Aly A. Fahmy:
Iris features segmentation for arabian horses identification. 74:1-74:5 - Yasser Baeshen, Wafi Al-Karaghouli, Ahmad Ghoneim:
Investigating the effect of website quality on eWOM and customer purchase decision: third parties hotel websites. 75:1-75:5 - Hani Hamdan, Pierre Vigier, Frédéric Wantiez:
Data representation in sentiment analysis task. 76:1-76:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.