default search action
WETICE 2023: Paris, France
- IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2023, Paris, France, December 14-16, 2023. IEEE 2023, ISBN 979-8-3503-5043-2
- Fidma Mohamed Abdelillah, Hamour Nora, Samir Ouchani, Sidi Mohamed Benslimane:
Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature Review. 1-6 - Leila Bouchrit, Sajeh Zairi, Ikbal Chammakhi Msadaa, Amine Dhraief, Kahlil Drira:
Flying to the Rescue: UAV-Assisted Urgent Alert Transmission in VANET. 1-6 - Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk:
Enhancing Cyber Threat Intelligence Through Supervised Machine Learning: A Comprehensive Classification Approach. 1-8 - Seyf Eddine Hasnaoui, Mohammed Amine Boudouaia, Samir Ouchani, Abdellatif Rahmoun:
DLSTM-SCM- A Dynamic LSTM-Based Framework for Smart Supply Chain Management. 1-6 - Kawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa:
Unveiling the Software Supply Chain Paradigm: Architecture, Actors, Challenges, and Security Perspectives. 1-7 - Nassim Zaouia, Kheyreddine Djouzi, Mehammed Daoui:
Collisions-Resistant Hash Function Based on a Logistics Map. 1-6 - Floribert Katembo Vuseghesa, Mohamed-Lamine Messai:
Study on Poisoning Attacks: Application Through an IoT Temperature Dataset. 1-6 - Charaf Eddine Dridi, Nabil Hameurlain, Faiza Belala:
A Maude-Based Formal Approach to Control and Analyze Time-Resource Aware Missioned Systems-of-Systems. 1-6 - Daliton da Silva, Dimas Cassimiro Nascimento Filho, Camila Dantas, Paulo Maciel:
Enhancing Augmented Reality Performance: An Exploration of Edge Computing and Code Offloading in Collaborative AR Systems. 1-6 - David Novoa-Paradela, Oscar Fontenla-Romero, Bertha Guijarro-Berdiñas, Diego Orellana-Cañás:
A Federated Learning Architecture for Anomaly Detection on the Edge Using Deep Autoencoders. 1-6 - Ma'en Saleh:
Security-based Multipath Route Switching Protocol for Quality-of-Service Enhancement in VANETs using Wiedemann Car-Following Model. 1-6 - Zicheng Xu, Ao Liu:
Virtual Collaborative Assembly System Based on Unity. 1-6 - Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:
COVID-19 Patient Secure Classification Based on ANN and Risk Analysis. 1-7 - Eyad K. Almaita:
Harmonic Pollution in Distribution Transformers: Evaluating the Effects of Pv Solar Installations in Jordan's Electrical Grid. 1-5 - Houda Khlif, Hatem Hadj Kacem, Ojilvie Avila-Cortés, Saúl E. Pomares Hernández, Julio Cesar Perez Sansalvador, Lil María Rodríguez-Henríquez:
Unraveling Spatio-Temporal Behavior in Collaborative Cyber-Physical Systems Inspired by Social Insects. 1-6 - Fabio Salice, Federico Simoni, Giovanni Castiglioni, Andrea Masciadri, Mariagrazia Fugini, Sara Comai:
waterFSA: A Contact-Less Water Flow Source Analyzer for the Household to Enable HAR and ADL Recognition. 1-6 - Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes:
An Hybridization of LSTM and Random Forest Model to Predict Road Situation. 1-7 - Andrea Pelosi, Claudio Felicioli, Andrea Canciani, Fabio Severino:
A Hybrid-DLT Based Trustworthy AI Framework. 1-6 - Tidiane Sylla, Mohamed Aymen Chalouf, Léo Mendiboure, Francine Krief, Hasnaâ Aniss, Lylia Alouache:
Applying Fuzzy Logic to Efficiently Manage Shared Edge Infrastructure. 1-6 - Mariem Bousaid, Safa Kaabi, Amine Dhraief, Khalil Drira:
Unlocking the Power of Reinforcement Learning: Investigating Optimal Q-Learning Parameters for Routing in Flying Ad Hoc Networks. 1-6 - Fidma Mohamed Abdelillah, Hamour Nora, Samir Ouchani, Sidi Mohamed Benslimane:
Predictive Maintenance Approaches in Industry 4.0: A Systematic Literature Review. 1-6 - Chengyi Qu, Chaise Ballotti, Daniel De Sousa, Jiaqing Liu:
Intelligent UAS-Edge-Server Collaboration and Orchestration in Disaster Response Management. 1-6 - Corrado Santoro, Federico Fausto Santoro:
LWN Simulator - A LoRaWAN Network Simulator. 1-6 - Kawouther Thabet, Jihen Bennaceur, Salma Hamza, Raoudha Ben Jemaa, Wissem Zouaghi:
Securing the Software Supply Chain: A New Taxonomy for Attack Classification. 1-8 - Joseph Merhej, Hassan Harb, Abdelhafid Abouaissa, Lhassane Idoumghar:
DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE System. 1-6 - Frikha Hounaida, Larbi Chrifi-Alaoui, Odette Fokapu, Amel Meddeb-Makhlouf, Faouzi Zarai:
QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients. 1-6 - Md Masum Musfique, Tanvir Ahmed Aadeef, Md. Samiur Rahman, Monosij Kanti Sarkar, Md Fahad Monir:
Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification. 1-6 - Rim Ben Fekih, Mariam Lahami, Mohamed Jmaiel, Salma Bradai:
Formal Verification of Smart Contracts Based on Model Checking: An Overview. 1-6 - Angelo Ferrando, Vadim Malvone, Aniello Murano, Silvia Stranieri:
HYASM: A Tool to Verify Hierarchical Systems. 1-6 - David Melo, Saúl E. Pomares Hernández, Lil María Rodríguez-Henríquez, Julio Cesar Perez Sansalvador:
Bitcoin Transactions Types and Their Impact on Storage Scalability. 1-6 - Salah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia, Mimoune Malki:
A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical Systems. 1-6 - Ala Arman, Emiliano Di Reto, Massimo Mecella, Giuseppe Santucci:
An Approach for Software Development Effort Estimation Using ChatGPT. 1-7 - Simone Dallospedale, Mattia Alex Leoni, Stefania Monica, Federico Bergenti:
Experiments on Accurate Indoor Positioning Using the Whale Optimization Algorithm. 1-6 - Felipe Jesus, Rodrigo Rocha, Igor Medeiros Vanderlei, Jean Araujo, Fred Freitas:
Design Thinking Evidence in Software Development: Results from a Systematic Mapping. 1-6 - Asma Hamissi, Amine Dhraief, Layth Sliman:
On Safety of Decentralized Unmanned Aircraft System Traffic Management Using Blockchain. 1-6 - Pedro Melo, Lucas Gama, Jamilson Dantas, David Beserra, Jean Araujo:
Performance Evaluation of Container Management Tasks in OS-Level Virtualization Platforms. 1-6 - Deepak Sharma, Muhammad Asif Suryani, Steffen Strohm, Matthias Renz:
Synergize Multidisciplinary Research via Research Data Management. 1-6 - Salah Eddine Elgharbi, Samir Ouchani, Mohammed Amine Boudouaia, Mimoune Malki:
A Smart Mining Strategy for Blockchain-Enabled Cyber-Physical Systems. 1-6 - Camila Dantas, Pablo Pessoa do Nascimento, João Ferreira, Paulo Maciel, Jamilson Dantas:
DDoS Detection Based on Hardware Performance Counters Selection. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.