


default search action
COINS 2021: Barcelona, Spain
- 2021 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2021, Barcelona, Spain, August 23-25, 2021. IEEE 2021, ISBN 978-1-6654-3156-9
- Sherifdeen Lawal, Ram Krishnan:
Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain. 1-6 - Davide Bacciu, Siranush Akarmazyan, Eric Armengaud
, Manlio Bacco, George Bravos, Calogero Calandra, Emanuele Carlini, Antonio Carta
, Pietro Cassarà, Massimo Coppola, Charalampos Davalas
, Patrizio Dazzi
, Maria Carmela De Gennaro, Daniele Di Sarli, Jürgen Dobaj, Claudio Gallicchio, Sylvain Girbal
, Alberto Gotta
, Riccardo Groppo, Vincenzo Lomonaco
, Georg Macher
, Daniele Mazzei, Gabriele Mencagli, Dimitrios Michail, Alessio Micheli
, Roberta Peroglio, Salvatore Petroni, Rosaria Potenza, Farank Pourdanesh, Christos Sardianos, Konstantinos Tserpes, Fulvio Tagliabo, Jakob Valtl, Iraklis Varlamis, Omar Veledar
:
TEACHING - Trustworthy autonomous cyber-physical applications through human-centred intelligence. 1-6 - Feiyang Cai, Ali Irmak Ozdagli, Nicholas Potteiger, Xenofon D. Koutsoukos:
Inductive Conformal Out-of-distribution Detection based on Adversarial Autoencoders. 1-6 - Ashwija Reddy Korenda, Sareh Assiri, Fatemeh Afghah, Bertrand Cambou:
An Error Correction Approach to Memristors PUF-based Key Encapsulation. 1-6 - Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Petru Eles, Zebo Peng:
Secure Cloud Control Using Verifiable Computation. 1-6 - Tiago Veiga, Erling Ljunggren, Kerstin Bach
, Sigmund Akselsen
:
Blind Calibration of Air Quality Wireless Sensor Networks Using Deep Neural Networks. 1-6 - Wataru Matsuda, Mariko Fujimoto, Yoshihiro Hashimoto, Takuho Mitsunaga
:
Cyber Security Risks of Technical Components in Industry 4.0. 1-7 - Neel Pradip Shah:
Design of a Reference Architecture for Serverless IoT Systems. 1-6 - Niko Lehto, Kimmo Halunen, Outi-Marja Latvala
, Anni Karinsalo
, Jarno Salonen:
CryptoVault - A Secure Hardware Wallet for Decentralized Key Management. 1-4 - Ivan da Silva Sendin, Rodrigo Sanches Miani:
Towards reliable and transparent vaccine phase III trials with smart contracts. 1-6 - Farshad Firouzi, Bahar J. Farahani
, Ehsan Panahi, Mojtaba Barzegari
:
Task Offloading for Edge-Fog-Cloud Interplay in the Healthcare Internet of Things (IoT). 1-8 - Ooi Sian En, Razvan Beuran, Yasuo Tan:
Secure IoT Development: A Maker's Perspective. 1-6 - Emanuel Regnath
, Markus Birkner, Sebastian Steinhorst
:
CISCAV: Consensus-based Intersection Scheduling for Connected Autonomous Vehicles. 1-7 - Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Similarity-Based Clustering For IoT Device Classification. 1-7 - Marcello Zanghieri
, Simone Benatti
, Alessio Burrello
, Victor Javier Kartsch Morinigo, Roberto Meattini, Gianluca Palli
, Claudio Melchiorri
, Luca Benini:
sEMG-based Regression of Hand Kinematics with Temporal Convolutional Networks on a Low-Power Edge Microcontroller. 1-6 - Atae Jafari-Tabrizi
, Dieter Paul Gruber:
Reinforcement-Learning-based Control of an Industrial Robotic Arm for Following a Randomly-Generated 2D-Trajectory. 1-6 - Mwrwan Abubakar
, Zakwan Jaroucheh, Ahmed Al-Dubai, Bill Buchanan
:
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. 1-7 - Salem Alqahtani, Murat Demirbas:
Bottlenecks in Blockchain Consensus Protocols. 1-8 - Özlem Altinay, Berna Örs
:
Instruction Extension of RV32I and GCC Back End for Ascon Lightweight Cryptography Algorithm. 1-6 - Kemal Turksonmez, Marcin Furtak, Mike P. Wittie, David L. Millman:
Two Ways Gas Price Oracles Miss The Mark. 1-7 - Marta Betti, Marinella Bertolotti, Tatiana Bolgeo, Alessio Bottrighi, Antonella Cassinari, Antonio Maconi, Costanza Massarino
, Marzio Pennisi, Emanuele Rava, Annalisa Roveta
:
A Preliminary Analysis of Hospitalized Covid-19 Patients in Alessandria Area: a machine learning approach. 1-6 - Ivanna Kramer, Raphael Memmesheimer, Dietrich Paulus:
Customer Interaction of a Future Convenience Store with a Mobile Manipulation Service Robot. 1-7 - Ahmed Ali Alhazmi
, Ghassen Kilani, William Allen, T. J. OConnor:
A Replication Study for IoT Privacy Preferences. 1-8 - Daniele Ambrosini, Alessandro Pirondi, Luca Vescovi
, Fabrizio Arbucci, Federico Gabba:
Feasibility study for the implementation of RFID technology in CFRPs component. 1-6 - Vita Santa Barletta
, Paolo Buono, Danilo Caivano, Giovanni Dimauro, Antonio Pontrelli:
Deriving Smart City Security From the Analysis of Their Technological Levels: a Case Study. 1-6 - Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Christof Pohl, Ramin Yahyapour
:
SmartSSO - A Deep Learning Platform for Automated Account Linkage in Federated Identity Management. 1-8 - Gabriel Galeote-Checa, Gabriella Panuccio, Bernabé Linares-Barranco, Teresa Serrano-Gotarredona:
Baseline Features Extraction from Microelectrode Array Recordings in an in vitro model of Acute Seizures using Digital Signal Processing for Electronic Implementation. 1-6 - Romain Liévin, Jean-Paul Jamont, David Hély:
CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems. 1-8 - Rupa Chiramdasu
, Gautam Srivastava, Sweta Bhattacharya
, M. Praveen Kumar Reddy
, Thippa Reddy Gadekallu
:
Malicious URL Detection using Logistic Regression. 1-6 - Ponlawat Weerapanpisit, Sergio Trilles, Joaquín Huerta, Marco Painho
:
Enabling Geospatial Context in an IoT Decentralised Reputation Management System using Ethereum Smart Contracts. 1-6 - Kun-Chih Jimmy Chen
, Tze-Ling Kuo:
A Unipolar-based Stochastic LIF Neuron Design for Low-cost Spiking Neural Network. 1-6 - Kotcharat Kitchat, Ching-Yu Lin, Min-Te Sun:
Defective Wafer Detection Using Sensed Numerical Features. 1-6 - Dimitrios Boursinos, Xenofon D. Koutsoukos:
Reliable Probability Intervals For Classification Using Inductive Venn Predictors Based on Distance Learning. 1-7 - Ege Korkan
, Miguel Romero Karam, Sebastian Kaebisch, Sebastian Steinhorst
:
Runtime Deployment, Management and Monitoring of Web of Things Systems. 1-6 - Leonardo Staglianò, Edoardo Longo, Alessandro E. C. Redondi
:
D-MQTT: design and implementation of a pub/sub broker for distributed environments. 1-6 - Alessio Burrello
, Moritz Scherer, Marcello Zanghieri
, Francesco Conti, Luca Benini:
A Microcontroller is All You Need: Enabling Transformer Execution on Low-Power IoT Endnodes. 1-6 - Giulia Milan
, Luca Vassio
, Idilio Drago
, Marco Mellia
:
RL-IoT: Reinforcement Learning to Interact with IoT Devices. 1-6 - Marco Braun, Moritz Luszek, Jan Siegemund, Kevin Kollek, Anton Kummert:
Quantification of Uncertainties in Deep Learning-based Environment Perception. 1-8 - Chun-Hsian Huang, Shao-Yu Yang, Wei-Ting Huang, Pei-Rong Wu:
An Edge AI based Robot System for Search and Rescue Applications. 1-6 - Luc Gerrits
, Edouard Kilimou, Roland Kromes, Lionel Faure, François Verdier:
A Blockchain cloud architecture deployment for an industrial IoT use case. 1-6 - Justin Amadeus Albert
, Pawel Glöckner, Bjarne Pfitzner
, Bert Arnrich:
Data Augmentation of Kinematic Time-Series From Rehabilitation Exercises Using GANs. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.