Mehrnoosh Monshizadeh, Vikramajeet Khatri, R. Kantola, Zheng Yan
{"title":"An Orchestrated Security Platform for Internet of Robots","authors":"Mehrnoosh Monshizadeh, Vikramajeet Khatri, R. Kantola, Zheng Yan","doi":"10.1007/978-3-319-57186-7_23","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_23","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guanghui Zhao, Xingyan Zi, K. Liang, Panyi Yun, Junwei Zhou
{"title":"A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes","authors":"Guanghui Zhao, Xingyan Zi, K. Liang, Panyi Yun, Junwei Zhou","doi":"10.1007/978-3-319-57186-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_18","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"193 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Silvio Barra, M. De Marsico, M. Nappi, F. Narducci, D. Riccio
{"title":"MOHAB: Mobile Hand-Based Biometric Recognition","authors":"Silvio Barra, M. De Marsico, M. Nappi, F. Narducci, D. Riccio","doi":"10.1007/978-3-319-57186-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_9","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video Clips","authors":"Chiara Galdi, M. Nappi, J. Dugelay","doi":"10.1007/978-3-319-57186-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_2","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru-Valentin Vladuta, I. Bica, V. Patriciu, Florin Pop
{"title":"Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles","authors":"Alexandru-Valentin Vladuta, I. Bica, V. Patriciu, Florin Pop","doi":"10.1007/978-3-319-57186-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_25","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Manzalini, M. Girolamo, Giuseppe Celozzi, Fulvio Bruno, Giuliana Carullo, M. Tambasco, G. Carrozzo, Fulvio Risso, Gabriele Castellano
{"title":"A Unifying Orchestration Operating Platform for 5G","authors":"A. Manzalini, M. Girolamo, Giuseppe Celozzi, Fulvio Bruno, Giuliana Carullo, M. Tambasco, G. Carrozzo, Fulvio Risso, Gabriele Castellano","doi":"10.1007/978-3-319-57186-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_20","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134302315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Framework for Predicting State War Engagement from Territorial Data","authors":"G. Acampora, G. Tortora, A. Vitiello","doi":"10.1007/978-3-319-57186-7_51","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_51","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Trovati, W. Thomas, Quanbin Sun, Georgios Kontonatsios
{"title":"Assessment of Security Threats via Network Topology Analysis: An Initial Investigation","authors":"M. Trovati, W. Thomas, Quanbin Sun, Georgios Kontonatsios","doi":"10.1007/978-3-319-57186-7_31","DOIUrl":"https://doi.org/10.1007/978-3-319-57186-7_31","url":null,"abstract":"","PeriodicalId":225531,"journal":{"name":"Grid and Pervasive Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}