Wednesday Juin 27 2018
|
|
|
|
|
|
|
|
Room1
|
|
|
|
|
|
|
|
|
8 :00
|
Registration
|
PSB Receiption Hall
|
|
|
09:00
|
Welcome Speech
|
Research Director of Paris School of Business and WETICE2018 General
Chair
|
|
|
09:30
|
Keynote
|
Pr. Riza Sulaiman - University Kebangsaan
Malaysia, UKM
|
Measuring Soft Organs in
Human Body: Issues and Challenges
|
|
10:30
|
coffee
break
|
|
|
|
11:00
|
ACEC
|
Claudia Di
Napoli, Marco Valentino, Luca Sabatucci
and Massimo Cossentino
|
Adaptive Workflows of
Home-Care Services
|
|
|
|
Kurt Byrne and Cesar Marin
|
Human Trust in Robots When Performing a Service
|
|
|
|
Marwa Mokni, Jaleleddine Hajlaoui and Zaki Brahmi
|
SMA-based Approach for Scheduling Intensive Workflows in Cloud computing
|
|
|
|
|
|
|
12:30
|
lunch
break
|
|
|
|
14:00
|
CDCGM
|
Valentina Casola, Umberto Villano,
Alessandra De Benedictis and Massimiliano Rak
|
Towards Automated Penetration Testing for Cloud Applications
|
|
|
|
Amel Ksentini, Maha Jebalia and Sami Tabbane
|
Survey on Architectual and Energetic Aspects on
Fog Computing Environment
|
|
|
|
Alessandro
Di Stefano, Antonella Di Stefano, Giovanni Morana
and Daniele Zito
|
Coope4M: A deployment framework for Communication-Intensive applications
on Mesos
|
|
|
|
Wael Sellami, Hatem Hadj Kacem and Ahmed Hadj Kacem
|
Elastic Multi-tenant Business Process Based on Temporal Constraints
|
|
15:30
|
coffee
break
|
|
|
|
16:00
|
CDCGM
|
Wafa Ben Slama, Zaki Brahmi and Mohamed
Mohsen Gammoudi
|
Interference-Aware Virtual Machine Placement in Cloud Computing system
approach based on Fuzzy Formal Concepts Analysis
|
|
|
|
|
|
|
|
|
Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi and Sami
Tabbane
|
A Fair Resource Allocation Approach in Cloud Computing Environments
|
|
20:00
|
|
GALA DINNER
|
|
|
|
|
|
|
|
Room2
|
|
|
|
11:00
|
AROSA
|
Hichem Ben
Abdallah, Takoua Abdellatif
and Faouzi Chekir
|
Hydle : a
Deployment Framework for Efficient IoT Surveillance
Systems
|
|
|
|
Rymel Benabidallah, Salah Sadou and
Ahmed Nacer Mohamed
|
Using Systems of Systems's States for
Identifying Emergent Misbihaviors
|
|
|
|
Sana Nadouri, Yassine
Ouhammou, Zaidi Sahnoun
and Allel Hadjali
|
Towards a multi-agent approach for distributed decision support systems
|
|
12:30
|
lunch
break
|
|
|
|
14:00
|
AROSA
|
Abderrahim Ait Wakrime,
J Paul Gibson and Jean-Luc Raffy
|
Formalising the
Requirements of an E-Voting Software Product Line using Event-B
|
|
|
|
Yessin M. Neggaz and Soufian Toufga
|
Temporal Property Testing in Dynamic Networks: Application to
Software-Defined Vehicular Networks
|
|
|
|
Sofiane
Ait Arab, Karim Benouaret,
Djamal Benslimane and Salim Berbar
|
Two-layer recommendation-based Real Time Bidding (RTB)
|
|
15:30
|
coffee
break
|
|
|
|
16:00
|
SSTM
|
Mian Muhammad
Waseem Iqbal, Subas Khan, Imran Rashid and Bilal
Rauf
|
DECENTRALIZED AUTHENTICATION FOR SECURE CLOUD DATA SHARING
|
|
|
|
Ihsen Nakouri, Mohamed Hamdi and Tai-Hoon Kim
|
A key management scheme for IoT-based video
surveillance systems based on fingerprints
|
|
|
|
|
|
|
|
|
Naeem Amjad, Muhammad Faisal Amjad, Hammad Afzal and Farrukh Aslam
Khan
|
A Multi-Classifier Framework for Open Source Malware Forensics
|
|
|
|
Mounia Zaydi and
Bouchaib Nassereddine
|
A new approach of Information System Security Governance: A proposition
of the continuous improvement process model of information system security
risk management - 4D-ISS
|
|
20:00
|
|
GALA DINNER
|
|
|
|
|
|
|
|
|
|
|
|
Thursday Juin 28
2018
|
|
|
|
|
|
|
|
Room1
|
|
|
|
09:30
|
Keynote
|
Pr. Khalil Drira - LAAS-CNRS, Université de Toulouse, France
|
Semantic-enabled IoT
Systems: an overview of recent initiatives and future directions
|
|
10:30
|
coffee
break
|
|
|
|
11:00
|
COMETS
|
Alberto Falcone, Alfredo Garro, Andrea D'Ambrogio and Andrea Giglio
|
A Model-Driven Method to Enable the Distributed Simulation of BPMN Models
|
|
|
|
Yentl Van Tendeloo and Hans Vangheluwe
|
Unifying Model and Screen Sharing
|
|
|
|
Kawtar Ougaabal, Greg Zacharewicz,
Yves Ducq and Said Tazi
|
Functionnal and Non-Functionnal BPMN M&S at Design Time
|
|
|
|
|
|
|
12:30
|
lunch
break
|
|
|
|
14:00
|
DEW
|
Wala Rebhi, Nesrine Ben Yahia and Narjčs Bellamine Ben Saoud
|
Discovering stable communities in dynamic multilayer social networks
|
|
|
|
Hossein Mohammadhassanzadeh, Samina Abidi, William Van Woensel and Syed Sibte Raza Abidi
|
Investigating Plausible Reasoning over Knowledge Graphs for
Semantics-based Health Data Analytics
|
|
|
|
Avimanyu Mukhopadhyay and Kemafor Anyanwu
|
Efficient and Scalable Exploratory Search on Big Knowledge Graphs Using
Apache Spark
|
|
|
|
Alexander Askinadze
|
How to deal with data privacy in Education Data Mining? An approach to
the transparent handling of student data and dealing with the resulting missing
value problem
|
|
15:30
|
cofee break
|
|
|
|
16:00
|
DEW
|
Nunziato Cassavia, Elio Masciari, Chiara
Pulice and Domenico Sacca'
|
Evaluating the Influence of User Searches on Neighbors
|
|
|
|
Doaa Hassan
|
A Text Mining Approach for Evaluating Event Credibility on Twitter
|
|
|
|
Haris Supic
|
Case-based Reasoning Model for Personalized Learning Path Recommendation
in Example-based Learning Activities
|
|
|
Room2
|
|
|
|
11:00
|
SSCIOT
|
Jaweher Zouari, Mohamed Hamdi and Tai-Hoon Kim
|
Privacy Preserving Profile Matching Protocol for Human-Centric Social
Internet of Things
|
|
|
|
Yacine Challal, Fatima Zohra Benhamida
and Omar Nouali
|
Scalable Key Management for Elastic Security Domains in Fog networks
|
|
|
|
Aymen Yahyaoui, Takoua Abdellatif and Rabah Attia
|
READ: Reliable Event and Anomaly Detection System in Wireless Sensor
Networks
|
|
|
|
Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi and Kim Tai-Hoon
|
Secured Distributed IoT Based Supply Chain
Architecture
|
|
12:30
|
lunch
break
|
|
|
|
14:00
|
CONESEC
|
Bassem Hadjkacem, Walid Ayedi, Hichem Snoussi and Mohamed Abid
|
Multi-shot Human Re-identification for the Security in Video Surveillance
Networks
|
|
|
|
Haifa Gmati
and Amira Mouakher
|
Fast and compact cover extraction from big formal contexts
|
|
|
FISA
|
Marwa Boulakbech, Nizar Messai, Yacine Sam and Thomas Devogele
|
Configuring RESTful Web Services for Personalized Trip Planning
|
|
|
SOFTNET
|
Emna Taktak, Mohamed Tounsi, Mohamed
Mosbah and Ahmed Hadj Kacem
|
Proving Distributed Algorithms for Wireless Sensor Networks by Combining
Refinement and Local Computations
|
|
15:30
|
coffee
break
|
|
|
|
16:00
|
VSC
|
Marcus Mikulcak, Paula Herber,
Thomas Göthel and Sabine Glesner
|
Information Flow Analysis of Combined Simulink/Stateflow
Models
|
|
|
|
Luigi Novella, Manuela Tufo and
Giovanni Fiengo
|
Improving Test Suites via a Novel Testing with Model Learning Approach
|
|
|
|
Tobias Pfeffer, Paula Herber, Lucas Druschke
and Sabine Glesner
|
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate
Language
|
|
|
|
Andrea Di Stefano, Andrea Fornaia, Emiliano Tramontana and Gabriella Verga
|
Detecting Android Malware According to Observations on User Activities
|
|
|
|
Fabio Martinelli, Francesco Mercaldo,
Vittoria Nardone, Albina Orlando, Antonella Santone
and Gigliola Vaglini
|
Safety Critical Systems Formal Verification using Execution Traces
|
|
|
|
|
|
|
|
|
|
|
|
Friday Juin 29 2018
|
|
|
Room1
|
|
|
|
09:00
|
WEB2TOUCH
|
Mariagrazia Fugini, Anum Javaid, Imran Rashid and Haider
Abbas
|
Ease or Privacy? A Comprehensive Analysis on Android Embedded Adware
|
|
|
|
Andrey Justo, Felipe Rodrigues Jensen, Julio Reis, Ivo Calado and Rodrigo Bonacin
|
Exploring Ontologies to Improve the Empathy of Interactive Bots
|
|
|
|
Mariagrazia Fugini
and Jacopo Finocchi
|
Innovative Big Data Analytics: A System for Document Management
|
|
|
|
Fatiha
Saďs, Rallou Thomopoulos
and Andreson Carlos Ferreira Da Silva
|
Argumentation-based Explanation of Linked Data Fusion
|
|
|
|
Julio Cesar Dos Reis, Rodrigo Bonacin, Andreiwid Sheffer Corręa, Francisco Edeneziano Dantas Pereira, Ivo Pierozzi
Junior, Jarbas Lopes Cardoso Junior, Katia Regina Evaristo de Jesus, Olga Fernanda Nabuco
and Sérgio Alves Torquato
|
A Framework for Designing Cognitive Assistants to Support Agricultural
Production Systems
|
|