the proceedings contain 25 papers. the topics discussed include: pattern-based modeling, integration, and deployment of microservice architectures;open source software development process: a systematic review;explaina...
ISBN:
(纸本)9781728164731
the proceedings contain 25 papers. the topics discussed include: pattern-based modeling, integration, and deployment of microservice architectures;open source software development process: a systematic review;explainable queries over event logs;verifying compliance of process compositions through certification of its components;end-to-end production process orchestration for smart printing factories: an application in industry;how business process benchmarks enable organizations to improve performance;TOSCA4QC: two modeling styles for TOSCA to automate the deployment and orchestration of quantum applications;and assessing resilience in enterprise architecture: a systematic review.
the proceedings contain 15 papers. the topics discussed include: a NLP based framework to support document verification-as-a-service;an extensible meta-modeling assistant;apriori and sequence analysis for discovering ...
ISBN:
(纸本)9781467398855
the proceedings contain 15 papers. the topics discussed include: a NLP based framework to support document verification-as-a-service;an extensible meta-modeling assistant;apriori and sequence analysis for discovering declarative process models;combining network measures and expert knowledge to analyze enterprise architecture at the component level;decentralized enforcement of artifact lifecycles;generating domain-specific process studios;informed active learning to aid domain experts in modeling compliance;process- and resource-aware information systems;product line architecture for automatic evolution of multi-tenant applications;retrieving resource availability insights from event logs;and root cause analysis through abduction in Markov logic networks.
the proceedings contain 57 papers. the topics discussed include: paradigm shift of telecommunications services and management for next generation networks (NGN);user-centered agents for structured information location...
详细信息
ISBN:
(纸本)076952558X
the proceedings contain 57 papers. the topics discussed include: paradigm shift of telecommunications services and management for next generation networks (NGN);user-centered agents for structured information location on the Web;extended influence diagrams for enterprise architecture analysis;a performance evaluation of Web service security;a model driven framework for enterprise Web services;bridging multi-agent systems and Web services;estimating structures of business process models from execution logs;structural patterns for soundness of business process models;combining analysis of unstructured workflows with transformation to structured workflows;towards transactional pervasive workflows;secure dissemination of XML content using structure-based routing;and specifying and controlling multi-channel Web interfaces for enterprise applications.
the proceedings contain 23 papers. the topics discussed include: on notification message re-broadcasting for the node-disjoint multipath routing method in ad hoc networks to counter eavesdropping of data packets;an al...
ISBN:
(纸本)9781467373036
the proceedings contain 23 papers. the topics discussed include: on notification message re-broadcasting for the node-disjoint multipath routing method in ad hoc networks to counter eavesdropping of data packets;an alloy verification model for consensus-based auction protocols;a proposal for mobile collaborative work support platform using an embedded data stream management system;using genetic programming to identify tradeoffs in self-stabilizing programs: a case study;ensuring cloud service guarantees via service level agreement (SLA)-based resource allocation;Tengu: an experimentation platform for big data applications;making WiFi work in multi-hop topologies: automatic negotiation and allocation of airtime;expressing different traffic models using the LegoTG framework;providing a high level abstraction for SDN networks in GENI;in-network dynamic pathlet switching with VIRO for SDN networks;and selection of virtual machines based on classification of MapReduce jobs.
the k-hop query represents a fundamental challenge in various graph applications, often supported by numerous distributedsystems. the conventional approach to this query paradigm typically involves iterative layer-by...
详细信息
the proceedings contain 72 papers. the topics discussed include: distributed algorithm to improve coverage for mobile swarms of sensors;efficient wireless recharging in sensor networks;improving the dependability of s...
the proceedings contain 72 papers. the topics discussed include: distributed algorithm to improve coverage for mobile swarms of sensors;efficient wireless recharging in sensor networks;improving the dependability of sensornets;iterative security risk analysis for network flows based on provenance and interdependency;GreenSensing: a fine grained power monitoring system for a network of computers;multiple sensor skewed covariance target localization;a trust-based recruitment framework for multi-hop social participatory sensing;trade-offs of forecasting algorithm for extending WSN lifetime in a real-world deployment;low-power self-energy meter for wireless sensor network;distributive model-based sensor fault diagnosis in wireless sensor networks;the analysis of temperature, depth, salinity effect on acoustic speed for a vertical water column;event prediction and modeling of variable rate sampled data using dynamic Bayesian networks;and imaging seismic tomography in sensor network.
this work proposes a real-time sentiment analysis pipeline on customer feedback using Yelp and addresses the high-volume dynamic user-generated contents processing problem. the proposal integrates state-of-the-art mac...
详细信息
the proceedings contain 79 papers. the topics discussed include: plant health app: a tool for plant enthusiasts;supercapacitor based STATCOM for enhancing power quality in grid-connected photovoltaic systems;dynamic a...
ISBN:
(纸本)9798350350593
the proceedings contain 79 papers. the topics discussed include: plant health app: a tool for plant enthusiasts;supercapacitor based STATCOM for enhancing power quality in grid-connected photovoltaic systems;dynamic and static wireless charging of EVs using solar energy;development of CheXNet-based web application to detect pneumonia using chest x-ray images;machine learning and deep learning for knee osteoarthritis diagnosis: a survey on classification and severity grading;gesture-enhanced presentation control for education;dynamic surveillance : integration of VGG and ResNET;smart garbage sorting system: integrating robotic arm and machine learning for segregation;NURTURHUB: a smart maternal health monitoring device for postpartum depression;and implementation of digital FIR filter using optimized hybrid arithmetic unit.
the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transfor...
ISBN:
(纸本)9780769533384
the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transformations;service level management in global enterprise services: from QoS monitoring and diagnostics to adaptation, a case study;metadata support for transactional Web services;Web services interfaces and open standards integration into the European UNICORE 6 grid middleware;usage tracking components for service-oriented middleware systems;alignment of authentication information for trust federation;an economy driven resource allocation middleware for grid workflow;towards a privacy policy enforcement middleware with location intelligence;and network-centric middleware for service oriented architectures across heterogeneous embedded systems.
Federated Learning (FL) is vulnerable to backdoor attacks through data poisoning if the data is not scrutinized, as malicious participants can inject backdoor triggers in normal samples, leading to poisoned updates. D...
详细信息
暂无评论