The proceedings contain 137 papers. The topics discussed include: mediation without a global schema - matching queries and local schemas through an ontology;web federates - towards a middleware for highly scalable pee...
ISBN:
(纸本)9789728865474
The proceedings contain 137 papers. The topics discussed include: mediation without a global schema - matching queries and local schemas through an ontology;web federates - towards a middleware for highly scalable peer-to-peer services;knowledge management for adapted information retrieval in ubiquitous environments;instances navigation for querying integrated data from web-sites;CWS-transactions: an approach for composing web services;RSA-padding signatures with attack studies;annals and a perspective of architectural styles and architectural patterns within the context of large complex web-based systems;are learning repositories likely to become mainstream in education?;mobile- and virtual factors in existential learning;analysis of positive incentives for protecting secrets in digital rights management;pitfalls and potentials of social software in higher education;and open source software in the desktop: the perspective of the public administrations in UK.
The proceedings contain 137 papers. The topics discussed include: mediation without a global schema - matching queries and local schemas through an ontology;web federates - towards a middleware for highly scalable pee...
ISBN:
(纸本)9789728865467
The proceedings contain 137 papers. The topics discussed include: mediation without a global schema - matching queries and local schemas through an ontology;web federates - towards a middleware for highly scalable peer-to-peer services;knowledge management for adapted information retrieval in ubiquitous environments;instances navigation for querying integrated data from web-sites;CWS-transactions: an approach for composing web services;RSA-padding signatures with attack studies;annals and a perspective of architectural styles and architectural patterns within the context of large complex web-based systems;are learning repositories likely to become mainstream in education?;mobile- and virtual factors in existential learning;analysis of positive incentives for protecting secrets in digital rights management;pitfalls and potentials of social software in higher education;and open source software in the desktop: the perspective of the public administrations in UK.
The proceedings contain 120 papers. The topics discussed include: teamwork on the road: efficient collaboration in VANETs with context-based grouping;RFID service for non-RFID enabled devices: embedded hardware implem...
The proceedings contain 120 papers. The topics discussed include: teamwork on the road: efficient collaboration in VANETs with context-based grouping;RFID service for non-RFID enabled devices: embedded hardware implementation;a simulator for generating and visualizing sensor data for ambient intelligence environments;towards ambient communication support for power grid maintenance and repair;wireless sensor network based wildfire hazard prediction system modeling;unsupervised clustering of web sessions to detect malicious and non-malicious website users;SurvSec: a new security architecture for reliable network recovery from base station failure of surveillance WSN;a novel approach to video copy detection using audio fingerprints and PCA;challenges in the implementation and simulation for wireless side-channel based on intentionally corrupted FCS;and towards augmenting federated wireless sensor networks.
web applications have become essential tools for communication, commerce, andinformation dissemination in an era where the internet is pivotal in our daily lives. However, as the digital landscape continues to evolve...
详细信息
The proceedings contain 46 papers. The special focus in this conference is on Security andinformationtechnologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyr...
ISBN:
(纸本)9789819777853
The proceedings contain 46 papers. The special focus in this conference is on Security andinformationtechnologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyright systems;a Zero-Watermarking Image Scheme in Normalized Cross-Correlation with Robust Copyright Protections;a Novel Approach for Detecting and Analyzing Cyber-Attacks in Cyber-Physical systems;white-Box Penetration Testing for Hash Collision Attack on web Applications;towards Zero Trust for Financial Sectors: A Proposed Framework on Trust Evaluation;FiT-DPKI: Decentralized Public Key Infrastructure with Flexibility and Transparency for IoT Networks;Revolutionizing Healthcare: Case Studies of AI Algorithms Transforming the Field of Medicine;analysis and Detection of Abnormal Transactions on Ethereum;feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-supervised Learning Models;Securing NLP systems: A Comprehensive AI-Based Approach;A New Scheme Modeling Gym Membership Transactions with NFT systems;A Text to Human-Like Speech Using Tacotron-Based TTS Model;A Novel Malware Classification Using CNN-SVM Deep Learning Method Based on Transfer Learning Architecture;enhancing Project Programming Hour Prediction with Regression Analysis Techniques—A Case Study of Company D;a New Traceable One-Time Address Scheme Secure Against Privilege Escalation Attack;An Object-Based Multi-level Authentication Framework for AR e-Book;a Door Lock System Based on Visual Cryptography;Automatic APT Attack Reconstruction Supporting Lateral Movement;using Open-Source Intelligence to Archive Criminal Organizations;FIDO-Based Access Control Mechanism in Named Data Networking;empirical Approach to a Fine-Tuning Using Forgetting in Large Language Models;automatic Wound Segmentation with Deep Convolutional Neural Networks;Prediction of the Prevalence of COVID-19 Using Epidemic Differential Equations and Deep Learning Network.
As Artificial Intelligence (AI) continues to reshape industries and societies, a critical examination of the ethical dimensions surrounding its development becomes imperative. This talk delves into the multifaceted la...
详细信息
Amid the continuous advancement of information technology, the rapid evolution of key big data technologies has provided essential technical support for the management of power systems. To ensure high-quality electric...
详细信息
With the application of new technologies such as the Internet of Things, cloud computing, and big data, industrial control systems are increasingly becoming digitalized, networked, and intelligent, which injects vital...
详细信息
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi...
详细信息
暂无评论