through the massive use of mobile devices, data clouds, and the rise of Internet of things, enormous amount of data has been generated and analyzed for the benefit of society. NoSQL Databases and specially key-value s...
详细信息
Energy is usually used in the form of cool, heat and electricity power in industrial park and town. Different types of energy are often coupled in generation, convention, storage and usage sides, especially withthe e...
详细信息
Nowadays, constraint processing has become a mayor issue in engineering applications based on digital product models. A modern product naturally decomposes into numerous subcomponents, the physical behaviour of which ...
详细信息
Hazardous materials transportation is different from general materials transportation which needs special transport route. In this article, the safe transportation route planning (STRP) for vehicles loaded with hazard...
详细信息
Duplicating the full dynamic capabilities of the human eye-brain combination is a difficult task but an important goal because of the wide application for a system which can acquire accurate 3D models of a scene in re...
详细信息
the proceedings contain 16 papers. the special focus in this conference is on Formal methods, Machine learning, Cloud and passwords, Measurements and ontologies and Access control. the topics include: Formal verificat...
ISBN:
(纸本)9783319156170
the proceedings contain 16 papers. the special focus in this conference is on Formal methods, Machine learning, Cloud and passwords, Measurements and ontologies and Access control. the topics include: Formal verification of liferay RBAC;formal verification of privacy properties in electric vehicle charging;unwinding based model-checking and testing for non-interference on EFSMs;state-continuous transfer of state in protected-module architectures;are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection;learning how to prevent return-oriented programming efficiently;re-thinking kernelized MLS database architectures in the context of cloud-scale data stores;optimising multi-cloud deployments with security controls as constraints;towards an inverted cloud;faster password guessing using an ordered markov enumerator;the heavy tails of vulnerability exploitation;benchmarking indistinguishability obfuscation - a candidate implementation;a security ontology for security requirements elicitation;producing hook placements to enforce expected access control policies;improving reuse of attribute-based access control policies using policy templates and monitoring database access constraints with an RBAC metamodel.
Optimal scheduling of the battery energy storage (BES) in a microgrid is presented in this paper. the microgrid model in this paper consists of a photovoltaic (PV) power plant, a wind generator (WG), battery energy st...
详细信息
Many researchers have worked on example-based machine translation and different techniques have been investigated in the area. In literature, a method of using translation templates learned from bilingual example pair...
详细信息
ISBN:
(纸本)9783540408031
Many researchers have worked on example-based machine translation and different techniques have been investigated in the area. In literature, a method of using translation templates learned from bilingual example pairs was proposed. the paper investigates the possibility of applying the same idea for close languages where word order is preserved. In addition to applying the original algorithm for example pairs, we believe that the similarities between the translated sentences may always be learned as atomic translations. Since the word order is almost always preserved, there is no need to have any previous knowledge to identify the corresponding differences. the paper concludes that applying this method for close languages may improve the performance of the system.
One of the fundamental problems in the field of robotic motion planning is to safely and efficiently drive the end effector of a robotic manipulator to a specified goal position. Here, safety refers to the requirement...
详细信息
the ever-increasing penetration of distributed photovoltaic (PV) poses challenges to the safe and reliable operation of distribution grids, which limit the hosting capacity of PVs. the flexible resources in distributi...
详细信息
暂无评论