The proceedings contain 60 papers. The topics discussed include: blockchain-based PKI solutions for IoT;monitor: an abnormality detection approach in buildings energy consumption;securing mobile data collectors by int...
ISBN:
(纸本)9781538695029
The proceedings contain 60 papers. The topics discussed include: blockchain-based PKI solutions for IoT;monitor: an abnormality detection approach in buildings energy consumption;securing mobile data collectors by integrating software attestation and encrypted data repositories;link-sign prediction in dynamic signed directed networks;mining the best observational window to model social phenomena;parallel schedule of live migrations for virtual machine placements;automatic feedback control for graceful degradation of real-time services in the face of an attack;a decentralized marketplace application on the ethereum blockchain;and lightweight web services migration framework in hybrid clouds.
The proceedings contain 37 papers. The topics discussed include: CoShare: a cost-effective data sharing system for data center networks;incremental partitioning of large time-evolving graphs;AR-ABAC: a new attribute b...
ISBN:
(纸本)9781509000890
The proceedings contain 37 papers. The topics discussed include: CoShare: a cost-effective data sharing system for data center networks;incremental partitioning of large time-evolving graphs;AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing;CARDS - collaborative audit and report data sharing for a-posteriori access control in DOSNs;exploring emotions in social media;public information sharing behaviors analysis over different social media;jointly learning sentiment, keyword and opinion leader in social reviews;privacy-preserving and outsourced multi-user K-means clustering;probabilistic matrix factorization based on similarity propagation and trust propagation for recommendation;collaborative vehicle routing and scheduling with cross-docks under uncertainty;genetic algorithm based QoS-aware service composition in multi-cloud;and UI ripping in Android: reverse engineering of graphical user interfaces and its application.
The proceedings contain 18 papers. The topics discussed include: a survey of mobile edge computing for the metaverse: architectures, applications, and challenges;next generation federated learning for edge devices: an...
ISBN:
(纸本)9781665473002
The proceedings contain 18 papers. The topics discussed include: a survey of mobile edge computing for the metaverse: architectures, applications, and challenges;next generation federated learning for edge devices: an overview;leveraging synergies between AI and networking to build next generation edge networks;the social emotional web;network sheaf models for social information dynamics;entropy-based characterization of influence pathways in traditional and social media;an imperative to assess socio-technical impact of algorithms in online spaces and wresting responsibility from technology companies;cognitive architectures and their applications;and human-machine collaboration for smart decision making: current trends and future opportunities.
The proceedings contain 14 papers. The topics discussed include: a collaborative and adaptive feedback system for physical exercises;hierarchical federated learning based anomaly detection using digital twins for smar...
ISBN:
(纸本)9781665416252
The proceedings contain 14 papers. The topics discussed include: a collaborative and adaptive feedback system for physical exercises;hierarchical federated learning based anomaly detection using digital twins for smart healthcare;securing collaborative work in wide-band display environments;IoT reconnaissance attack classification with random undersampling and ensemble feature selection;when trust meets the internet of vehicles: opportunities, challenges, and future prospects;service-based drone delivery;collaborative analysis of genomic data: vision and challenges;digital twins-based application development for digital manufacturing;data-driven in-crisis community identification for disaster response and management;and privacy vulnerabilities of wearable activity monitors: threat and potential defense.
The proceedings contain 41 papers. The topics discussed include: arti?cial intelligence empowered cyber threat detection and protection for power utilities;integration of user emotion and self-awareness in text messag...
ISBN:
(纸本)9781728167398
The proceedings contain 41 papers. The topics discussed include: arti?cial intelligence empowered cyber threat detection and protection for power utilities;integration of user emotion and self-awareness in text messaging;on the use of operations research for decision making with uncertainty for IoT devices in battlefield situations;airport restroom cleanliness prediction using real time user feedback data;engineering heterogeneous internet of things applications: from models to code;benchmarking for end-to-end QoS sustainability in cloud-hosted data processing pipelines;and challenges and approaches to teaching data science technologies in an information technology program with non-traditional students.
The proceedings contain 70 papers. The topics discussed include: discovering opinion changes in online reviews via learning fine-grained sentiments;business process tasks-assignment and resource allocation in crowdsou...
ISBN:
(纸本)9781509046072
The proceedings contain 70 papers. The topics discussed include: discovering opinion changes in online reviews via learning fine-grained sentiments;business process tasks-assignment and resource allocation in crowdsourcing context;why is it difficult for welfare recipients to return to work? a case study through a collaborative online community;social-PPM: personal experience sharing and recommendation;an attribute-based access control extension for OpenStack and its enforcement utilizing the policy machine;a patient-centric attribute based access control scheme for secure sharing of personal health records using cloud computing;capturing policies for fine-grained access control on mobile devices;big data privacy risk: connecting many large data sets;and collaborative differentially private outlier detection for categorical data.
The proceedings contain 16 papers. The topics discussed include: virtual reality for stress management in university students;polarization detection on social networks: dual contrastive objectives for self-supervision...
ISBN:
(纸本)9798350386707
The proceedings contain 16 papers. The topics discussed include: virtual reality for stress management in university students;polarization detection on social networks: dual contrastive objectives for self-supervision;RFPG: question-answering from low-resource language (Arabic) texts using factually aware RAG;FGA-IDS: a federated learning and GAN-augmented intrusion detection system for UAV networks;a survey of transformer enabled time series synthesis;Sinema: semantics-driven intelligent network management using AI assistance;autonomous shuttle operation for vulnerable populations: lessons and experiences;and enhancing explainability and trustworthiness of intrusion detection systems using competitive learning.
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signal...
ISBN:
(纸本)9781538625651
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signaling mechanism for many-to-many video conferencing;concurrent command and consistency management for distributed compound document authoring;model selection based on kalman temporal differences learning;extracting linked data from HTML tables;source identification for printed documents;when do changes induce software vulnerabilities?;VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps;and detecting android malwares by mining statically registered broadcast receivers.
The proceedings contain 22 papers. The topics discussed include: discovering localized information for heterogeneous graph node representation learning;what information is required for explainable AI? : a provenance-b...
ISBN:
(纸本)9781728141466
The proceedings contain 22 papers. The topics discussed include: discovering localized information for heterogeneous graph node representation learning;what information is required for explainable AI? : a provenance-based research agenda and future challenges;memory abstraction and optimization for distributed executors;challenges in developing collaborative IoT systems;PriSE: slenderized privacy-preserving surveillance as an edge service;a short survey of LSTM models for de-identification of medical free text;cybersecurity in medical private practice: results of a survey in audiology;HydraSpace: computational data storage for autonomous vehicles;and ParaSDN: an access control model for SDN applications based on parameterized roles and permissions.
The proceedings contain 16 papers. The topics discussed include: the emergence of hypergraphs in complex system analysis;RESONATE: advancing sustainability in IoT networks through smart and selective data streaming;in...
ISBN:
(纸本)9798350339123
The proceedings contain 16 papers. The topics discussed include: the emergence of hypergraphs in complex system analysis;RESONATE: advancing sustainability in IoT networks through smart and selective data streaming;influence pathway discovery on social media;KNNs of semantic encodings for rating prediction;understanding the behavior of ransomware: an I/O request packet (IRP) driven study on ransomware detection against execution time;scalable multimodal learning and multimedia recommendation;PRISM: a blockchain-enabled reputation-based consensus for enhancing scientific workflow provenance;enabling synergistic knowledge sharing and reasoning in large language models with collaborative multi-agents;a pro-active defense framework for IoT systems;and a Blackbox approach to profile runtime execution dependencies in microservices.
暂无评论