The proceedings contain 111 papers. The topics discussed include: identification and validation of real-time health events through social media;active storage mechanism for cluster-wide RAID system;SMASH: a cloud-base...
ISBN:
(纸本)9781509002146
The proceedings contain 111 papers. The topics discussed include: identification and validation of real-time health events through social media;active storage mechanism for cluster-wide RAID system;SMASH: a cloud-based architecture for big data processing and visualization of traffic data;sequential pattern mining system for analysis of programming learning history;a mixed and batching authentication protocol for grouped tags in mobile RFID system;scalable data representation in risk management information systems using an XQuery extension;operation-level performance control in the object store for distributed storage systems;exploiting collective spontaneous mobility to improve location prediction of mobile phone users;an event-based framework for the specification and runtime checking of timing constraints in wireless sensor and actuator networks;flow-control policies for wireless sequencer-based causal and total order communication;and malicious node traceback in opportunistic networks using Merkle trees.
With developing expenditure on R&D activities of Industry Enterprises Designated Size (IEDSs) in China, it is essential for evaluating effectiveness of R&D of China IRDSs. Though, certain studies in R&D ef...
详细信息
Graph data represents information efficiently and can be used to learn subsequent tasks easily. In the domain of biological science, recommender systems, social network analysis graph representation learning has becom...
详细信息
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr...
详细信息
Attackers are increasingly using model inversion attacks, in which the outputs of the model can be used to reconstruct confidential or private information to target machine learning models, especially those that handl...
详细信息
Over the years, Cloud computing is becoming increasingly popular due to the continually changing technology. The primary goal of the cloud computing network is to offer consumers pay-per-use usage of on-demand process...
详细信息
Phenomena such as smart health and emergency management systems when embedded with data-driven decision-making have become a game-changer in the field of healthcare and an emergency response. In this paper, we investi...
详细信息
Recent data-intensive applications encounter memory wall bottlenecks in the traditional processor-centric computing architecture due to the need for frequent and extensive off-chip data movement. The emerging 3D-enabl...
详细信息
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal...
详细信息
Grape farming is a globally significant agricultural practice, but grapevines frequently encounter viral, fungal, and bacterial infections that compromise crop quality and yield. Conventional disease detection methods...
详细信息
暂无评论