The proceedings contain 46 papers. The topics discussed include: marker less hand gesture tracking using smart phones;friendnet backdoor: indentifying backdoor attack that is safe for friendly deep neural network;impr...
ISBN:
(纸本)9781450376907
The proceedings contain 46 papers. The topics discussed include: marker less hand gesture tracking using smart phones;friendnet backdoor: indentifying backdoor attack that is safe for friendly deep neural network;improving core topics discovery in semantic markup literature: a combined approach;an integrated of fuzzy rule base system and TOPSIS technique for multi-attribute decision making;efficient semantic segmentation through dense upscaling convolutions;dynamic image quality analysis and comparison between 6MHz and 8MHz bandwidths for DVB-C digital TV system;a cooperative trust evaluation scheme for tactical wireless sensor networks;and the moderating effects of mentoring in ERP systems.
Large Language Models (LLM) is a type of artificial neural network that excels at language-related tasks. The advantages and disadvantages of using LLM in softwareengineering are still being debated, but it is a tool...
详细信息
The proceedings contain 396 papers. The topics discussed include: the FairRoot framework;iSpy: a powerful and lightweight event display;CMS simulation software;precision analysis of Geant4 condensed transport effects ...
The proceedings contain 396 papers. The topics discussed include: the FairRoot framework;iSpy: a powerful and lightweight event display;CMS simulation software;precision analysis of Geant4 condensed transport effects on energy deposition in detectors;monitoring ARC services with GangliARC;software installation and condition data distribution via CernVM file system in ATLAS;managing the virtual machine lifecycle of the CernVM Project;experience of BESIII data production with local cluster and distributed computing model;PROOF-Lite running experience in high energy physics data analysis;WHALE, a management tool for Tier-2 LCG sites;new data visualization of the LHC Era monitoring (Lemon) system;database on demand;conditions and configuration metadata for the ATLAS experiment;using zoom technologies to display HEP plots and talks;data acquisition and online monitoring software for CBM test beams;and online meta-data collection and monitoring framework for the STAR experiment at RHIC.
The proceedings contain 24 papers. The special focus in this conference is on New Trends in Model and dataengineering. The topics include: Record Linkage for Auto-tuning of High Performance Computing Systems;protecti...
ISBN:
(纸本)9783030876562
The proceedings contain 24 papers. The special focus in this conference is on New Trends in Model and dataengineering. The topics include: Record Linkage for Auto-tuning of High Performance Computing Systems;protecting Sensitive data in Web of data;COVID-DETECT: A Deep Learning Based Approach to Accelerate COVID-19 Detection;time Insertion Functions;static Checking Consistency of Temporal Requirements for Control software;visual Language for Device Management in Telecommunication Product Line;Using Process-Oriented Structured Text for IEC 61499 Function Block Specification;the DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain Information;towards a Resource-Aware Formal Modelling Language for Workflow Planning;Development of Critical Systems with UML/OCL and FoCaLiZe;systematic Literature Review of Methods for Maintaining data Integrity;medical dataengineering – Theory and Practice;querying Medical Imaging datasets Using Spatial Logics (Position Paper);evaluation of Anonymization Tools for Health data;usages of the ContSys Standard: A Position Paper;systematic Assessment of Formal Methods Based Models Quality Criteria;deriving Interaction Scenarios for Timed Distributed Systems by Symbolic Execution;energy Efficient Real-Time Calibration of Wireless Sensor Networks for Smart Buildings;edge-to-Fog Collaborative Computing in a Swarm of Drones;Coverage Maximization in WSN Deployment Using Particle Swarm Optimization with Voronoi Diagram;EPSAAV: An Extensible Platform for Safety Analysis of Autonomous Vehicles;bridging Trust in Runtime Open Evaluation Scenarios.
The proceedings contain 39 papers. The topics discussed include: vibration region extraction method of bridge based on ground-based MIMO radar;academic paper knowledge graph, the construction and application;research ...
The proceedings contain 39 papers. The topics discussed include: vibration region extraction method of bridge based on ground-based MIMO radar;academic paper knowledge graph, the construction and application;research on test case generation method of airborne software based on NLP;3D dynamic hand gesture recognition with fused RGB and depth images;refined balanced resource allocation based on Kubernetes;visible region enhancement network for occluded pedestrian detection;a hierarchical-based frequent itemset mining method under local differential privacy;similarity-aware attention network for multimodal fake news detection;pedestrian attribute recognition based on multi-scale feature fusion over a larger receptive field and strip pooling;stowaway mining: a selfish mining against strategy;spatiotemporal attention networks for traffic demand prediction;and benefits analysis of Chinese cities on urban networks based on evolutionary games.
The proceedings contain 61 papers. The topics discussed include: multi-objective hardware-software co-optimization for the SNIPER multi-core simulator;consistency checking of safety arguments in the goal structuring n...
ISBN:
(纸本)9781479965687
The proceedings contain 61 papers. The topics discussed include: multi-objective hardware-software co-optimization for the SNIPER multi-core simulator;consistency checking of safety arguments in the goal structuring notation standard;interleaving ontology-based reasoning and natural language processing for character identification in folktales;nonparametric weighted MMC feature extraction method for HRRP recognition;real-time pedestrian detection in urban scenarios;vision algorithms and embedded solution for pedestrian detection with far infrared camera;aggregate road surface based environment representation using digital elevation maps;UDCT complex coefficient statistics based rotation invariant texture characterization;industrial AGVs: toward a pervasive diffusion in modern factory warehouses;protecting cache memories through data scrambling technique;parallel object-oriented implementation of the TestU01 statistical test suites;and parallel implementation of the matrix rank test for randomness assessment.
The proceedings contain 20 papers. The special focus in this conference is on 2nd international Workshop on TEchnical and LEgal aspects of data pRIvacy and Security, 2nd international Workshop on Mining the Social Web...
ISBN:
(纸本)9783319469621
The proceedings contain 20 papers. The special focus in this conference is on 2nd international Workshop on TEchnical and LEgal aspects of data pRIvacy and Security, 2nd international Workshop on Mining the Social Web, 1st international Workshop on Liquid Multi-Device software for the Web and 5th Workshop on Distributed User Interfaces. The topics include: A privacy-by-design GDPR-compliant framework with verifiable data traceability controls;evaluation of professional cloud password management tools;enhancing access control trees for cloud computing;identifying great teachers through their online presence;experimental measures of news personalization in google news;synchronizing application state using virtual DOM trees;exploiting attributes for inter-component communication;improving context-awareness in healthcare through distributed interactions;study involving two RFID tabletops with generic tangible objects;distributing interaction in responsive cross-device applications;towards user-defined cross-device interaction;virtual spatially aware shared displays;flexible distribution of existing web interfaces and an architecture involving developers and end-users.
The proceedings contain 40 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Synthetic data in Automatic Number Plate Recognition;An Untold Tale of...
ISBN:
(纸本)9783031143427
The proceedings contain 40 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Synthetic data in Automatic Number Plate Recognition;An Untold Tale of Scientific Collaboration: SCCH and AC 2 T;on the Creation and Maintenance of a Documentation Generator in an Applied Research Context;towards the Digitalization of Additive Manufacturing;Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers;data Integration, Management, and Quality: From Basic Research to Industrial Application;building a YouTube Channel for Science Communication;introduction of Visual Regression Testing in Collaboration Between Industry and Academia;vibration Analysis for Rotatory Elements Wear Detection in Paper Mill Machine;applying Time-Inhomogeneous Markov Chains to Math Performance Rating;introducing data Science Techniques into a Company Producing Electrical Appliances;a Technology Transfer Portal to Promote Industry-Academia Collaboration in South-Tyrol;fast and Automatic Object Registration for Human-Robot Collaboration in Industrial Manufacturing;sending Spies as Insurance Against Bitcoin Pool Mining Block Withholding Attacks;risks in DeFi-Lending Protocols - An Exploratory Categorization and Analysis of Interest Rate Differences;battling the Bullwhip Effect with Cryptography;Reporting of Cross-Border Transactions for Tax Purposes via DLT;securing File System Integrity and Version History Via Directory Merkle Trees and Blockchains;taxation of Blockchain Staking Rewards: Propositions Based on a Comparative Legal Analysis;comparison Framework for Blockchain Interoperability Implementations;A Comparative Analysis of Anomaly Detection Methods for Predictive Maintenance in SME;towards Strategies for Secure data Transfer of IoT Devices with Limited Resources;application of Validation Obligations to Security Concerns;mode Switching for Secure Edge Devices;a Lifecycle Framework for Semantic Web Machine Learn
The proceedings contain 31 papers. The special focus in this conference is software and data Technologies. The topics include: benefits of enterprise ontology for the development of ICT-based value networks;SOA pragma...
ISBN:
(纸本)3540886540
The proceedings contain 31 papers. The special focus in this conference is software and data Technologies. The topics include: benefits of enterprise ontology for the development of ICT-based value networks;SOA pragmatism;a simple language for novel visualizations of information;generic components for static operations at object level;a visual dataflow language for image segmentation and registration;a debugger for the interpreter design pattern;concepts for high-perfomance scientific computing;a model driven architecture approach to web development;reverse-architecting legacy software based on roles;a supporting tool for requirements elicitation using a domain ontology;pattern detection in object-oriented source code;testing the effectiveness of MBIUI life-cycle framework for the development of affective interfaces;an ontological SW architecture supporting agile development of semantic portals;the vcodex platform for data compression;classification of benchmarks for the evaluation of grid resource planning algorithms;a disconnection-aware mechanism to provide anonymity in two-level P2P systems;approximation and scoring for XML data management;quantitative analysis of the top ten Wikipedia's;a semantic web approach for ontological instances analysis;aspects based modeling of web applications to support co-evolution;recommending trustworthy knowledge in KMS by using agents;recent developments in automated inferencing of emotional state from face images;inconsistency-tolerant integrity checking for knowledge assimilation;improving cutting-stock plans with multi-objective genetic algorithm;knowledge purpose and visualization;empirical experimentation for validating the usability of knowledge;an ontological investigation in the field of computer programs;formal problem domain modeling within MDA;model based testing for agent systems and a metamodel for defining development methodologies.
The proceedings contain 23 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through Knowledge Diffusion...
ISBN:
(纸本)9783030871000
The proceedings contain 23 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through Knowledge Diffusion and Derivative Works;robust and Efficient Bio-Inspired data-Sampling Prototype for Time-Series Analysis;membership-Mappings for data Representation Learning: Measure Theoretic Conceptualization;membership-Mappings for data Representation Learning: A Bregman Divergence Based Conditionally Deep Autoencoder;data Catalogs: A Systematic Literature Review and Guidelines to Implementation;task-Specific Automation in Deep Learning Processes;approximate Fault Tolerance for Edge Stream Processing;deep Learning Rule for Efficient Changepoint Detection in the Presence of Non-Linear Trends;time Series Pattern Discovery by Deep Learning and Graph Mining;a Conceptual Model for Mitigation of Root Causes of Uncertainty in Cyber-Physical Systems;integrating Gene Ontology Based Grouping and Ranking into the Machine Learning Algorithm for Gene Expression data Analysis;SVM-RCE-R-OPT: Optimization of Scoring Function for SVM-RCE-R;short-Term Renewable Energy Forecasting in Greece Using Prophet Decomposition and Tree-Based Ensembles;a Comparative Study of Deep Learning Approaches for Day-Ahead Load Forecasting of an Electric Car Fleet;Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Study;Privacy Preserving Machine Learning for Malicious URL Detection;remote Attestation of Bare-Metal Microprocessor software: A Formally Verified Security Monitor;Provenance and Privacy in ProSA: A Guided Interview on Privacy-Aware Provenance;placeholder Constraint Evaluation in Simulation Graphs;Walk Extraction Strategies for Node Embeddings with RDF2Vec in Knowledge Graphs;bridging Semantic Web and Machine Learning: First Results of a Systematic Mapping Study.
暂无评论