The proceedings contain 28 papers. The special focus in this conference is on Cyber Security Cryptography and Machine Learning. The topics include: The advantage of truncated permutations;reconstructing C2 servers for...
ISBN:
(纸本)9783030209506
The proceedings contain 28 papers. The special focus in this conference is on Cyber Security Cryptography and Machine Learning. The topics include: The advantage of truncated permutations;reconstructing C2 servers for remote access trojans with symbolic execution;generating a random string with a fixed weight;an access control model for data security in online social networks based on role and user credibility;enhancing image steganalysis with adversarially generated examples;controllable privacy preserving blockchain: Fiatchain: distributed privacy preserving cryptocurrency with law enforcement capabilities;a relay attack on a tamper detection system;amended cross-entropy cost: An approach for encouraging diversity in classification ensemble;governance and regulations implications on machine learning;linear cryptanalysis reduced round of piccolo-80;simulating homomorphic evaluation of deep learning predictions;Everything is in the name – a URL based approach for phishing detection;network cloudification;new goal recognition algorithms using attack graphs;peerClear: Peer-to-peer bot-net detection;Rethinking identification protocols from the point of view of the GDPR;Temporal pattern-based malicious activity detection in SCADA systems.anonymous deniable identification in ephemeral setup and leakage scenarios;randomized and set-system based collusion resistant key predistribution schemes;continuous key agreement with reduced bandwidth;Covert channel cyber-attack over video stream DCT payload: (Copyright protection algorithm for video and audio streams);Effects of weather on drone to IoT QKD;malware classification using image representation;MLDStore: DNNs as similitude models for sharing big data;cyber attack localization in smart grids by graph modulation;Beyond replications in blockchain: on/off-blockchain IDA for storage efficiency and confidentiality.
Recently, the rapid development of modern nonvolatile memories (NVMs) have renovated the designs of computingsystems. However, the unique characteristics of NVMs often degrade the performance, reliability, or lifetim...
详细信息
Finding free parking space is a common problem in cities nowadays, both in streets and parking lots. This problem causes traffic congestion and influence in the delay of people to get to their jobs. With the advent of...
详细信息
ISBN:
(纸本)9781538676127
Finding free parking space is a common problem in cities nowadays, both in streets and parking lots. This problem causes traffic congestion and influence in the delay of people to get to their jobs. With the advent of smart cities and buildings, research in this area is increasingly relevant. This work proposes a distributed architecture of a real time system for the detection of vacant space in parking lots, using computerized vision and machine learning. The proposed architecture seeks to minimize the search time for a parking space, as well as reduce the congestion resulting from having to maneuver in small spaces with pedestrians. The expected benefits are mainly the reduction of delays in reaching the position of work and study, and the risk reduction of pedestrians circulating in the parking areas, all this with a minimum investment.
Femtosecond laser direct writing achieves high precision into micro-metric in additive manufacturing of customized-geometric structures and was used to fabricate the high quality micro optical lenses in various photor...
详细信息
Femtosecond laser direct writing achieves high precision into micro-metric in additive manufacturing of customized-geometric structures and was used to fabricate the high quality micro optical lenses in various photoresist, including SU-8, by two-photon polymerization. The fabricates axicons could approximately create the Bessel beam, which has smaller beam diameter and extended depth of focus, so that widely employed in imaging systems. The axicons and any geometric micro-lenses of certain applications were designed and optimized using ZEMAX before the lenses being fabricated by femtosecond laser direct writing, and they serve as core components of imaging systems. microscopy, and other research fields.
Cloud storage systems.(CSS) are heterogeneous in nature. In such a heterogeneous distributed storage system, how to identify a tradeoff between system storage cost and system repair cost is investigated by analyzing t...
详细信息
ISBN:
(纸本)9781538643013
Cloud storage systems.(CSS) are heterogeneous in nature. In such a heterogeneous distributed storage system, how to identify a tradeoff between system storage cost and system repair cost is investigated by analyzing the min-cut constraints of information flow graph. Moreover, it is proved that the number of min-cut constraints can be greatly reduced such that the tradeoff curve can be established in polynomial time.
The convergence between computing- and data-centric workloads and platforms is imposing new challenges on how to best use the resources of modern computingsystems. In this paper we show the need of enhancing system s...
详细信息
ISBN:
(数字)9783319751788
ISBN:
(纸本)9783319751788;9783319751771
The convergence between computing- and data-centric workloads and platforms is imposing new challenges on how to best use the resources of modern computingsystems. In this paper we show the need of enhancing system schedulers to differentiate between compute- and data-oriented applications to minimise interferences between storage and application traffic. These interferences can be especially harmful in systems.featuring fully distributed storage systems.together with unified interconnects, such as our custom-made architecture ExaNeSt. We analyse several data-aware allocation strategies, and found that such strategies are essential to maintain performance in distributed storage systems.
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by a...
详细信息
ISBN:
(纸本)9781450365628
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by adapting them to big data technology to allow a fundamental change in the access to voluminous information in the web. That Intended to have a complete and relevant response to the user request. Our research work focuses on the semantic web. Focus exactly on the semantic search on many data expressed by rdF (Resource Description Framework) in distributed system. The semantic language proposed by W3C (World Wide Web Consortium) provides the formalism necessary for the representation of data for the Semantic Web. However, only a knowledge representation format is insufficient and we need powerful response mechanisms to manage effectively global and distributed queries across a set of stand-alone and heterogeneous rdF resources marked by the dynamic and scalable nature of their content.
Supervisory Control Theory (SCT) is an important framework for establishing formal control of discrete event systems.(DES). It is divided into two main approaches: (i) the qualitative approach which studies the DES lo...
详细信息
ISBN:
(纸本)9783319608341;9783319608334
Supervisory Control Theory (SCT) is an important framework for establishing formal control of discrete event systems.(DES). It is divided into two main approaches: (i) the qualitative approach which studies the DES logical performances with respect to the logical states and events;and (ii) the quantitative approach which is interested in the performance assessment, and introduces "Time" to the untimed DES. This work concerns DES where the elapse of time among the events can affect the system behavior. We recently proposed an untimed approach to distributed supervisory control design and implementation. In this paper, the concept of time observer is introduced to incorporate time dependencies to the proposed approach. The applicability of the proposed method is validated by an experimental Automated Manufacturing System (AMS).
Based on the fifth generation of mobile communication (5G), 5G open grid computing environment (5G OGCE), in order to adapt to "civil-military integration strategy" in region from deep sea to space, at the s...
详细信息
ISBN:
(纸本)9781538695944
Based on the fifth generation of mobile communication (5G), 5G open grid computing environment (5G OGCE), in order to adapt to "civil-military integration strategy" in region from deep sea to space, at the same time to meet the needs of ocean engineering development, a joint (connecting or docking-and-berthing) robot and aircraft carriers combinatorial systems.are presented in this paper, the aim of which is to, (1) achieve aircraft carrier combinatorial systems.jointed dynamically by double aircraft carriers, or more ships and aircraft carriers, providing the new runway of 600 meters long taking off and landing aircraft in the sea;(2) integrate unmanned aircraft carriers (and manned aircraft carriers) to take off and land the sixth generation strike fighter or unmanned stealth fighter;(3) combine the aircraft carrier and new production systems.of ocean engineering, including polar icebreaker, underwater rare earth mining, combustible ice mining, underwater power generation and so on;(4) support the development of sea wave energy, offshore power generation plant and weather radar forecasting platform, and the launch and recovery of offshore rockets. By using distributed control cloud architecture in 5G OGCE, large passenger aircraft taking off and landing at 600 meters runway in aircraft carriers combinatorial systems.can be realized.
Students of software engineering need to learn the skills necessary to work together in geographically distributed, international teams. Both at the bachelor39;s and master39;s degree levels, students need to lear...
详细信息
ISBN:
(纸本)9781450363839
Students of software engineering need to learn the skills necessary to work together in geographically distributed, international teams. Both at the bachelor's and master's degree levels, students need to learn the intercultural and project management skills to work successfully in global software development teams. This paper reports experiences using Project-Based Learning methods used to teach virtual, cooperative courses in global software engineering. The effectiveness of Project-Based Learning for students at the bachelor's level is compared to its effectiveness for students at the master's degree level.
暂无评论