The proceedings contain 37 papers. The topics discussed include: improving prediction accuracy in LSTM network model for aircraft testing flight data;application of transfer learning in continuous time series for anom...
ISBN:
(纸本)9781538651827
The proceedings contain 37 papers. The topics discussed include: improving prediction accuracy in LSTM network model for aircraft testing flight data;application of transfer learning in continuous time series for anomaly detection in commercial aircraft flight data;serverless performance and optimization strategies;effectiveness analysis of web based simulation for computational science and engineering on improvement EDISON platform;a medical information service platform based on distributed cloud and blockchain;search over compute: solving multiplication-intensive computational problems over FHE data;a privacy-aware and user-centric approach for query processing in cloud;efficient expression recognition based on shape-indexed features;resource and service management for fog infrastructure as a service;and evaluating bio-inspired optimization techniques for utility price estimation in fog computing.
The proceedings contain 42 papers. The topics discussed include: engineering self-adaptive software systems.- an organized tour;a design for adaptation framework for self-adaptive systems.reactive and adaptive securit...
ISBN:
(纸本)9781538651759
The proceedings contain 42 papers. The topics discussed include: engineering self-adaptive software systems.- an organized tour;a design for adaptation framework for self-adaptive systems.reactive and adaptive security monitoring in cloud computing;towards a pragmatic approach to engineer cognitive, agent-oriented, distributed applications;a legally relevant socio-technical language development for smart contracts;towards self-adaptive systems.with hierarchical decentralized control;voronoi-based indoor deployment of mobile sensors network with obstacles;efficient classification of application characteristics by using hardware performance counters with data mining;design of skiplist based key-value store on non-volatile memory;and design and implementation of software-based dynamically connected transport.
The Network of Polarized Evolutionary Processors (NPEP) is a rather new variant of the bio-inspired computing model called Network of Evolutionary Processors (NEP). This model, together with its variants, is able to p...
详细信息
ISBN:
(纸本)9781450372534
The Network of Polarized Evolutionary Processors (NPEP) is a rather new variant of the bio-inspired computing model called Network of Evolutionary Processors (NEP). This model, together with its variants, is able to provide theoretical feasible solutions to hard computational problems. NPEPE is a software engine able to simulate NPEP which is deployed over Giraph, an ultra-scalable platform based on the Bulk Synchronous Parallel (BSP) programming model. Rather surprisingly, the BSP model and the underlying architecture of NPEP have many common points. Moreover, these similarities are also shared with all variants in the NEP family. We take advantage of these similarities and propose an extension of NPEPE (named gNEP) that enhances it to simulate any variant of the NEP's family. Our extended gNEP framework, presents a twofold contribution. Firstly, a flexible architecture able to extend software components in order to include other NEP models (including the seminal NEP model and new ones). Secondly, a component able to translate input configuration files representing the instance of a problem and an algorithm based on different variants of the NEP model into some suitable input files for gNEP framework. In this work, we simulate a solution to the "3-colorability" problem which is based on NPEP. We compare the results for a specific experiment using NPEPE engine and gNEP. Moreover, we show several experiments in the aim of studying, in a preliminary way, the scalability offered by gNEP to easily deploy and execute instances of problems requiring more intensive computations.
The proceedings contain 164 papers. The topics discussed include: a fuzzy IBE Scheme with Attribute Timeliness;An Attribute-Based Searchable Encryption scheme supporting trapdoor updating;application of fuzzy analogy ...
ISBN:
(纸本)9781538675182
The proceedings contain 164 papers. The topics discussed include: a fuzzy IBE Scheme with Attribute Timeliness;An Attribute-Based Searchable Encryption scheme supporting trapdoor updating;application of fuzzy analogy preferred ratio based on Euclid distance in quantitative decision of turfgrass introduction;incremental user modeling of online activity for cyber-I growth with successive browsing logs;from user models to the cyber-I model: approaches, progresses and issues;correlation analyses between personality traits and personal behaviors under specific emotion states using physiological data from wearable devices;a study on quantitative risk assessment methods in security design for industrial control systems.and acquisition and analysis of forensic data artifacts of some popular apps in android smartphone..
Big Data Security and privacy are key concerns for cloud computing. At the initial stage, security was not considered for processing Big Data because of insufficient research and adequate security technology. Now rese...
详细信息
The proceedings contain 106 papers. The topics discussed include: Extracting attributes for recommender systems.based on MEC theory;investigating an adaptive network coding control protocol for multihop-multipath netw...
ISBN:
(纸本)9781538663509
The proceedings contain 106 papers. The topics discussed include: Extracting attributes for recommender systems.based on MEC theory;investigating an adaptive network coding control protocol for multihop-multipath networks for network reconfigurability;moving vehicle classification using pixel quantity based on Gaussian mixture models;optimizing field-aware factorization machine with particle swarm optimization on online ads click-through rate prediction;a new hybrid sampling approach for classification of imbalanced datasets;secured and high performance distributed big data storage in cloud systems.machine learning-based framework for the analysis of project viability;feature-selection-based ransomware detection with machine learning of data analysis;and electricity price prediction for geographically distributed data centers in multi-region electricity markets.
Database industry is recently facing a major challenge in gaining scalability and handling multiple databases in one application. Relational database is clearly a well known standard for storing, managing and querying...
详细信息
ISBN:
(纸本)9781538625996
Database industry is recently facing a major challenge in gaining scalability and handling multiple databases in one application. Relational database is clearly a well known standard for storing, managing and querying information. It is used in variety of contexts including analytical querying and business intelligence. However, due to enormous growth in distributed databases and massive use of social networks, new requirements have emerged and graph-structured data is becoming more and more important. Graph database can store graph data more naturally. Relational databases and graph databases both have strengths and weaknesses depending on the characteristics of data and the types of queries to be evaluated. However benefits can be taken from mix of both by moderating some of the constraints. Thus propose a design of hybrid model such that the two models are integrated in one system to eliminate the limitations of individual systems. The hybrid system unifies the strengths of relational databases and graph databases by analyzing their strengths and weaknesses. This paper attempts to provide an overview of past investigation on the hybrid database model.
The proceedings contain 16 papers. The topics discussed include: WAZIUP, an open and versatile long-range IoT framework to fully take advantage of the cloudification of the IoT;Secure and parallel expressive search ov...
ISBN:
(纸本)9781538646298
The proceedings contain 16 papers. The topics discussed include: WAZIUP, an open and versatile long-range IoT framework to fully take advantage of the cloudification of the IoT;Secure and parallel expressive search over encrypted data with access control in multi-CloudIoT;performance analyses of quantized congestion notification for 5G distributed base station;securing IoT uplink communications against eavesdropping;a cloud-based virtual network operator for managing multimodal LPWANs and devices;and towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems.
Gathering is a fundamental coordination problem for multi robot systems. This paper presents a study of the gathering problem for a set of oblivious, autonomous mobile robots in the three dimensional Euclidean space, ...
详细信息
ISBN:
(纸本)9781450363723
Gathering is a fundamental coordination problem for multi robot systems. This paper presents a study of the gathering problem for a set of oblivious, autonomous mobile robots in the three dimensional Euclidean space, under obstructed visibility model. In this model, robots are considered to be opaque. Robots may not have the complete view of the configuration. This paper assumes only an agreement on the direction and orientation of one coordinate axis. A distributed algorithm is proposed to solve the gathering problem for a set of asynchronous robots, when the system does not contain any faulty robot. Another distributed algorithm is presented to solve the problem for a set of semi-synchronous robots under crash fault model. The proposed algorithm can tolerate an arbitrary number of crash faults. Both algorithms work for an arbitrary initial robot configuration.
Nowadays, the Internet of Things is significantly used in the world of information technology. One of the most important things for the Internet of Things is RFID tags that send information out of the environment. For...
详细信息
ISBN:
(纸本)9783319725505;9783319725499
Nowadays, the Internet of Things is significantly used in the world of information technology. One of the most important things for the Internet of Things is RFID tags that send information out of the environment. Forasmuch as the security process is important, the network authentication should be done with great accuracy. In this study, we propose a cryptographic authentication method that can increase the security of Internet of Things against various attacks.
暂无评论