This article through the concept, function and basic content analysis method of softwareengineering, the application of softwareengineering method and related technology in the development of computer application sy...
详细信息
ISBN:
(纸本)9781510871038
This article through the concept, function and basic content analysis method of softwareengineering, the application of softwareengineering method and related technology in the development of computer application system, so as to provide some technical reference for computersoftware development. Today, modern softwareengineering has been developed and characterized by an object centric approach. In the practical application, many softwareengineering methods and software environment can not be unified, so it will produce great constraint. Therefore, it is of practical significance to study the application of softwareengineering in modern software development.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Data security is becoming more and more crucial due to developments in communication and information technology, particularly when it comes to video transmission. This research provides a unique approach that combines...
详细信息
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o...
详细信息
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on softwareengineering and computer Systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 190 revised full p...
详细信息
ISBN:
(数字)9783642222030
ISBN:
(纸本)9783642222023
This Three-Volume-Set constitutes the refereed proceedings of the Second
International Conference on softwareengineering and computer Systems,
ICSECS 2011, held in Kuantan, Malaysia, in June 2011.
The 190 revised full papers presented together with invited papers in
the three volumes were carefully reviewed and selected from numerous
submissions. The papers are organized in topical sections on softwareengineering; network; bioinformatics and e-health; biometrics
technologies; Web engineering; neural network; parallel and distributed;
e-learning; ontology; image processing; information and data management;
engineering; software security; graphics and multimedia; databases;
algorithms; signal processing; software design/testing; e- technology;
ad hoc networks; social networks; software process modeling;
miscellaneous topics in softwareengineering and computer systems.
Secure deduplication not only optimizes cloud storage but also prevents data leakage. However, traditional schemes are with high computation and communication costs to deal with large-scale multimedia data. To address...
详细信息
EEG-based interfaces are an active research area with great potential. We, therefore, focused on classifying motor imaging (MI) tasks from various problem areas. Because of that, we applied MI patterns to voting ensem...
详细信息
Nowadays, bio-signal-based emotion recognition have become a popular research topic. However, there are some problems that must be solved before emotion-based systems can be realized. We therefore aimed to propose a f...
详细信息
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of softwareengineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of softwareengineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
RAN slicing technology is a key aspect of the Open RAN paradigm, allowing simultaneous and independent provision of various services such as ultra-reliable low-latency communications (URLLC), enhanced mobile broadband...
详细信息
暂无评论