Connected Autonomous Vehicle (CAV) Driving, as a data-driven intelligent driving technology within the Internet of Vehicles (IoV), presents significant challenges to the efficiency and security of real-time data manag...
详细信息
Connected Autonomous Vehicle (CAV) Driving, as a data-driven intelligent driving technology within the Internet of Vehicles (IoV), presents significant challenges to the efficiency and security of real-time data management. The combination of Web3.0 and edge content caching holds promise in providing low-latency data access for CAVs’ real-time applications. Web3.0 enables the reliable pre-migration of frequently requested content from content providers to edge nodes. However, identifying optimal edge node peers for joint content caching and replacement remains challenging due to the dynamic nature of traffic flow in IoV. Addressing these challenges, this article introduces GAMA-Cache, an innovative edge content caching methodology leveraging Graph Attention Networks (GAT) and Multi-Agent Reinforcement Learning (MARL). GAMA-Cache conceptualizes the cooperative edge content caching issue as a constrained Markov decision process. It employs a MARL technique predicated on cooperation effectiveness to discern optimal caching decisions, with GAT augmenting information extracted from adjacent nodes. A distinct collaborator selection mechanism is also developed to streamline communication between agents, filtering out those with minimal correlations in the vector input to the policy network. Experimental results demonstrate that, in terms of service latency and delivery failure, the GAMA-Cache outperforms other state-of-the-art MARL solutions for edge content caching in IoV.
With the technical advancement of digital media and the medium of communication in recent years, there is a widespread interest in digital entertainment. An emerging te- nical research area edutainment, or educational...
详细信息
ISBN:
(数字)9783642145339
ISBN:
(纸本)9783642145322
With the technical advancement of digital media and the medium of communication in recent years, there is a widespread interest in digital entertainment. An emerging te- nical research area edutainment, or educational entertainment, has been accepted as education using digital entertainment. Edutainment has been recognized as an eff- tive way of learning using modern digital media tools, like computers, games, mobile phones, televisions, or other virtual reality applications, which emphasizes the use of entertainment with application to the education domain. The Edutainment conference series was established in 2006 and subsequently - ganized as a special event for researchers working in this new interest area of e-learning and digital entertainment. The main purpose of Edutainment conferences is to facilitate the discussion, presentation, and information exchange of the scientific and technological development in the new community. The Edutainment conference series becomes a valuable opportunity for researchers, engineers, and graduate s- dents to communicate at these international annual events. The conference series - cludes plenary invited talks, workshops, tutorials, paper presentation tracks, and panel discussions. The Edutainment conference series was initiated in Hangzhou, China in 2006. Following the success of the first event, the second (Edutainment 2007 in Hong Kong, China), third (Edutainment 2008 in Nanjing, China), and fourth editions (Edutainment 2009 in Banff, Canada) were organized. Edutainment 2010 was held during August 16–18, 2010 in Changchun, China. Two workshops were jointly org- ized together with Edutainment 2010.
This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of computer Science, SOFSEM 2012, held in Špindlerův Mlýn, Czech Republic, in January 2012. The 43 re...
详细信息
ISBN:
(数字)9783642276606
ISBN:
(纸本)9783642276590
This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of computer Science, SOFSEM 2012, held in Špindlerův Mlýn, Czech Republic, in January 2012.
The 43 revised papers presented in this volume were carefully reviewed and selected from 121 submissions. The book also contains 11 invited talks, 10 of which are in full-paper length. The contributions are organized in topical sections named: foundations of computer science; software and Web engineering; cryptography, security, and verification; and artificial intelligence.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are org...
详细信息
ISBN:
(数字)9783642395277
ISBN:
(纸本)9783642395260
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006....
详细信息
ISBN:
(数字)9783540476627
ISBN:
(纸本)9783540476597
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006. In line with its reputation as one of the pre-eminent fora for the discussion and debate of advances of distributed systems management, the 2006 iteration of DSOM brought together an international audience of researchers and practitioners from both industry and academia. th DSOM 2006 was the 17 in a series of annual workshops, and it followed the footsteps of highly successful previous meetings, the most recent of which were held in Barcelona, Spain (DSOM 2005), Davis, USA (DSOM 2004), Heidelberg, Germany (DSOM 2003), Montreal, Canada (DSOM 2002) and Nancy, France (DSOM 2001). The goal of the DSOM workshops is to bring together researchers in the areas of networks, systems and services management, from both industry and academia, to discuss recent advances and foster future growth in these ?elds. In contrast to the larger management symposia, such as Integrated Management (IM) and Network Operations and Management (NOMS), the DSOM workshops are organised as sing- track programmes in order to stimulate interaction among participants. Following the excellent experiences from the previous year, DSOM was for the th
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques, such as biometric authentication systems, have been developed in recent years. This pa...
详细信息
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques, such as biometric authentication systems, have been developed in recent years. This paper provides a detailed review of keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promises to be nonintrusive and cost-effective. In addition, no additional hardware is required, making it convenient to deploy. This survey covers novel keystroke datasets, state-of-the-art keystroke authentication algorithms, keystroke authentication on touch screen and mobile devices, and various prominent applications of such techniques beyond authentication. The paper covers all the significant aspects of keystroke dynamics and can be considered a reference for future researchers in this *** paper includes a discussion of the latest keystroke datasets, providing researchers with an up-to-date resource for analysis and experimentation. In addition, this survey covers the state-of-the-art algorithms adopted within this domain, offering insights into the cutting-edge techniques utilized for keystroke analysis. Moreover, this paper explains the diverse applications of keystroke dynamics, particularly focusing on security, verification, and identification uses. Beyond these crucial areas, we mention additional applications where keystroke dynamics can be applied, broadening the scope of understanding regarding its potential impact across various domains. Unlike previous survey papers, which typically concentrate on specific aspects of keystroke dynamics, our comprehensive analysis presents all relevant areas within this field. By introducing discussions on the latest advances, we provide readers with a thorough understanding of the current landscape and emerging trends in keystroke dynamics research. Furthermore, this paper presents a summary of
Data warehousing and knowledge discovery has been widely accepted as a key te- nology for enterprises and organizations to improve their abilities in data analysis, decision support, and the automatic extraction of kn...
详细信息
ISBN:
(数字)9783642151057
ISBN:
(纸本)9783642151040
Data warehousing and knowledge discovery has been widely accepted as a key te- nology for enterprises and organizations to improve their abilities in data analysis, decision support, and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision-making process, the data to be considered become more and more complex in both structure and semantics. New developments such as cloud computing add to the challenges with massive scaling, a new computing infrastructure, and new types of data. Consequently, the process of retrieval and knowledge discovery from this huge amount of heterogeneous complex data forms the litmus test for research in the area. In the last decade, the International Conference on Data Warehousing and Kno- edge Discovery (DaWaK) has become one of the most important international sci- tific events bringing together researchers, developers, and practitioners to discuss the latest research issues and experiences in developing and deploying data warehousing and knowledge discovery systems, applications, and solutions. th This year’s conference, the 12 International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2010), continued the tradition by discussing and disseminating innovative principles, methods, algorithms, and solutions to challe- ing problems faced in the development of data warehousing, knowledge discovery, the emerging area of "cloud intelligence," and applications within these areas. In order to better reflect novel trends and the diversity of topics, the conference was organized in four tracks: Cloud Intelligence, Data Warehousing, Knowledge Discovery, and Industry and Applications.
暂无评论