The two-volume set LNAI 7802 and LNAI 7803 constitutes the refereed proceedings of the 5th Asian Conference on Intelligent Information and Database systems, ACIIDS 2013, held in Kuala Lumpur, Malaysia in March 2013.;T...
详细信息
ISBN:
(数字)9783642365461
ISBN:
(纸本)9783642365454
The two-volume set LNAI 7802 and LNAI 7803 constitutes the refereed proceedings of the 5th Asian Conference on Intelligent Information and Database systems, ACIIDS 2013, held in Kuala Lumpur, Malaysia in March 2013.;The 108 revised papers presented were carefully reviewed and selected from numerous submissions. The papers included are grouped into topical sections on: innovations in intelligent computation and applications; intelligent database systems; intelligent information systems; tools and applications; intelligent recommender systems; multiple modal approach to machine learning; engineering knowledge and semantic systems; computational biology and bioinformatics; computational intelligence; modeling and optimization techniques in information systems, database systems and industrial systems; intelligent supply chains; applied data mining for semantic Web; semantic Web and ontology; integration of information systems; and conceptual modeling in advanced database systems.
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile,...
详细信息
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile, machine learning (ML) has been applied to enhance analysis and plan functions of MAPE so that self-adaptive systems have optimal adaption to changing conditions. However, most of ML-based approaches don’t utilize CAVs’ connectivity to collaboratively generate an optimal learner for MAPE, because of sensor data threatened by gradient leakage attack (GLA). In this article, we first design an intelligent architecture for MAPE-based self-adaptive systems on Web 3.0-based CAVs, in which a collaborative machine learner supports the capabilities of managing systems. Then, we observe by practical experiments that importance sampling of sparse vector technique (SVT) approaches cannot defend GLA well. Next, we propose a fine-grained SVT approach to secure the learner in MAPE-based self-adaptive systems, that uses layer and gradient sampling to select uniform and important gradients. At last, extensive experiments show that our private learner spends a slight utility cost for MAPE (e.g., \(0.77\%\) decrease in accuracy) defending GLA and outperforms the typical SVT approaches in terms of defense (increased by \(10\%\sim 14\%\) attack success rate) and utility (decreased by \(1.29\%\) accuracy loss).
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006....
详细信息
ISBN:
(数字)9783540476627
ISBN:
(纸本)9783540476597
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006. In line with its reputation as one of the pre-eminent fora for the discussion and debate of advances of distributed systems management, the 2006 iteration of DSOM brought together an international audience of researchers and practitioners from both industry and academia. th DSOM 2006 was the 17 in a series of annual workshops, and it followed the footsteps of highly successful previous meetings, the most recent of which were held in Barcelona, Spain (DSOM 2005), Davis, USA (DSOM 2004), Heidelberg, Germany (DSOM 2003), Montreal, Canada (DSOM 2002) and Nancy, France (DSOM 2001). The goal of the DSOM workshops is to bring together researchers in the areas of networks, systems and services management, from both industry and academia, to discuss recent advances and foster future growth in these ?elds. In contrast to the larger management symposia, such as Integrated Management (IM) and Network Operations and Management (NOMS), the DSOM workshops are organised as sing- track programmes in order to stimulate interaction among participants. Following the excellent experiences from the previous year, DSOM was for the th
Computational Intelligence is comparatively a new field but it has made a tremendous progress in virtually every discipline right from engineering, science, business, m- agement, aviation to healthcare. Computational ...
详细信息
ISBN:
(数字)9783642144646
ISBN:
(纸本)9783642144639;9783642264924
Computational Intelligence is comparatively a new field but it has made a tremendous progress in virtually every discipline right from engineering, science, business, m- agement, aviation to healthcare. Computational intelligence already has a solid track-record of applications to healthcare, of which this book is a continuation. We would like to refer the reader to the excellent previous volumes in this series on computational intelligence in heal- care [1-3]. This book is aimed at providing the most recent advances and state of the art in the practical applications of computational intelligence paradigms in healthcare. It - cludes nineteen chapters on using various computational intelligence methods in healthcare such as intelligent agents and case-based reasoning. A number of fielded applications and case studies are presented. Highlighted are in particular novel c- putational approaches to the semantic management of health information such as in the Web 2.0, mobile agents such as in portable devices, learning agents capable of adapting to diverse clinical settings through case-based reasoning, and statistical - proaches in computational intelligence. This book is targeted towards scientists, application engineers, professors, health professionals, professors, and students. Background information on computational intelligence has been provided whenever necessary to facilitate the comprehension of a broad audience including healthcare practitioners.
This two volume set LNCS 7446 and LNCS 7447 constitutes the refereed proceedings of the 23rd International Conference on Database and Expert systems Applications, DEXA 2012, held in Vienna, Austria, September 3-6, 201...
详细信息
ISBN:
(数字)9783642326004
ISBN:
(纸本)9783642325991
This two volume set LNCS 7446 and LNCS 7447 constitutes the refereed proceedings of the 23rd International Conference on Database and Expert systems Applications, DEXA 2012, held in Vienna, Austria, September 3-6, 2012.;The 49 revised full papers presented together with 37 short papers and 2 keynote talks were carefully reviewed and selected from 179 submissions. These papers discuss a range of topics including: database query processing, in particular XML queries; labelling of XML documents; computational efficiency, data extraction; personalization, preferences, and ranking; security and privacy; database schema evaluation and evolution; semantic Web; privacy and provenance; data mining; data streaming; distributed systems; searching and query answering; structuring, compression and optimization; failure, fault analysis, and uncertainty; predication, extraction, and annotation; ranking and personalisation; database partitioning and performance measurement; recommendation and prediction systems; business processes; social networking.
Trajectory prediction is a crucial challenge in autonomous vehicle motion planning and decision-making techniques. However, existing methods face limitations in accurately capturing vehicle dynamics and interactions. ...
详细信息
Trajectory prediction is a crucial challenge in autonomous vehicle motion planning and decision-making techniques. However, existing methods face limitations in accurately capturing vehicle dynamics and interactions. To address this issue, this paper proposes a novel approach to extracting vehicle velocity and acceleration, enabling the learning of vehicle dynamics and encoding them as auxiliary information. The VDI-LSTM model is designed, incorporating graph convolution and attention mechanisms to capture vehicle interactions using trajectory data and dynamic information. Specifically, a dynamics encoder is designed to capture the dynamic information, a dynamic graph is employed to represent vehicle interactions, and an attention mechanism is introduced to enhance the performance of LSTM and graph convolution. To demonstrate the effectiveness of our model, extensive experiments are conducted, including comparisons with several baselines and ablation studies on real-world highway datasets. Experimental results show that VDI-LSTM outperforms other baselines compared, which obtains a 3% improvement on the average RMSE indicator over the five prediction steps.
This collection represents the proceedings of the 1st GSFC/JPL Workshop on Radical Agent Concepts (WRAC), which was held on 16–18 January, 2002 at the Science Applications International Corporation (SAIC) Conference ...
详细信息
ISBN:
(数字)9783540451730
ISBN:
(纸本)9783540407256
This collection represents the proceedings of the 1st GSFC/JPL Workshop on Radical Agent Concepts (WRAC), which was held on 16–18 January, 2002 at the Science Applications International Corporation (SAIC) Conference Center in McLean, VA, USA. Over the past few years, agent technologyhas emerged as a powerful force in computing. Agent technology may well form the foundation for the next gen- ation of computing systems. New and innovative agent concepts and techniques may bring further developments to this exploding area of research. Such work is often strongly inspired by theoretical or empirical studies of human behavior, social intelligence, psychology, arts, biology, computer science and philosophy. Thisworkshopaimedatbringingtogether,inaninterdisciplinaryevent,or- inal thinkers, practitioners and academics with an interest in radical (very - novative) concepts for agent-based systems. The workshop provided a forum to present the latest research?ndings in many aspects of agent technology. The - ganizers welcomed participation by those working in agent architectures, agent communities, agent communications, agent modeling, agent applications and other agent-related areas. We were particularly seeking papers on novel and - novative ideas, pushing the envelope of current agent technology. Contributions without a prototype or working system, i.e., purely conceptual contributions, were welcomed, and ”out-of-the-box” thinkers were especially encouraged to participate. The workshop was structured so as to allow the participants adequate time for discussion and interaction, to exchange ideas and re?ect on the motivations, scienti?c grounds and practical consequences of the concepts presented.
暂无评论