Service-Oriented Computing ¿ ICSOC 2020 Workshops

Service-Oriented Computing  ¿ ICSOC 2020 Workshops
-0 %
AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14¿17, 2020, Proceedings
 Paperback
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I

Unser bisheriger Preis:ORGPRICE: 53,49 €

Jetzt 53,48 €* Paperback

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9783030763510
Veröffentl:
2021
Einband:
Paperback
Erscheinungsdatum:
30.05.2021
Seiten:
668
Autor:
Hakim Hacid
Gewicht:
996 g
Format:
235x155x36 mm
Serie:
12632, Programming and Software Engineering
Sprache:
Englisch
Beschreibung:

This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020.

A total of 125 submissions were received for the satellite events. The volume includes 

9 papers from the PhD Symposium Track,
4 papers from the Demonstration Track, and 
45 papers from the following workshops:

  • International Workshop on Artificial Intelligence for IT Operations (AIOps)
  • International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020)
  • 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020)
  • International Workshop on AI-enabled Process Automation (AI-PA 2020)
  • International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)

 

PhD Symposium.- Staking Assets Management on Blockchains: Vision and Roadmap.- Hybrid Context aware method for quality assessment of data streams.- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments.- Towards a Rule-based Recommendation Approach for Business Process Modeling.- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT.- Learning Performance Models Automatically.- Formal Foundations for Intel SGX Data Center Attestation Primitives.- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach.- Formal Quality of Service analysis in the Service Selection problem.- Software Demonstrations.- A Crowdsourcing-Based Knowledge Graph Construction Platform.- Data Interaction for IoT-Aware Wearable Process Management.- SiDD: The Situation-Aware Distributed Deployment System.- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines.- AIOps 2020.-  Performance Diagnosis in Cloud Microservices using Deep Learning.- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models.- A Systematic Mapping Study in AIOps.- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks.- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals.- Pre-training Language Models for IT Operations.- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures.- Decentralized Federated Learning Preserves Model and Data Privacy.- Online Memory Leak Detection in the Cloud-based Infrastructures.- Multi-Source Anomaly Detection in Distributed IT Systems.- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services.- Discovering Alarm Correlation Rules for Network Fault Management.- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence.- SLMAD: Statistical Learning-Based Metric Anomaly Detection.- Software Reliability Engineering for Resilient Cloud Operations.- AI-PA 2020.- The Future of Robotic Process Automation (RPA).- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback.- TAP: A Two-Level Trust and Personality-aware Recommender System.- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies.- On how Cognitive Computing will plan your next Systematic Review.- Security Professionals' Skills Representation for Bug Bounty Programs.- Stage-Based Process Performance Mining.- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem.- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation.- Bringing Cognitive Augmentation to Web Browsing Accessibility.- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction.- Eyewitness Prediction During Crisis via Linguistic Features.- STRAPS 2020.- On the definition of Data Regulation Risk.- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets.- Data Centred and Usage-based Security service.- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices.- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud.- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology.- Ontology Evolution using Recoverable SQL Logs.- AI-IOTS 2020.- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention.- A novel approach for detecting IoT Botnet using balanced network traffic attributes.- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection.- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications.- CFTIC 2020.- An Information Retrieval-based Approach to Activity Recognition in Smart Homes.- Botnet sizes: when maths meet myths.- Cyber Security Education and Future Provision.- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.- Peer-to-peer application threat investigation.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.