libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

hacid hakim (curatore); outay fatma (curatore); paik hye-young (curatore); alloum amira (curatore); petrocchi marinella (curatore); bouadjenek mohamed reda (curatore); beheshti amin (curatore); liu xumin (curatore); maaradji abderrahmane (curatore) - service-oriented computing  – icsoc 2020 workshops

Service-Oriented Computing – ICSOC 2020 Workshops AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings

; ; ; ; ; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 05/2021
Edizione: 1st ed. 2021





Trama

This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020.

A total of 125 submissions were received for the satellite events. The volume includes 

9 papers from the PhD Symposium Track,
4 papers from the Demonstration Track, and 
45 papers from the following workshops:

  • International Workshop on Artificial Intelligence for IT Operations (AIOps)
  • International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020)
  • 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020)
  • International Workshop on AI-enabled Process Automation (AI-PA 2020)
  • International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)

 





Sommario

PhD Symposium.- Staking Assets Management on Blockchains: Vision and Roadmap.- Hybrid Context aware method for quality assessment of data streams.- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments.- Towards a Rule-based Recommendation Approach for Business Process Modeling.- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT.- Learning Performance Models Automatically.- Formal Foundations for Intel SGX Data Center Attestation Primitives.- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach.- Formal Quality of Service analysis in the Service Selection problem.- Software Demonstrations.- A Crowdsourcing-Based Knowledge Graph Construction Platform.- Data Interaction for IoT-Aware Wearable Process Management.- SiDD: The Situation-Aware Distributed Deployment System.- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines.- AIOps 2020.-  Performance Diagnosis in Cloud Microservices using Deep Learning.- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models.- A Systematic Mapping Study in AIOps.- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks.- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals.- Pre-training Language Models for IT Operations.- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures.- Decentralized Federated Learning Preserves Model and Data Privacy.- Online Memory Leak Detection in the Cloud-based Infrastructures.- Multi-Source Anomaly Detection in Distributed IT Systems.- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services.- Discovering Alarm Correlation Rules for Network Fault Management.- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence.- SLMAD: Statistical Learning-Based Metric Anomaly Detection.- Software Reliability Engineering for Resilient Cloud Operations.- AI-PA 2020.- The Future of Robotic Process Automation (RPA).- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback.- TAP: A Two-Level Trust and Personality-aware Recommender System.- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies.- On how Cognitive Computing will plan your next Systematic Review.- Security Professionals' Skills Representation for Bug Bounty Programs.- Stage-Based Process Performance Mining.- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem.- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation.- Bringing Cognitive Augmentation to Web Browsing Accessibility.- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction.- Eyewitness Prediction During Crisis via Linguistic Features.- STRAPS 2020.- On the definition of Data Regulation Risk.- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets.- Data Centred and Usage-based Security service.- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices.- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud.- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology.- Ontology Evolution using Recoverable SQL Logs.- AI-IOTS 2020.- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention.- A novel approach for detecting IoT Botnet using balanced network traffic attributes.- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection.- System for Monitoring and Control of Vehicle’s Carbon Emissions Using Embedded Hardwares and Cloud Applications.- CFTIC 2020.- An Information Retrieval-based Approach to Activity Recognition in Smart Homes.- Botnet sizes: when maths meet myths.- Cyber Security Education and Future Provision.- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.- Peer-to-peer application threat investigation.










Altre Informazioni

ISBN:

9783030763510

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIII, 652 p. 216 illus., 158 illus. in color.
Pagine Arabe: 652
Pagine Romane: xiii


Dicono di noi