Cantitate/Preț
Produs

Service-Oriented Computing – ICSOC 2020 Workshops: AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings: Lecture Notes in Computer Science, cartea 12632

Editat de Hakim Hacid, Fatma Outay, Hye-young Paik, Amira Alloum, Marinella Petrocchi, Mohamed Reda Bouadjenek, Amin Beheshti, Xumin Liu, Abderrahmane Maaradji
en Limba Engleză Paperback – 30 mai 2021
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020.
A total of 125 submissions were received for the satellite events. The volume includes 
9 papers from the PhD Symposium Track,
4 papers from the Demonstration Track, and 
45 papers from the following workshops:

  • International Workshop on Artificial Intelligence for IT Operations (AIOps)
  • International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020)
  • 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020)
  • International Workshop on AI-enabled Process Automation (AI-PA 2020)
  • International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)
 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 34365 lei

Preț vechi: 42957 lei
-20% Nou

Puncte Express: 515

Preț estimativ în valută:
6577 6832$ 5463£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030763510
ISBN-10: 303076351X
Pagini: 652
Ilustrații: XIII, 652 p. 216 illus., 158 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.92 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Programming and Software Engineering

Locul publicării:Cham, Switzerland

Cuprins

PhD Symposium.- Staking Assets Management on Blockchains: Vision and Roadmap.- Hybrid Context aware method for quality assessment of data streams.- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments.- Towards a Rule-based Recommendation Approach for Business Process Modeling.- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT.- Learning Performance Models Automatically.- Formal Foundations for Intel SGX Data Center Attestation Primitives.- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach.- Formal Quality of Service analysis in the Service Selection problem.- Software Demonstrations.- A Crowdsourcing-Based Knowledge Graph Construction Platform.- Data Interaction for IoT-Aware Wearable Process Management.- SiDD: The Situation-Aware Distributed Deployment System.- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines.- AIOps 2020.-  Performance Diagnosis in Cloud Microservices using Deep Learning.- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models.- A Systematic Mapping Study in AIOps.- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks.- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals.- Pre-training Language Models for IT Operations.- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures.- Decentralized Federated Learning Preserves Model and Data Privacy.- Online Memory Leak Detection in the Cloud-based Infrastructures.- Multi-Source Anomaly Detection in Distributed IT Systems.- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services.- Discovering Alarm Correlation Rules for Network Fault Management.- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence.- SLMAD: Statistical Learning-Based Metric Anomaly Detection.- Software Reliability Engineering for Resilient Cloud Operations.- AI-PA 2020.- The Future of Robotic Process Automation (RPA).- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback.- TAP: A Two-Level Trust and Personality-aware Recommender System.- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies.- On how Cognitive Computing will plan your next Systematic Review.- Security Professionals' Skills Representation for Bug Bounty Programs.- Stage-Based Process Performance Mining.- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem.- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation.- Bringing Cognitive Augmentation to Web Browsing Accessibility.- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction.- Eyewitness Prediction During Crisis via Linguistic Features.- STRAPS 2020.- On the definition of Data Regulation Risk.- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets.- Data Centred and Usage-based Security service.- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices.- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud.- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology.- Ontology Evolution using Recoverable SQL Logs.- AI-IOTS 2020.- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention.- A novel approach for detecting IoT Botnet using balanced network traffic attributes.- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection.- System for Monitoring and Control of Vehicle’s Carbon Emissions Using Embedded Hardwares and Cloud Applications.- CFTIC 2020.- An Information Retrieval-based Approach to Activity Recognition in Smart Homes.- Botnet sizes: when maths meet myths.- Cyber Security Education and Future Provision.- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.- Peer-to-peer application threat investigation.