Muutke küpsiste eelistusi

Service-Oriented Computing ICSOC 2020 Workshops: AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 1417, 2020, Proceedings 1st ed. 2021 [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 652 pages, kõrgus x laius: 235x155 mm, kaal: 1009 g, 158 Illustrations, color; 58 Illustrations, black and white; XIII, 652 p. 216 illus., 158 illus. in color., 1 Paperback / softback
  • Sari: Programming and Software Engineering 12632
  • Ilmumisaeg: 30-May-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303076351X
  • ISBN-13: 9783030763510
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 652 pages, kõrgus x laius: 235x155 mm, kaal: 1009 g, 158 Illustrations, color; 58 Illustrations, black and white; XIII, 652 p. 216 illus., 158 illus. in color., 1 Paperback / softback
  • Sari: Programming and Software Engineering 12632
  • Ilmumisaeg: 30-May-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303076351X
  • ISBN-13: 9783030763510
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020.





A total of 125 submissions were received for the satellite events. The volume includes 

9 papers from the PhD Symposium Track, 4 papers from the Demonstration Track, and  45 papers from the following workshops:







International Workshop on Artificial Intelligence for IT Operations (AIOps) International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020) 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020) International Workshop on AI-enabled Process Automation (AI-PA 2020) International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)









 
PhD Symposium.- Staking Assets Management on Blockchains: Vision and
Roadmap.- Hybrid Context aware method for quality assessment of data
streams.- Container-Based Network Architecture for Mobility, Energy and
Security Management as a Service in IoT Environments.- Towards a Rule-based
Recommendation Approach for Business Process Modeling.- Towards a Privacy
Conserved and Linked OpenData Based Device Recommendation in IoT.- Learning
Performance Models Automatically.- Formal Foundations for Intel SGX Data
Center Attestation Primitives.- Blockchain-Based Business Processes: A
Solidity-to-CPN Formal Verification Approach.- Formal Quality of Service
analysis in the Service Selection problem.- Software Demonstrations.- A
Crowdsourcing-Based Knowledge Graph Construction Platform.- Data Interaction
for IoT-Aware Wearable Process Management.- SiDD: The Situation-Aware
Distributed Deployment System.- AuraEN: Autonomous Resource Allocation for
Cloud-hosted Data Processing Pipelines.- AIOps 2020.-  Performance Diagnosis
in Cloud Microservices using Deep Learning.- Anomaly Detection at Scale: The
Case for Deep Distributional Time Series Models.- A Systematic Mapping Study
in AIOps.- An Influence-based Approach for Root Cause Alarm Discovery in
Telecom Networks.- Localization of operational faults in cloud applications
by mining causal dependencies in logs using Golden Signals.- Pre-training
Language Models for IT Operations.- Towards Runtime Verification via Event
Stream Processing in Cloud Computing Infrastructures.- Decentralized
Federated Learning Preserves Model and Data Privacy.- Online Memory Leak
Detection in the Cloud-based Infrastructures.- Multi-Source Anomaly Detection
in Distributed IT Systems.- TELESTO: A Graph Neural Network Model for Anomaly
Classification in Cloud Services.- Discovering Alarm Correlation Rules for
Network Fault Management.- Resource Sharing in Public Cloud System with
Evolutionary Multi-agent Artificial Swarm Intelligence.- SLMAD: Statistical
Learning-Based Metric Anomaly Detection.- Software Reliability Engineering
for Resilient Cloud Operations.- AI-PA 2020.- The Future of Robotic Process
Automation (RPA).- Adaptive Summaries: A Personalized Concept-based
Summarization Approach by Learning from Users' Feedback.- TAP: A Two-Level
Trust and Personality-aware Recommender System.- Am I Rare? An Intelligent
Summarization Approach for Identifying Hidden Anomalies.- On how Cognitive
Computing will plan your next Systematic Review.- Security Professionals'
Skills Representation for Bug Bounty Programs.- Stage-Based Process
Performance Mining.- AudioLens: Audio-Aware Video Recommendation for
Mitigating New Item Problem.- Scalable Online Conformance Checking Using
Incremental Prefix-Alignment Computation.- Bringing Cognitive Augmentation to
Web Browsing Accessibility.- Towards Knowledge-Driven Automatic Service
Composition for Wildfire Prediction.- Eyewitness Prediction During Crisis via
Linguistic Features.- STRAPS 2020.- On the definition of Data Regulation
Risk.- Classifying Micro-Text Document Datasets: Application to
Crisis-Related Tweets.- Data Centred and Usage-based Security service.- XYZ
Monitor: IoT Monitoring of Infrastructures using Microservices.- Multi-cloud
Solution Design for Migrating a Portfolio of Applications to the Cloud.-
Higher Order Statistical Analysis in Multiresolution Domain - Application to
Breast Cancer Histopathology.- Ontology Evolution using Recoverable SQL
Logs.- AI-IOTS 2020.- A Novel Automated System for Hospital Acquired
Infection Monitoring and Prevention.- A novel approach for detecting IoT
Botnet using balanced network traffic attributes.- KMeans Kernel- Learning
based AI-IoT framework for plant leaf disease detection.- System for
Monitoring and Control of Vehicles Carbon Emissions Using Embedded Hardwares
and Cloud Applications.- CFTIC 2020.- An Information Retrieval-based Approach
to Activity Recognition in Smart Homes.- Botnet sizes: when maths meet
myths.- Cyber Security Education and Future Provision.- Efficient Threat
Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.-
Peer-to-peer application threat investigation.