default search action
18th ICSOC Workshops 2020: Dubai, United Arab Emirates
- Hakim Hacid, Fatma Outay, Hye-young Paik, Amira Alloum, Marinella Petrocchi, Mohamed Reda Bouadjenek, Amin Beheshti, Xumin Liu, Abderrahmane Maaradji:
Service-Oriented Computing - ICSOC 2020 Workshops - AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12632, Springer 2021, ISBN 978-3-030-76351-0
Ph.D Symposium
- Stefan Driessen:
Staking Assets Management on Blockchains: Vision and Roadmap. 3-9 - Mostafa Mirzaie:
Hybrid Context-Aware Method for Quality Assessment of Data Streams. 10-16 - Zahid Iqbal:
Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments. 17-24 - Diana Sola:
Towards a Rule-Based Recommendation Approach for Business Process Modeling. 25-31 - Fouad Komeiha, Nasredine Cheniki, Yacine Sam, Ali Jaber, Nizar Messai, Thomas Devogele:
Towards a Privacy Conserved and Linked Open Data Based Device Recommendation in IoT. 32-39 - Runan Wang:
Learning Performance Models Automatically. 40-46 - Ikram Garfatta, Kaïs Klai, Mahamed Graïet, Walid Gaaloul:
Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach. 47-53 - Agustín Eloy Martinez Suñé:
Formal Quality of Service Analysis in the Service Selection Problem. 54-60
Software Demonstrations
- Xingkun Liu, Zhiying Tu, Zhongjie Wang, Xiaofei Xu, Yin Chen:
A Crowdsourcing-Based Knowledge Graph Construction Platform. 63-66 - Stefan Schönig, Richard Jasinski, Andreas Ermer:
Data Interaction for IoT-Aware Wearable Process Management. 67-71 - Kálmán Képes, Frank Leymann, Benjamin Weder, Karoline Wild:
SiDD: The Situation-Aware Distributed Deployment System. 72-76 - Sunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, Ryszard Kowalczyk, Surya Nepal:
AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines. 77-80
Artificial Intelligence for IT Operations (AIOPS 2020)
- Li Wu, Jasmin Bogatinovski, Sasho Nedelkoski, Johan Tordsson, Odej Kao:
Performance Diagnosis in Cloud Microservices Using Deep Learning. 85-96 - Fadhel Ayed, Lorenzo Stella, Tim Januschowski, Jan Gasthaus:
Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models. 97-109 - Paolo Notaro, Jorge Cardoso, Michael Gerndt:
A Systematic Mapping Study in AIOps. 110-123 - Keli Zhang, Marcus Kalander, Min Zhou, Xi Zhang, Junjian Ye:
An Influence-Based Approach for Root Cause Alarm Discovery in Telecom Networks. 124-136 - Pooja Aggarwal, Ajay Gupta, Prateeti Mohapatra, Seema Nagar, Atri Mandal, Qing Wang, Amit M. Paradkar:
Localization of Operational Faults in Cloud Applications by Mining Causal Dependencies in Logs Using Golden Signals. 137-149 - Xiaotong Liu, Yingbei Tong, Anbang Xu, Rama Akkiraju:
Using Language Models to Pre-train Features for Optimizing Information Technology Operations Management Tasks. 150-161 - Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, Angela Scibelli:
Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures. 162-175 - Thorsten Wittkopp, Alexander Acker:
Decentralized Federated Learning Preserves Model and Data Privacy. 176-187 - Anshul Jindal, Paul Staab, Jorge Cardoso, Michael Gerndt, Vladimir Podolskiy:
Online Memory Leak Detection in the Cloud-Based Infrastructures. 188-200 - Jasmin Bogatinovski, Sasho Nedelkoski:
Multi-source Anomaly Detection in Distributed IT Systems. 201-213 - Dominik Scheinert, Alexander Acker:
TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services. 214-227 - Philippe Fournier-Viger, Ganghuan He, Min Zhou, Mourad Nouioua, Jiahong Liu:
Discovering Alarm Correlation Rules for Network Fault Management. 228-239 - Beiran Chen, Yi Zhang, George Iosifidis:
Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence. 240-251 - Arsalan Shahid, Gary White, Jaroslaw Diuwe, Alexandros Agapitos, Owen O'Brien:
SLMAD: Statistical Learning-Based Metric Anomaly Detection. 252-263 - Michael R. Lyu, Yuxin Su:
Software Reliability Engineering for Resilient Cloud Operations. 264-268
AI-Enabled Process Automation (AI-PA 2020)
- Aditya Ghose, Geeta Mahala, Simon Pulawski, Hoa Khanh Dam:
The Future of Robotic Process Automation (RPA). 273-280 - Samira Ghodratnama, Mehrdad Zakershahrak, Fariborz Sobhanmanesh:
Adaptive Summaries: A Personalized Concept-Based Summarization Approach by Learning from Users' Feedback. 281-293 - Shahpar Yakhchi, Seyed Mohssen Ghafari, Mehmet A. Orgun:
TAP: A Two-Level Trust and Personality-Aware Recommender System. 294-308 - Samira Ghodratnama, Mehrdad Zakershahrak, Fariborz Sobhanmanesh:
Am I Rare? an Intelligent Summarization Approach for Identifying Hidden Anomalies. 309-323 - Maisie Badami, Marcos Báez, Shayan Zamanirad, Wei Kang:
On How Cognitive Computing Will Plan Your Next Systematic Review. 324-333 - Sara Mumtaz, Carlos Rodríguez, Shayan Zamanirad:
Security Professional Skills Representation in Bug Bounty Programs and Processes. 334-348 - Chiao-Yun Li, Sebastiaan J. van Zelst, Wil M. P. van der Aalst:
Stage-Based Process Performance Analysis. 349-364 - Mohammad Hossein Rimaz, Reza Hosseini, Mehdi Elahi, Farshad Bakhshandegan Moghaddam:
AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem. 365-378 - Daniel Schuster, Gero Joss Kolhof:
Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation. 379-394 - Alessandro Pina, Marcos Báez, Florian Daniel:
Bringing Cognitive Augmentation to Web Browsing Accessibility. 395-407 - Hela Taktak, Khouloud Boukadi, Chirine Ghedira Guégan, Michael Mrissa, Faïez Gargouri:
Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction. 408-420 - Suliman Aladhadh:
Eyewitness Prediction During Crisis via Linguistic Features. 421-429
Smart Data Integration and Processing on Service Based Environments (STRAPS 2020)
- Guillaume Delorme, Guilaine Talens, Eric Disson, Guillaume Collard, Elise Gaget:
On the Definition of Data Regulation Risk. 433-443 - Mehrdad Farokhnejad, Raj Ratn Pranesh, Javier A. Espinosa-Oviedo:
Classifying Micro-text Document Datasets: Application to Query Expansion of Crisis-Related Tweets. 444-456 - Jingya Yuan, Frédérique Biennier, Aïcha-Nabila Benharkat:
Data Centered and Usage-Based Security Service. 457-471 - Marc Vila, Maria-Ribera Sancho, Ernest Teniente:
XYZ Monitor: IoT Monitoring of Infrastructures Using Microservices. 472-484 - Shubhi Asthana, Aly Megahed, Ilyas Iyoob:
Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud. 485-494 - Durgamahanthi Vaishali, P. Vishnu Priya, Nithyasri Govind, K. Venkat Ratna Prabha:
Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology. 495-508 - Awais Yousaf, Asad Masood Khattak, Kifayat-Ullah Khan:
Ontology Evolution Using Recoverable SQL Logs. 509-517
Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)
- Samyak Shrimali:
A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention. 523-533 - M. Shobana, Poonkuzhali Sugumaran:
A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes. 534-548 - Youssouph Gueye, Maïssa Mbaye:
KMeans Kernel-Learning Based AI-IoT Framework for Plant Leaf Disease Detection. 549-563 - Tsvetan Tsokov, Hristo Kostadinov:
System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications. 564-577
Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020)
- Brendon J. Woodford, Ahmad Ghandour:
An Information Retrieval-Based Approach to Activity Recognition in Smart Homes. 583-595 - Elisa Chiapponi, Marc Dacier, Massimiliano Todisco, Onur Catakoglu, Olivier Thonnard:
Botnet Sizes: When Maths Meet Myths. 596-611 - Gaynor Davies, Mamoun Qasem, Ahmed M. Elmisery:
Cyber Security Education and Future Provision. 612-626 - Ahmed M. Elmisery, Mirela Sertovic, Mamoun Qasem:
Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform. 627-641 - Mohamed Mahdy:
Peer-to-Peer Application Threat Investigation. 642-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.