default search action
13th IDC 2019: St. Petersburg, Russia
- Igor V. Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic:
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019. Studies in Computational Intelligence 868, Springer 2020, ISBN 978-3-030-32257-1
Internet of Things, Cloud Computing and Big Data
- Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné:
Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains. 3-12 - Oleg V. Baranov, Nikolay V. Smirnov, Tatiana E. Smirnova, Yefim V. Zholobov:
Design of Fail-Safe Quadrocopter Configuration. 13-22 - Sasa Pesic, Milos Radovanovic, Mirjana Ivanovic, Costin Badica, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic:
CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems. 23-34 - Vladimir Gorodetsky, Vladimir Larukchin, Petr Skobelev:
Conceptual Model of Digital Platform for Enterprises of Industry 5.0. 35-40 - Maria A. Poltavtseva, Maxim O. Kalinin:
Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security. 41-47 - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Smart Topic Sharing in IoT Platform Based on a Social Inspired Broker. 48-55 - Ichiro Satoh:
Easy Development of Software for IoT Systems. 56-61
Data Analysis, Mining and Machine Learning
- Fatemeh Khodaparast, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli:
Privacy-Preserving LDA Classification over Horizontally Distributed Data. 65-74 - Ivan Kholod, Andrey Shorov, Sergei Gorlatch:
Improving Parallel Data Mining for Different Data Distributions in IoT Systems. 75-85 - Felix Petcusin, Liana Stanescu, Costin Badica:
An Experiment on Automated Requirements Mapping Using Deep Learning Methods. 86-95 - Artem Kovalev, Nikita Voinov, Igor Nikiforov:
Using the Doc2Vec Algorithm to Detect Semantically Similar Jira Issues in the Process of Resolving Customer Requests. 96-101 - Diogo Ramos, Davide Carneiro, Paulo Novais:
evoRF: An Evolutionary Approach to Random Forests. 102-107 - Sergey I. Ivanov, G. N. Ilin:
The Method of Fuzzy Logic and Data Mining for Monitoring Troposphere Parameters Using Ground-Based Radiometric Complex. 108-114
Multi-agent and Service-Based Distributed Systems
- Yury Iskanderov, Mikhail Pautov:
Actor-Network Approach to Self-organisation in Global Logistics Networks. 117-127 - Jing Tan, Rongjun Xu, Kai Chen, Lars Braubach, Kai Jander, Alexander Pokahr:
Multi-agent System for Simulation of Response to Supply Chain Disruptions. 128-139 - Maria A. Butakova, Andrey V. Chernov, Ilias K. Savvas, Georgia Garani:
Data Warehouse Design for Security Applications Using Distributed Ontology-Based Knowledge Representation. 140-145
Distributed Algorithms and Optimization
- Amelia Badica, Costin Badica, Mirjana Ivanovic, Doina Logofatu:
Exploring the Space of Block Structured Scheduling Processes Using Constraint Logic Programming. 149-159 - Victor V. Toporkov, Anna S. Toporkova, Dmitry Yemelyanov:
Global and Private Job-Flow Scheduling Optimization in Grid Virtual Organizations. 160-169 - Roman A. Sizov, Dan A. Simovici:
Type-Based Genetic Algorithms. 170-176 - Tatiana M. Kosovskaya:
Distributed Construction of a Level Class Description in the Framework of Logic-Predicate Approach to AI Problems. 177-182 - Alina V. Boiko, Nikolay V. Smirnov:
On Approaches for Solving Nonlinear Optimal Control Problems. 183-188
Modeling Operational Processes for Intelligent Distributed Computing
- Valentin Olenev, Irina Lavrovskaya, Ilya Korobkov, Nikolay Sinyov, Yuriy Sheynin:
Hierarchical Simulation of Onboard Networks. 191-196 - Vincenza Carchiolo, Marco Grassia, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Strategies Comparison in Link Building Problem. 197-202 - Pavel I. Sharikov, Andrey V. Krasov, Artem M. Gelfand, Nikita A. Kosov:
Research of the Possibility of Hidden Embedding of a Digital Watermark Using Practical Methods of Channel Steganography. 203-209 - Hitoshi Mitake, Hiroshi Yamada, Tatsuo Nakajima:
A Highly Scalable Index Structure for Multicore In-Memory Database Systems. 210-217 - Vladimir Lokhvickii, Yuri Ryzhikov, Andry Dudkin:
Applying the Split-Join Queuing System Model to Estimating the Efficiency of Detecting Contamination Content Process in Multimedia Objects Streams. 218-223 - Sergey Krasnov, Vladimir Lokhvitckii, Andry Dudkin:
On the Applicability of the Modernized Method of Latent-Semantic Analysis to Identify Negative Content in Multimedia Objects. 224-229
Advanced Methods for Social Network Analysis and Inappropriate Content Counteraction
- Dmitry Gavra, Vladislav Dekalov, Ksenia Naumenko:
Digital Subjects as New Power Actors: A Critical View on Political, Media-, and Digital Spaces Intersection. 233-243 - Lidiya Vitkova, Igor Saenko, Olga Tushkanova:
An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet. 244-254 - Abhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
A Note on Analysing the Attacker Aims Behind DDoS Attacks. 255-265 - Sergey Pilkevich, Konstantin Gnidko:
Formation of the System of Signs of Potentially Harmful Multimedia Objects. 266-271 - Anastasiia O. Khlobystova, Maxim V. Abramov, Alexander L. Tulupyev:
Soft Estimates for Social Engineering Attack Propagation Probabilities Depending on Interaction Rates Among Instagram Users. 272-277 - Diana Gaifulina, Andrey Chechulin:
Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet. 278-284 - Lidia Vitkova, Maxim Kolomeets:
Approach to Identification and Analysis of Information Sources in Social Networks. 285-293 - Igor B. Parashchuk, Elena Doynikova:
The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects' Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing. 294-301 - Alexander Branitskiy, Elena Doynikova, Igor V. Kotenko, Natalia Krasilnikova, Dmitry Levshun, Artem Tishkov, Nina Vanchakova:
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing. 302-310
Intelligent Distributed Computing for Cyber-Physical Security and Safety
- Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure. 313-322 - Vasily Desnitsky, Nikolay Rudavin, Igor V. Kotenko:
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems. 323-332 - Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification. 333-343 - Alexey Lukashin, Mikhail Popov, Anatoliy Bolshakov, Yuri Nikolashin:
Scalable Data Processing Approach and Anomaly Detection Method for User and Entity Behavior Analytics Platform. 344-349 - Anastasia Balueva, Vasily Desnitsky, Igor Ushakov:
Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning. 350-355 - Maria Usova, Sergey Chuprov, Ilya I. Viksnin, Ruslan Gataullin, Antonina Komarova, Andrey Iuganson:
Model of Smart Manufacturing System. 356-362
Intelligent Distributed Decision Support Systems
- Alexsander N. Pavlov, Dmitry A. Pavlov, Valerii V. Zakharov:
Technology Resolution Criterion of Uncertainty in Intelligent Distributed Decision Support Systems. 365-373 - Oleg Karsaev, Evgeniy Minakov:
Satellite Constellation Control Based on Inter-Satellite Information Interaction. 374-384 - Maad M. Khalill, Anatoly D. Khomonenko, Sergey I. Gindin:
Load Balancing Cloud Computing with Web-Interface Using Multi-channel Queuing Systems with Warming up and Cooling. 385-393 - Inna Trofimova, Boris V. Sokolov, Dmitry Nazarov, Semyon A. Potryasaev, Andrey Musaev, Vladimir Kalinin:
Application of Cyber-Physical System and Real-Time Control Construction Algorithm in Supply Chain Management Problem. 394-403 - Andrey A. Tyugashev, Sergei Orlov:
Method for Design of 'smart' Spacecraft Onboard Decision Making in Case of Limited Onboard Resources. 404-413 - Elena Serova:
Intelligent Technologies and Systems for Spatial Industrial Strategic Planning. 414-422 - Alexander S. Geyda:
Conceptual and Formal Models of Information Technologies Use for Decisions Support in Technological Systems. 423-429 - Andrey A. Tyugashev, Alexander Kovalev, Vjacheslav Pjatkov:
Role and Future of Standards in Development of Intelligent and Dependable Control Software in Russian Space Industry. 430-436 - Samer El-Khatib, Yuri A. Skobtsov, Sergey Rodzin:
Improved Particle Swarm Medical Image Segmentation Algorithm for Decision Making. 437-442 - Dmitry N. Verzilin, Tatyana Maximova, Irina Sokolova:
Collecting and Processing Distributed Data for Decision Support in Social Ecology. 443-448 - V. V. Mikhailov, Alexandr V. Spesivtsev, Andrey Yu. Perevaryukha:
Evaluation of the Dynamics of Phytomass in the Tundra Zone Using a Fuzzy-Opportunity Approach. 449-454
Intelligent Human-Machine Interfaces
- Ildar Kagirov, Alexey Karpov, Irina S. Kipyatkova, Konstantin Klyuzhev, Alexander Kudryavcev, Igor Kudryavcev, Dmitry Ryumin:
Lower Limbs Exoskeleton Control System Based on Intelligent Human-Machine Interface. 457-466 - Vlado Delic, Dragisa Miskovic, Branislav M. Popovic, Milan Secujski, Sinisa Suzic, Tijana Delic, Niksa Jakovljevic:
Central Audio-Library of the University of Novi Sad. 467-476 - Alena Velichko, Viktor Budkov, Ildar Kagirov, Alexey Karpov:
Applying Ensemble Learning Techniques and Neural Networks to Deceptive and Truthful Information Detection Task in the Flow of Speech. 477-482
Security for Intelligent Distributed Computing - Machine Learning vs. Chains of Trust
- Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini:
Model Checking to Detect the Hummingbad Malware. 485-494 - Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. 495-504 - Andre Lopes, Andrew Hutchison:
Experimenting with Machine Learning in Automated Intrusion Response. 505-514 - Alexander A. Grusho, Nick A. Grusho, Elena E. Timonina:
Method of Several Information Spaces for Identification of Anomalies. 515-520 - Diethelm Bienhaus, Lukas Jäger, Roland Rieke, Christoph Krauß:
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors. 521-528
Visual Analytics in Distributed Environment
- Yulia A. Shichkina, Galina V. Kataeva, Yulia A. Irishina, Elizaveta S. Stanevich:
The Architecture of the System for Monitoring the Status in Patients with Parkinson's Disease Using Mobile Technologies. 531-540 - Yana A. Bekeneva, Vladimir Mochalov, Andrey Shorov:
Approach to Association and Classification Rules Visualization. 541-546 - Evgenia Novikova, Mikhail Bestuzhev, Andrey Shorov:
The Visualization-Driven Approach to the Analysis of the HVAC Data. 547-552
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.