


default search action
18th ICSOC Workshops 2020: Dubai, United Arab Emirates
- Hakim Hacid

, Fatma Outay
, Hye-young Paik
, Amira Alloum, Marinella Petrocchi
, Mohamed Reda Bouadjenek
, Amin Beheshti
, Xumin Liu, Abderrahmane Maaradji
:
Service-Oriented Computing - ICSOC 2020 Workshops - AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12632, Springer 2021, ISBN 978-3-030-76351-0
Ph.D Symposium
- Stefan Driessen:

Staking Assets Management on Blockchains: Vision and Roadmap. 3-9 - Mostafa Mirzaie

:
Hybrid Context-Aware Method for Quality Assessment of Data Streams. 10-16 - Zahid Iqbal

:
Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments. 17-24 - Diana Sola

:
Towards a Rule-Based Recommendation Approach for Business Process Modeling. 25-31 - Fouad Komeiha, Nasredine Cheniki, Yacine Sam, Ali Jaber, Nizar Messai, Thomas Devogele:

Towards a Privacy Conserved and Linked Open Data Based Device Recommendation in IoT. 32-39 - Runan Wang:

Learning Performance Models Automatically. 40-46 - Ikram Garfatta

, Kaïs Klai, Mahamed Graïet, Walid Gaaloul:
Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach. 47-53 - Agustín Eloy Martinez Suñé:

Formal Quality of Service Analysis in the Service Selection Problem. 54-60
Software Demonstrations
- Xingkun Liu, Zhiying Tu, Zhongjie Wang, Xiaofei Xu, Yin Chen:

A Crowdsourcing-Based Knowledge Graph Construction Platform. 63-66 - Stefan Schönig, Richard Jasinski, Andreas Ermer:

Data Interaction for IoT-Aware Wearable Process Management. 67-71 - Kálmán Képes

, Frank Leymann, Benjamin Weder
, Karoline Wild:
SiDD: The Situation-Aware Distributed Deployment System. 72-76 - Sunil Singh Samant

, Mohan Baruwal Chhetri
, Quoc Bao Vo, Ryszard Kowalczyk
, Surya Nepal
:
AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines. 77-80
Artificial Intelligence for IT Operations (AIOPS 2020)
- Li Wu, Jasmin Bogatinovski, Sasho Nedelkoski, Johan Tordsson, Odej Kao:

Performance Diagnosis in Cloud Microservices Using Deep Learning. 85-96 - Fadhel Ayed, Lorenzo Stella, Tim Januschowski, Jan Gasthaus:

Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models. 97-109 - Paolo Notaro

, Jorge Cardoso, Michael Gerndt:
A Systematic Mapping Study in AIOps. 110-123 - Keli Zhang, Marcus Kalander, Min Zhou, Xi Zhang, Junjian Ye:

An Influence-Based Approach for Root Cause Alarm Discovery in Telecom Networks. 124-136 - Pooja Aggarwal, Ajay Gupta, Prateeti Mohapatra, Seema Nagar, Atri Mandal, Qing Wang, Amit M. Paradkar:

Localization of Operational Faults in Cloud Applications by Mining Causal Dependencies in Logs Using Golden Signals. 137-149 - Xiaotong Liu, Yingbei Tong, Anbang Xu, Rama Akkiraju:

Using Language Models to Pre-train Features for Optimizing Information Technology Operations Management Tasks. 150-161 - Domenico Cotroneo, Luigi De Simone

, Pietro Liguori
, Roberto Natella
, Angela Scibelli:
Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures. 162-175 - Thorsten Wittkopp, Alexander Acker:

Decentralized Federated Learning Preserves Model and Data Privacy. 176-187 - Anshul Jindal

, Paul Staab, Jorge Cardoso
, Michael Gerndt
, Vladimir Podolskiy
:
Online Memory Leak Detection in the Cloud-Based Infrastructures. 188-200 - Jasmin Bogatinovski, Sasho Nedelkoski:

Multi-source Anomaly Detection in Distributed IT Systems. 201-213 - Dominik Scheinert, Alexander Acker:

TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services. 214-227 - Philippe Fournier-Viger

, Ganghuan He, Min Zhou, Mourad Nouioua
, Jiahong Liu:
Discovering Alarm Correlation Rules for Network Fault Management. 228-239 - Beiran Chen, Yi Zhang, George Iosifidis:

Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence. 240-251 - Arsalan Shahid, Gary White, Jaroslaw Diuwe, Alexandros Agapitos, Owen O'Brien:

SLMAD: Statistical Learning-Based Metric Anomaly Detection. 252-263 - Michael R. Lyu, Yuxin Su:

Software Reliability Engineering for Resilient Cloud Operations. 264-268
AI-Enabled Process Automation (AI-PA 2020)
- Aditya Ghose, Geeta Mahala, Simon Pulawski

, Hoa Khanh Dam:
The Future of Robotic Process Automation (RPA). 273-280 - Samira Ghodratnama

, Mehrdad Zakershahrak, Fariborz Sobhanmanesh:
Adaptive Summaries: A Personalized Concept-Based Summarization Approach by Learning from Users' Feedback. 281-293 - Shahpar Yakhchi, Seyed Mohssen Ghafari

, Mehmet A. Orgun
:
TAP: A Two-Level Trust and Personality-Aware Recommender System. 294-308 - Samira Ghodratnama

, Mehrdad Zakershahrak, Fariborz Sobhanmanesh:
Am I Rare? an Intelligent Summarization Approach for Identifying Hidden Anomalies. 309-323 - Maisie Badami, Marcos Báez, Shayan Zamanirad, Wei Kang:

On How Cognitive Computing Will Plan Your Next Systematic Review. 324-333 - Sara Mumtaz, Carlos Rodríguez

, Shayan Zamanirad:
Security Professional Skills Representation in Bug Bounty Programs and Processes. 334-348 - Chiao-Yun Li, Sebastiaan J. van Zelst, Wil M. P. van der Aalst

:
Stage-Based Process Performance Analysis. 349-364 - Mohammad Hossein Rimaz

, Reza Hosseini, Mehdi Elahi
, Farshad Bakhshandegan Moghaddam:
AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem. 365-378 - Daniel Schuster

, Gero Joss Kolhof:
Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation. 379-394 - Alessandro Pina, Marcos Báez, Florian Daniel:

Bringing Cognitive Augmentation to Web Browsing Accessibility. 395-407 - Hela Taktak

, Khouloud Boukadi
, Chirine Ghedira Guegan, Michael Mrissa, Faïez Gargouri
:
Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction. 408-420 - Suliman Aladhadh:

Eyewitness Prediction During Crisis via Linguistic Features. 421-429
Smart Data Integration and Processing on Service Based Environments (STRAPS 2020)
- Guillaume Delorme, Guilaine Talens, Eric Disson, Guillaume Collard, Elise Gaget:

On the Definition of Data Regulation Risk. 433-443 - Mehrdad Farokhnejad, Raj Ratn Pranesh, Javier A. Espinosa-Oviedo:

Classifying Micro-text Document Datasets: Application to Query Expansion of Crisis-Related Tweets. 444-456 - Jingya Yuan

, Frédérique Biennier
, Aïcha-Nabila Benharkat
:
Data Centered and Usage-Based Security Service. 457-471 - Marc Vila

, Maria-Ribera Sancho, Ernest Teniente:
XYZ Monitor: IoT Monitoring of Infrastructures Using Microservices. 472-484 - Shubhi Asthana, Aly Megahed, Ilyas Iyoob:

Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud. 485-494 - Durgamahanthi Vaishali, P. Vishnu Priya, Nithyasri Govind, K. Venkat Ratna Prabha:

Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology. 495-508 - Awais Yousaf, Asad Masood Khattak, Kifayat-Ullah Khan:

Ontology Evolution Using Recoverable SQL Logs. 509-517
Artificial Intelligence in the IoT Security Services (AI-IOTS 2020)
- Samyak Shrimali:

A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention. 523-533 - M. Shobana

, Poonkuzhali Sugumaran
:
A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes. 534-548 - Youssouph Gueye, Maïssa Mbaye

:
KMeans Kernel-Learning Based AI-IoT Framework for Plant Leaf Disease Detection. 549-563 - Tsvetan Tsokov

, Hristo Kostadinov:
System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications. 564-577
Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020)
- Brendon J. Woodford, Ahmad Ghandour

:
An Information Retrieval-Based Approach to Activity Recognition in Smart Homes. 583-595 - Elisa Chiapponi

, Marc Dacier, Massimiliano Todisco, Onur Catakoglu, Olivier Thonnard:
Botnet Sizes: When Maths Meet Myths. 596-611 - Gaynor Davies, Mamoun Qasem, Ahmed M. Elmisery

:
Cyber Security Education and Future Provision. 612-626 - Ahmed M. Elmisery

, Mirela Sertovic, Mamoun Qasem:
Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform. 627-641 - Mohamed Mahdy:

Peer-to-Peer Application Threat Investigation. 642-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














