Computer Science & Engineering: Recent submissions
Now showing items 621-640 of 2402
-
Policy-based customisation and corrective adaptation of composite web services
( Inderscience Publishers , 2011 , Article)Due to the typical long-running character of business processes, it is often desirable to be able to change a running process to respond to changes of business requirements and company policies. However, current process ... -
Scalable Containerized Pipeline for Real-time Big Data Analytics
( IEEE Computer Society , 2022 , Conference Paper)With the widespread usage of IoT, processing data streams in real-time have become very important. The traditional data-stream processing systems are inefficient in processing big data for detecting anomalies, classifications, ... -
A model-based approach to self-protection in computing system
( Association for Computing Machinery, Inc , 2013 , Conference Paper)This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ... -
An autonomic detection and protection system for denial of service attack
( ACTA Press , 2012 , Conference Paper)This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ... -
Applying and evaluating architectural patterns on a stock trading case study
( IEEE , 2012 , Conference Paper)Teaching architectural and design patterns is a difficult task and not easy to understand by the students as patterns are expressed at a higher abstraction level than programming language constructs or graphical UML ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Online cost optimization algorithms for tiered cloud storage services
( Elsevier , 2020 , Article)The new generation multi-tiered cloud storage services offer various tiers, such as hot and cool tiers, which are characterized by differentiated Quality of Service (QoS) (i.e., access latency, availability and throughput) ... -
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Safety risk assessment is an essential process to ensure a dependable cyber-physical system (CPS) design. Traditional risk assessment considers only physical failures. For modern CPSs, failures caused by cyber attacks are ... -
Social-sensor cloud service for scene reconstruction
( Springer Verlag , 2017 , Conference Paper)We propose a new social-sensor cloud services selection framework for scene reconstruction. The proposed research represents social media data streams, i.e., images' metadata and related posted information, as social sensor ... -
Crowd Counting: A Survey of Machine Learning Approaches
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Crowd counting is applied in many areas including efficient resources allocation and effective management of emergency situations. In this paper, we survey and compare various crowd counting methods. Additionally, we ... -
Spatiotemporal Tensor Completion for Improved Urban Traffic Imputation
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Effective management of urban traffic is important for any smart city initiative. Therefore, the quality of the sensory traffic data is of paramount importance. However, like any sensory data, urban traffic data are prone ... -
Software interfaces: On the impact of interface design anomalies
( IEEE , 2013 , Conference Paper)Interfaces are recognized as an important mechanism to define contracts governing interactions between semi-independent software modules. Well-designed interfaces significantly reduce software complexity and ease maintainability ... -
Mobile crowdsourced sensors selection for journey services
( Springer Verlag , 2018 , Conference Paper)We propose a mobile crowdsourced sensors selection approach to improve the journey planning service especially in areas where no wireless or vehicular sensors are available. We develop a location estimation model of journey ... -
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
( Springer Science and Business Media Deutschland GmbH , 2021 , Article)To assist policymakers in making adequate decisions to stop the spread of the COVID-19 pandemic, accurate forecasting of the disease propagation is of paramount importance. This paper presents a deep learning approach to ... -
Towards model-based management of database fragmentation
( USENIX Association , 2013 , Conference Paper)The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ... -
Optimal inconsistency repairing of pairwise comparison matrices using integrated linear programming and eigenvector methods
( Hindawi Publishing Corporation , 2014 , Article)Satisfying consistency requirements of pairwise comparison matrix (PCM) is a critical step in decision making methodologies. An algorithm has been proposed to find a new modified consistent PCM in which it can replace the ... -
Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique
( IOS Press , 2018 , Article)The proper expression of the potentially useful but hidden information in large-scale datasets via using proper structure is vital important in both theory and applications of advanced pattern mining. The fundamental ... -
Chatbot Application to Support Smart Agriculture in Thailand
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)A chatbot is a software developed to help reply to text or voice conversations automatically and quickly in real time. In the agriculture sector, the existing smart agriculture systems just use data from sensing and internet ... -
The research on detection of crop diseases ranking based on transfer learning
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Crop diseases are a major global threat to food security. Because the lack of agriculture experts or necessary facilities, it is difficult to determine the type of disease, as well as the degree of disease in time, which ... -
Hesitant extension of fuzzy-rough set to address uncertainty in classification
( IOS Press , 2018 , Article)Although fuzzy rough sets have been considered as a powerful theory to handle real-valued data with uncertainty, fuzzy rough sets based algorithms reached their limit of conveying hesitation information in the processes ...