Computer Science & Engineering: Recent submissions
Now showing items 441-460 of 2402
-
An Ontology-Based Context-Aware Mobile System for On-the-Move Tourists
( Springer Verlag , 2013 , Conference Paper)Ontology-based model in context-aware systems offers more expressiveness, semantically sharing and interoperability. It supports reasoning tasks in a better way than other approaches. However, the main concern with ontology ... -
Overview of CheckThat! 2020: Automatic Identification and Verification of Claims in Social Media
( Springer Science and Business Media Deutschland GmbH , 2020 , Conference Paper)We present an overview of the third edition of the CheckThat! Lab at CLEF 2020. The lab featured five tasks in two different languages: English and Arabic. The first four tasks compose the full pipeline of claim verification ... -
CheckThat! at CLEF 2020: Enabling the automatic identification and verification of claims in social media
( Springer , 2020 , Conference Paper)We describe the third edition of the CheckThat! Lab, which is part of the 2020 Cross-Language Evaluation Forum (CLEF). CheckThat! proposes four complementary tasks and a related task from previous lab editions, offered in ... -
Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar's Mega Sporting Events
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Unmanned aircraft vehicles (UAVs) are now used to support security precautions in search and rescue operations to track and evaluate critical services, to provide cybersecurity measures by transporting security supply chain ... -
A New Shift in Implementing Unmanned Aerial Vehicles (UAVs) in the Safety and Security of Smart Cities: A Systematic Literature Review
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article Review)The rapid rise of Unmanned Aerial Vehicles (UAVs) and their integration into smart city initiatives has sparked a surge of research interest in a broad array of thematic areas. This study undertakes a comprehensive review ... -
Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Information-technology (IT) security standards are regularly updated in a rapidly changing technological world to maintain pace with advanced technologies. This study was motivated by the realization that established IT ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article Review)Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ... -
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ... -
Interactive Graphical Access Control Tools
( IEEE Computer Society , 2023 , Conference Paper)Access control (AC) policy creation and implementation is challenging because of its complex structure and specifications. This paper explores the potential of two novel interactive graphical displays whose design draws ... -
Machine Learning Techniques for Network Anomaly Detection: A Survey
( IEEE , 2020 , Conference Paper)Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit ... -
Hybrid Machine Learning for Network Anomaly Intrusion Detection
( IEEE , 2020 , Conference Paper)In this paper, a hybrid approach of combing two machine learning algorithms is proposed to detect the different possible attacks by performing effective feature selection and classification. This system uses Random Forest ... -
Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory
( IEEE , 2023 , Conference Paper)The Wireless Sensor Networks (WSN) are designed to remotely monitor and control specific physical or environmental conditions. However, due to the open nature of WSN, many threats and attacks may arise by malicious users ... -
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
( IEEE , 2023 , Article)Data centers serve as the backbone for cloud computing, enterprise services, and infrastructure-based offerings. One area of ongoing research in data center networking focuses on innovating new topologies for large-scale ... -
Overview of the CLEF-2021 CheckThat! Lab Task 1 on check-worthiness estimation in tweets and political debates
( CEUR-WS , 2021 , Conference Paper)We present an overview of Task 1 of the fourth edition of the CheckThat! Lab, part of the 2021 Conference and Labs of the Evaluation Forum (CLEF). The task asks to predict which posts in a Twitter stream are worth ... -
The many benefits of annotator rationales for relevance judgments
( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ... -
Mix and match: Collaborative expert-crowd judging for building test collections accurately and affordably
( CEUR-WS , 2018 , Conference Paper)Crowdsourcing offers an affordable and scalable means to collect relevance judgments for information retrieval test collections. However, crowd assessors may showhigher variance in judgment quality than trusted assessors. ... -
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to Ensure Quality Relevance Annotations
( AAAI Press , 2018 , Conference Paper)While peer-agreement and gold checks are well-established methods for ensuring quality in crowdsourced data collection, we explore a relatively new direction for quality control: estimating work quality directly from ... -
Annotator rationales for labeling tasks in crowdsourcing
( Elsevier , 2020 , Article)When collecting item ratings from human judges, it can be difficult to measure and enforce data quality due to task subjectivity and lack of transparency into how judges make each rating decision. To address this, we ... -
ArTest: The First Test Collection for Arabic Web Search with Relevance Rationales
( Association for Computing Machinery, Inc , 2020 , Conference Paper)The scarcity of Arabic test collections has long hindered information retrieval (IR) research over the Arabic Web. In this work, we present ArTest, the first large-scale test collection designed for the evaluation of ad-hoc ...