All Stories

  1. TDML — A Trustworthy Distributed Machine Learning Framework
  2. Blockchain-Enabled NFTs as Certificates for Next-Generation UAV Communication Systems
  3. Understanding DAOs: An Empirical Study on Governance Dynamics
  4. SoK: Bitcoin Layer Two (L2)
  5. Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage
  6. BRC20 Snipping Attack
  7. A Lightweight Blockchain-Based System for Efficient Metaverse Services
  8. 3D-DAG: Scaling Blockchain via DAG
  9. A Privacy-Aware Task Distribution Architecture for UAV Communications System Using Blockchain
  10. Efficient Incremental Verification of Neural Networks Guided by Counterexample Potentiality
  11. Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
  12. Decentralised Autonomous Organizations (DAOs): An Exploratory Survey
  13. Maximizing NFT Incentives: References Make You Rich
  14. Understanding BRC-20: Hope or Hype
  15. Towards Heterogeneity-Aware and Energy-Efficient Topology Optimization for Decentralized Federated Learning in Edge Environment
  16. Confix: Combining node-level fix templates and masked language model for automatic program repair
  17. MicroIRC: Instance-level Root Cause Localization for Microservice Systems
  18. Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse
  19. A Novel Method for Bitcoin Price Manipulation Identification Based on Graph Representation Learning
  20. A Blockchain-Based Self-Sovereign Identity System for KYC Processes
  21. SDTU-Net: Stepwise-Drop and Transformer-Based U-Net for Subject-Sensitive Hashing of HRRS Images
  22. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
  23. A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems
  24. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
  25. Modeling and exploring the evolution of the mobile software ecosystem: How far are we?
  26. Exploring Blockchains Interoperability: A Systematic Survey
  27. BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems
  28. Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling
  29. Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact
  30. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
  31. VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors
  32. Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution
  33. A First Look into Blockchain DAOs
  34. A Referable NFT Scheme
  35. Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused
  36. Predicting NFT Classification with GNN: A Recommender System for Web3 Assets
  37. Formal Security Analysis on dBFT Protocol of NEO
  38. Transparent Registration-Based Encryption through Blockchain
  39. SoK: DAG-based Blockchain Systems
  40. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
  41. Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images
  42. Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders
  43. Adapting New Learners and New Resources to Micro Open Learning via Online Computation
  44. Digging into primary financial market: The issues of primary financial market issuance and investigations from the perspective of blockchain
  45. A Hybrid Incentive Mechanism for Decentralized Federated Learning
  46. Blockchain Enables Your Bill Safer
  47. Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems
  48. DeDa: A DeFi-enabled Data Sharing and Trading System
  49. Software engineers' response to public crisis
  50. i-Bond: A Next Generation Bond’s Issuing Service System
  51. Internet of Things – ICIOT 2021
  52. How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing
  53. AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
  54. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain
  55. An instance-oriented performance measure for classification
  56. Capability-based IoT access control using blockchain
  57. Applying blockchain for primary financial market: A survey
  58. Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain
  59. Towards Interconnected Blockchains
  60. C_CART: An instance confidence-based decision tree algorithm for classification
  61. Patterns for Blockchain-Based Payment Applications
  62. Bottleneck-Aware Resource Allocation for Service Processes
  63. ServiceNet
  64. Anonymous Blockchain-based System for Consortium
  65. Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
  66. Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection
  67. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
  68. Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems
  69. BIDI: A classification algorithm with instance difficulty invariance
  70. Object Versioning for Flow-Sensitive Pointer Analysis
  71. A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles
  72. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
  73. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
  74. ChainSim: A P2P Blockchain Simulation Framework
  75. HFM++: An Enhanced Holographic Factorization Machine for Recommendation
  76. A Deep Recommendation Framework for Completely New Users in Mashup Creation
  77. BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
  78. Vulnerabilities, Threats, and Impacts of False Data Injection Attacks in Smart Grids: An Overview
  79. Analytics on Health of Mobile Software Ecosystem Based on the Internal Operating Mechanism
  80. Ponzi Contracts Detection Based on Improved Convolutional Neural Network
  81. Statistical Techniques-based Characterization of FDIA in Smart Grids Considering Grid Contingencies
  82. Multi-focus image fusion based on L1 image transform
  83. Public and private blockchain in construction business process and information integration
  84. Exposing Android Event-Based Races by Selective Branch Instrumentation
  85. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity
  86. Real-Time Optimization of Dynamic Speed Scaling for Distributed Data Centers
  87. Statistical Detection Of Collective Data Fraud
  88. Decentralized Real-Time Optimization of Voltage Reconfigurable Cloud Computing Data Center
  89. Software Architecture for Blockchain-based Trade Certificate Systems
  90. Frequency-Reconfigurable Cloud Versus Fog Computing: An Energy-Efficiency Aspect
  91. BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
  92. Security Analysis on dBFT Protocol of NEO
  93. Attention-Based High-Order Feature Interactions to Enhance the Recommender System for Web-Based Knowledge-Sharing Service
  94. Deep-Cross-Attention Recommendation Model for Knowledge Sharing Micro Learning Service
  95. FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification
  96. Security Analysis on Tangle-Based Blockchain Through Simulation
  97. STRIP
  98. Byte2vec: Malware Representation and Feature Selection for Android
  99. DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
  100. From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning
  101. Pipeline provenance for cloud‐based big data analytics
  102. Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds
  103. Cost-Efficient Stream Processing on the Cloud
  104. Crossover Service Fusion Approach Based on Microservice Architecture
  105. A Landscape of Cryptocurrencies
  106. A RESTful architecture for data exploration as a service
  107. Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android
  108. Building Secure SRAM PUF Key Generators on Resource Constrained Devices
  109. Particle Swarm Optimization of Real-Time PID Controllers
  110. An Energy-Efficient Transmission Strategy for Cache-Enabled Wireless Networks With Non-Negligible Circuit Power
  111. APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home
  112. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
  113. Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis
  114. A Study of Contemporary System Performance Testing Framework
  115. Urban Traffic Analysis Using Social Media Data on the Cloud
  116. Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud
  117. (WIP) Evaluation of a Cloud-Based System for Delivering Adaptive Micro Open Education Resource to Fresh Learners
  118. Elevated incidence of monozygotic twinning is associated with extended embryo culture, but not with zona pellucida manipulation or freeze-thaw procedure
  119. Spatio-temporal context reduction
  120. Live path control flow integrity
  121. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
  122. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
  123. REMOTE SENSING IMAGE QUALITY ASSESSMENT EXPERIMENT WITH POST-PROCESSING
  124. Pregnancy outcomes of PCOS overweight/obese patients after controlled ovarian stimulation with the GnRH antagonist protocol and frozen embryo transfer
  125. MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning
  126. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
  127. Malytics: A Malware Detection Scheme
  128. Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques
  129. Live Path CFI Against Control Flow Hijacking Attacks
  130. Data Service API Design for Data Analytics
  131. A Heuristic Approach for New-Item Cold Start Problem in Recommendation of Micro Open Education Resources
  132. A Simulation Approach for Studying Behavior and Quality of Blockchain Networks
  133. Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  134. Learning Latent Byte-Level Feature Representation for Malware Detection
  135. A Study of Contemporary System Performance Testing Framework
  136. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection
  137. A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment
  138. A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
  139. TruXy: Trusted Storage Cloud for Scientific Workflows
  140. Ontological Learner Profile Identification for Cold Start Problem in Micro Learning Resources Delivery
  141. Blockchain Based Data Integrity Service Framework for IoT Data
  142. Assisting Open Education Resource Providers and Instructors to Deal with Cold Start Problem in Adaptive Micro Learning: A Service Oriented Solution
  143. Body composition substudy of the SECOND-LINE study
  144. Extracting Fine-Grained Service Value Features and Distributions for Accurate Service Recommendation
  145. ProductRec: Product Bundle Recommendation Based on User's Sequential Patterns in Social Networking Service Environment
  146. Towards Massive Data and Sparse Data in Adaptive Micro Open Educational Resource Recommendation: A Study on Semantic Knowledge Base Construction and Cold Start Problem
  147. Empirically characteristic analysis of chaotic PID controlling particle swarm optimization
  148. Ovarian response prediction in controlled ovarian stimulation for IVF using anti-Müllerian hormone in Chinese women
  149. An adaptive prediction approach based on workload pattern discrimination in the cloud
  150. Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming
  151. ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
  152. Organizing Online Computation for Adaptive Micro Open Education Resource Recommendation
  153. Predicting the Evolution of Service Value Features from User Reviews for Continuous Service Improvement
  154. SwingDB: An Embedded In-memory DBMS Enabling Instant Snapshot Sharing
  155. Handbook of Research on End-to-End Cloud Computing Architecture Design
  156. Build security into pub/sub middleware
  157. Realizing IoT service’s policy privacy over publish/subscribe-based middleware
  158. Choice of Software Development Methodologies: Do Organizational, Project, and Team Characteristics Matter?
  159. Profiling and Supporting Adaptive Micro Learning on Open Education Resources
  160. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies
  161. Facilitating Secure Sharing of Personal Health Data in the Cloud
  162. Automated memory leak fixing on value-flow slices for C programs
  163. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
  164. The Blockchain as a Software Connector
  165. K-PRSCAN: A clustering method based on PageRank
  166. PBCP: A Process-based Bussiness Collaboration Platform
  167. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations
  168. A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
  169. Towards Bringing Adaptive Micro Learning into MOOC Courses
  170. Automated Policy Combination for Data Sharing across Multiple Organizations
  171. Cloud Docs: Secure Scalable Document Sharing on Public Clouds
  172. MLaaS: A Cloud System for Mobile Micro Learning in MOOC
  173. ReputationNet: Reputation-Based Service Recommendation for e-Science
  174. Self Protecting Data Sharing Using Generic Policies
  175. Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences
  176. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds
  177. Numerical simulation of a new two-dimensional variable-order fractional percolation equation in non-homogeneous porous media
  178. Protecting and Analysing Health Care Data on Cloud
  179. Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem
  180. Cloud Based Toolbox for Image Analysis, Processing and Reconstruction Tasks
  181. Synergistic delivery of gold nanorods using multifunctional microbubbles for enhanced plasmonic photothermal therapy
  182. An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory
  183. Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
  184. A platform for secure monitoring and sharing of generic health data in the Cloud
  185. Cost-oriented proactive fault tolerance approach to high performance computing (HPC) in the cloud
  186. Service-Oriented Computing – ICSOC 2013 Workshops
  187. Security, Privacy and Trust in Cloud Systems
  188. A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem
  189. Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud
  190. Secure and Controlled Sharing of Data in Distributed Computing
  191. Secure Data Sharing in the Cloud
  192. Energy Efficient Fault Tolerance for High Performance Computing (HPC) in the Cloud
  193. Cloud Computing for High Performance Image Analysis on a National Infrastructure
  194. A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems
  195. A Mobile Cloud with Trusted Data Provenance Services for Bioinformatics Research
  196. Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All?
  197. Biomedical image analysis and processing in clouds
  198. A Performance Evaluation of Public Cloud Using TPC-C
  199. Data Provenance and Data Management in eScience
  200. A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud
  201. A performance evaluation of distributed database architectures
  202. ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services
  203. A Financial Compensation Based Transaction Management Model for Service-Oriented Business Collaborations
  204. Business Process Engine Simulator
  205. A Fault Tolerance Framework for High Performance Computing in Cloud
  206. A configurable UI framework for easy composition visualisation of web services at semantic level.
  207. A Consolidated Process Model for Identity Management
  208. Accountability for Service Compliance
  209. A MapReduce-Based Parallel Clustering Algorithm for Large Protein-Protein Interaction Networks
  210. A Secure Storage Service in the Hybrid Cloud
  211. Secure Connectivity for Intra-cloud and Inter-cloud Communication
  212. Modelling Collaborative Services for Business and QoS Compliance
  213. DIaaS: Data Integrity as a Service in the Cloud
  214. Feedback loop mechanisms based particle swarm optimization with neighborhood topology
  215. Dynamic Business Collaborations Through Contract Services
  216. Facilitating Biodefense Research with Mobile-Cloud Computing
  217. A Service-Oriented User Interface for the Next Generation Web
  218. Dynamic Business Collaborations Through Contract Services
  219. A Test-bed for the Evaluation of Business Process Prediction Techniques
  220. A Mobile Web Service Middleware and Its Performance Study
  221. A Smart User Interface for Service-Oriented Web
  222. mBOSSS+: A Mobile Web Services Framework
  223. Accountability as a Service for the Cloud
  224. A Mobile Learning System for Syndromic Surveillance and Diagnosis
  225. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
  226. An Application-Level Data Transparent Authentication Scheme without Communication Overhead
  227. End-to-End Service Support for Mashups
  228. TrustStore: Making Amazon S3 Trustworthy with Services Composition
  229. Managing Web Services: An Application in Bioinformatics
  230. A Contract-Based Accountability Service Model
  231. Supporting Bioinformatic Experiments with a Service Query Engine
  232. A Contract Language for Service-Oriented Dynamic Collaborations
  233. A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context
  234. Finite difference approximations for the fractional Fokker–Planck equation
  235. Secure and Conditional Resource Coordination for Successful Collaborations
  236. Facilitating Dynamic Collaborations with eContract Services
  237. Composing Adaptive Web Services on COTS Middleware
  238. WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations
  239. Message from the SEASS Workshop Chairs
  240. WSLA+: Web Service Level Agreement Language for Collaborations
  241. Achieving simultaneous distribution control and privacy protection for Internet media delivery
  242. Yet Another Performance Testing Framework
  243. ADI-Euler and extrapolation methods for the two-dimensional fractional advection-dispersion equation
  244. Cooperative Data Management Services Based on Accountable Contract
  245. Performance Evaluation and Modeling of Web Services Security
  246. Explicitly Controlling the Fair Service for Busy Web Servers
  247. An Infrastructure Virtualisation SOA for VNO-based Business Models
  248. User-Controlled Collaborations in the Context of Trust Extended Environments
  249. Virtual Storage Services for Dynamic Collaborations
  250. Auto-tune design and evaluation on staged event-driven architecture
  251. A Performance Evaluation of Web Services Security
  252. Evaluation and Modeling of Web Services Performance
  253. Performance prediction of component-based applications
  254. A low energy, high-luminosity, high-resolution double-focusing magnetic beta-ray spectrometer for measuring neutrino rest mass
  255. The Radioactive Decay of 44gSc and 44mSc
  256. Facilitating Biodefense Research with Mobile-Cloud Computing
  257. A predictive performance model to evaluate the contention cost in application servers
  258. Evaluating the scalability of Enterprise JavaBeans technology
  259. A Technology and Process Analysis for Contemporary Identity Management Frameworks
  260. Cost of Using Cloud Computing
  261. International Journal of Systems and Service-Oriented Engineering