All Stories

  1. STAR: Spatial-Temporal Autoscaling for Cloud Applications with Deep Reinforcement Learning
  2. TDML — A Trustworthy Distributed Machine Learning Framework
  3. Blockchain-Enabled NFTs as Certificates for Next-Generation UAV Communication Systems
  4. Understanding DAOs: An Empirical Study on Governance Dynamics
  5. SoK: Bitcoin Layer Two (L2)
  6. Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage
  7. BRC20 Snipping Attack
  8. A Lightweight Blockchain-Based System for Efficient Metaverse Services
  9. 3D-DAG: Scaling Blockchain via DAG
  10. A Privacy-Aware Task Distribution Architecture for UAV Communications System Using Blockchain
  11. Efficient Incremental Verification of Neural Networks Guided by Counterexample Potentiality
  12. Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
  13. Decentralised Autonomous Organizations (DAOs): An Exploratory Survey
  14. Maximizing NFT Incentives: References Make You Rich
  15. Understanding BRC-20: Hope or Hype
  16. Towards Heterogeneity-Aware and Energy-Efficient Topology Optimization for Decentralized Federated Learning in Edge Environment
  17. Confix: Combining node-level fix templates and masked language model for automatic program repair
  18. MicroIRC: Instance-level Root Cause Localization for Microservice Systems
  19. Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse
  20. A Novel Method for Bitcoin Price Manipulation Identification Based on Graph Representation Learning
  21. A Blockchain-Based Self-Sovereign Identity System for KYC Processes
  22. SDTU-Net: Stepwise-Drop and Transformer-Based U-Net for Subject-Sensitive Hashing of HRRS Images
  23. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
  24. A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems
  25. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
  26. Modeling and exploring the evolution of the mobile software ecosystem: How far are we?
  27. Exploring Blockchains Interoperability: A Systematic Survey
  28. BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems
  29. Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling
  30. Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact
  31. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
  32. VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors
  33. Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution
  34. A First Look into Blockchain DAOs
  35. A Referable NFT Scheme
  36. Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused
  37. Predicting NFT Classification with GNN: A Recommender System for Web3 Assets
  38. Formal Security Analysis on dBFT Protocol of NEO
  39. Transparent Registration-Based Encryption through Blockchain
  40. SoK: DAG-based Blockchain Systems
  41. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
  42. Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images
  43. Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders
  44. Adapting New Learners and New Resources to Micro Open Learning via Online Computation
  45. Digging into primary financial market: The issues of primary financial market issuance and investigations from the perspective of blockchain
  46. A Hybrid Incentive Mechanism for Decentralized Federated Learning
  47. Blockchain Enables Your Bill Safer
  48. Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems
  49. DeDa: A DeFi-enabled Data Sharing and Trading System
  50. Software engineers' response to public crisis
  51. i-Bond: A Next Generation Bond’s Issuing Service System
  52. Internet of Things – ICIOT 2021
  53. How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing
  54. AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
  55. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain
  56. An instance-oriented performance measure for classification
  57. Capability-based IoT access control using blockchain
  58. Applying blockchain for primary financial market: A survey
  59. Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain
  60. Towards Interconnected Blockchains
  61. C_CART: An instance confidence-based decision tree algorithm for classification
  62. Patterns for Blockchain-Based Payment Applications
  63. Bottleneck-Aware Resource Allocation for Service Processes
  64. ServiceNet
  65. Anonymous Blockchain-based System for Consortium
  66. Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
  67. Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection
  68. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
  69. Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems
  70. BIDI: A classification algorithm with instance difficulty invariance
  71. Object Versioning for Flow-Sensitive Pointer Analysis
  72. A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles
  73. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
  74. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
  75. ChainSim: A P2P Blockchain Simulation Framework
  76. HFM++: An Enhanced Holographic Factorization Machine for Recommendation
  77. A Deep Recommendation Framework for Completely New Users in Mashup Creation
  78. BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
  79. Vulnerabilities, Threats, and Impacts of False Data Injection Attacks in Smart Grids: An Overview
  80. Analytics on Health of Mobile Software Ecosystem Based on the Internal Operating Mechanism
  81. Ponzi Contracts Detection Based on Improved Convolutional Neural Network
  82. Statistical Techniques-based Characterization of FDIA in Smart Grids Considering Grid Contingencies
  83. Multi-focus image fusion based on L1 image transform
  84. Public and private blockchain in construction business process and information integration
  85. Exposing Android Event-Based Races by Selective Branch Instrumentation
  86. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity
  87. Real-Time Optimization of Dynamic Speed Scaling for Distributed Data Centers
  88. Statistical Detection Of Collective Data Fraud
  89. Decentralized Real-Time Optimization of Voltage Reconfigurable Cloud Computing Data Center
  90. Software Architecture for Blockchain-based Trade Certificate Systems
  91. Frequency-Reconfigurable Cloud Versus Fog Computing: An Energy-Efficiency Aspect
  92. BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
  93. Security Analysis on dBFT Protocol of NEO
  94. Attention-Based High-Order Feature Interactions to Enhance the Recommender System for Web-Based Knowledge-Sharing Service
  95. Deep-Cross-Attention Recommendation Model for Knowledge Sharing Micro Learning Service
  96. FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification
  97. Security Analysis on Tangle-Based Blockchain Through Simulation
  98. STRIP
  99. Byte2vec: Malware Representation and Feature Selection for Android
  100. DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
  101. From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning
  102. Pipeline provenance for cloud‐based big data analytics
  103. Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds
  104. Cost-Efficient Stream Processing on the Cloud
  105. Crossover Service Fusion Approach Based on Microservice Architecture
  106. A Landscape of Cryptocurrencies
  107. A RESTful architecture for data exploration as a service
  108. Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android
  109. Building Secure SRAM PUF Key Generators on Resource Constrained Devices
  110. Particle Swarm Optimization of Real-Time PID Controllers
  111. An Energy-Efficient Transmission Strategy for Cache-Enabled Wireless Networks With Non-Negligible Circuit Power
  112. APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home
  113. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
  114. Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis
  115. A Study of Contemporary System Performance Testing Framework
  116. Urban Traffic Analysis Using Social Media Data on the Cloud
  117. Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud
  118. (WIP) Evaluation of a Cloud-Based System for Delivering Adaptive Micro Open Education Resource to Fresh Learners
  119. Elevated incidence of monozygotic twinning is associated with extended embryo culture, but not with zona pellucida manipulation or freeze-thaw procedure
  120. Spatio-temporal context reduction
  121. Live path control flow integrity
  122. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
  123. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
  124. REMOTE SENSING IMAGE QUALITY ASSESSMENT EXPERIMENT WITH POST-PROCESSING
  125. Pregnancy outcomes of PCOS overweight/obese patients after controlled ovarian stimulation with the GnRH antagonist protocol and frozen embryo transfer
  126. MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning
  127. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
  128. Malytics: A Malware Detection Scheme
  129. Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques
  130. Live Path CFI Against Control Flow Hijacking Attacks
  131. Data Service API Design for Data Analytics
  132. A Heuristic Approach for New-Item Cold Start Problem in Recommendation of Micro Open Education Resources
  133. A Simulation Approach for Studying Behavior and Quality of Blockchain Networks
  134. Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  135. Learning Latent Byte-Level Feature Representation for Malware Detection
  136. A Study of Contemporary System Performance Testing Framework
  137. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection
  138. A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment
  139. A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
  140. TruXy: Trusted Storage Cloud for Scientific Workflows
  141. Ontological Learner Profile Identification for Cold Start Problem in Micro Learning Resources Delivery
  142. Blockchain Based Data Integrity Service Framework for IoT Data
  143. Assisting Open Education Resource Providers and Instructors to Deal with Cold Start Problem in Adaptive Micro Learning: A Service Oriented Solution
  144. Body composition substudy of the SECOND-LINE study
  145. Extracting Fine-Grained Service Value Features and Distributions for Accurate Service Recommendation
  146. ProductRec: Product Bundle Recommendation Based on User's Sequential Patterns in Social Networking Service Environment
  147. Towards Massive Data and Sparse Data in Adaptive Micro Open Educational Resource Recommendation: A Study on Semantic Knowledge Base Construction and Cold Start Problem
  148. Empirically characteristic analysis of chaotic PID controlling particle swarm optimization
  149. Ovarian response prediction in controlled ovarian stimulation for IVF using anti-Müllerian hormone in Chinese women
  150. An adaptive prediction approach based on workload pattern discrimination in the cloud
  151. Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming
  152. ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
  153. Organizing Online Computation for Adaptive Micro Open Education Resource Recommendation
  154. Predicting the Evolution of Service Value Features from User Reviews for Continuous Service Improvement
  155. SwingDB: An Embedded In-memory DBMS Enabling Instant Snapshot Sharing
  156. Handbook of Research on End-to-End Cloud Computing Architecture Design
  157. Build security into pub/sub middleware
  158. Realizing IoT service’s policy privacy over publish/subscribe-based middleware
  159. Choice of Software Development Methodologies: Do Organizational, Project, and Team Characteristics Matter?
  160. Profiling and Supporting Adaptive Micro Learning on Open Education Resources
  161. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies
  162. Facilitating Secure Sharing of Personal Health Data in the Cloud
  163. Automated memory leak fixing on value-flow slices for C programs
  164. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
  165. The Blockchain as a Software Connector
  166. K-PRSCAN: A clustering method based on PageRank
  167. PBCP: A Process-based Bussiness Collaboration Platform
  168. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations
  169. A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
  170. Towards Bringing Adaptive Micro Learning into MOOC Courses
  171. Automated Policy Combination for Data Sharing across Multiple Organizations
  172. Cloud Docs: Secure Scalable Document Sharing on Public Clouds
  173. MLaaS: A Cloud System for Mobile Micro Learning in MOOC
  174. ReputationNet: Reputation-Based Service Recommendation for e-Science
  175. Self Protecting Data Sharing Using Generic Policies
  176. Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences
  177. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds
  178. Numerical simulation of a new two-dimensional variable-order fractional percolation equation in non-homogeneous porous media
  179. Protecting and Analysing Health Care Data on Cloud
  180. Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem
  181. Cloud Based Toolbox for Image Analysis, Processing and Reconstruction Tasks
  182. Synergistic delivery of gold nanorods using multifunctional microbubbles for enhanced plasmonic photothermal therapy
  183. An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory
  184. Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
  185. A platform for secure monitoring and sharing of generic health data in the Cloud
  186. Cost-oriented proactive fault tolerance approach to high performance computing (HPC) in the cloud
  187. Service-Oriented Computing – ICSOC 2013 Workshops
  188. Security, Privacy and Trust in Cloud Systems
  189. A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem
  190. Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud
  191. Secure and Controlled Sharing of Data in Distributed Computing
  192. Secure Data Sharing in the Cloud
  193. Energy Efficient Fault Tolerance for High Performance Computing (HPC) in the Cloud
  194. Cloud Computing for High Performance Image Analysis on a National Infrastructure
  195. A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems
  196. A Mobile Cloud with Trusted Data Provenance Services for Bioinformatics Research
  197. Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All?
  198. Biomedical image analysis and processing in clouds
  199. A Performance Evaluation of Public Cloud Using TPC-C
  200. Data Provenance and Data Management in eScience
  201. A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud
  202. A performance evaluation of distributed database architectures
  203. ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services
  204. A Financial Compensation Based Transaction Management Model for Service-Oriented Business Collaborations
  205. Business Process Engine Simulator
  206. A Fault Tolerance Framework for High Performance Computing in Cloud
  207. A configurable UI framework for easy composition visualisation of web services at semantic level.
  208. A Consolidated Process Model for Identity Management
  209. Accountability for Service Compliance
  210. A MapReduce-Based Parallel Clustering Algorithm for Large Protein-Protein Interaction Networks
  211. A Secure Storage Service in the Hybrid Cloud
  212. Secure Connectivity for Intra-cloud and Inter-cloud Communication
  213. Modelling Collaborative Services for Business and QoS Compliance
  214. DIaaS: Data Integrity as a Service in the Cloud
  215. Feedback loop mechanisms based particle swarm optimization with neighborhood topology
  216. Dynamic Business Collaborations Through Contract Services
  217. Facilitating Biodefense Research with Mobile-Cloud Computing
  218. A Service-Oriented User Interface for the Next Generation Web
  219. Dynamic Business Collaborations Through Contract Services
  220. A Test-bed for the Evaluation of Business Process Prediction Techniques
  221. A Mobile Web Service Middleware and Its Performance Study
  222. A Smart User Interface for Service-Oriented Web
  223. mBOSSS+: A Mobile Web Services Framework
  224. Accountability as a Service for the Cloud
  225. A Mobile Learning System for Syndromic Surveillance and Diagnosis
  226. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
  227. An Application-Level Data Transparent Authentication Scheme without Communication Overhead
  228. End-to-End Service Support for Mashups
  229. TrustStore: Making Amazon S3 Trustworthy with Services Composition
  230. Managing Web Services: An Application in Bioinformatics
  231. A Contract-Based Accountability Service Model
  232. Supporting Bioinformatic Experiments with a Service Query Engine
  233. A Contract Language for Service-Oriented Dynamic Collaborations
  234. A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context
  235. Finite difference approximations for the fractional Fokker–Planck equation
  236. Secure and Conditional Resource Coordination for Successful Collaborations
  237. Facilitating Dynamic Collaborations with eContract Services
  238. Composing Adaptive Web Services on COTS Middleware
  239. WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations
  240. Message from the SEASS Workshop Chairs
  241. WSLA+: Web Service Level Agreement Language for Collaborations
  242. Achieving simultaneous distribution control and privacy protection for Internet media delivery
  243. Yet Another Performance Testing Framework
  244. ADI-Euler and extrapolation methods for the two-dimensional fractional advection-dispersion equation
  245. Cooperative Data Management Services Based on Accountable Contract
  246. Performance Evaluation and Modeling of Web Services Security
  247. Explicitly Controlling the Fair Service for Busy Web Servers
  248. An Infrastructure Virtualisation SOA for VNO-based Business Models
  249. User-Controlled Collaborations in the Context of Trust Extended Environments
  250. Virtual Storage Services for Dynamic Collaborations
  251. Auto-tune design and evaluation on staged event-driven architecture
  252. A Performance Evaluation of Web Services Security
  253. Evaluation and Modeling of Web Services Performance
  254. Performance prediction of component-based applications
  255. A low energy, high-luminosity, high-resolution double-focusing magnetic beta-ray spectrometer for measuring neutrino rest mass
  256. The Radioactive Decay of 44gSc and 44mSc
  257. Facilitating Biodefense Research with Mobile-Cloud Computing
  258. A predictive performance model to evaluate the contention cost in application servers
  259. Evaluating the scalability of Enterprise JavaBeans technology
  260. A Technology and Process Analysis for Contemporary Identity Management Frameworks
  261. Cost of Using Cloud Computing
  262. International Journal of Systems and Service-Oriented Engineering