All Stories

  1. TDML — A Trustworthy Distributed Machine Learning Framework
  2. Blockchain-Enabled NFTs as Certificates for Next-Generation UAV Communication Systems
  3. Understanding DAOs: An Empirical Study on Governance Dynamics
  4. SoK: Bitcoin Layer Two (L2)
  5. Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage
  6. BRC20 Snipping Attack
  7. 3D-DAG: Scaling Blockchain via DAG
  8. A Privacy-Aware Task Distribution Architecture for UAV Communications System Using Blockchain
  9. Efficient Incremental Verification of Neural Networks Guided by Counterexample Potentiality
  10. Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
  11. Decentralised Autonomous Organizations (DAOs): An Exploratory Survey
  12. Maximizing NFT Incentives: References Make You Rich
  13. Understanding BRC-20: Hope or Hype
  14. Towards Heterogeneity-Aware and Energy-Efficient Topology Optimization for Decentralized Federated Learning in Edge Environment
  15. Confix: Combining node-level fix templates and masked language model for automatic program repair
  16. MicroIRC: Instance-level Root Cause Localization for Microservice Systems
  17. Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse
  18. A Novel Method for Bitcoin Price Manipulation Identification Based on Graph Representation Learning
  19. A Blockchain-Based Self-Sovereign Identity System for KYC Processes
  20. SDTU-Net: Stepwise-Drop and Transformer-Based U-Net for Subject-Sensitive Hashing of HRRS Images
  21. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
  22. A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems
  23. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
  24. Modeling and exploring the evolution of the mobile software ecosystem: How far are we?
  25. Exploring Blockchains Interoperability: A Systematic Survey
  26. BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems
  27. Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling
  28. Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact
  29. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
  30. VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors
  31. Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution
  32. A First Look into Blockchain DAOs
  33. A Referable NFT Scheme
  34. Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused
  35. Predicting NFT Classification with GNN: A Recommender System for Web3 Assets
  36. Formal Security Analysis on dBFT Protocol of NEO
  37. Transparent Registration-Based Encryption through Blockchain
  38. SoK: DAG-based Blockchain Systems
  39. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
  40. Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images
  41. Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders
  42. Adapting New Learners and New Resources to Micro Open Learning via Online Computation
  43. Digging into primary financial market: The issues of primary financial market issuance and investigations from the perspective of blockchain
  44. A Hybrid Incentive Mechanism for Decentralized Federated Learning
  45. Blockchain Enables Your Bill Safer
  46. Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems
  47. DeDa: A DeFi-enabled Data Sharing and Trading System
  48. Software engineers' response to public crisis
  49. i-Bond: A Next Generation Bond’s Issuing Service System
  50. Internet of Things – ICIOT 2021
  51. How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing
  52. AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
  53. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain
  54. An instance-oriented performance measure for classification
  55. Capability-based IoT access control using blockchain
  56. Applying blockchain for primary financial market: A survey
  57. Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain
  58. Towards Interconnected Blockchains
  59. C_CART: An instance confidence-based decision tree algorithm for classification
  60. Patterns for Blockchain-Based Payment Applications
  61. Bottleneck-Aware Resource Allocation for Service Processes
  62. ServiceNet
  63. Anonymous Blockchain-based System for Consortium
  64. Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
  65. Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection
  66. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
  67. Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems
  68. BIDI: A classification algorithm with instance difficulty invariance
  69. Object Versioning for Flow-Sensitive Pointer Analysis
  70. A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles
  71. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
  72. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
  73. ChainSim: A P2P Blockchain Simulation Framework
  74. HFM++: An Enhanced Holographic Factorization Machine for Recommendation
  75. A Deep Recommendation Framework for Completely New Users in Mashup Creation
  76. BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
  77. Vulnerabilities, Threats, and Impacts of False Data Injection Attacks in Smart Grids: An Overview
  78. Analytics on Health of Mobile Software Ecosystem Based on the Internal Operating Mechanism
  79. Ponzi Contracts Detection Based on Improved Convolutional Neural Network
  80. Statistical Techniques-based Characterization of FDIA in Smart Grids Considering Grid Contingencies
  81. Multi-focus image fusion based on L1 image transform
  82. Public and private blockchain in construction business process and information integration
  83. Exposing Android Event-Based Races by Selective Branch Instrumentation
  84. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity
  85. Real-Time Optimization of Dynamic Speed Scaling for Distributed Data Centers
  86. Statistical Detection Of Collective Data Fraud
  87. Decentralized Real-Time Optimization of Voltage Reconfigurable Cloud Computing Data Center
  88. Software Architecture for Blockchain-based Trade Certificate Systems
  89. Frequency-Reconfigurable Cloud Versus Fog Computing: An Energy-Efficiency Aspect
  90. BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
  91. Security Analysis on dBFT Protocol of NEO
  92. Attention-Based High-Order Feature Interactions to Enhance the Recommender System for Web-Based Knowledge-Sharing Service
  93. Deep-Cross-Attention Recommendation Model for Knowledge Sharing Micro Learning Service
  94. FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification
  95. Security Analysis on Tangle-Based Blockchain Through Simulation
  96. STRIP
  97. Byte2vec: Malware Representation and Feature Selection for Android
  98. DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
  99. From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning
  100. Pipeline provenance for cloud‐based big data analytics
  101. Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds
  102. Cost-Efficient Stream Processing on the Cloud
  103. Crossover Service Fusion Approach Based on Microservice Architecture
  104. A Landscape of Cryptocurrencies
  105. A RESTful architecture for data exploration as a service
  106. Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android
  107. Building Secure SRAM PUF Key Generators on Resource Constrained Devices
  108. Particle Swarm Optimization of Real-Time PID Controllers
  109. An Energy-Efficient Transmission Strategy for Cache-Enabled Wireless Networks With Non-Negligible Circuit Power
  110. APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home
  111. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
  112. Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis
  113. A Study of Contemporary System Performance Testing Framework
  114. Urban Traffic Analysis Using Social Media Data on the Cloud
  115. Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud
  116. (WIP) Evaluation of a Cloud-Based System for Delivering Adaptive Micro Open Education Resource to Fresh Learners
  117. Elevated incidence of monozygotic twinning is associated with extended embryo culture, but not with zona pellucida manipulation or freeze-thaw procedure
  118. Spatio-temporal context reduction
  119. Live path control flow integrity
  120. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
  121. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
  122. REMOTE SENSING IMAGE QUALITY ASSESSMENT EXPERIMENT WITH POST-PROCESSING
  123. Pregnancy outcomes of PCOS overweight/obese patients after controlled ovarian stimulation with the GnRH antagonist protocol and frozen embryo transfer
  124. MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning
  125. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
  126. Malytics: A Malware Detection Scheme
  127. Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques
  128. Live Path CFI Against Control Flow Hijacking Attacks
  129. Data Service API Design for Data Analytics
  130. A Heuristic Approach for New-Item Cold Start Problem in Recommendation of Micro Open Education Resources
  131. A Simulation Approach for Studying Behavior and Quality of Blockchain Networks
  132. Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  133. Learning Latent Byte-Level Feature Representation for Malware Detection
  134. A Study of Contemporary System Performance Testing Framework
  135. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection
  136. A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment
  137. A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
  138. TruXy: Trusted Storage Cloud for Scientific Workflows
  139. Ontological Learner Profile Identification for Cold Start Problem in Micro Learning Resources Delivery
  140. Blockchain Based Data Integrity Service Framework for IoT Data
  141. Assisting Open Education Resource Providers and Instructors to Deal with Cold Start Problem in Adaptive Micro Learning: A Service Oriented Solution
  142. Body composition substudy of the SECOND-LINE study
  143. Extracting Fine-Grained Service Value Features and Distributions for Accurate Service Recommendation
  144. ProductRec: Product Bundle Recommendation Based on User's Sequential Patterns in Social Networking Service Environment
  145. Towards Massive Data and Sparse Data in Adaptive Micro Open Educational Resource Recommendation: A Study on Semantic Knowledge Base Construction and Cold Start Problem
  146. Empirically characteristic analysis of chaotic PID controlling particle swarm optimization
  147. Ovarian response prediction in controlled ovarian stimulation for IVF using anti-Müllerian hormone in Chinese women
  148. An adaptive prediction approach based on workload pattern discrimination in the cloud
  149. Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming
  150. ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
  151. Organizing Online Computation for Adaptive Micro Open Education Resource Recommendation
  152. Predicting the Evolution of Service Value Features from User Reviews for Continuous Service Improvement
  153. SwingDB: An Embedded In-memory DBMS Enabling Instant Snapshot Sharing
  154. Handbook of Research on End-to-End Cloud Computing Architecture Design
  155. Build security into pub/sub middleware
  156. Realizing IoT service’s policy privacy over publish/subscribe-based middleware
  157. Choice of Software Development Methodologies: Do Organizational, Project, and Team Characteristics Matter?
  158. Profiling and Supporting Adaptive Micro Learning on Open Education Resources
  159. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies
  160. Facilitating Secure Sharing of Personal Health Data in the Cloud
  161. Automated memory leak fixing on value-flow slices for C programs
  162. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
  163. The Blockchain as a Software Connector
  164. K-PRSCAN: A clustering method based on PageRank
  165. PBCP: A Process-based Bussiness Collaboration Platform
  166. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations
  167. A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
  168. Towards Bringing Adaptive Micro Learning into MOOC Courses
  169. Automated Policy Combination for Data Sharing across Multiple Organizations
  170. Cloud Docs: Secure Scalable Document Sharing on Public Clouds
  171. MLaaS: A Cloud System for Mobile Micro Learning in MOOC
  172. ReputationNet: Reputation-Based Service Recommendation for e-Science
  173. Self Protecting Data Sharing Using Generic Policies
  174. Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences
  175. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds
  176. Numerical simulation of a new two-dimensional variable-order fractional percolation equation in non-homogeneous porous media
  177. Protecting and Analysing Health Care Data on Cloud
  178. Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem
  179. Cloud Based Toolbox for Image Analysis, Processing and Reconstruction Tasks
  180. Synergistic delivery of gold nanorods using multifunctional microbubbles for enhanced plasmonic photothermal therapy
  181. An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory
  182. Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
  183. A platform for secure monitoring and sharing of generic health data in the Cloud
  184. Cost-oriented proactive fault tolerance approach to high performance computing (HPC) in the cloud
  185. Service-Oriented Computing – ICSOC 2013 Workshops
  186. Security, Privacy and Trust in Cloud Systems
  187. A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem
  188. Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud
  189. Secure and Controlled Sharing of Data in Distributed Computing
  190. Secure Data Sharing in the Cloud
  191. Energy Efficient Fault Tolerance for High Performance Computing (HPC) in the Cloud
  192. Cloud Computing for High Performance Image Analysis on a National Infrastructure
  193. A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems
  194. A Mobile Cloud with Trusted Data Provenance Services for Bioinformatics Research
  195. Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All?
  196. Biomedical image analysis and processing in clouds
  197. A Performance Evaluation of Public Cloud Using TPC-C
  198. Data Provenance and Data Management in eScience
  199. A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud
  200. A performance evaluation of distributed database architectures
  201. ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services
  202. A Financial Compensation Based Transaction Management Model for Service-Oriented Business Collaborations
  203. Business Process Engine Simulator
  204. A Fault Tolerance Framework for High Performance Computing in Cloud
  205. A configurable UI framework for easy composition visualisation of web services at semantic level.
  206. A Consolidated Process Model for Identity Management
  207. Accountability for Service Compliance
  208. A MapReduce-Based Parallel Clustering Algorithm for Large Protein-Protein Interaction Networks
  209. A Secure Storage Service in the Hybrid Cloud
  210. Secure Connectivity for Intra-cloud and Inter-cloud Communication
  211. Modelling Collaborative Services for Business and QoS Compliance
  212. DIaaS: Data Integrity as a Service in the Cloud
  213. Feedback loop mechanisms based particle swarm optimization with neighborhood topology
  214. Dynamic Business Collaborations Through Contract Services
  215. Facilitating Biodefense Research with Mobile-Cloud Computing
  216. A Service-Oriented User Interface for the Next Generation Web
  217. Dynamic Business Collaborations Through Contract Services
  218. A Test-bed for the Evaluation of Business Process Prediction Techniques
  219. A Mobile Web Service Middleware and Its Performance Study
  220. A Smart User Interface for Service-Oriented Web
  221. mBOSSS+: A Mobile Web Services Framework
  222. Accountability as a Service for the Cloud
  223. A Mobile Learning System for Syndromic Surveillance and Diagnosis
  224. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
  225. An Application-Level Data Transparent Authentication Scheme without Communication Overhead
  226. End-to-End Service Support for Mashups
  227. TrustStore: Making Amazon S3 Trustworthy with Services Composition
  228. Managing Web Services: An Application in Bioinformatics
  229. A Contract-Based Accountability Service Model
  230. Supporting Bioinformatic Experiments with a Service Query Engine
  231. A Contract Language for Service-Oriented Dynamic Collaborations
  232. A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context
  233. Finite difference approximations for the fractional Fokker–Planck equation
  234. Secure and Conditional Resource Coordination for Successful Collaborations
  235. Facilitating Dynamic Collaborations with eContract Services
  236. Composing Adaptive Web Services on COTS Middleware
  237. WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations
  238. Message from the SEASS Workshop Chairs
  239. WSLA+: Web Service Level Agreement Language for Collaborations
  240. Achieving simultaneous distribution control and privacy protection for Internet media delivery
  241. Yet Another Performance Testing Framework
  242. ADI-Euler and extrapolation methods for the two-dimensional fractional advection-dispersion equation
  243. Cooperative Data Management Services Based on Accountable Contract
  244. Performance Evaluation and Modeling of Web Services Security
  245. Explicitly Controlling the Fair Service for Busy Web Servers
  246. An Infrastructure Virtualisation SOA for VNO-based Business Models
  247. User-Controlled Collaborations in the Context of Trust Extended Environments
  248. Virtual Storage Services for Dynamic Collaborations
  249. Auto-tune design and evaluation on staged event-driven architecture
  250. A Performance Evaluation of Web Services Security
  251. Evaluation and Modeling of Web Services Performance
  252. Performance prediction of component-based applications
  253. A low energy, high-luminosity, high-resolution double-focusing magnetic beta-ray spectrometer for measuring neutrino rest mass
  254. The Radioactive Decay of 44gSc and 44mSc
  255. Facilitating Biodefense Research with Mobile-Cloud Computing
  256. A predictive performance model to evaluate the contention cost in application servers
  257. Evaluating the scalability of Enterprise JavaBeans technology
  258. A Technology and Process Analysis for Contemporary Identity Management Frameworks
  259. Cost of Using Cloud Computing
  260. International Journal of Systems and Service-Oriented Engineering