All Stories

  1. Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
  2. A Blockchain-Based Self-Sovereign Identity System for KYC Processes
  3. SDTU-Net: Stepwise-Drop and Transformer-Based U-Net for Subject-Sensitive Hashing of HRRS Images
  4. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
  5. A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems
  6. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
  7. Modeling and exploring the evolution of the mobile software ecosystem: How far are we?
  8. Exploring Blockchains Interoperability: A Systematic Survey
  9. BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems
  10. Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling
  11. Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact
  12. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
  13. VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors
  14. Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution
  15. Formal Security Analysis on dBFT Protocol of NEO
  16. Transparent Registration-Based Encryption through Blockchain
  17. SoK: DAG-based Blockchain Systems
  18. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
  19. Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images
  20. Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders
  21. Adapting New Learners and New Resources to Micro Open Learning via Online Computation
  22. Digging into primary financial market: The issues of primary financial market issuance and investigations from the perspective of blockchain
  23. A Hybrid Incentive Mechanism for Decentralized Federated Learning
  24. Blockchain Enables Your Bill Safer
  25. Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems
  26. DeDa: A DeFi-enabled Data Sharing and Trading System
  27. Software engineers' response to public crisis
  28. i-Bond: A Next Generation Bond’s Issuing Service System
  29. Internet of Things – ICIOT 2021
  30. How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing
  31. AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
  32. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain
  33. An instance-oriented performance measure for classification
  34. Capability-based IoT access control using blockchain
  35. Applying blockchain for primary financial market: A survey
  36. Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain
  37. Towards Interconnected Blockchains
  38. C_CART: An instance confidence-based decision tree algorithm for classification
  39. Patterns for Blockchain-Based Payment Applications
  40. Bottleneck-Aware Resource Allocation for Service Processes
  41. ServiceNet
  42. Anonymous Blockchain-based System for Consortium
  43. Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
  44. Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection
  45. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
  46. Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems
  47. BIDI: A classification algorithm with instance difficulty invariance
  48. Object Versioning for Flow-Sensitive Pointer Analysis
  49. A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles
  50. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
  51. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
  52. ChainSim: A P2P Blockchain Simulation Framework
  53. HFM++: An Enhanced Holographic Factorization Machine for Recommendation
  54. A Deep Recommendation Framework for Completely New Users in Mashup Creation
  55. BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
  56. Vulnerabilities, Threats, and Impacts of False Data Injection Attacks in Smart Grids: An Overview
  57. Analytics on Health of Mobile Software Ecosystem Based on the Internal Operating Mechanism
  58. Ponzi Contracts Detection Based on Improved Convolutional Neural Network
  59. Statistical Techniques-based Characterization of FDIA in Smart Grids Considering Grid Contingencies
  60. Multi-focus image fusion based on L1 image transform
  61. Public and private blockchain in construction business process and information integration
  62. Exposing Android Event-Based Races by Selective Branch Instrumentation
  63. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity
  64. Real-Time Optimization of Dynamic Speed Scaling for Distributed Data Centers
  65. Statistical Detection Of Collective Data Fraud
  66. Decentralized Real-Time Optimization of Voltage Reconfigurable Cloud Computing Data Center
  67. Software Architecture for Blockchain-based Trade Certificate Systems
  68. Frequency-Reconfigurable Cloud Versus Fog Computing: An Energy-Efficiency Aspect
  69. BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
  70. Security Analysis on dBFT Protocol of NEO
  71. Attention-Based High-Order Feature Interactions to Enhance the Recommender System for Web-Based Knowledge-Sharing Service
  72. Deep-Cross-Attention Recommendation Model for Knowledge Sharing Micro Learning Service
  73. FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification
  74. Security Analysis on Tangle-Based Blockchain Through Simulation
  75. STRIP
  76. Byte2vec: Malware Representation and Feature Selection for Android
  77. DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
  78. From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning
  79. Pipeline provenance for cloud‐based big data analytics
  80. Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds
  81. Cost-Efficient Stream Processing on the Cloud
  82. Crossover Service Fusion Approach Based on Microservice Architecture
  83. A Landscape of Cryptocurrencies
  84. A RESTful architecture for data exploration as a service
  85. Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android
  86. Building Secure SRAM PUF Key Generators on Resource Constrained Devices
  87. Particle Swarm Optimization of Real-Time PID Controllers
  88. An Energy-Efficient Transmission Strategy for Cache-Enabled Wireless Networks With Non-Negligible Circuit Power
  89. APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home
  90. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
  91. Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis
  92. A Study of Contemporary System Performance Testing Framework
  93. Urban Traffic Analysis Using Social Media Data on the Cloud
  94. Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud
  95. (WIP) Evaluation of a Cloud-Based System for Delivering Adaptive Micro Open Education Resource to Fresh Learners
  96. Elevated incidence of monozygotic twinning is associated with extended embryo culture, but not with zona pellucida manipulation or freeze-thaw procedure
  97. Spatio-temporal context reduction
  98. Live path control flow integrity
  99. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
  100. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
  101. REMOTE SENSING IMAGE QUALITY ASSESSMENT EXPERIMENT WITH POST-PROCESSING
  102. Pregnancy outcomes of PCOS overweight/obese patients after controlled ovarian stimulation with the GnRH antagonist protocol and frozen embryo transfer
  103. MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning
  104. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
  105. Malytics: A Malware Detection Scheme
  106. Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques
  107. Live Path CFI Against Control Flow Hijacking Attacks
  108. Data Service API Design for Data Analytics
  109. A Heuristic Approach for New-Item Cold Start Problem in Recommendation of Micro Open Education Resources
  110. A Simulation Approach for Studying Behavior and Quality of Blockchain Networks
  111. Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  112. Learning Latent Byte-Level Feature Representation for Malware Detection
  113. A Study of Contemporary System Performance Testing Framework
  114. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection
  115. A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment
  116. A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
  117. TruXy: Trusted Storage Cloud for Scientific Workflows
  118. Ontological Learner Profile Identification for Cold Start Problem in Micro Learning Resources Delivery
  119. Blockchain Based Data Integrity Service Framework for IoT Data
  120. Assisting Open Education Resource Providers and Instructors to Deal with Cold Start Problem in Adaptive Micro Learning: A Service Oriented Solution
  121. Body composition substudy of the SECOND-LINE study
  122. Extracting Fine-Grained Service Value Features and Distributions for Accurate Service Recommendation
  123. ProductRec: Product Bundle Recommendation Based on User's Sequential Patterns in Social Networking Service Environment
  124. Towards Massive Data and Sparse Data in Adaptive Micro Open Educational Resource Recommendation: A Study on Semantic Knowledge Base Construction and Cold Start Problem
  125. Empirically characteristic analysis of chaotic PID controlling particle swarm optimization
  126. Ovarian response prediction in controlled ovarian stimulation for IVF using anti-Müllerian hormone in Chinese women
  127. An adaptive prediction approach based on workload pattern discrimination in the cloud
  128. Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming
  129. ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
  130. Organizing Online Computation for Adaptive Micro Open Education Resource Recommendation
  131. Predicting the Evolution of Service Value Features from User Reviews for Continuous Service Improvement
  132. SwingDB: An Embedded In-memory DBMS Enabling Instant Snapshot Sharing
  133. Handbook of Research on End-to-End Cloud Computing Architecture Design
  134. Build security into pub/sub middleware
  135. Realizing IoT service’s policy privacy over publish/subscribe-based middleware
  136. Choice of Software Development Methodologies: Do Organizational, Project, and Team Characteristics Matter?
  137. Profiling and Supporting Adaptive Micro Learning on Open Education Resources
  138. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies
  139. Facilitating Secure Sharing of Personal Health Data in the Cloud
  140. Automated memory leak fixing on value-flow slices for C programs
  141. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
  142. The Blockchain as a Software Connector
  143. K-PRSCAN: A clustering method based on PageRank
  144. PBCP: A Process-based Bussiness Collaboration Platform
  145. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations
  146. A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
  147. Towards Bringing Adaptive Micro Learning into MOOC Courses
  148. Automated Policy Combination for Data Sharing across Multiple Organizations
  149. Cloud Docs: Secure Scalable Document Sharing on Public Clouds
  150. MLaaS: A Cloud System for Mobile Micro Learning in MOOC
  151. ReputationNet: Reputation-Based Service Recommendation for e-Science
  152. Self Protecting Data Sharing Using Generic Policies
  153. Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences
  154. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds
  155. Numerical simulation of a new two-dimensional variable-order fractional percolation equation in non-homogeneous porous media
  156. Protecting and Analysing Health Care Data on Cloud
  157. Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem
  158. Cloud Based Toolbox for Image Analysis, Processing and Reconstruction Tasks
  159. Synergistic delivery of gold nanorods using multifunctional microbubbles for enhanced plasmonic photothermal therapy
  160. An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory
  161. Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
  162. A platform for secure monitoring and sharing of generic health data in the Cloud
  163. Cost-oriented proactive fault tolerance approach to high performance computing (HPC) in the cloud
  164. Service-Oriented Computing – ICSOC 2013 Workshops
  165. Security, Privacy and Trust in Cloud Systems
  166. A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem
  167. Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud
  168. Secure and Controlled Sharing of Data in Distributed Computing
  169. Secure Data Sharing in the Cloud
  170. Energy Efficient Fault Tolerance for High Performance Computing (HPC) in the Cloud
  171. Cloud Computing for High Performance Image Analysis on a National Infrastructure
  172. A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems
  173. A Mobile Cloud with Trusted Data Provenance Services for Bioinformatics Research
  174. Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All?
  175. Biomedical image analysis and processing in clouds
  176. A Performance Evaluation of Public Cloud Using TPC-C
  177. Data Provenance and Data Management in eScience
  178. A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud
  179. A performance evaluation of distributed database architectures
  180. ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services
  181. A Financial Compensation Based Transaction Management Model for Service-Oriented Business Collaborations
  182. Business Process Engine Simulator
  183. A Fault Tolerance Framework for High Performance Computing in Cloud
  184. A configurable UI framework for easy composition visualisation of web services at semantic level.
  185. A Consolidated Process Model for Identity Management
  186. Accountability for Service Compliance
  187. A MapReduce-Based Parallel Clustering Algorithm for Large Protein-Protein Interaction Networks
  188. A Secure Storage Service in the Hybrid Cloud
  189. Secure Connectivity for Intra-cloud and Inter-cloud Communication
  190. Modelling Collaborative Services for Business and QoS Compliance
  191. DIaaS: Data Integrity as a Service in the Cloud
  192. Feedback loop mechanisms based particle swarm optimization with neighborhood topology
  193. Dynamic Business Collaborations Through Contract Services
  194. Facilitating Biodefense Research with Mobile-Cloud Computing
  195. A Service-Oriented User Interface for the Next Generation Web
  196. Dynamic Business Collaborations Through Contract Services
  197. A Test-bed for the Evaluation of Business Process Prediction Techniques
  198. A Mobile Web Service Middleware and Its Performance Study
  199. A Smart User Interface for Service-Oriented Web
  200. mBOSSS+: A Mobile Web Services Framework
  201. Accountability as a Service for the Cloud
  202. A Mobile Learning System for Syndromic Surveillance and Diagnosis
  203. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
  204. An Application-Level Data Transparent Authentication Scheme without Communication Overhead
  205. End-to-End Service Support for Mashups
  206. TrustStore: Making Amazon S3 Trustworthy with Services Composition
  207. Managing Web Services: An Application in Bioinformatics
  208. A Contract-Based Accountability Service Model
  209. Supporting Bioinformatic Experiments with a Service Query Engine
  210. A Contract Language for Service-Oriented Dynamic Collaborations
  211. A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context
  212. Finite difference approximations for the fractional Fokker–Planck equation
  213. Secure and Conditional Resource Coordination for Successful Collaborations
  214. Facilitating Dynamic Collaborations with eContract Services
  215. Composing Adaptive Web Services on COTS Middleware
  216. WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations
  217. Message from the SEASS Workshop Chairs
  218. WSLA+: Web Service Level Agreement Language for Collaborations
  219. Achieving simultaneous distribution control and privacy protection for Internet media delivery
  220. Yet Another Performance Testing Framework
  221. ADI-Euler and extrapolation methods for the two-dimensional fractional advection-dispersion equation
  222. Cooperative Data Management Services Based on Accountable Contract
  223. Performance Evaluation and Modeling of Web Services Security
  224. Explicitly Controlling the Fair Service for Busy Web Servers
  225. An Infrastructure Virtualisation SOA for VNO-based Business Models
  226. User-Controlled Collaborations in the Context of Trust Extended Environments
  227. Virtual Storage Services for Dynamic Collaborations
  228. Auto-tune design and evaluation on staged event-driven architecture
  229. A Performance Evaluation of Web Services Security
  230. Evaluation and Modeling of Web Services Performance
  231. Performance prediction of component-based applications
  232. A low energy, high-luminosity, high-resolution double-focusing magnetic beta-ray spectrometer for measuring neutrino rest mass
  233. The Radioactive Decay of 44gSc and 44mSc
  234. Facilitating Biodefense Research with Mobile-Cloud Computing
  235. A predictive performance model to evaluate the contention cost in application servers
  236. Evaluating the scalability of Enterprise JavaBeans technology
  237. A Technology and Process Analysis for Contemporary Identity Management Frameworks
  238. Cost of Using Cloud Computing
  239. International Journal of Systems and Service-Oriented Engineering