All Stories

  1. TDML — A Trustworthy Distributed Machine Learning Framework
  2. Blockchain-Enabled NFTs as Certificates for Next-Generation UAV Communication Systems
  3. Understanding DAOs: An Empirical Study on Governance Dynamics
  4. SoK: Bitcoin Layer Two (L2)
  5. Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage
  6. BRC20 Snipping Attack
  7. 3D-DAG: Scaling Blockchain via DAG
  8. A Privacy-Aware Task Distribution Architecture for UAV Communications System Using Blockchain
  9. Efficient Incremental Verification of Neural Networks Guided by Counterexample Potentiality
  10. Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
  11. Decentralised Autonomous Organizations (DAOs): An Exploratory Survey
  12. Maximizing NFT Incentives: References Make You Rich
  13. Understanding BRC-20: Hope or Hype
  14. Confix: Combining node-level fix templates and masked language model for automatic program repair
  15. MicroIRC: Instance-level Root Cause Localization for Microservice Systems
  16. Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB Collapse
  17. A Novel Method for Bitcoin Price Manipulation Identification Based on Graph Representation Learning
  18. A Blockchain-Based Self-Sovereign Identity System for KYC Processes
  19. SDTU-Net: Stepwise-Drop and Transformer-Based U-Net for Subject-Sensitive Hashing of HRRS Images
  20. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
  21. A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems
  22. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
  23. Modeling and exploring the evolution of the mobile software ecosystem: How far are we?
  24. Exploring Blockchains Interoperability: A Systematic Survey
  25. BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems
  26. Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling
  27. Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact
  28. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems
  29. VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors
  30. Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution
  31. A First Look into Blockchain DAOs
  32. A Referable NFT Scheme
  33. Leveraging Architectural Approaches in Web3 Applications - A DAO Perspective Focused
  34. Predicting NFT Classification with GNN: A Recommender System for Web3 Assets
  35. Formal Security Analysis on dBFT Protocol of NEO
  36. Transparent Registration-Based Encryption through Blockchain
  37. SoK: DAG-based Blockchain Systems
  38. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
  39. Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images
  40. Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders
  41. Adapting New Learners and New Resources to Micro Open Learning via Online Computation
  42. Digging into primary financial market: The issues of primary financial market issuance and investigations from the perspective of blockchain
  43. A Hybrid Incentive Mechanism for Decentralized Federated Learning
  44. Blockchain Enables Your Bill Safer
  45. Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems
  46. DeDa: A DeFi-enabled Data Sharing and Trading System
  47. Software engineers' response to public crisis
  48. i-Bond: A Next Generation Bond’s Issuing Service System
  49. Internet of Things – ICIOT 2021
  50. How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing
  51. AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images
  52. Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain
  53. An instance-oriented performance measure for classification
  54. Capability-based IoT access control using blockchain
  55. Applying blockchain for primary financial market: A survey
  56. Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain
  57. Towards Interconnected Blockchains
  58. C_CART: An instance confidence-based decision tree algorithm for classification
  59. Patterns for Blockchain-Based Payment Applications
  60. Bottleneck-Aware Resource Allocation for Service Processes
  61. ServiceNet
  62. Anonymous Blockchain-based System for Consortium
  63. Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
  64. Mutual Information and Feature Importance Gradient Boosting: Automatic byte n‐gram feature reranking for Android malware detection
  65. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
  66. Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems
  67. BIDI: A classification algorithm with instance difficulty invariance
  68. Object Versioning for Flow-Sensitive Pointer Analysis
  69. A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles
  70. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
  71. A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
  72. ChainSim: A P2P Blockchain Simulation Framework
  73. HFM++: An Enhanced Holographic Factorization Machine for Recommendation
  74. A Deep Recommendation Framework for Completely New Users in Mashup Creation
  75. BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
  76. Vulnerabilities, Threats, and Impacts of False Data Injection Attacks in Smart Grids: An Overview
  77. Analytics on Health of Mobile Software Ecosystem Based on the Internal Operating Mechanism
  78. Ponzi Contracts Detection Based on Improved Convolutional Neural Network
  79. Statistical Techniques-based Characterization of FDIA in Smart Grids Considering Grid Contingencies
  80. Multi-focus image fusion based on L1 image transform
  81. Public and private blockchain in construction business process and information integration
  82. Exposing Android Event-Based Races by Selective Branch Instrumentation
  83. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity
  84. Real-Time Optimization of Dynamic Speed Scaling for Distributed Data Centers
  85. Statistical Detection Of Collective Data Fraud
  86. Decentralized Real-Time Optimization of Voltage Reconfigurable Cloud Computing Data Center
  87. Software Architecture for Blockchain-based Trade Certificate Systems
  88. Frequency-Reconfigurable Cloud Versus Fog Computing: An Energy-Efficiency Aspect
  89. BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity
  90. Security Analysis on dBFT Protocol of NEO
  91. Attention-Based High-Order Feature Interactions to Enhance the Recommender System for Web-Based Knowledge-Sharing Service
  92. Deep-Cross-Attention Recommendation Model for Knowledge Sharing Micro Learning Service
  93. FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification
  94. Security Analysis on Tangle-Based Blockchain Through Simulation
  95. STRIP
  96. Byte2vec: Malware Representation and Feature Selection for Android
  97. DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
  98. From ideal to reality: segmentation, annotation, and recommendation, the vital trajectory of intelligent micro learning
  99. Pipeline provenance for cloud‐based big data analytics
  100. Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds
  101. Cost-Efficient Stream Processing on the Cloud
  102. Crossover Service Fusion Approach Based on Microservice Architecture
  103. A Landscape of Cryptocurrencies
  104. A RESTful architecture for data exploration as a service
  105. Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android
  106. Building Secure SRAM PUF Key Generators on Resource Constrained Devices
  107. Particle Swarm Optimization of Real-Time PID Controllers
  108. An Energy-Efficient Transmission Strategy for Cache-Enabled Wireless Networks With Non-Negligible Circuit Power
  109. APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home
  110. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
  111. Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis
  112. A Study of Contemporary System Performance Testing Framework
  113. Urban Traffic Analysis Using Social Media Data on the Cloud
  114. Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud
  115. (WIP) Evaluation of a Cloud-Based System for Delivering Adaptive Micro Open Education Resource to Fresh Learners
  116. Elevated incidence of monozygotic twinning is associated with extended embryo culture, but not with zona pellucida manipulation or freeze-thaw procedure
  117. Spatio-temporal context reduction
  118. Live path control flow integrity
  119. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
  120. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
  121. REMOTE SENSING IMAGE QUALITY ASSESSMENT EXPERIMENT WITH POST-PROCESSING
  122. Pregnancy outcomes of PCOS overweight/obese patients after controlled ovarian stimulation with the GnRH antagonist protocol and frozen embryo transfer
  123. MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning
  124. A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
  125. Malytics: A Malware Detection Scheme
  126. Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques
  127. Live Path CFI Against Control Flow Hijacking Attacks
  128. Data Service API Design for Data Analytics
  129. A Heuristic Approach for New-Item Cold Start Problem in Recommendation of Micro Open Education Resources
  130. A Simulation Approach for Studying Behavior and Quality of Blockchain Networks
  131. Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  132. Learning Latent Byte-Level Feature Representation for Malware Detection
  133. A Study of Contemporary System Performance Testing Framework
  134. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection
  135. A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment
  136. A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
  137. TruXy: Trusted Storage Cloud for Scientific Workflows
  138. Ontological Learner Profile Identification for Cold Start Problem in Micro Learning Resources Delivery
  139. Blockchain Based Data Integrity Service Framework for IoT Data
  140. Assisting Open Education Resource Providers and Instructors to Deal with Cold Start Problem in Adaptive Micro Learning: A Service Oriented Solution
  141. Body composition substudy of the SECOND-LINE study
  142. Extracting Fine-Grained Service Value Features and Distributions for Accurate Service Recommendation
  143. ProductRec: Product Bundle Recommendation Based on User's Sequential Patterns in Social Networking Service Environment
  144. Towards Massive Data and Sparse Data in Adaptive Micro Open Educational Resource Recommendation: A Study on Semantic Knowledge Base Construction and Cold Start Problem
  145. Empirically characteristic analysis of chaotic PID controlling particle swarm optimization
  146. Ovarian response prediction in controlled ovarian stimulation for IVF using anti-Müllerian hormone in Chinese women
  147. An adaptive prediction approach based on workload pattern discrimination in the cloud
  148. Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming
  149. ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity
  150. Organizing Online Computation for Adaptive Micro Open Education Resource Recommendation
  151. Predicting the Evolution of Service Value Features from User Reviews for Continuous Service Improvement
  152. SwingDB: An Embedded In-memory DBMS Enabling Instant Snapshot Sharing
  153. Handbook of Research on End-to-End Cloud Computing Architecture Design
  154. Build security into pub/sub middleware
  155. Realizing IoT service’s policy privacy over publish/subscribe-based middleware
  156. Choice of Software Development Methodologies: Do Organizational, Project, and Team Characteristics Matter?
  157. Profiling and Supporting Adaptive Micro Learning on Open Education Resources
  158. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies
  159. Facilitating Secure Sharing of Personal Health Data in the Cloud
  160. Automated memory leak fixing on value-flow slices for C programs
  161. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
  162. The Blockchain as a Software Connector
  163. K-PRSCAN: A clustering method based on PageRank
  164. PBCP: A Process-based Bussiness Collaboration Platform
  165. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations
  166. A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations
  167. Towards Bringing Adaptive Micro Learning into MOOC Courses
  168. Automated Policy Combination for Data Sharing across Multiple Organizations
  169. Cloud Docs: Secure Scalable Document Sharing on Public Clouds
  170. MLaaS: A Cloud System for Mobile Micro Learning in MOOC
  171. ReputationNet: Reputation-Based Service Recommendation for e-Science
  172. Self Protecting Data Sharing Using Generic Policies
  173. Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences
  174. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds
  175. Numerical simulation of a new two-dimensional variable-order fractional percolation equation in non-homogeneous porous media
  176. Protecting and Analysing Health Care Data on Cloud
  177. Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem
  178. Cloud Based Toolbox for Image Analysis, Processing and Reconstruction Tasks
  179. Synergistic delivery of gold nanorods using multifunctional microbubbles for enhanced plasmonic photothermal therapy
  180. An Architectural Evaluation for Scientific Workflow Service Deployment in a Virtual Laboratory
  181. Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
  182. A platform for secure monitoring and sharing of generic health data in the Cloud
  183. Cost-oriented proactive fault tolerance approach to high performance computing (HPC) in the cloud
  184. Service-Oriented Computing – ICSOC 2013 Workshops
  185. Security, Privacy and Trust in Cloud Systems
  186. A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem
  187. Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud
  188. Secure and Controlled Sharing of Data in Distributed Computing
  189. Secure Data Sharing in the Cloud
  190. Energy Efficient Fault Tolerance for High Performance Computing (HPC) in the Cloud
  191. Cloud Computing for High Performance Image Analysis on a National Infrastructure
  192. A survey of fault tolerance mechanisms and checkpoint/restart implementations for high performance computing systems
  193. A Mobile Cloud with Trusted Data Provenance Services for Bioinformatics Research
  194. Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All?
  195. Biomedical image analysis and processing in clouds
  196. A Performance Evaluation of Public Cloud Using TPC-C
  197. Data Provenance and Data Management in eScience
  198. A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud
  199. A performance evaluation of distributed database architectures
  200. ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services
  201. A Financial Compensation Based Transaction Management Model for Service-Oriented Business Collaborations
  202. Business Process Engine Simulator
  203. A Fault Tolerance Framework for High Performance Computing in Cloud
  204. A configurable UI framework for easy composition visualisation of web services at semantic level.
  205. A Consolidated Process Model for Identity Management
  206. Accountability for Service Compliance
  207. A MapReduce-Based Parallel Clustering Algorithm for Large Protein-Protein Interaction Networks
  208. A Secure Storage Service in the Hybrid Cloud
  209. Secure Connectivity for Intra-cloud and Inter-cloud Communication
  210. Modelling Collaborative Services for Business and QoS Compliance
  211. DIaaS: Data Integrity as a Service in the Cloud
  212. Feedback loop mechanisms based particle swarm optimization with neighborhood topology
  213. Dynamic Business Collaborations Through Contract Services
  214. Facilitating Biodefense Research with Mobile-Cloud Computing
  215. A Service-Oriented User Interface for the Next Generation Web
  216. Dynamic Business Collaborations Through Contract Services
  217. A Test-bed for the Evaluation of Business Process Prediction Techniques
  218. A Mobile Web Service Middleware and Its Performance Study
  219. A Smart User Interface for Service-Oriented Web
  220. mBOSSS+: A Mobile Web Services Framework
  221. Accountability as a Service for the Cloud
  222. A Mobile Learning System for Syndromic Surveillance and Diagnosis
  223. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
  224. An Application-Level Data Transparent Authentication Scheme without Communication Overhead
  225. End-to-End Service Support for Mashups
  226. TrustStore: Making Amazon S3 Trustworthy with Services Composition
  227. Managing Web Services: An Application in Bioinformatics
  228. A Contract-Based Accountability Service Model
  229. Supporting Bioinformatic Experiments with a Service Query Engine
  230. A Contract Language for Service-Oriented Dynamic Collaborations
  231. A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context
  232. Finite difference approximations for the fractional Fokker–Planck equation
  233. Secure and Conditional Resource Coordination for Successful Collaborations
  234. Facilitating Dynamic Collaborations with eContract Services
  235. Composing Adaptive Web Services on COTS Middleware
  236. WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations
  237. Message from the SEASS Workshop Chairs
  238. WSLA+: Web Service Level Agreement Language for Collaborations
  239. Achieving simultaneous distribution control and privacy protection for Internet media delivery
  240. Yet Another Performance Testing Framework
  241. ADI-Euler and extrapolation methods for the two-dimensional fractional advection-dispersion equation
  242. Cooperative Data Management Services Based on Accountable Contract
  243. Performance Evaluation and Modeling of Web Services Security
  244. Explicitly Controlling the Fair Service for Busy Web Servers
  245. An Infrastructure Virtualisation SOA for VNO-based Business Models
  246. User-Controlled Collaborations in the Context of Trust Extended Environments
  247. Virtual Storage Services for Dynamic Collaborations
  248. Auto-tune design and evaluation on staged event-driven architecture
  249. A Performance Evaluation of Web Services Security
  250. Evaluation and Modeling of Web Services Performance
  251. Performance prediction of component-based applications
  252. A low energy, high-luminosity, high-resolution double-focusing magnetic beta-ray spectrometer for measuring neutrino rest mass
  253. The Radioactive Decay of 44gSc and 44mSc
  254. Facilitating Biodefense Research with Mobile-Cloud Computing
  255. A predictive performance model to evaluate the contention cost in application servers
  256. Evaluating the scalability of Enterprise JavaBeans technology
  257. A Technology and Process Analysis for Contemporary Identity Management Frameworks
  258. Cost of Using Cloud Computing
  259. International Journal of Systems and Service-Oriented Engineering