![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
305 Result(s)
-
Chapter and Conference Paper
Data Sharing and Privacy for Patient IoT Devices Using Blockchain
Once a fitness fad, wearable and other related Internet of Things (IoT) devices are fast becoming common place in many different smart city applications such as healthcare. However, IoT devices, particularly i...
-
Chapter and Conference Paper
Research on the Key Techniques of Semantic Mining of Information Digest in the Field of Agricultural Major Crops Based on Deep Learning
Nowadays application scopes of deep learning research in the machine learning subfield have been gradually expanded, mainly in the field of computer vision and natural language processing. However, in the latt...
-
Chapter and Conference Paper
Key Retrieval from AES Architecture Through Hardware Trojan Horse
The study of Hardware Trojan and its impact is a cutting edge research topic today. Hardware Trojan Horses (HTH) are inserted by an adversary either during design or fabrication phase of IC which does the mali...
-
Chapter and Conference Paper
Trends and Opportunities for Traffic Engineering Paradigms Across Mobile Cellular Network Generations
Traffic engineering is at the heart of telecommunications engineering. In telecommunication engineering, we have recently experienced a revolution in the form of mobile cellular network generations. History sh...
-
Chapter and Conference Paper
Communication Design for the Dissemination of Scientific Knowledge. Languages, Tools, Technologies, Collaborative Processes for Museum Education
This paper sets out to report an articulated research-action process, which started with some educational-scientific experiments carried out in a collaborative effort between the disciplines of design, multime...
-
Chapter and Conference Paper
Data Imputation with an Improved Robust and Sparse Fuzzy K-Means Algorithm
Missing data may be one of the biggest problems hindering modern research science. It occurs frequently, for various reasons, and slows down crucial data analytics required to answer important questions relate...
-
Chapter and Conference Paper
The Pollicina Project: A Collaborative and Educational Social Suite to Build Cultural Itineraries
The Pollicina project is aimed at defining a collaborative coordinated learning environment, called Educational Social Network, to allow students to elaborate thematic cultural paths on the territory. The topi...
-
Chapter and Conference Paper
A Revocable Outsourcing Attribute-Based Encryption Scheme
Attribute-Based Encryption (ABE) is a generalized cryptographic primitive from normal public key encryption. It provides an access control mechanism over encrypted message using access policies and ascribed at...
-
Chapter and Conference Paper
Investigating the Recognition of Non-articulatory Sounds by Using Statistical Tests and Support Vector Machine
People with articulation and phonological disorders need training to plan and to execute sounds of speech. Compared to other children, children with Down Syndrome have significantly delayed speech development ...
-
Chapter and Conference Paper
Hardware Assisted Randomization of Data
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space ...
-
Chapter and Conference Paper
Position Paper on Blockchain Technology: Smart Contract and Applications
Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component...
-
Chapter and Conference Paper
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security
Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the f...
-
Chapter and Conference Paper
Climbing Ranking Position via Long-Distance Backlinks
The best attachment consists in finding a good strategy that allows a node inside a network to achieve a high rank. This is an open issue due to its intrinsic computational complexity and to the giant dimension o...
-
Chapter and Conference Paper
An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games
In this paper, an approach based on Possibilistic WorkFlow nets is proposed to model mutiplayer game scenarios. In a multiplayer game scenario, the actions of a player may influence, directly or indirectly, th...
-
Chapter and Conference Paper
Exploiting Long Distance Connections to Strengthen Network Robustness
Network fault tolerance (also known as resilience or robustness) is becoming a highly relevant topic, expecially in real networks, where it is essential to know to what extent it is still working notwithstandi...
-
Chapter and Conference Paper
Design and Performance Analysis of Load Balancing Strategies for Cloud-Based Business Process Management Systems
Business Process Management Systems (BPMS) provide automated support for the execution of business processes in modern organisations. With the advent of cloud computing, the deployment of BPMS is shifting from...
-
Chapter and Conference Paper
Mixed Membership Sparse Gaussian Conditional Random Fields
Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...
-
Chapter and Conference Paper
Mining Textual Reviews with Hierarchical Latent Tree Analysis
Collecting feedback from customers is an important task of any business if they hope to retain customers and improve their quality of service. Nowadays, customers can enter reviews on many websites. The vast n...
-
Chapter and Conference Paper
Facilitating Social Harmony Through ICTs
Social Harmony involves the peaceful interaction of people in a social setting. In this keynote address I briefly examine the historical antecedents of social harmony and identify some of the salient barriers ...
-
Chapter and Conference Paper
Protecting Document Outside Enterprise Network: A Confirmed Framework
Sharing e-documents are important components of any enterprise workflow. Kee** these e-documents secure is fundamental to enterprise security, especially in multi-site enterprises or when sharing e-documents...