![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
101 Result(s)
-
Chapter and Conference Paper
Toward a Supporting System of Communication Skill: The Influence of Functional Roles of Participants in Group Discussion
More and more companies are putting emphasis on communication skill in the recruitment of their employees and are adopting group discussion as part of recruitment interview. In our project, we aim to develop a...
-
Chapter and Conference Paper
Research on the Social Experience of Mobile Internet Products
There are many factors affecting the social experience of the product, such as the contents, UI design, interactive mode and communication method. Taking Wechat and Weibo as examples, this paper studies the in...
-
Chapter and Conference Paper
JSON Patch for Turning a Pull REST API into a Push
REST APIs together with JSON are commonly used by modern web applications to export their services. However, these services are usually reachable in a pull mode which is not suitable for accessing changing dat...
-
Chapter and Conference Paper
User Involvement in Design: The Four Models
User studies and user involvement in design have been heavily discussed but lacks a systematic theory, thus causing confusion for novice designers and researchers. Through extensive literature review, this pap...
-
Chapter and Conference Paper
An Optimal and Iterative Pricing Model for Multiclass IaaS Cloud Services
In this paper, we investigate optimal pricing models for profit maximization from the perspective of cloud providers in the presence of multiple classes of IaaS (Infrastructure as a Service) services. We propo...
-
Chapter and Conference Paper
Service Recommendation Based on Social Balance Theory and Collaborative Filtering
With the increasing popularity of web service technology, many users turn to look for appropriate web services to further build their complex business applications. As an effective manner for service discovery...
-
Chapter and Conference Paper
A Recommender System Research Based on Location-Based Social Networks
Nowadays, with the rapid development of Location-Based Social Networks, information presents a trend of explosive growth. In order to locate the valuable information in tremendous amounts of location-based ser...
-
Chapter and Conference Paper
Integrating POMDP and SARSA( \(\lambda \) ) for Service Composition with Incomplete Information
As a powerful computing paradigm for constructing complex distributed applications, service composition is usually addressed as a planning problem since the goal is to optimize a path for combining services to...
-
Chapter and Conference Paper
Erratum to: Web-Age Information Management (Part I and II)
-
Chapter and Conference Paper
Co** with Ageing Issues: Adoption and Appropriation of Technology by Older Adults in Singapore
Older adults are facing various challenges while using technology. With an ageing society, it is desirable to develop senior-friendly innovations to empower older adults to lead enjoyable and fulfilling lives....
-
Chapter and Conference Paper
Predicting Drug-Drug Interactions Through Large-Scale Similarity-Based Link Prediction
Drug-Drug Interactions (DDIs) are a major cause of preventable adverse drug reactions (ADRs), causing a significant burden on the patients’ health and the healthcare system. It is widely known that clinical st...
-
Chapter and Conference Paper
Monitoring-Based Task Scheduling in Large-Scale SaaS Cloud
With the increasing scale of SaaS and the continuous growth in server failures, task scheduling problems become more intricate, and both scheduling quality and scheduling speed raise further concerns. In this ...
-
Chapter and Conference Paper
Older Adults and the Appropriation and Disappropriation of Smartphones
Research in recent years has focused on examining the acceptance as well as the appropriation of technologies amongst older adults, especially in how technologies alleviate issues of functional declines, lonel...
-
Chapter and Conference Paper
An Effective Cloud-Based Active Defense System against Malicious Codes
With the rapid development of cloud computing technique, network security has attracted more and more attention. Of all the network threats, malicious code is the major one. Due to the surge of number and spec...
-
Chapter and Conference Paper
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
The introduction of e-Health applications has not only brought benefits, but also raised serious concerns regarding security and privacy of health data. The increasing demands of accessing health data, highlig...
-
Chapter and Conference Paper
Social Context-Aware Trust Prediction in Social Networks
Online social networks have been widely used for a large number of activities in recent years. Utilizing social network information to infer or predict trust among people to recommend services from trustworthy...
-
Chapter and Conference Paper
A Full Privacy-Preserving Scheme for Location-Based Services
Location based services(LBS) pose risks to user’s privacy, as they have access to user’s identity, location and usage profile. Many approaches have been made up to deal with the privacy problems. But few of them ...
-
Chapter and Conference Paper
Modelling Critical Node Attacks in MANETs
MANETs (mobile ad hoc networks) operate in a self-organised and decentralised way. Attacks against nodes that are highly relied to relay traffic could result in a wide range of service outage. A comprehensive ...
-
Chapter and Conference Paper
Attribute-Based Fine-Grained Access Control with User Revocation
Attribute-based encryption brings a lot of convenience for access control. But it introduces several challenges with regard to the user revocation. In this paper, we propose an access control mechanism using n...
-
Chapter and Conference Paper
Personalized Quality Prediction for Dynamic Service Management Based on Invocation Patterns
Recent service management needs, e.g., in the cloud, require services to be managed dynamically. Services might need to be selected or replaced at runtime. For services with similar functionality, one approach...