Search
Search Results
-
Searching for Microservices
This chapter uses a mock scenario to understand a client's problems with an application critical for their business. You will see how a... -
Runtime Verification of Operating Systems Based on Abstract Models
AbstractBecause of high complexity of a modern operating system (OS) one has to use complex models in high-level languages even when specifying some...
-
Creating a Library Privacy Policy by Focusing on Patron Interactions
As sensitive transactions continue to move online, public libraries are becoming a critical resource to patrons without access to the internet. This... -
Effects of Minimum Wage on Enterprise Productivity—Empirical Analysis Based on Database of Industrial Enterprises
As an important policy to protect the rights and interests of workers, China's minimum wage regulation has had a continuous and extensive impact. The... -
To wrap or not to wrap? A study of how long words are split when reflowed on magnified web pages
Many low-vision users adjust the browser zoom level to make text more comfortable to read. Responsive websites attempt to fit the content within the...
-
Closing the Gap Between Privacy Policies and Privacy Preferences with Privacy Interfaces
Privacy is an important topic regarding the modern and interconnected world. However, there is a tendency to ignore own intentions regarding... -
Spreading cybersecurity awareness via gamification: zero-day game
This research project aims to increase the employees' cybersecurity awareness by proposing a training program that consists of pre-game and post-game...
-
Research on the Board-Game-Like Service Design Tools Based on SECI Knowledge Transformation Model: Take the Customer Journey Map as an Example
With the popularity of the new methodology of service design thinking, graphic service design tools, such as Customer Journey Map, Persona, Story... -
Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements
Privacy policies are a widely used approach in informing end-users about the processing of their data and collecting consent to such processing.... -
Information security and privacy challenges of cloud computing for government adoption: a systematic review
The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and...
-
Modernize Monolithic Applications to Cloud Native
So far, I have explained various cloud-native architectures such as microservices, event-driven, and serverless. These architecture concepts can be... -
Input addition and deletion in reinforcement: towards protean learning
Reinforcement Learning (RL) agents are commonly thought of as adaptive decision procedures. They work on input/output data streams called “states”,...
-
Studying the Adoption of 5G and Future Networks for Social Inclusion: An Innovation Systems Transitions Perspective for Networks-as-a-Service
This paper explores the adoption of 5G and future networks as a means of improving social inclusion. The paper outlines the cost dilemma associated... -
Compliance mit Metadaten
Alle reden von der Ökonomie der Daten. Daten werden erhoben, gespeichert, verarbeitet und wiederverwendet. In der EU schafft die... -
Learning key steps to attack deep reinforcement learning agents
Deep reinforcement learning agents are vulnerable to adversarial attacks. In particular, recent studies have shown that attacking a few key steps can...
-
MapReduce scheduling algorithms in Hadoop: a systematic study
Hadoop is a framework for storing and processing huge volumes of data on clusters. It uses Hadoop Distributed File System (HDFS) for storing data and...
-
Single Sign-On
Now that we’ve covered some protocol basics and a sample application, we can discuss single sign-on (SSO), starting with what it is and why it is... -
Machine Understandable Policies and GDPR Compliance Checking
The European General Data Protection Regulation (GDPR) calls for technical and organizational measures to support its implementation. Towards this...
-
A Research on the Manchu-Chinese Bilingual Comparative Characteristics of the Yu Zhi Zeng Ding Qing Wen Jian Dictionary
Yu Zhi Zeng Ding Qing Wen Jian was the first official Manchu-Chinese bilingual dictionary of the Qing Dynasty. It added Chinese translation to the... -
ContainerGym: A Real-World Reinforcement Learning Benchmark for Resource Allocation
We present ContainerGym, a benchmark for reinforcement learning inspired by a real-world industrial resource allocation task. The proposed benchmark...