We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 762 results
  1. Searching for Microservices

    This chapter uses a mock scenario to understand a client's problems with an application critical for their business. You will see how a...
    Sean Whitesell, Rob Richardson, Matthew D. Groves in Pro Microservices in .NET 6
    Chapter 2022
  2. Runtime Verification of Operating Systems Based on Abstract Models

    Abstract

    Because of high complexity of a modern operating system (OS) one has to use complex models in high-level languages even when specifying some...

    D. V. Efremov, V. V. Kopach, ... I. V. Shchepetkov in Programming and Computer Software
    Article 07 December 2023
  3. Creating a Library Privacy Policy by Focusing on Patron Interactions

    As sensitive transactions continue to move online, public libraries are becoming a critical resource to patrons without access to the internet. This...
    Shandra Morehouse, Jessica Vitak, ... Yuting Liao in Sustainable Digital Communities
    Conference paper 2020
  4. Effects of Minimum Wage on Enterprise Productivity—Empirical Analysis Based on Database of Industrial Enterprises

    As an important policy to protect the rights and interests of workers, China's minimum wage regulation has had a continuous and extensive impact. The...
    Conference paper 2022
  5. To wrap or not to wrap? A study of how long words are split when reflowed on magnified web pages

    Many low-vision users adjust the browser zoom level to make text more comfortable to read. Responsive websites attempt to fit the content within the...

    Article Open access 11 November 2023
  6. Closing the Gap Between Privacy Policies and Privacy Preferences with Privacy Interfaces

    Privacy is an important topic regarding the modern and interconnected world. However, there is a tendency to ignore own intentions regarding...
    Stefan Becher, Felix Bölz, Armin Gerl in Trust, Privacy and Security in Digital Business
    Conference paper 2022
  7. Spreading cybersecurity awareness via gamification: zero-day game

    This research project aims to increase the employees' cybersecurity awareness by proposing a training program that consists of pre-game and post-game...

    Fadi Abu-Amara, Reem Al Hosani, ... Baraka Al Hamdi in International Journal of Information Technology
    Article 24 March 2024
  8. Research on the Board-Game-Like Service Design Tools Based on SECI Knowledge Transformation Model: Take the Customer Journey Map as an Example

    With the popularity of the new methodology of service design thinking, graphic service design tools, such as Customer Journey Map, Persona, Story...
    Ying Zhao, **ong Ding, Shan Liu in Design, User Experience, and Usability
    Conference paper 2023
  9. Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements

    Privacy policies are a widely used approach in informing end-users about the processing of their data and collecting consent to such processing....
    Nazila Gol Mohammadi, Jens Leicht, ... Maritta Heisel in Trust, Privacy and Security in Digital Business
    Conference paper 2019
  10. Information security and privacy challenges of cloud computing for government adoption: a systematic review

    The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and...

    Ndukwe Ukeje, Jairo Gutierrez, Krassie Petrova in International Journal of Information Security
    Article 03 January 2024
  11. Modernize Monolithic Applications to Cloud Native

    So far, I have explained various cloud-native architectures such as microservices, event-driven, and serverless. These architecture concepts can be...
    Shivakumar R Goniwada in Cloud Native Architecture and Design
    Chapter 2022
  12. Input addition and deletion in reinforcement: towards protean learning

    Reinforcement Learning (RL) agents are commonly thought of as adaptive decision procedures. They work on input/output data streams called “states”,...

    Iago Bonnici, Abdelkader Gouaïch, Fabien Michel in Autonomous Agents and Multi-Agent Systems
    Article 09 November 2021
  13. Studying the Adoption of 5G and Future Networks for Social Inclusion: An Innovation Systems Transitions Perspective for Networks-as-a-Service

    This paper explores the adoption of 5G and future networks as a means of improving social inclusion. The paper outlines the cost dilemma associated...
    Galyna Otlyvanska, Niall Connolly, ... John Dooley in Transfer, Diffusion and Adoption of Next-Generation Digital Technologies
    Conference paper 2024
  14. Compliance mit Metadaten

    Alle reden von der Ökonomie der Daten. Daten werden erhoben, gespeichert, verarbeitet und wiederverwendet. In der EU schafft die...
    Rigo Wenning, Sabrina Kirrane in Wissensbasierte KI-Anwendungen
    Chapter 2023
  15. Learning key steps to attack deep reinforcement learning agents

    Deep reinforcement learning agents are vulnerable to adversarial attacks. In particular, recent studies have shown that attacking a few key steps can...

    Chien-Min Yu, Ming-Hsin Chen, Hsuan-Tien Lin in Machine Learning
    Article 20 March 2023
  16. MapReduce scheduling algorithms in Hadoop: a systematic study

    Hadoop is a framework for storing and processing huge volumes of data on clusters. It uses Hadoop Distributed File System (HDFS) for storing data and...

    Soudabeh Hedayati, Neda Maleki, ... Kamal Berahmand in Journal of Cloud Computing
    Article Open access 10 October 2023
  17. Single Sign-On

    Now that we’ve covered some protocol basics and a sample application, we can discuss single sign-on (SSO), starting with what it is and why it is...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
  18. Machine Understandable Policies and GDPR Compliance Checking

    The European General Data Protection Regulation (GDPR) calls for technical and organizational measures to support its implementation. Towards this...

    Piero A. Bonatti, Sabrina Kirrane, ... Luigi Sauro in KI - Künstliche Intelligenz
    Article 08 July 2020
  19. A Research on the Manchu-Chinese Bilingual Comparative Characteristics of the Yu Zhi Zeng Ding Qing Wen Jian Dictionary

    Yu Zhi Zeng Ding Qing Wen Jian was the first official Manchu-Chinese bilingual dictionary of the Qing Dynasty. It added Chinese translation to the...
    Conference paper 2024
  20. ContainerGym: A Real-World Reinforcement Learning Benchmark for Resource Allocation

    We present ContainerGym, a benchmark for reinforcement learning inspired by a real-world industrial resource allocation task. The proposed benchmark...
    Abhijeet Pendyala, Justin Dettmer, ... Asma Atamna in Machine Learning, Optimization, and Data Science
    Conference paper 2024
Did you find what you were looking for? Share feedback.