We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach

    The recent advancements in network systems, including Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and cloud...

    Sajid Alam, Javier Jose Diaz Rivera, ... Wang-Cheol Song in Journal of Network and Systems Management
    Article 03 April 2024
  2. Future of Web 3.0

    The high-frequency term Web 3.0 is receiving more and more attention. We hear people around us discussing Web 3.0, digital people, metaverse, NFT,...
    Chapter 2024
  3. Consistent and Quality-Aware Service Composition in Smart Cities

    In this chapter, we review our research for dependable service composition for smart cities in both cyber and physical spaces. For the cyber space,...
    Chapter Open access 2024
  4. An improved ACO based service composition algorithm in multi-cloud networks

    In recent years, with the rapid development of mobile communication networks, some new services such as cloud virtual reality, holographic...

    Liu Bei, Li Wenlin, ... Xu **bin in Journal of Cloud Computing
    Article Open access 15 January 2024
  5. Accessibility engineering in web evaluation process: a systematic literature review

    Several works of literature contributed to the web evaluation process in recent years to promote digital inclusion by addressing several...

    **at Ara, Cecilia Sik-Lanyi, Arpad Kelemen in Universal Access in the Information Society
    Article Open access 27 January 2023
  6. Knowledge Graph Enhanced Web API Recommendation via Neighbor Information Propagation for Multi-service Application Development

    In cloud era, Web APIs have been the best carrier for service delivery, capability replication and data output in multi-service application...
    Conference paper 2022
  7. Creating Service

    How to create angular service.
    Video segment 2023
  8. Early web application attack detection using network traffic analysis

    The number of deployed web applications and the number of web-based attacks in the last decade are constantly increasing. One group of tools that...

    Branislav Rajić, Žarko Stanisavljević, Pavle Vuletić in International Journal of Information Security
    Article 26 October 2022
  9. Design of a web based career counselling information system: Türkiye case

    This research presents the design of Career Counselling Information System (CCIS), a web-based career counselling information system. The research...

    Salim Atay, Cennet Terzi Müftüoğlu, ... Savaş Ceylan in Education and Information Technologies
    Article Open access 19 April 2024
  10. A deep learning approach for collaborative prediction of Web service QoS

    Web services are a cornerstone of many crucial domains, including cloud computing and the Internet of Things. In this context, QoS prediction for Web...

    Mohammed Ismail Smahi, Fethallah Hadjila, ... Abdelkrim Benamar in Service Oriented Computing and Applications
    Article 07 November 2020
  11. The indexation of retracted literature in seven principal scholarly databases: a coverage comparison of dimensions, OpenAlex, PubMed, Scilit, Scopus, The Lens and Web of Science

    In this study, the coverage and overlap of retracted publications, retraction notices and withdrawals are compared across seven significant scholarly...

    José Luis Ortega, Lorena Delgado-Quirós in Scientometrics
    Article Open access 28 June 2024
  12. Web Scams Detection System

    Web-based scams rely on scam websites to provide fraudulent business or fake services to steal money and sensitive information from unsuspecting...
    Emad Badawi, Guy-Vincent Jourdan, Iosif-Viorel Onut in Foundations and Practice of Security
    Conference paper 2024
  13. A multi-objective parameter optimization approach to maximize lifetime of wireless sensor networks inspired by spider web

    Spider-web-inspired hierarchical clustering network is an emerging research topic in wireless sensor networks (WSNs), benefitting from the particular...

    Jun Wang, Yadan Zhang, ... Bo Liu in The Journal of Supercomputing
    Article 23 July 2022
  14. Heterogeneous ensemble learning method for personalized semantic web service recommendation

    Semantic web service (SWS) discovery and recommendation (SWSR) has emerged as a potential technology which aims to fulfill the user requirements by...

    S. Sagayaraj, M. Santhoshkumar in International Journal of Information Technology
    Article 26 May 2020
  15. A two-phase method to optimize service composition in cloud manufacturing

    Service composition is widely employed in cloud manufacturing. Due to the abundance of similar cloud manufacturing services, the search space for...

    Qiang Hu, Haoquan Qi, ... Lianen Qu in Computing
    Article 15 April 2024
  16. Web Content Integrity: Tamper-Proof Websites Beyond HTTPS

    We propose Web Content Integrity, a framework that allows a service provider to guarantee the integrity of their static website, even in the face of...
    Sven Zemanek, Sebastian Tauchert, ... Lilli Bruckschen in ICT Systems Security and Privacy Protection
    Conference paper 2024
  17. Application of Machine Learning Algorithms for Detection of Vulnerability in Web Applications

    The Internet is a world-class network that connects systems and electronic devices. As per the report, 4.66 billion people in the world use the...

    Vijayalakshmi Mathalli Narasimha, Dharani Andhe, ... Manjuprasad Balaraju in SN Computer Science
    Article 20 December 2022
  18. Bias and the Web

    Bias is everywhere, sometimes blatantly explicit, but most of the time it’s hidden, as it often arises from that which is missing, the gaps in our...
    Ricardo Baeza-Yates, Leena Murgai in Introduction to Digital Humanism
    Chapter Open access 2024
  19. Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP

    The realm of cybersecurity places significant importance on early ransomware detection. Feature selection is critical in this context, as it enhances...

    Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy in Discover Internet of Things
    Article Open access 30 November 2023
Did you find what you were looking for? Share feedback.