Search
Search Results
-
Monitoring of an Artificial DNA in Dynamic Environments
In the last decade, bio-inspired techniques like self-organization and emergence have been in the focus of several research projects to deal with the... -
The Future of Blockchain
Blockchain's current uses demonstrate potential for enhancing efficiencies and patient-centered solutions in life sciences research. For blockchain... -
GUI Enabled Optimized Approach of CNN for Automatic Diagnosis of COVID-19 Using Radiograph Images
World Health Organization (WHO) proclaimed the Corona virus (COVID-19) as a pandemic, since it contaminated billions of individuals and killed lakhs....
-
Security assurance cases—state of the art of an emerging approach
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful...
-
Philosophical and Social Realm
Let us begin by considering an individual’s perception of oneself, the perception of one’s own mind and the mind of others, notions related to what... -
A privacy-aware deep learning framework for health recommendation system on analysis of big data
In recent technological advancement, the health recommendation system is gaining attention among the public to acquire health care services online....
-
Middleware Support for Self-aware Computing Systems
The implementation of a distributed self-aware computing system (SACS) typically requires a substantial software infrastructure. A middleware system... -
Design Patterns and Primitives: Introduction of Components and Patterns for SACS
When faced with the task of designing and implementing self-aware and self-expressive computing systems, researchers and practitioners need... -
Improved modeling of intelligent tutoring systems using ant colony optimization
Swarm intelligence approaches, such as ant colony optimization (ACO), are used in adaptive e-learning systems and provide an effective method for...
-
Reversible client/server interactions
In the setting of session behaviours , we study an extension of the concept of compliance when a disciplined form of backtracking and of output...
-
On applying stochastic network calculus
Performance evaluation plays a crucial role in the design of network systems. Many theoretical tools, including queueing theory, effective bandwidth...
-
Formalising Security in Ubiquitous and Cloud Scenarios
We survey some critical issues arising in the ubiquitous computing paradigm, in particular the interplay between context-awareness and security. We... -
Activity-Based Advertising
This chapter discusses Activity-based Advertising, an approach to more accurately target advertisements by inferring a consumer’s activities. This... -
Model Checking Recursive Programs with Numeric Data Types
Pushdown systems (PDS) naturally model sequential recursive programs. Numeric data types also often arise in real-world programs. We study the... -
Proximity-Based Federation of Smart Objects: Liberating Ubiquitous Computing from Stereotyped Application Scenarios
This paper proposes three new formal models of autonomic proximity-based federation among smart objects with wireless network connectivity and... -
Semantically-based crossover in genetic programming: application to real-valued symbolic regression
We investigate the effects of semantically-based crossover operators in genetic programming, applied to real-valued symbolic regression problems. We...
-
Distributed Event Routing in Publish/Subscribe Systems
Since the early nineties, anonymous and asynchronous dissemination of information has been a basic building block for typical distributed... -
Turn Taking for Artificial Conversational Agents
In this paper we describe the design of a turn manager for deployment in artificial conversational agents, using the Harel statechart formalism. We... -
Using Clustering Information for Sensor Network Localization
Sensor network localization continues to be an important research challenge. The goal of localization is to assign geographic coordinates to each... -