No abstract available.
Cited By
- Xuan L, Haoxiang Z, Baozheng J, Yanxia L and You L A Benchmark Dataset for Evaluating Spatial Perception in Multimodal Large Models Proceedings of the First International Workshop on IoT Datasets for Multi-modal Large Model, (37-43)
- Alharthi R Recognizing Hate-prone Characteristics of Online Hate Speech Targets Companion Publication of the 13th ACM Web Science Conference 2021, (153-155)
- Protopsaltis A, Sarigiannidis P, Margounakis D and Lytos A Data visualization in internet of things Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-11)
- Su T, Sun H and Wang S Intrusion Detection Using Convolutional Recurrent Neural Network Proceedings of the 2019 8th International Conference on Computing and Pattern Recognition, (413-419)
- Fan Y, Jiang S, Zhang Z, Chen G, chen Y and Li B Evaluation of Business English Majors Teaching Quality Based on the Attribute Importance of Rough Set Proceedings of the 2019 3rd International Workshop on Education, Big Data and Information Technology, (54-59)
- Yu Z and Xu G The Relationship between Carbon Emission and Economic Activity in the United States Proceedings of the 2019 5th International Conference on E-Business and Applications, (114-119)
- Wang W, Yao J and Qiu S Implementation of Kalman Filter in plc Proceedings of the International Symposium on Big Data and Artificial Intelligence, (242-245)
- Monterrey C, Fabian J and Canahuire R H-infinity Controller Design with Constrained Control Effort Proceedings of the 6th International Conference on Control, Mechatronics and Automation, (60-64)
- Toshiaki T Rapid Imaging Observations of Clouds and Precipitations with High-resolution Millimeter-wave Radar FALCON-I Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, (1-6)
- Wang W and He D Click-through Rate Estimates based on Deep Learning Proceedings of the 2018 2nd International Conference on Deep Learning Technologies, (12-15)
- Song Z Application of Big Data and Intelligent Processing Technology in Modern Chinese Multi-category Words Part of Speech Tagging Corpus Proceedings of the 1st International Conference on Information Science and Systems, (107-111)
- Hao C and Xu-ran L Exploring the Impact of Public Service Effectiveness on Public Policy Compliance based on Prospect Theory Proceedings of the 2018 International Conference on E-Business, Information Management and Computer Science, (1-5)
- Perez M, Lagman A and Adao R Event Management Solution Using Web Application Platform Proceedings of the 2017 International Conference on Information Technology, (206-211)
- Wu Y, Fong S and Zhuang Y General Precautions against Security Threats for Computer Networks in SMEs Proceedings of the International Conference on Big Data and Internet of Thing, (134-140)
- Rha E, Shi W and Belkin N (2017). An exploration of reasons for query reformulations, Proceedings of the Association for Information Science and Technology, 54:1, (337-346), Online publication date: 24-Oct-2017.
- ahmadpour S and Khaleghi A Central Trouble Ticketing (CTT) System as a Communication Tool between Stakeholders of Center of Training and learning (CTL) Proceedings of the 9th International Conference on Information Management and Engineering, (91-95)
- Sobecki P, Życka-Malesa D, Mykhalevych I, Gora A, Sklinda K and Przelaskowski A Feature Extraction Optimized For Prostate Lesion Classification Proceedings of the 9th International Conference on Bioinformatics and Biomedical Technology, (22-27)
- Çano E and Morisio M MoodyLyrics Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, (118-124)
- Jung M Affective Grounding in Human-Robot Interaction Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, (263-273)
- Mitsuzuka K, Ling F and Ohwada H Analysis of CSR activities Affecting Corporate Value Using Machine Learning Proceedings of the 9th International Conference on Machine Learning and Computing, (11-14)
- Min W, Jun Z and Wei Z The application of fuzzy comprehensive evaluation method in the software project risk assessment Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences, (76-79)
- Radovanovic A, Heavlin W and Kiliccote S Optimized Risk-Aware Nomination Strategy in Demand Response Markets Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, (99-108)
- Cazco G, González M, Abad F and Mercado-Varela M Digital competence of the university faculty Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, (147-154)
- Kang K, Byeon G, Jang J and Hong J Framework for assigning multiple resources development environment utilizing various sensor devices Proceedings of the International Conference on Research in Adaptive and Convergent Systems, (121-122)
- Desai P, Pujari J and Kinnikar A An Image Retrieval using combined approach Wavelets and Local Binary Pattern Proceedings of the International Conference on Informatics and Analytics, (1-6)
- Hiremath D, Shah P and Chaudhary S ICT Interventions to Improve the Performance of Canal Irrigation Sector in India Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, (1-5)
- Araullo J Increasing Physical Activity In Seniors Using Emerging Technology Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, (7-8)
- Guo D and Koufakou A A Certification-Guided Course for Cloud Computing (Abstract Only) Proceedings of the 47th ACM Technical Symposium on Computing Science Education, (687-688)
- Schleusener M, Stevens S, Brenner S, Murata K, Adams A and Palma A (2016). Snowden's revelations led to more informed and shocked German citizens, ACM SIGCAS Computers and Society, 45:3, (393-397), Online publication date: 5-Jan-2016.
- Agrawal R, Kadadi A, Dai X and Andres F Challenges and opportunities with big data visualization Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, (169-173)
- Kim D, Choi E and Hong J System information-based Hadoop load balancing for heterogeneous clusters Proceedings of the 2015 Conference on research in adaptive and convergent systems, (465-467)
- Sowriraghavan A and Burnap P Prediction of Malware Propagation and Links within Communities in Social Media Based Events Proceedings of the ACM Web Science Conference, (1-2)
- Wu X, Liu Y and Gorton I Exploring Performance Models of Hadoop Applications on Cloud Architecture Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, (93-101)
- Bizin I, Vlasov V, Demidov A and Kanatnikov N The Use of Multicopters for Traffic Monitoring in Dense Urban Areas Proceedings of the 2014 Conference on Electronic Governance and Open Society: Challenges in Eurasia, (42-44)
- Vafopoulos M, Meimaris M, Rodríguez J, Xidias I, Klonaras M and Vafeiadis G Insights in global public spending Proceedings of the 9th International Conference on Semantic Systems, (135-139)
- Pereira D, Dantas C and Ribeiro C A pragmatic approach for sustainable development based on semantic web services Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, (82-90)
- Patni J, Trivedi N, Pal O, Chauhan P and Sharma A An optimal approach of load balancing for grid computing Proceedings of the CUBE International Information Technology Conference, (567-571)
- Bonomi F, Milito R, Zhu J and Addepalli S Fog computing and its role in the internet of things Proceedings of the first edition of the MCC workshop on Mobile cloud computing, (13-16)
- Spry K An infographical approach to designing the problem list Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (791-794)
- Zandanel A Users and households appliances Proceedings of the 9th ACM SIGCHI Italian Chapter International Conference on Computer-Human Interaction: Facing Complexity, (96-100)
- Yuantao J, Siqin Y and Zhifeng X Simulation of e-commerce diffusion model based on Netlogo Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing, (99-102)
- Wang X, Bier E, Butkiewicz T, Ribarsky W and Dou W Designing visual analytics systems for organizational environments Proceedings of the 2011 Visual Information Communication - International Symposium, (1-9)
- Klingert S, Schulze T and Bunse C GreenSLAs for the energy-efficient management of data centres Proceedings of the 2nd International Conference on Energy-Efficient Computing and Networking, (21-30)
- Ganev V, Guo Z, Serrano D, Tansey B, Barbosa D and Stroulia E An environment for building, exploring and querying academic social networks Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (282-289)
- McDaniel J Developing an information security program for HIPAA compliance 2009 Information Security Curriculum Development Conference, (100-106)
Recommendations
Modelling and Simulation of Peer-to-Peer Overlay Network Protocols using OverSim
UKSIM '13: Proceedings of the 2013 UKSim 15th International Conference on Computer Modelling and SimulationDue to the large scale and decentralized nature of peer-to-peer (P2P) networks, it is prohibitively expensive to test a P2P algorithm by deploying it on real-world networks and obtaining data on its performance. To be able to conduct research on ...
Multidisciplinary knowledge modeling and cooperative design for automobile development
CDVE'07: Proceedings of the 4th international conference on Cooperative design, visualization, and engineeringThe paper presents a cooperative design approach based on multidisciplinary knowledge modeling for automobile development. The design knowledge from multidisciplinary domain is obtained to establish multidisciplinary knowledge model. Then ...
Design space analysis for modeling incentives in distributed systems
SIGCOMM '11Distributed systems without a central authority, such as peer-to-peer (P2P) systems, employ incentives to encourage nodes to follow the prescribed protocol. Game theoretic analysis is often used to evaluate incentives in such systems. However, most game-...