The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)
Internet of Things (IoT) is experiencing a huge hype these days, thanks to the increasing capabilities of embedded devices that enable their adoption in new fields of application (e.g. Wireless Sensor Networks, Connected Cars, Health Care, etc.). On the one hand, this is leading to an increasing adoption of multi-tenancy solutions for Cloud and Fog Computing, to analyze and store the data produced...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Recently wireless Networks-on-Chip (WiNoCs) have been proposed to overcome the scalability and performance limitations of traditional multi-hop wired NoC architectures. However, the adaptation of wireless technology for on-chip communication is still in its infancy. Consequently, several challenges such as simulation and design tools that consider the technological constraints imposed by the wireless...
The wide deployment of public cloud computing infrastructures has become an appealing solution for the advantages of flexibility and cost saving, but the risk of being exposed to privacy and security issues refrains a lot of customers from risking their sensitive data to the cloud. The data owners do not want to move to the cloud unless the data confidentiality and the privacy of their queries are...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
In order to make transformer potential fault diagnose effectively, Support Vector Machine (SVM) is introduced as an effective algorithm. Firstly, the above SVM algorithm is formed by four common kernel functions: linear kernel function, polynomial kernel function, RBF kernel function and Sigmoid kernel function, Secondly, Differential Evolution Algorithm (DEA) based on new fitness function is introduced...
The proliferation of mobiles devices, such as laptops, tablets and smartphones, has led a number of educational networks to define Bring Your Own Device (BYOD) policies that allow students and teachers to bring their own devices to school and use them for educational and learning purposes. This paper presents a case study for the design of an effective and secure BYOD policy for the Greek School Network,...
We live in a world increasingly digital where intelligent and communicating objects evolve and interact. These objects have their own missions and goals. However, in a more and more complex environment, mechanisms of communication and information exchange protocols need to be more efficient, fast and smart. The collaborative approach seems to be the most suitable to facilitate interaction between...
The property space of internet use has three dimensions: type of use, amount of use and variety of use. While internet is one of the sources of information security knowledge among students, the relationship of dimensions of internet use and information security awareness has not yet been explored. The purpose of this paper is to explore relationship between dimensions of internet use and, information...
The aim of this presentation is to show how various ideas coming from the nonlinear stability theory of functional differential systems, stochastic modeling, and machine learning, can be put together in order to create an approximating model that explains the working mechanisms behind a certain type of reservoir computers. Reservoir computing is a recently introduced brain-inspired machine learning...
Human activity recognition (HAR) is an interesting research area in machine learning. The purpose of human activity recognition study is to automatically detect human activities from the information acquired from different sensors, and to analyze this information using statistical techniques. Big data still a challenging problem in human activity prediction. Several approaches have recently been developed...
The LASSO is a variable subset selection procedure in statistical linear regression based on sparsity promoting `1 penalization of the least-squares operator. In many applications, the design matrix has strongly correlated columns which are smoothly evolving with the column index. For such applications, the standard LASSO does not provide satisfactory solutions in practice because some incoherence...
Reservoir Computing is an attractive paradigm of recurrent neural network architecture, due to the ease of training and existing neuromorphic implementations. Successively applied on speech recognition and time series forecasting, few works have so far studied the behavior of such networks on computer vision tasks. Therefore we decided to investigate the ability of Echo State Networks to classify...
The research into data analysis over large quantities of data requires different strategies from traditional computation, in order to allow data processing in this scenario and extract valuable information from it. Cross join is a common operation from the relational algebra that other operations can be derived from it, like the Theta-join operation. Implementing it, however, implies excessive data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.