The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Process mining has an important place in business process (BP) analysis. It aims to analyze process events in order to discover the related BP model. However, these techniques are only based on process events and sometimes on business data, leaving aside a large set of data, namely the BP execution context. Existing studies have shown the benefits of considering the context in the BP analysis but...
Large repository of music that can be accessed or downloaded over the Internet, provides a new way of trading or sharing. However, the technologies for features based Music Information Retrieval (MIR), which is a multidisciplinary field of research, are not well established. Existing MIR techniques and products suffer from either limited capabilities or poor performance. In this paper, we proposed...
Big data analytics have been proposed as a disruptive technology that will reshape security and law enforcement agencies, which is a domain that relies on data analytics to achieve criminal network insights for better decision-making. Rooted in current literature, we review the landscape of criminal network analysis through the big data analytic framework in this paper. We identify the big data sources,...
In today's highly competitive markets, the challenge for product manufacturers is not only to improve a product's performance by evolving its current features but also to provide out-of-the-box product designs and characteristics. This paper proposes the FEATURE framework, which recommends product manufacturers with the unique features to be added to the next generation of a product by examining features...
According to our survey about the express delivery from hundreds of campuses, we find that the location of commodity storage places impacts the delivery success rate and service quality. Thus, how to select the proper delivery location is vital to logistics enterprises, which contributes to improve the work efficiency and reduce delivery costs. In this paper, probabilistic model checking is used to...
In WoT environment, smart things provide RESTful services to expose their resources and operations. There are a large number of smart things that offer the same functionalities but have different service interfaces. Because of the high coupling between device service instances and process specifications like BPEL, the cost of reusing a BPEL specification between different device environments could...
Based on smart devices and wireless communication infrastructure, the Electronic Medical Records (EMR) systems become more and more popular in hospitals by reason of its convenient operation, remote access, data integrity, facilitated resources sharing, statistical analysis and many other advantages. When entering an EMR system, patients can be treated by many kinds of services and also leave their...
Most existing approaches for solving the network threat problems focus on the specific security mechanisms, for example, network intrusion detection system (NIDS) detection, firewall configuration, rather than on flow management approaches to defend network threats with an SDN (Software Defined Networking) architecture. Accordingly, this study proposes an improved behaviour-based SVM (support vector...
K-SGS is a novel graph summarization method which solves the scale limits. By using the concept hierarchy of the nodes' attributes, K-SGS can group the nodes in a flexible way. It groups the nodes not only with same values but also with similar values. Besides the edges' information loss, it also considers the nodes' information loss during the summarization and model the summarization as multi-objective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.