Abstract is missing.
- Staking Assets Management on Blockchains: Vision and RoadmapStefan Driessen. 3-9 [doi]
- Hybrid Context-Aware Method for Quality Assessment of Data StreamsMostafa Mirzaie. 10-16 [doi]
- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT EnvironmentsZahid Iqbal. 17-24 [doi]
- Towards a Rule-Based Recommendation Approach for Business Process ModelingDiana Sola. 25-31 [doi]
- Towards a Privacy Conserved and Linked Open Data Based Device Recommendation in IoTFouad Komeiha, Nasredine Cheniki, Yacine Sam, Ali Jaber, Nizar Messai, Thomas Devogele. 32-39 [doi]
- Learning Performance Models AutomaticallyRunan Wang. 40-46 [doi]
- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification ApproachIkram Garfatta, Kaïs Klai, Mahamed Graïet, Walid Gaaloul. 47-53 [doi]
- Formal Quality of Service Analysis in the Service Selection ProblemAgustín Eloy Martinez Suñé. 54-60 [doi]
- A Crowdsourcing-Based Knowledge Graph Construction PlatformXingkun Liu, Zhiying Tu, Zhongjie Wang, Xiaofei Xu, Yin Chen. 63-66 [doi]
- Data Interaction for IoT-Aware Wearable Process ManagementStefan Schönig, Richard Jasinski, Andreas Ermer. 67-71 [doi]
- SiDD: The Situation-Aware Distributed Deployment SystemKálmán Képes, Frank Leymann, Benjamin Weder, Karoline Wild. 72-76 [doi]
- AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing PipelinesSunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, Ryszard Kowalczyk, Surya Nepal. 77-80 [doi]
- Performance Diagnosis in Cloud Microservices Using Deep LearningLi Wu, Jasmin Bogatinovski, Sasho Nedelkoski, Johan Tordsson, Odej Kao. 85-96 [doi]
- Anomaly Detection at Scale: The Case for Deep Distributional Time Series ModelsFadhel Ayed, Lorenzo Stella, Tim Januschowski, Jan Gasthaus. 97-109 [doi]
- A Systematic Mapping Study in AIOpsPaolo Notaro, Jorge S. Cardoso, Michael Gerndt. 110-123 [doi]
- An Influence-Based Approach for Root Cause Alarm Discovery in Telecom NetworksKeli Zhang, Marcus Kalander, Min Zhou, Xi Zhang, Junjian Ye. 124-136 [doi]
- Localization of Operational Faults in Cloud Applications by Mining Causal Dependencies in Logs Using Golden SignalsPooja Aggarwal, Ajay Gupta, Prateeti Mohapatra, Seema Nagar, Atri Mandal, Qing Wang, Amit M. Paradkar. 137-149 [doi]
- Using Language Models to Pre-train Features for Optimizing Information Technology Operations Management TasksXiaotong Liu, Yingbei Tong, Anbang Xu, Rama Akkiraju. 150-161 [doi]
- Towards Runtime Verification via Event Stream Processing in Cloud Computing InfrastructuresDomenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, Angela Scibelli. 162-175 [doi]
- Decentralized Federated Learning Preserves Model and Data PrivacyThorsten Wittkopp, Alexander Acker. 176-187 [doi]
- Online Memory Leak Detection in the Cloud-Based InfrastructuresAnshul Jindal, Paul Staab, Jorge S. Cardoso, Michael Gerndt, Vladimir Podolskiy. 188-200 [doi]
- Multi-source Anomaly Detection in Distributed IT SystemsJasmin Bogatinovski, Sasho Nedelkoski. 201-213 [doi]
- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud ServicesDominik Scheinert, Alexander Acker. 214-227 [doi]
- Discovering Alarm Correlation Rules for Network Fault ManagementPhilippe Fournier-Viger, Ganghuan He, Min Zhou, Mourad Nouioua, Jiahong Liu. 228-239 [doi]
- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm IntelligenceBeiran Chen, Yi Zhang, George Iosifidis. 240-251 [doi]
- SLMAD: Statistical Learning-Based Metric Anomaly DetectionArsalan Shahid, Gary White, Jaroslaw Diuwe, Alexandros Agapitos, Owen O'Brien. 252-263 [doi]
- Software Reliability Engineering for Resilient Cloud OperationsMichael R. Lyu, Yuxin Su. 264-268 [doi]
- The Future of Robotic Process Automation (RPA)Aditya Ghose, Geeta Mahala, Simon Pulawski, Hoa Khanh Dam. 273-280 [doi]
- Adaptive Summaries: A Personalized Concept-Based Summarization Approach by Learning from Users' FeedbackSamira Ghodratnama, Mehrdad Zakershahrak, Fariborz Sobhanmanesh. 281-293 [doi]
- TAP: A Two-Level Trust and Personality-Aware Recommender SystemShahpar Yakhchi, Seyed Mohssen Ghafari, Mehmet A. Orgun. 294-308 [doi]
- Am I Rare? an Intelligent Summarization Approach for Identifying Hidden AnomaliesSamira Ghodratnama, Mehrdad Zakershahrak, Fariborz Sobhanmanesh. 309-323 [doi]
- On How Cognitive Computing Will Plan Your Next Systematic ReviewMaisie Badami, Marcos Báez, Shayan Zamanirad, Wei Kang. 324-333 [doi]
- Security Professional Skills Representation in Bug Bounty Programs and ProcessesSara Mumtaz, Carlos Rodríguez 0001, Shayan Zamanirad. 334-348 [doi]
- Stage-Based Process Performance AnalysisChiao Yun Li, Sebastiaan J. van Zelst, Wil M. P. van der Aalst. 349-364 [doi]
- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item ProblemMohammad Hossein Rimaz, Reza Hosseini, Mehdi Elahi, Farshad Bakhshandegan Moghaddam. 365-378 [doi]
- Scalable Online Conformance Checking Using Incremental Prefix-Alignment ComputationDaniel Schuster, Gero Joss Kolhof. 379-394 [doi]
- Bringing Cognitive Augmentation to Web Browsing AccessibilityAlessandro Pina, Marcos Báez, Florian Daniel. 395-407 [doi]
- Towards Knowledge-Driven Automatic Service Composition for Wildfire PredictionHela Taktak, Khouloud Boukadi, Chirine Ghedira Guegan, Michael Mrissa, Faïez Gargouri. 408-420 [doi]
- Eyewitness Prediction During Crisis via Linguistic FeaturesSuliman Aladhadh. 421-429 [doi]
- On the Definition of Data Regulation RiskGuillaume Delorme, Guilaine Talens, Eric Disson, Guillaume Collard, Elise Gaget. 433-443 [doi]
- Classifying Micro-text Document Datasets: Application to Query Expansion of Crisis-Related TweetsMehrdad Farokhnejad, Raj Ratn Pranesh, Javier A. Espinosa-Oviedo. 444-456 [doi]
- Data Centered and Usage-Based Security ServiceJingya Yuan, Frédérique Biennier, Aïcha-Nabila Benharkat. 457-471 [doi]
- XYZ Monitor: IoT Monitoring of Infrastructures Using MicroservicesMarc Vila, Maria-Ribera Sancho, Ernest Teniente. 472-484 [doi]
- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the CloudShubhi Asthana, Aly Megahed, Ilyas Iyoob. 485-494 [doi]
- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer HistopathologyDurgamahanthi Vaishali, P. Vishnu Priya, Nithyasri Govind, K. Venkat Ratna Prabha. 495-508 [doi]
- Ontology Evolution Using Recoverable SQL LogsAwais Yousaf, Asad Masood Khattak, Kifayat-Ullah Khan. 509-517 [doi]
- A Novel Automated System for Hospital Acquired Infection Monitoring and PreventionSamyak Shrimali. 523-533 [doi]
- A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic AttributesM. Shobana, Sugumaran Poonkuzhali. 534-548 [doi]
- KMeans Kernel-Learning Based AI-IoT Framework for Plant Leaf Disease DetectionYoussouph Gueye, Maïssa Mbaye. 549-563 [doi]
- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud ApplicationsTsvetan Tsokov, Hristo Kostadinov. 564-577 [doi]
- An Information Retrieval-Based Approach to Activity Recognition in Smart HomesBrendon J. Woodford, Ahmad Ghandour. 583-595 [doi]
- Botnet Sizes: When Maths Meet MythsElisa Chiapponi, Marc Dacier, Massimiliano Todisco, Onur Catakoglu, Olivier Thonnard. 596-611 [doi]
- Cyber Security Education and Future ProvisionGaynor Davies, Mamoun Qasem, Ahmed M. Elmisery. 612-626 [doi]
- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows PlatformAhmed M. Elmisery, Mirela Sertovic, Mamoun Qasem. 627-641 [doi]
- Peer-to-Peer Application Threat InvestigationMohamed Mahdy. 642-650 [doi]