457 Hits in 4.6 sec

Cardiovascular Informatics: building a bridge to data harmony

J Harry Caufield, Dibakar Sigdel, John Fu, Howard Choi, Vladimir Guevara-Gonzalez, Ding Wang, Peipei Ping
2021 Cardiovascular Research  
The search for new strategies for better understanding cardiovascular disease is a constant one, spanning multitudinous types of observations and studies.  ...  We describe in detail how open data sources and methods can drive discovery while demanding few initial resources, an advantage afforded by widespread availability of cloud computing-driven platforms.  ...  Acknowledgements The authors thank Samir Akre for assistance with conceptual development of data exploration workflows.  ... 
doi:10.1093/cvr/cvab067 pmid:33751044 fatcat:wkryk7uhyncyjg2lzrtiasl2lq

HARMONY: A Human-centered Multimodal Driving Study in the Wild

Arash Tavakoli, Shashwat Kumar, Xiang Guo, Vahid Balali, Mehdi Boukhechba, Arsalan Heydarian
2021 IEEE Access  
Additionally, HARMONY collects the weather and road data by using two APIs of Google Map [105] , and Open-WeatherMap [106].  ...  of physical sensors or cloud information.  ... 
doi:10.1109/access.2021.3056007 fatcat:qczxgrbxsfdwvfawemlhyclspi


Konstantinos Tovletoglou, Lev Mukhanov, Dimitrios S. Nikolopoulos, Georgios Karakonstantis
2020 Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems  
This work was funded by the H2020 Framework Program of the European Union through the UniServer Project (Grant Agreement 688540, and OpreComp project (Grant Agreement 732631  ...  Acknowledgments The authors thank the anonymous reviewers and our shepherd Michael Swift for their insightful comments and suggestions.  ...  At the initialization phase of a VM, the host OS exposes the available memory size of the reliability domains to the cloud users and let them select the size of reliable and variablyreliable memory domains  ... 
doi:10.1145/3373376.3378489 dblp:conf/asplos/TovletoglouMNK20 fatcat:w6u5b5p66feuri6fxlzdcpsmve

Rise of the API Copyright Dead?: An Updated Epitaph for Copyright Protection of Network and Functional Features of Computer Software

Peter S. Menell
2017 Social Science Research Network  
Further advances in bandwidth, speed, and storage capacity have pushed software business into Internet-based clouds. 729 Oracle has long used cloud-based business models to run its core relational database  ...  ; id. at 13 ("The Selection Naming and Organization of Java's Packages (APis) Are Unique and Creative.").  ...  Had Sun been able to stand in Google's way based solely on API design, we would never have gotten a bold new platform and the permissive licensing structure that has ignited competition and innovation  ... 
doi:10.2139/ssrn.2893192 fatcat:c5kjk2f4zfbdbft5rnnklj62hu

Prison Break: A Generic Schema Matching Solution to the Cloud Vendor Lock-in Problem

Mohammad Hamdaqa, Ladan Tahvildari
2014 2014 IEEE 8th International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems  
We determined that Prison Break helps solve the vendor lock-in problem by reducing the manual efforts required to map complex correspondences between cloud schemas.  ...  Porting applications from one cloud platform to another is difficult, making vendor lock-in a major impediment to cloud adoption.  ...  In our work, we noticed that some search APIs return misleading information based on estimates (e.g., Google, Yahoo).  ... 
doi:10.1109/mesoca.2014.13 dblp:conf/mesoca/HamdaqaT14 fatcat:amteqnumvzhyhp7xtw2ehthztu

CloudPick: a framework for QoS-aware and ontology-based service deployment across clouds

Amir Vahid Dastjerdi, Saurabh Kumar Garg, Omer F. Rana, Rajkumar Buyya
2014 Software, Practice & Experience  
Multiple providers are offering a variety of software solutions in the form of virtual appliances and computing units in the form of virtual machines with different pricing and Quality of Service (QoS)  ...  They take into account QoS criteria such as reliability, data communication cost, and latency between multiple Clouds to select the most appropriate combination of virtual machines and appliances.  ...  Acknowledgments The authors wish to thank Rodrigo N. Calheiros and Kurt Vanmechelen for their constructive and helpful suggestions.  ... 
doi:10.1002/spe.2288 fatcat:w3tv6754yfgcdcgttvfxxu4j7q


2016 Procedia Computer Science  
the Internet of Things (IoT) C.  ...  Collision Avoidance Aircraft System and Design of a Pair of Wing Flaps in Autodesk Maya Software K.  ... 
doi:10.1016/s1877-0509(16)31379-5 fatcat:26fka6pk6nh7toovyckwf4fxbm

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial [chapter]

Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke
2018 Advances in Information Security  
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections  ...  Finally, the results of experimental study of all the method using common data was given to demonstrate the accuracy and complexity.  ...  Bayesian Networks are used in many cases of classification and information retrieval (such as semantic search). The method's routine can be described as following.  ... 
doi:10.1007/978-3-319-73951-9_2 fatcat:rtzoclkjofh6tloo5v3nipu4uu

Internet of Things: An Overview [article]

Farzad Khodadadi, Amir Vahid Dastjerdi, Rajkumar Buyya
2017 arXiv   pre-print
However, paving the path for achieving aforementioned objectives and making the IoT paradigm more tangible requires integration and convergence of different knowledge and research domains, covering aspects  ...  As technology proceeds and the number of smart devices continues to grow substantially, need for ubiquitous context-aware platforms that support interconnected, heterogeneous, and distributed network of  ...  API management which is essential for defining and sharing system services and web-based dashboards (or equivalent smartphone applications) for managing and accessing these APIs are also included in the  ... 
arXiv:1703.06409v1 fatcat:cgivogat35cb7n6h3z2onqrmcu

High performance networked computing in media, services and information management

Gang Kou
2013 Journal of Supercomputing  
Arabnia, the Editor-in-Chief of The Journal of Supercomputing, for giving us the chance to edit this special issue.  ...  The guest editor has been supported by grants from the National Natural Science Foundation of China (#70901015 and #71222108).  ...  On the contrary, inverted index based DHT network can provide semantic-based fuzzy search for resources similar to search engines over the Internet.  ... 
doi:10.1007/s11227-013-0942-7 fatcat:ziz3qcncvbfo5nf6lzho4upyse

Internet of Smart City Objects: A Distributed Framework for Service Discovery and Composition

Fikret Sivrikaya, Nizar Ben-Sassi, Xuan-Thuy Dang, O. Can Gorur, Christian Kuster
2019 IEEE Access  
An overview of the smart city concept and the three-tier architecture that emerges through the digitalization of cities is presented first, together with the main challenges in attaining coherent smart  ...  This paper presents our methodology of transforming the complex smart city concept and its digital layer into a structured model for creating a dynamic and adaptive service ecosystem in the digital cities  ...  The current implementation is graph based, and uses a Fast Forward planner [67] to reduce the search space and fasten the system response.  ... 
doi:10.1109/access.2019.2893340 fatcat:apvn33up2jfrhemnnizqlzwxym

MaestROB: A Robotics Framework for Integrated Orchestration of Low-Level Control and High-Level Reasoning [article]

Asim Munawar, Giovanni De Magistris, Tu-Hoa Pham, Daiki Kimura, Michiaki Tatsubori, Takao Moriyama, Ryuki Tachibana, Grady Booch
2018 arXiv   pre-print
To realize this, it handles a hierarchical structure by using the knowledge stored in the forms of ontology and rules for bridging among different levels of instructions.  ...  Accordingly, the framework has multiple layers of processing components; perception and actuation control at the low level, symbolic planner and Watson APIs for cognitive capabilities and semantic understanding  ...  MaestROB provides cloud based machine learning API to allow the robot to acquire or fine tune machine learning based skills. F.  ... 
arXiv:1806.00802v1 fatcat:7sywrrpiebfudckfmmu7kdg6sa

A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection

Noor Syahirah Nordin, Mohd Arfian Ismail, Tole Sutikno, Shahreen Kasim, Rohayanti Hassan, Zalmiyah Zakaria, Mohd Saberi Mohamad
2021 Indonesian Journal of Electrical Engineering and Computer Science  
Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed and four metrics including accuracy, recall, precision, and f-measure. </div>  ...  The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system.  ...  By using dataset from PhishTank and Yandex Search API, the method that proposed by them outperformed other methods in feature subsets selection [51] .  ... 
doi:10.11591/ijeecs.v23.i2.pp1146-1158 fatcat:mju6gf6bbfezxdszrlwuhkrdra

A survey and taxonomy of program analysis for IoT platforms

Alyaa A. Hamza, Islam T. Abdel-Halim, Mohamed A. Sobh, Ayman M. Bahaa-Eldin
2021 Ain Shams Engineering Journal  
This survey has been introduced carefully based on the systematic literature reviews (SLR) guidelines to provide a survey and taxonomy of the PA with its related topics: the sensitivity of analysis and  ...  Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting security and privacy.  ...  Meta Heuristic: It has various malware detection algorithms such as clonal selection, genetic algorithm, harmony search, and Negative selection algorithms.  ... 
doi:10.1016/j.asej.2021.03.026 fatcat:qcaa3y646fad5ls6ouczd5avha

An Integrated Knowledge Graph to Automate Cloud Data Compliance

Karuna Pande Joshi, Lavanya Elluri, Ankur Nagar, Amith Hendre
2020 IEEE Access  
We have validated our knowledge graph against the privacy policies of various Cloud service providers like Amazon, Google, IBM, and Rackspace.  ...  This knowledge graph is available in the public domain and can be used by organizations to automate their compliance processes and set their enterprise Cloud security policies.  ...  The compliance model implements some rules and regulations across the various components of IT to make them work harmoniously. The security model is adopted based on these compliance models.  ... 
doi:10.1109/access.2020.3008964 fatcat:fs3i5xhzrnavhbs6v4lqt6wz4a
« Previous Showing results 1 — 15 out of 457 results