Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2021)," -- Report of Collaborative Modeling and Simulation (CoMetS) track of WETICE 2021," -- Web2Touch 2021, Semantic Technologies for Smart Information Sharing and Web Collaboration," -- An Adaptive Approach for the Coordination of Autonomous Vehicles at Intersections," -- Quality-Based Reinforcement Learning in Intelligent Opportunistic Software Composition," -- Heterogeneous Anchor Nodes Deployment in Large Scale Outdoor Application for Wireless Sensor Networks," -- A Review of Container level Autoscaling for Microservices-based Applications," -- Multi-Objective Whale Optimization for Network Interface Selection in HWNs," -- Prometheus and AIOps for the orchestration of Cloud-native applications in Ananke," -- CloudNPlay: Resource Optimization for A Cloud-Native Gaming System," -- A genetic-based requirements-aware approach for reliable IoT applications in the Fog," -- Automatic Generation of Access Control for Permissionless Blockchains: Ethereum Use Case," -- Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0," -- Towards a Uniform Description Language for Smart Contract," -- Tangle the Blockchain:Towards Connecting Blockchain and DAG," -- A Solidity-to-CPN Approach Towards Formal Verification of Smart Contracts," -- DART: Towards a role-based trust management system on blockchain," -- A Meta-heuristic-based Scheduling of Transactions for Medical Blockchain Systems," -- Privacy-Preserving Initial Public Offering using SCALE-MAMBA and Hyperledger Fabric," -- Research on Value Based Heuristics Miner for Product Service System," -- Process over Things (PoT): an Ontology Based Approach for IoT-Aware Business Processes," -- IoT Botnet Detection using Black-box Machine Learning Models: the Trade-off between Performance and Interpretability," -- Regional Center of Cybersecurity anomaly detection module efficiency in network monitoring scenarios," -- SAT vs. Substitution Boxes of DES like Ciphers," -- Android Malware Detection Using Deep Learning Methods," -- A Malware Evasion Technique for Auditing Android Anti-Malware Solutions," -- Excess-Mass and Mass-Volume anomaly detection algorithms applicability in unsupervised intrusion detection systems,"A. -- Semantic composition of cloud services," -- Towards modeling a Service-Oriented application managing a Smart City using UML 2.x, -- Collaborative Internet of Things (C-IoT) Data Analysis for Enhancing Activity Recognition and Preventing Serious Health Problems,"I. -- Improving Activity Recognition while Reducing Misclassification of Unknown Activities, -- A (Reverse) Mutation Testing Approach to Automatically generate parallel C/C++ Code, -- A Multidimensional Framework for Semantic Electronic Health Records in Oncology Domain, -- Semantic rule-based device recommendation for service-migration in multiple-device contexts, -- OntoSAMSEI: Interactive ontology engineering for supporting simulation-based training in Medicine," -- WECRAFT: a Platform for Networking Rural Craftsmen in Co-Production of Artisanal Crafts,".
The International Conference on Enabling Technologies Infrastructure for Collaborative Enterprises WETICE is an international conference on the state of the art research in enabling technologies for collaboration, consisting of a number of conference tracks.
Description based on publisher supplied metadata and other sources.