Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2023
Library Development with MPI: Attributes, Request Objects, Group Communicator Creation, Local Reductions, and Datatypes
EuroMPI '23: Proceedings of the 30th European MPI Users' Group MeetingSeptember 2023, Article No.: 5, Pages 1–10https://doi.org/10.1145/3615318.3615323A major design objective of MPI is to enable support for the construction of safe parallel libraries that can be used and mixed freely in complex applications. In this respect, MPI has been extremely successful; but may nevertheless lack elementary ...
- ArticleOctober 2023
Design and Implementation of a Multifunctional Screw Disassembly Workstation
Intelligent Robotics and ApplicationsJul 2023, Pages 506–519https://doi.org/10.1007/978-981-99-6501-4_43AbstractThe rapid growth of the electric vehicle industry has created a significant demand for the recycling of end-of-life electric vehicle batteries (EOL-EVB). Manual disassembly methods suffer from low efficiency, highlighting the urgent need for ...
- research-articleMay 2023
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality
SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and TechnologiesMay 2023, Pages 79–90https://doi.org/10.1145/3589608.3593839Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates digital content, e.g., 3D virtual objects, into the physical world, which not only has been implemented for multiple intents such as shopping, entertainment, ...
- research-articleJanuary 2023
Attributes and Dimensions of Trust in Secure Systems
IoT '22: Proceedings of the 12th International Conference on the Internet of ThingsNovember 2022, Pages 179–186https://doi.org/10.1145/3567445.3571105What is it to be trusted? This is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how related terms are used. Many definitions ...
- research-articleJanuary 2022
PREFNEG: preference-based price negotiation scheme in fog environment
International Journal of Grid and Utility Computing (IJGUC), Volume 13, Issue 52022, Pages 565–576https://doi.org/10.1504/ijguc.2022.126194Fog computing has emerged as a promising extension of cloud computing. Owing to recent developments, there has been a tremendous increase in the number of fog service consumers and providers who trade for fog resources. Consumers pay rent to the providers ...
-
- research-articleJanuary 2021
Improvement assessment method for special kids by observing the social and behavioural activities using data mining techniques
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 19, Issue 42021, Pages 443–455https://doi.org/10.1504/ijbidm.2021.118924Data mining identifies heterogeneous data that has diverse information. Clustering is the process of gathering unique items into classes, were most clustering methods are based on numerical or categorical attributes which is used in software. In this ...
- research-articleJuly 2020
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model
ACM Transactions on Privacy and Security (TOPS), Volume 23, Issue 4Article No.: 18, Pages 1–33https://doi.org/10.1145/3401027Neo4j is a popular graph database that offers two versions: an enterprise edition and a community edition. The enterprise edition offers customizable Role-based Access Control features through custom developed procedures, while the community edition ...
- posterJune 2020
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In Organizations
SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and TechnologiesJune 2020, Pages 223–225https://doi.org/10.1145/3381991.3396227Recently, Internet of Things (IoT) devices and applications are becoming increasingly popular among users in various IoT domains, such as Wearable IoT, Smart Cities, Smart Home, and Smart Industry. With a range of IoT devices, cyber attack surface has ...
- research-articleJune 2020
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things
SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and TechnologiesJune 2020, Pages 203–212https://doi.org/10.1145/3381991.3395618Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. These devices are commonly referred to as smart things enabling smart environments, such as Smart Home, Smart Health, ...
- research-articleJune 2020
Explaining with Counter Visual Attributes and Examples
ICMR '20: Proceedings of the 2020 International Conference on Multimedia RetrievalJune 2020, Pages 35–43https://doi.org/10.1145/3372278.3390672In this paper, we aim to explain the decisions of neural networks by utilizing multimodal information. That is counter-intuitive attributes and counter visual examples which appear when perturbed samples are introduced. Different from previous work on ...
- research-articleMay 2020
Influence of Fractal Dimension on Network Anomalies Binary Classification Quality Using Machine Learning Methods
Automatic Control and Computer Sciences (ACCS), Volume 54, Issue 3May 2020, Pages 216–228https://doi.org/10.3103/S0146411620030074AbstractIn this paper, it is proposed to improve the efficiency of binary classification of network traffic anomalous behavior by introducing an additional informative feature – fractal dimension. The overall effectiveness of the proposed method is ...
- research-articleApril 2020
Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 16, Issue 1sArticle No.: 25, Pages 1–15https://doi.org/10.1145/3360050Deep learning has revolutionized the field of computer vision and image processing. Its ability to extract the compact image representation has taken the person re-identification (re-id) problem to a new level. However, in most cases, researchers are ...
- research-articleJuly 2019
More Effective Contextualization of CS Education Research: A Pair-Programming Example
ITiCSE '19: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science EducationJuly 2019, Pages 182–188https://doi.org/10.1145/3304221.3319790This position paper discusses the need for greater inclusion of context in papers describing computer science education research. This inspiration arose from our efforts to compare our experiences with pair programming in an introductory computer ...
- research-articleJune 2019
Deep learning based glance of real world scenes through decision tree
ICAICR '19: Proceedings of the Third International Conference on Advanced Informatics for Computing ResearchJune 2019, Article No.: 49, Pages 1–9https://doi.org/10.1145/3339311.3339360How do computers learn to recognize scene instantly? Humans classify scenes based on local features along with context and also compared with other features. A scene can be described in multiple ways and include details about objects, regions, geometry, ...
- research-articleMay 2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesMay 2019, Pages 195–206https://doi.org/10.1145/3322431.3325109Recently, applications that deliver customized content to end-users, e.g., digital objects on top of a video stream, depending on information such as their current physical location, usage patterns, personal data, etc., have become extremely popular. ...
- research-articleMay 2019
A Study of Factors Influencing Students' Decision to Pursue to Tertiary Education
MSIE '19: Proceedings of the 2019 International Conference on Management Science and Industrial EngineeringMay 2019, Pages 134–138https://doi.org/10.1145/3335550.3339902There are many underlying factors that may influence the students to make a decision to further their study in tertiary education which is a key issue for higher education institution authorities to acknowledge. Hence, the main purpose of this research ...
- research-articleApril 2019
An attribute language definition for adaptable parsing expression grammars
- Elton M. Cardoso,
- Rodrigo G. Ribeiro,
- Leonardo V. S. Reis,
- Mariza A. S. Bigonha,
- Roberto S. Bigonha,
- Vladimir O. Di Iorio
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied ComputingApril 2019, Pages 1518–1525https://doi.org/10.1145/3297280.3299738Adaptable Parsing Expression Grammars (APEG) are a formal model whose main purpose is to formally describe the syntax of extensible languages and their extension mechanisms. APEG extends Parsing Expression Grammar model with the notion of syntactic ...
- research-articleJanuary 2019
Perceptual Attributes Analysis of Real-world Materials
ACM Transactions on Applied Perception (TAP), Volume 16, Issue 1Article No.: 1, Pages 1–19https://doi.org/10.1145/3301412Material appearance is often represented by a bidirectional reflectance distribution function (BRDF). Although the concept of the BRDF is widely used in computer graphics and related applications, the number of actual captured BRDFs is limited due to a ...
- research-articleJanuary 2019
Violation Detection in Heterogeneous Events Streams
Procedia Computer Science (PROCS), Volume 150, Issue C2019, Pages 381–388https://doi.org/10.1016/j.procs.2019.02.067AbstractViolation detection at production facilities is a vital task, especially for critical infrastructures. Nowadays, many monitoring sensors of different types are used for the event collection. These sensors often provide a data in different format ...
- research-articleJune 2018
Annotating, Understanding, and Predicting Long-term Video Memorability
ICMR '18: Proceedings of the 2018 ACM on International Conference on Multimedia RetrievalJune 2018, Pages 178–186https://doi.org/10.1145/3206025.3206056Memorability can be regarded as a useful metric of video importance to help make a choice between competing videos. Research on computational understanding of video memorability is however in its early stages. There is no available dataset for modelling ...