Database and expert systems applications : 31st International Conference, DEXA 2020, Bratislava, Czech Republic, September 14-17, 2020, Proceedings. Part II /
Saved in:
Meeting name: | Database and Expert Systems Applications Conference (31st : 2020 : Online) |
---|---|
Imprint: | Cham : Springer, 2020. |
Description: | 1 online resource (434 p.). |
Language: | English |
Series: | Lecture Notes in Computer Science ; 12392 LNCS sublibrary, SL 3, Information systems and applications, incl. internet/web, and HCI Lecture notes in computer science ; 12392. LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12607643 |
Table of Contents:
- Intro
- Preface
- Organization
- Abstracts of Keynote Talks
- Knowledge Graph for Drug Discovery
- Incremental Learning and Learning with Drift
- From Sensors to Dempster-Shafer Theory and Back: The Axiom of Ambiguous Sensor Correctness and Its Applications
- Knowledge Availability and Information Literacies
- Explainable Fact Checking for Statistical and Property Claims
- "How Many Apples?" or the Age of Science-Making Machines (Panel)
- Contents
- Part II
- Contents
- Part I
- Authenticity, Privacy, Security and Trust
- A Framework for Factory-Trained Virtual Sensor Models Based on Censored Production Data
- 1 Introduction
- 2 Related Work
- 2.1 Model Architectures for Censored Data
- 2.2 Censored Data in Industrial Applications
- 3 Methods
- 3.1 Framework
- 3.2 Correction Methods
- 4 Experiments and Discussion
- 4.1 Data and Simulated Censoring
- 4.2 Model
- 4.3 Results
- 4.4 Further Discussion
- 5 Conclusion and Future Work
- References
- Blockchain-Based Access Control for IoT in Smart Home Systems
- 1 Introduction
- 2 Related Work
- 3 BAC: Blockchain-Based Access Control Model
- 3.1 System Setting and Roles
- 3.2 Agent-Based Policy for the Blockchain Management
- 3.3 System Algorithm Design for Smart Home
- 4 Validation of BAC in Smart Home Systems
- 4.1 System Implementation Process
- 4.2 Performance Evaluation
- 5 Conclusion
- References
- Online Attacks on Picture Owner Privacy
- 1 Introduction
- 2 Related Work
- 3 Architecture
- 4 Attack Description
- 5 Offline Training
- 5.1 Data Crawling from User Context
- 5.2 Data Pre-processing
- 5.3 Features Selection and Extraction
- 5.4 Retrofitting Words/Emojis Vectors
- 6 Online Attack and Gender Obfuscation
- 6.1 Pre-processing and N-Grams
- 6.2 Word/Emoji Similarity
- 6.3 Gender Classification
- 6.4 Comment/Picture Filtering
- 7 Experiments
- 8 Discussion
- 9 Conclusion
- References
- Cloud Databases and Workflows
- Distributed Caching of Scientific Workflows in Multisite Cloud
- 1 Introduction
- 2 Use Case in Plant Phenotyping
- 3 Multisite Cloud Workflow System Architecture
- 4 Multisite Cache-Aware Workflow Execution
- 4.1 Distributed Workflow Execution Overview
- 4.2 Cache Data Selection
- 4.3 Cache Site Selection
- 4.4 Execution Site Selection
- 4.5 Global Decision
- 5 Experimental Evaluation
- 5.1 Experimental Setup
- 5.2 Experiments
- 5.3 Concluding Remarks
- 6 Conclusion
- References
- Challenges in Resource Provisioning for the Execution of Data Wrangling Workflows on the Cloud: A Case Study
- 1 Introduction
- 2 Related Work
- 3 A Traffic DW Workflow
- 4 Methodology
- 5 Simulation, Results and Discussion
- 6 Conclusions and Further Work
- References
- Genetic Programming Based Hyper Heuristic Approach for Dynamic Workflow Scheduling in the Cloud
- 1 Introduction
- 2 Related Work