標(biāo)題: Titlebook: Database and Expert Systems Applications - DEXA 2021 Workshops; BIOKDD, IWCFS, MLKgr Gabriele Kotsis,A Min Tjoa,Sohail Khan Conference proc [打印本頁(yè)] 作者: 專家 時(shí)間: 2025-3-21 17:34
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops影響因子(影響力)
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops影響因子(影響力)學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops網(wǎng)絡(luò)公開度
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops被引頻次
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops被引頻次學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops年度引用
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops年度引用學(xué)科排名
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops讀者反饋
書目名稱Database and Expert Systems Applications - DEXA 2021 Workshops讀者反饋學(xué)科排名
作者: needle 時(shí)間: 2025-3-21 22:02 作者: Ceramic 時(shí)間: 2025-3-22 00:35
Jo?o Paulo Aires,Felipe Meneguzziive alternative strategies to extract information complementary to basic random walks and compare them on several benchmark datasets to show that research within this field is still relevant for node classification tasks.作者: 吹牛需要藝術(shù) 時(shí)間: 2025-3-22 08:01 作者: Hemoptysis 時(shí)間: 2025-3-22 11:27 作者: 大暴雨 時(shí)間: 2025-3-22 13:12 作者: 大暴雨 時(shí)間: 2025-3-22 19:16 作者: 顯示 時(shí)間: 2025-3-22 22:24 作者: Rodent 時(shí)間: 2025-3-23 01:55
Avi Rosenfeld,Gal A Kaminka,Sarit Kraushosen . as our sample application. In this paper (i) we suggest a multi-modal architecture for web applications; (ii) we present . as our web application scenario; and (iii) we show first reflections on how mode switching can reduce attack surfaces and, thus, increase resilience.作者: 我吃花盤旋 時(shí)間: 2025-3-23 07:40 作者: AGATE 時(shí)間: 2025-3-23 13:21 作者: 疏遠(yuǎn)天際 時(shí)間: 2025-3-23 14:22 作者: 追蹤 時(shí)間: 2025-3-23 20:53 作者: Armory 時(shí)間: 2025-3-23 23:26 作者: Heterodoxy 時(shí)間: 2025-3-24 05:25
Jo?o Paulo Aires,Felipe Meneguzzi characterise systems in this area. Given the breadth of the area, we scope the study to focus on systems that combine semantic web technologies and machine learning, which we call SWeML Systems. While the study is still ongoing, we hereby report on its design and the first results obtained.作者: 打折 時(shí)間: 2025-3-24 10:21 作者: 頌揚(yáng)國(guó)家 時(shí)間: 2025-3-24 11:26 作者: Enervate 時(shí)間: 2025-3-24 18:33 作者: Eviction 時(shí)間: 2025-3-24 23:00
Data Catalogs: A Systematic Literature Review and Guidelines to Implementationog? and (2) Which guidelines can be recommended to implement a data catalog? The results benefit practitioners in implementing a data catalog to accelerate any AI initiative and researchers with a compilation of future research directions.作者: 感情 時(shí)間: 2025-3-25 03:00
Task-Specific Automation in Deep Learning Processespment effort. We verify this claim with the ALOHA tool flow, where task-specific glue code is automated. The gains of the ALOHA tool flow pipeline are evaluated with respect to human effort, computing performance, and security作者: legitimate 時(shí)間: 2025-3-25 03:27
1865-0929 pplications,?DEXA 2021, held in a virtual format in September 2021:?The 12.th. ?International Workshop on Biological Knowledge Discovery from Data (BIOKDD 2021), the 5.th. ?International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems (IWCFS 2021), the 3.rd. ?International作者: 沐浴 時(shí)間: 2025-3-25 11:01 作者: 感激小女 時(shí)間: 2025-3-25 12:51 作者: MIME 時(shí)間: 2025-3-25 15:54 作者: ensemble 時(shí)間: 2025-3-25 23:41
Membership-Mappings for Data Representation Learning: Measure Theoretic Conceptualization property of the membership-mapping, that can be exploited for data representation learning, is of providing an interpolation on the given data points in the data space. An analytical approach to the variational learning of a membership-mappings based data representation model is considered.作者: 使高興 時(shí)間: 2025-3-26 01:33 作者: 不能根除 時(shí)間: 2025-3-26 04:25
Mode Switching for Secure Web Applications – A Juice Shop Case?Scenariowhen vulnerabilities are known or when attacks are performed. OWASP provides several vulnerable web applications for testing and training security skills. We have the idea of applying mode switching to one of these applications in order to demonstrate its usefulness in increasing security. We have c作者: Leaven 時(shí)間: 2025-3-26 11:47 作者: 食道 時(shí)間: 2025-3-26 12:45
Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Studyts and have mutual impact on each other. In the last decade, there are many cases where security breach resulted in safety hazards. There have been very few studies in the literature that address the integrated safety security risk assessment. Since, the need of the time is to consider both safety a作者: 動(dòng)作謎 時(shí)間: 2025-3-26 19:40
Privacy Preserving Machine Learning for?Malicious URL Detectionn sensitive information from users, install malware and obtain control over their systems. Currently, web browsers counter this attack using blacklisting method, however it fails to detect newly generated malicious websites, hence ineffective. In the recent times, machine learning based URL classifi作者: innate 時(shí)間: 2025-3-27 01:02
Remote Attestation of Bare-Metal Microprocessor Software: A Formally Verified Security Monitorarchitectures for remote attestation combine signature or MAC primitives with hardware monitors to enforce secret confidentiality..Our works are based on a verified hardware/software co-design for remote attestation, VRASED. Its proof is established using formal methods and its implementation is con作者: 拱形大橋 時(shí)間: 2025-3-27 03:39
Provenance and Privacy in ProSAever, this does not have to be the case. But before we can address this conflict and its resolution, we want to understand what the terms privacy, provenance, and research data management actually mean. We are not interested in the formal definitions but in the community’s understanding of these ter作者: Costume 時(shí)間: 2025-3-27 07:35
Placeholder Constraint Evaluation in?Simulation Graphsconstraint knowledge which is stored in a graph database. In this paper an application for automatic guided simulation creation is presented in the form of a three-step process to evaluate constraints of placeholders and therefore suggest suitable components.作者: Maximizer 時(shí)間: 2025-3-27 10:28
Walk Extraction Strategies for Node Embeddings with RDF2Vec in Knowledge GraphsDF2Vec is an unsupervised technique that can create task-agnostic numerical representations of the nodes in a KG by extending successful language modeling techniques. The original work proposed the Weisfeiler-Lehman kernel to improve the quality of the representations. However, in this work, we show作者: NOCT 時(shí)間: 2025-3-27 17:14
Bridging Semantic Web and Machine Learning: First Results of a Systematic Mapping Studyher opportunities lie in the combined use of these two paradigms in ways that benefit from their complementary strengths. Accordingly, there is much research at the confluence of these two research areas and a number of efforts were already made to survey and analyze the resulting research area. How作者: 營(yíng)養(yǎng) 時(shí)間: 2025-3-27 20:05 作者: 謙卑 時(shí)間: 2025-3-27 23:32
Semantic Influence Score: Tracing Beautiful Minds Through Knowledge Diffusion and Derivative Works a perceived notion of paper quality and influence among scientific communities. This perception of preferential attachment, overlooking important factors such as context and the age of the paper has been criticized recently. In this paper, we propose ‘Semantic Influence Score (SIS)’, an unbiased al作者: Synchronism 時(shí)間: 2025-3-28 03:46 作者: homocysteine 時(shí)間: 2025-3-28 09:52
Membership-Mappings for Data Representation Learning: Measure Theoretic Conceptualizationues associated to parametric deep models. However, a formal conceptualization of the fuzzy theoretic analytical deep models is still not available. This paper introduces using measure theoretic basis the notion of . for representing data points through attribute values (motivated by fuzzy theory). A作者: voluble 時(shí)間: 2025-3-28 10:54
Membership-Mappings for Data Representation Learning: A Bregman Divergence Based Conditionally Deep nsists of layers such that each layer learns data representation at certain abstraction level through a membership-mappings based autoencoder), is presented. A multi-class classifier is presented that employs a parallel composition of conditionally deep autoencoders to learn data representation for 作者: insipid 時(shí)間: 2025-3-28 15:16 作者: BLOT 時(shí)間: 2025-3-28 22:19 作者: 代替 時(shí)間: 2025-3-28 23:24 作者: 不公開 時(shí)間: 2025-3-29 03:57 作者: 泛濫 時(shí)間: 2025-3-29 07:16
On the Quality of Compositional Prediction for Prospective Analytics on Graphsns of their sub-parts and appropriate composition rules, and 2) the production of rich prospective analytics scenarios, where new objects never observed before can be predicted based on their simpler parts. We show that the quality of such predictions compete with macro-learning ones, while enabling作者: GEN 時(shí)間: 2025-3-29 12:29
1865-0929 ta, cyber security, cyber-physical system, machine learning, knowledge graphs, information retriever, data base, and artificial intelligence..978-3-030-87100-0978-3-030-87101-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 注射器 時(shí)間: 2025-3-29 16:01 作者: 儀式 時(shí)間: 2025-3-29 20:59
Avi Rosenfeld,Gal A Kaminka,Sarit KrausURL detection..In this work, we focus on privacy enabled malicious URL detection based on FHE using 3 methods (i) Deep Neural Network (DNN) (ii) Logistic regression (iii) Hybrid. In the hybrid approach, the feature extraction is done using DNN and classification is done using logistic regression mod作者: AVID 時(shí)間: 2025-3-30 03:34
Suzanne Sadedin,Christian Guttmann personal data. We found that all participants have a very good understanding of their own research data, which in most cases is based on a well-developed research data management. Nevertheless, there is still some uncertainty, especially in the area of provenance and privacy.作者: 龍蝦 時(shí)間: 2025-3-30 05:01
https://doi.org/10.1007/978-3-031-16617-4ns of their sub-parts and appropriate composition rules, and 2) the production of rich prospective analytics scenarios, where new objects never observed before can be predicted based on their simpler parts. We show that the quality of such predictions compete with macro-learning ones, while enabling作者: padding 時(shí)間: 2025-3-30 08:31
Conference proceedings 2021apers were thoroughly reviewed and selected from 50 submissions, and discuss a range of topics including: knowledge discovery, biological data, cyber security, cyber-physical system, machine learning, knowledge graphs, information retriever, data base, and artificial intelligence..作者: otic-capsule 時(shí)間: 2025-3-30 16:16
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263510.jpg作者: meritorious 時(shí)間: 2025-3-30 19:41
Avi Rosenfeld,Gal A Kaminka,Sarit Krauswhen vulnerabilities are known or when attacks are performed. OWASP provides several vulnerable web applications for testing and training security skills. We have the idea of applying mode switching to one of these applications in order to demonstrate its usefulness in increasing security. We have c作者: ENNUI 時(shí)間: 2025-3-30 23:13
Paul Scerri,Régis Vincent,Roger Mailler industrial control systems, automatic pilot avionics, robotics systems, and so on. Uncertainty is one of the major issues that challenge the reliability of a CPS. In the literature, various approaches have been proposed to deal with uncertainty. However, fewer studies have focused on handling the r