|
|
|
Sebastián Vallejos, Luis Berdun, Marcelo Armentano, Silvia Schiaffino and Daniela Godoy
Data captured by mobile devices enable us, among other things, learn the places where users go, identify their home and workplace, the places they usually visit (e.g., supermarket, gym, etc.), the different paths they take to move from one place to anoth...
ver más
|
|
|
|
|
|
|
Xinyi Meng and Daofeng Li
The explosive growth of malware targeting Android devices has resulted in the demand for the acquisition and integration of comprehensive information to enable effective, robust, and user-friendly malware detection. In response to this challenge, this pa...
ver más
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Yuli Rohmiyati, Tengku Siti Meriam Tengku Wook, Noraidah Sahari, Siti Aishah Hanawi and Faizan Qamar
Persona is a method to create a user profile by describing a fictitious user through user experience. This persona study needs to be carried out for the benefit of system design according to the users? wishes because, so far, electronic resources (e-reso...
ver más
|
|
|
|
|
|
|
Irina Kochetkova, Anna Kushchazli, Sofia Burtseva and Andrey Gorshenin
Fifth-generation (5G) networks require efficient radio resource management (RRM) which should dynamically adapt to the current network load and user needs. Monitoring and forecasting network performance requirements and metrics helps with this task. One ...
ver más
|
|
|
|
|
|
|
Jiaxu Zhao, Binting Su, Xuli Rao and Zhide Chen
In this paper, we build a recommender system for a new study area: social commerce, which combines rich information about social network users and products on an e-commerce platform. The idea behind this recommender system is that a social network contai...
ver más
|
|
|
|
|
|
|
Konstantinos V. Kostas and Maria Manousaridou
In this work, supervised Machine Learning (ML) techniques were employed to solve the forward and inverse problems of airfoil and hydrofoil design. The forward problem pertains to the prediction of a foil?s aerodynamic or hydrodynamic performance given it...
ver más
|
|
|
|
|
|
|
Markos Konstantakis, Yannis Christodoulou, John Aliprantis and George Caridakis
In recent years, Recommendation Systems (RSs) have gained popularity in different scientific fields through the creation of (mostly mobile) applications that deliver personalized services. A mobile recommendation system (MRS) that classifies in situ visi...
ver más
|
|
|
|
|
|
|
Yen-Hsun Lin, Yi-Chung Chen, Sheng-Min Chiu, Chiang Lee and Fu-Cheng Wang
Spatial information analysis has gained increasing attention in recent years due to its wide range of applications, from disaster prevention and human behavioral patterns to commercial value. This study proposes a novel application to help businesses ide...
ver más
|
|
|
|