[PDF][PDF] Towards the maintenance principles of cyber-physical systems
S Ruiz-Arenas, I Horváth… - … Vestnik-Journal of …, 2014 - repository.eafit.edu.co
Cyber-physical systems (CPSs) are rapidly proliferating in different applications. Their
system features significantly differ from those of linear complex systems (LCSs) …
system features significantly differ from those of linear complex systems (LCSs) …
Question answering system for chemistry
This paper describes the implementation and evaluation of a proof-of-concept Question
Answering (QA) system for accessing chemical data from knowledge graphs (KGs) which …
Answering (QA) system for accessing chemical data from knowledge graphs (KGs) which …
A reputation-based framework for honest provenance reporting
Given the distributed, heterogenous, and dynamic nature of service-based IoT systems,
capturing circumstances data underlying service provisions becomes increasingly important …
capturing circumstances data underlying service provisions becomes increasingly important …
Delivering multi-agent MicroServices using CArtAgO
This paper describes an agent programming language agnostic implementation of the Multi-
Agent MicroServices (MAMS) model-an approach to integrating agents within microservices …
Agent MicroServices (MAMS) model-an approach to integrating agents within microservices …
[PDF][PDF] Online business quality of service information analytics using artificial intelligence
H Fazlollahtabar - Information Sciences Letters, 2021 - digitalcommons.aaru.edu.jo
Online business Services Composition is one of the most important issues in service
oriented architectures. For answering to majority of complicated business process, it might …
oriented architectures. For answering to majority of complicated business process, it might …
Handling faults in service oriented computing: A comprehensive study
Recently, service-oriented computing paradigms have become a trending development
direction, in which software systems are built using a set of loosely coupled services …
direction, in which software systems are built using a set of loosely coupled services …
Trust reality-mining: evidencing the role of friendship for trust diffusion
Value sensitive design is driven by the motivation of making social and moral values central
to the development of ICT systems. Among the most challenging concerns when imparting …
to the development of ICT systems. Among the most challenging concerns when imparting …
Reconfigurable service-based architecture based on variability description
S Adjoyan, AD Seriai - Proceedings of the Symposium on Applied …, 2017 - dl.acm.org
Self-adaptive systems evolve during system's execution against changes in operating
environment. Such evolution and reconfiguration can be specified at architecture level using …
environment. Such evolution and reconfiguration can be specified at architecture level using …
Trust model engines in cloud computing
MR Farcasescu - … on Symbolic and Numeric Algorithms for …, 2012 - ieeexplore.ieee.org
The first concern when we think about adopting cloud computing is security. Even if, cloud
computing seems to be remarkably cheap, the security part might transform the" buzz world" …
computing seems to be remarkably cheap, the security part might transform the" buzz world" …
[PDF][PDF] Development of FIGA: a novel trust-based algorithm for securing autonomous interactions in WSN
AA Atayero, SA Ilori, MO Adedokun - Accepted, International Conference …, 2015 - iaeng.org
(WSN) and making them more resilient and self-healing after attacks demand that services
rendered by the network be secured on individual basis. The fact that a node is …
rendered by the network be secured on individual basis. The fact that a node is …