


default search action
ICSS 2022: Zhuhai, China
- International Conference on Service Science, ICSS 2022, Zhuhai, China, May 13-15, 2022. IEEE 2022, ISBN 978-1-6654-9861-6

- Tianshi Wang, Hongwei Kan

, Qibo Sun, Shan Xiao, Shangguang Wang:
Congestion Detection and Link Control via Feedback in RDMA Transmission. 1-4 - Zi Ye, Xuefeng Piao, Fanchao Meng, Bo Cao, Dianhui Chu:

A Non-standardized Chinese Express Delivery Address Identification Model Based on Enhanced Representation. 5-11 - Jiawei Wu, Yanchun Sun, Jiaqi Zhang:

An Open-source Repository Retrieval Service Using Functional Semantics for Software Developers. 12-20 - Congcong Min, Dongcheng Zhao, Hua Lu:

The Processing Method of the Message Based on the In-band Network Telemetry Technology. 21-24 - Zhiwei Ma

, Chunyang Ye, Hui Zhou:
A Study on Sentiment Analysis for Smart Tourism. 25-32 - Wenxuan Liu, Donghong Zhang, Jindong Zhao:

Ring-Overlap: A Storage Scaling Mechanism For Consortium Blockchain. 33-40 - Jianzhong Su, Jiyi Liu, Yuhong Nan, Yin Li:

Security Evaluation of Smart Contracts based on Code and Transaction - A Survey. 41-48 - Xinran Ma, Shulin Sun, Zehua Liu, Lijun Sun:

A Worker Selection Scheme for Vehicle Crowdsourcing Blockchain. 49-56 - Fu Chen, Huizhu Li, Zhiyuan Sui, Kun Liu, Wenying Tang:

Fast Probabilistic Consensus Protocol (FPC) under Different Network Topologies. 57-63 - Yuqi Zhang, Nancy Wang, Jian Yu

, Sira Yongchareon, Mo Nguyen:
A Short Survey on Inductive Biased Graph Neural Networks. 64-71 - Guiling Wang, Jun Fang, Jing Wang, Jian Yu

, Liang Zhang, Yanbo Han:
Service-Based Event Penetration from IoT Sensors to Businesses: a Case Study. 72-79 - Marc Hesenius

, Nils Schwenzfeier, Ole Meyer, Volker Gruhn:
On the Uncertainty in IoT-enabled Business Processes using Artificial Intelligence Components. 80-87 - Yusuf Kirikkayis, Florian Gallik, Manfred Reichert:

IoTDM4BPMN: An IoT-Enhanced Decision Making Framework for BPMN 2.0. 88-95 - Florian Gallik, Yusuf Kirikkayis, Manfred Reichert:

Modeling, Executing and Monitoring IoT-Aware Processes with BPM Technology. 96-103 - Jun Peng, Jingwei Zhu, Liang Zhang:

Generalizing STNU to Model Non-functional Constraints for Business Processes. 104-111 - Chao Ji, Tuo Li, Xiaofeng Zou:

Multifunctional Module Design Based on Hybrid CMOS-Memristor Logic Circuit. 112-116 - Ziliang Wang, Tingting Zhang, Ying Li, Sheng Wang, Fanqin Zhou, Lei Feng, Wenjing Li:

Multi-Granularity Decomposition based Task Scheduling for Migration Cost Minimization. 117-124 - Zongpeng Du, Zhiqiang Li, Xiaodong Duan, Jing Wang

:
Service Information Informing in Computing Aware Networking. 125-130 - Xiaonan Shi, Qin Li, Dan Wang, Lu Lu:

Mobile Computing Force Network (MCFN): Computing and Network Convergence Supporting Integrated Communication Service. 131-136 - Huijuan Yao, Xiaodong Duan, Yuexia Fu:

A computing-aware routing protocol for Computing Force Network. 137-141 - Mingkang Song, Mengke Yao, Xiaobin Wang, Jianming Zhou, Tenghui Ke, Peng Dai, Weidong Li, Xiaolong Zhou:

Base station computing force resource load balancing strategy for distributed machine learning. 142-146 - Yongqiang Dong, Chenchen Guan, Yunli Chen, Kun Gao, Lu Lu, Yuexia Fu:

Optimization of Service Scheduling in Computing Force Network. 147-153 - Yanheng Bi, Yingchi Long, Yanzheng Jin, Shengwen Zheng, Huaiyuan Liu, Hongzhi Wang:

Automatic Scheduling Technology of Computing Power Network Driven by Knowledge Graph. 154-160 - Bingyi Hu, Jixun Gao, Quanzhen Huang, Huaichen Wang, Yanxin Hu, Jialei Liu, Yanmin Ge:

Overbooking-enabled Virtual Machine Deployment Approach in Mobile Edge Computing. 161-166 - Liwen Li, Chunyang Ye, Hui Zhou:

Cache Replacement Algorithm Based on Dynamic Constraints in Microservice Platform. 167-174 - Yu Jiang, Chengkai Li, Ying Li:

SUAM: A Service Unified Access Model for Microservice Management. 175-180 - Hangyu Cheng

, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Bowen Liang:
Task-role Performance Evaluation via Business Process Monitoring with BPMN Extension. 181-187 - Zhilu Lian, Yangzi Li, Zhixiang Chen

, Shiwen Shan, Baoxin Han, Yuxin Su:
eBPF-based Working Set Size Estimation in Memory Management. 188-195 - Xinyu Zhao, Chen Liu, Shuo Zhang, Xin You:

A Novel Science and Technology Resource Recommendation Service based on Knowledege Graph and Collaborative Filtering. 196-202 - Liwen Zhang, Weiping Li, Tong Mo, Weijie Chu:

HRET: Heterogeneous Information Network for Recommendation in testing and inspection. 203-208 - Yongyan Yang, Lihong Yang, Mengda Xing:

MRNN-SA: A Multi-dimensional Time Series Fault Prediction Service for Power Equipment through Self-attention Network. 209-216 - Yushuang Fang, Min Yuan, Hangrui Zhang, Ruzhen Wang:

A Process Evaluation Method for Crossover Service Recommendation. 217-224 - Congcong Min, Dongcheng Zhao, Hua Lu:

A Machine Learning Method and Device Based on Programmable Switch. 225-228 - Tianyang Li, Tibing Zhang, Jian Wang, Zhongjie Wang, Ting He, Yufeng Zhang:

Improve the performance of CenterNet through hybrid attention mechanism CBAM. 229-236 - Yi Yang, Mingkang Song, Jianming Zhou, Peng Dai, Tenghui Ke, Weidong Li, Zhengguang Wu, Xiayan Zheng, Xijin Li:

Distributed machine learning based link allocation strategy. 237-240 - Boqin Hu, Chen Fu:

Game difficulty prediction algorithm based on improved Monte Carlo tree. 241-247 - Xiuwen Tang, Jiazhen Gan, Zigui Jiang:

A Graph Neural Network-based Code Recommendation Method for Smart Contract Development. 248-254 - Zhenxiang Zhao, Chao Ma, Haochen Yuan, Zhongjie Wang:

A DTP and SoLiD based Service for Multi-Source Semantically-Heterogeneous Personal Data Management. 255-262 - Wenjie Teng, Hanchuan Xu, Zhe Huang, Yu Bai, Zhongjie Wang:

A Smart Contract-based Service Platform for Trustworthy Crowd Funding and Crowd Innovation. 263-270 - Kui Xiao, Yuming Fu, Ying Deng, Lingmei Xia:

Identifying Prerequisite Relations Between Concepts In Wikipedia. 271-276 - Meng Wang, Rong Jiang, Yue Yang, Chenguang Wang, Lin Zhang, Liang Yang, Xuetao Pu:

Medical service oriented blockchain data credibility evaluation method. 277-282 - Rui Yu, Fu Chen, Wenmao Liu, Hongqing Sang:

Threat identification model for suspected Internet of Things attack groups. 283-288 - Ruize Yu, Changlin Yang, Ying Liu:

FSC: File Storage in Coded Blockchain with C-PBFT Consensus Protocol. 289-296 - Yuanjun Ding, Weili Chen:

Probing the Mystery of Cryptocurrency Exchange: The Case Study Based on Mt.Gox. 297-304 - Kean Ren

:
Differentially Private Auction for Federated Learning with Non-IID Data. 305-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














