![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Service Oriented Computing and Applications, Volume 16
Volume 16, Number 1, March 2022
- Carlos Eduardo da Silva
, Yan de Lima Justino
, Eiji Adachi Barbosa
:
SPReaD: service-oriented process for reengineering and DevOps. 1-16 - Hajer Nabli
, Raoudha Ben Djemaa
, Ikram Amous Ben Amor
:
Cloud services description ontology used for service selection. 17-30 - Juba Agoun
, Mohand-Saïd Hacid:
Access control based on entity matching for secure data sharing. 31-44 - Jabir Kakkottakath Valappil Thekkepurayil, David Peter Suseelan, Preetha Mathew Keerikkattil:
Multi-objective Scheduling Policy for Workflow Applications in Cloud Using Hybrid Particle Search and Rescue Algorithm. 45-65 - Yanhui Su
, Per Backlund, Henrik Engström:
Data-driven method for mobile game publishing revenue forecast. 67-76 - Stefan Hintzen, Yves Liesy, Christian Zirpins
:
Publisher Correction to: A third-party replication service for dynamic hidden databases. 77
Volume 16, Number 2, June 2022
- Ulf Wilhelmsson
, Wei Wang
, Ran Zhang
, Marcus Toftedahl
:
Shift from game-as-a-product to game-as-a-service research trends. 79-81 - Bing Shi, Lianzhen Huang, Rongjian Shi:
A deep reinforcement learning-based approach for pricing in the competing auction-based cloud market. 83-95 - Mingyi Liu, Zhiying Tu, Hanchuan Xu, Xiaofei Xu, Zhongjie Wang:
Community-based service ecosystem evolution analysis. 97-110 - Yun Hao, Jiaju Wu, Xiangkang Huang, Zijia Zhang, Fei Liu, Qingyao Wu:
Speaker extraction network with attention mechanism for speech dialogue system. 111-119 - Jian Zhang, Bo Qin, Yufei Zhang, Junhua Zhou, Hongwei Wang
:
A knowledge extraction framework for domain-specific application with simplified pre-trained language model and attention-based feature extractor. 121-131 - Wenjun Wang, Lvlong Lai
, Jian Chen, Qingyao Wu:
CAM-based non-local attention network for weakly supervised fire detection. 133-142
Volume 16, Number 3, September 2022
- Omar Khadeer Hussain:
The process of risk management needs to evolve with the changing technology in the digital world. 143-145 - Hajer Nabli
, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Description, discovery, and recommendation of Cloud services: a survey. 147-166 - Tingyu Xie, Shuting Tao
, Qi Li
, Hongwei Wang
, Yihong Jin:
A lattice LSTM-based framework for knowledge graph construction from power plants maintenance reports. 167-177 - Yuran Dong, Zuoying Zeng, Cheng Xie
:
Two-layers service middleware for non-smart IoT sensors: case studies on industrial applications. 179-189 - Amina Khedimi, Tarek Menouer
, Christophe Cérin, Mourad Boudhar
:
A cloud weather forecasting service and its relationship with anomaly detection. 191-208 - Jacopo Soldani
, Lars Luthmann, Nicolas Gottwald, Malte Lochau, Antonio Brogi
:
Compositional testing of management conformance for multi-component enterprise applications. 209-225
Volume 16, Number 4, December 2022
- Yehui Tang, Junchi Yan, Guoqiang Hu, Baohua Zhang, Jinzan Zhou:
Recent progress and perspectives on quantum computing for finance. 227-229 - Alexandros Gerontas
, Efthimios Tambouris
, Konstantina Lazopoulou, Konstantinos A. Tarabanis
:
On using CPSV-AP to publish public service descriptions as linked open data. 231-261 - Saoussen Cheikhrouhou, Zakaria Maamar, Rawya Mars, Slim Kallel
:
A time interval-based approach for business process fragmentation over cloud and edge resources. 263-278 - Hongmei Cao
, Xi Chen, Liang Zhang, Tiange Zhang, Xiaochun Xiao:
A sound response to long-tailed changes in business process management. 279-291 - H. Rekha, M. Siddappa:
Hybrid deep learning model for attack detection in internet of things. 293-312 - Hathal Salamah Alwageed
:
Detection of cyber attacks in smart grids using SVM-boosted machine learning models. 313-326
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.