05716nam 2200769Ia 450 991102046310332120251116163400.0978661268679597812826867931282686798978047039485404703948549780470612200047061220797818470461161847046118(CKB)1000000000821519(EBL)700761(OCoLC)769341541(SSID)ssj0000361782(PQKBManifestationID)11242446(PQKBTitleCode)TC0000361782(PQKBWorkID)10353087(PQKB)10452143(MiAaPQ)EBC700761(Perlego)2762567(EXLCZ)99100000000082151920060602d2006 uy 0engur|n|---|||||txtccrInteroperability for enterprise software and applications proceedings of the workshops and the doctorial symposium of the second IFAC/IFIP I-ESA International Conference: EI2N, WSI, IS-TSPQ 2006 /edited by Herve Panetto, Nacer BoudjlidaNewport Beach, CA ISTE ltdc20061 online resource (398 p.)ISTE ;v.119Includes index.9781905209613 1905209614 Interoperability for Enterprise Software and Applications; Contents; Editorial; EI2N 2nd International Workshop on Enterprise Integration, Interoperability and Networking; Co-chairs message; Session 1: UEML for Enterprise Applications Interoperability; UEML: Systematic Approach for the Determination of Elementary Constructs; Comparison of Goal-oriented Languages using the UEML Approach; Session 2: Ontologies for Applications Interoperability; A Multi-Views Business Process Ontology for Flexible Collaboration; Session 3: Collaborative and Networked Enterprise InteroperabilityGRAI and SCOR Meta-model and Design Principles for Interoperability Framework for enterprise interoperability; WSI 2nd International Workshop on Web Services and Interoperability; Co-chairs message; Session 1: Model Driven Architectures; Rapid Prototyping for Service-Oriented Architectures; Model Driven Architectures for Web Services Platforms; Model Driven Design of Interoperable Agents; Session 2: Web Services for Interoperability; Information Security Patterns for Web Services; Detecting Similarities between Web Services Interfaces: The WSDL AnalyzerBusiness Process Fusion based on Semantically-enabled Service-Oriented Business Applications IS-TSPQ 1st International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems; Co-chairs message; Session 1: A Business and Requirements View; Constraint-Driven Negotiation Based on Semantic Interoperability in BTO Production Networks; Risk Assessment of Business Contracts; Exploring the Interoperability of Web Services using MOQARE; Session 2: Infrastructure Provision; Quality of Service Evaluation in Virtual Organizations using SLAsImproving Interoperation Security through Instrumentation and Analysis Guarding Enterprise Collaborations with Trust Decisions - the TuBE approach; I-ESA'2006 Doctoral Symposium; Co-chairs message; Session 1: Model Driven Development; Manage QoS in MDD using an aspect-oriented model driven framework; A Model Driven Approach for Service Composition Using Agent Technology; Models simulation and interoperability using MDA and HLA; A Study of Aspect-Driven Transformations to Facilitate Model Driven Development; Session 2: Business Process ModellingWorkflow Re-engineering through Log Event-based Analysis Dependency based approach for Process Design; A Declarative Approach of Process Models; Improving Alignment of Business Models and Business Process Models for Ensuring Strategic Fit of Business Processes; Session 3: Software Development and Interoperability; An Interactive Multi-Agent Based TV Game Show Implementation; Towards Plug and Play Business Software; Formalising Problem Frames with Ontology; Session 4: Enterprise Modelling and Knowledge Management; A Proposal for Modelling Enterprise Knowledge in Virtual EnterprisesMethodology for the Development of a Tacit Knowledge Management System for Virtual EnterprisesDuring the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise applications and software.The workshops were selected to complement the conference topics, providing researchers with more time to brainstorm and then to come out, at the end of the workshops, with new research directions for the future.Wiley UBCM ebooks.ISTEComputer softwareDevelopmentApplication softwareDevelopmentInternetworking (Telecommunication)Computer softwareDevelopment.Application softwareDevelopment.Internetworking (Telecommunication)005.1006.7/6Panetto Herve990655Boudjlida Nacer1341767IFAC/IFIP I-ESA International Conference: EI2N, WSI, IS-TSPQ.MiAaPQMiAaPQMiAaPQBOOK9911020463103321Interoperability for enterprise software and applications3064543UNINA07458nam 22007335 450 99666455260331620250625125924.0981-9687-31-410.1007/978-981-96-8731-2(MiAaPQ)EBC32176708(Au-PeEL)EBL32176708(CKB)39472207800041(DE-He213)978-981-96-8731-2(OCoLC)1526862750(EXLCZ)993947220780004120250625d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierWireless Artificial Intelligent Computing Systems and Applications 19th International Conference, WASA 2025, Tokyo, Japan, June 24–26, 2025, Proceedings, Part III /edited by Zhipeng Cai, Yongxin Zhu, Yonghao Wang, Meikang Qiu1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (769 pages)Lecture Notes in Computer Science,1611-3349 ;15688981-9687-30-6 -- FedBridgeICL: Federated Bridging of Small and Large Models for In-Context Learning. -- Hierarchical DRL-Based Multi-Motor Control with Torque Synchronization in Industrial IoT. -- Double Spending Defense in Consortium Blockchain under Network Partitioning. -- PM-SRCANet: A Privacy-preserving Multimodal Stress Recognition Convolutional Attention Network Model. -- Data Augmentation Based on Neighborhood Effects to Steer User Interests. -- Research on location privacy protection methods in vehicle networking. -- A Fair Rate Shaping-Based Congestion Control Strategy for Remote Sensing Satellite Networks. -- Resilient Cooperative Computing for Satellite Mobile Edge Computing Using Multi-Agent DRL. -- FedALoRA:Adaptive Local LoRA Aggregation for Personalized Federated Learning in LLM. -- A Lightweight Transformation Method for Privacy Protection in Image Classification. -- CSVA: Complexity-Driven and Semantic-Aware Video Analytics via Edge-Cloud Collaboration. -- Efficient Task Offloading and Resource Allocation in Space-Air Ground-Sea Networks: A MAPPO-based Approach. -- A Fine-grained Resource Allocation Strategy for Industrial TSN-5G Networks. -- A Task Feature Prediction Approach for Adaptive Computation Offloading in VEC. -- Exploiting Viaduct Blocking Effects for Enhanced Spectrum Availability in Cognitive Radio-Assisted Internet of Vehicles. -- Feature Compression with Spatial Reduction and Hyperprior Enhancement for Collaborative Intelligences. -- Black-box universal adversarial attack targeting speaker recognition models. -- GraphFT: A Lightweight Fault-tolerant Framework for Iterative Graph Processing. -- Byzantine-Resilient Differentially Private Federated Learning: A Dual-Phase Group-wise Aggregation Approach. -- Deep Decision Algorithm for DNA Image Storage: Enhancing Accuracy with Edit Distance-Based Quality Assessment. -- DROIT: A Distributed Robustness Optimization Scheme with Local Information for IoT Topology. -- A Hybrid EEG Forecasting Model with Rolling Mapping-Partial Decomposition and LSTM. -- A Joint Learning and Communication Framework for Intrusion Detection in Wireless Networks with High-speed UAVs. -- Adaptive Privacy Defense Against Category Inference Attack in Clustered Federated Learning: Balancing Security and Model Performance. -- An open X-ray spectrometric dataset for deep-learning based pile-up correction. -- KARMA: A Multilevel Decomposition Hybrid Mamba Framework for Multivariate Long-Term Time Series Forecasting. -- Guarding Semantic Communication: A Proactive Security Mechanism Against Eavesdropping. -- DeepTTF: A Deep Tree Traffic Forecast Model Based on Tree Structure. -- TransGER: Transformer-Based CNN-BiGRU Architecture for sEMG Gesture Recognition in Time-Frequency Domain. -- Multi-Layer IRS-Assisted Wireless-Powered Secure Terahertz Communication. -- A Practical Deep Reinforcement Learning-based QoS-Aware Scheduler for 5G Cellular Networks. -- Fast Autonomous Exploration in Complex Environments via the Farthest Cluster Representative and Dynamic Information Gain. -- Lightweight Attention-Based CNN Architecture for CSI Feedback of RIS-Assisted MISO Systems. -- Quantum Routing Design and Implementation for LEO Satellite Networks. -- AICom2. -- Nvwa Patches Up the Block: A Powerful Model for Error Concealment in Panoramic Video Transmission. -- Wi-FiAG: Fine-Grained Abnormal Gait Recognition via CNN-BiGRU with Attention Mechanism from Wi-Fi CSI. -- A Security Sharing Scheme for Multi-Institutional Access Control of Medical Data Based on Blockchain. -- A Secure and Efficient Data Sharing Framework for IoV Using Blockchain and Reputation-Based Incentive Mechanism. -- A PSO-based Method for Finding Approximately Optimal Order for LLL Algorithm. -- Blockchain-based Privacy-preserving Asynchronous Federated Learning. -- Multilayer Context Network: A New Approach for Gait Phase Detection. -- Energy-Constrained Joint Path Planning for Vehicle-UAVs in Task Point Coverage. -- A Blockchain-Assisted Certificateless Authentication Protocol for Internet of Vehicles. -- A Dynamic Frame Slotted ALOHA Based on Q-Learning.The 3-volume set LNCS 15686 - 15688 constitutes the proceedings of the 19th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2025, which took place in Tokyo, Japan, during June 24-26, 2025. The 70 full papers and 34 short papers included in the proceedings were carefully reviewed and selected from 282 submissions. The proceedings also contain 10 papers from the AICom2 symposium. WASA is a prestigious annual gathering that serves as a global platform for researchers, academics, and industry professionals to explore and exchange cuttingedge ideas, research findings, and innovative solutions at the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.Lecture Notes in Computer Science,1611-3349 ;15688Wireless communication systemsMobile communication systemsArtificial intelligenceApplication softwareComputersComputer networksWireless and Mobile CommunicationArtificial IntelligenceComputer and Information Systems ApplicationsComputing MilieuxComputer Communication NetworksWireless communication systems.Mobile communication systems.Artificial intelligence.Application software.Computers.Computer networks.Wireless and Mobile Communication.Artificial Intelligence.Computer and Information Systems Applications.Computing Milieux.Computer Communication Networks.621.384Cai Zhipeng1782744Zhu Yongxin1830312Wang Yonghao1744522Qiu Meikang1214261MiAaPQMiAaPQMiAaPQBOOK996664552603316Wireless Artificial Intelligent Computing Systems and Applications4400593UNISA