LEADER 01847nam 2200361Ia 450 001 996387409103316 005 20221108075839.0 035 $a(CKB)4940000000084908 035 $a(EEBO)2240902930 035 $a(OCoLC)27359031 035 $a(EXLCZ)994940000000084908 100 $a19930202d1688 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA true copy of the imperial decree and of the declaration that was delivered to the envoys of the electors, princes and estates of the empire, by Prince Herman of Baden$b[electronic resource] $eby which the late insinuations of the papists do's appear wholly groundless, (viz.) that the Catholick princes were grown jealous of his Royal Highness the Prince of Orange's designs, and that therefore a peace would speedily be concluded between his Imperial Majesty and France, and a league of all the Catholick princes ensue, for maintenance of the Romish religion 210 $aLondon $cPrinted by John Wallis ...$d1688 215 $a1 sheet (2 p.) 300 $aReproduction of original in Huntington Library. 330 $aeebo-0113 606 $aGrand Alliance, War of the, 1689-1697 607 $aHoly Roman Empire$xForeign relations$zFrance 607 $aFrance$xForeign relations$zHoly Roman Empire 607 $aGreat Britain$xHistory$yRevolution of 1688 615 0$aGrand Alliance, War of the, 1689-1697. 701 $aLeopold William$cCount of Honningreck-Combruck.$01017676 701 $aHermann$cMarkgraf von Baden,$f1628-1691.$01017677 801 0$bEAG 801 1$bEAG 801 2$bWaOLN 906 $aBOOK 912 $a996387409103316 996 $aA true copy of the imperial decree and of the declaration that was delivered to the envoys of the electors, princes and estates of the empire, by Prince Herman of Baden$92388763 997 $aUNISA LEADER 10508nam 2200505 450 001 996464550603316 005 20231110224346.0 010 $a3-030-99191-1 035 $a(MiAaPQ)EBC6935560 035 $a(Au-PeEL)EBL6935560 035 $a(CKB)21418289700041 035 $a(PPN)261519743 035 $a(EXLCZ)9921418289700041 100 $a20221106d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCloud computing $e11th EAI International Conference, CloudComp 2021, virtual event, December 9-10, 2021, proceedings /$fedited by Mohammad R. Khosravi, Qiang He, Haipeng Dai 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (241 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;$vv.430 311 08$aPrint version: Khosravi, Mohammad R. Cloud Computing Cham : Springer International Publishing AG,c2022 9783030991906 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Data Analytics for Cloud Systems with Distributed Applications -- Load Quality Analysis and Forecasting for Power Data Set on Cloud Platform -- 1 Introduction -- 2 Analysis and Improvement of Power Data -- 2.1 Classification and Comparison of Common Power Data Sets -- 2.2 The Function of Electric Power Data Set -- 2.3 Methods of Improving Data Quality -- 3 Data Prediction -- 3.1 ARIMA Model -- 3.2 LSTM Model -- 3.3 Experimental Results and Evaluation -- 4 Conclusion -- References -- A Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges -- 1 Introduction -- 2 Classification of Traffic Data -- 2.1 Spatial Static Time Dynamic Data -- 2.2 Spatio-Temporal Dynamic Data -- 3 Deep Neural Networks for Traffic Prediction -- 3.1 A Traffic Forecasting Method Based on CNN -- 3.2 A Traffic Forecasting Method Based on RNN -- 3.3 A Traffic Forecasting Method Based on the Hybrid Model -- 4 Challenges -- 5 Conclusions -- References -- A Dynamic Gesture Recognition Control File Method Based on Deep Learning -- 1 Introduction -- 2 Construction of PyTorch Model, YOLOv4 and Realization of Control Algorithm -- 2.1 PyTorch Model -- 2.2 Introduction to YOLO -- 2.3 Control Algorithm -- 3 Experiment and Result Analysis -- 3.1 Experimental Platform and Data Set -- 3.2 Network Training -- 3.3 Result Analysis -- 4 Conclusion -- References -- A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment -- 1 Introduction -- 2 Methods -- 2.1 Three Layer Model-L2R (= 0.001) Overall Network Architecture -- 2.2 Back Propagation (BP) Algorithm -- 2.3 Baseline Model -- 3 Deep Learning Distributed System -- 4 Experiment and Analysis -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Model Performance -- 5 Conclusion -- References. 327 $aTriangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection in Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Triangle Coordinate Diagram Localization -- 3.1 Gaussian Filter and Sobel Operator -- 3.2 Line Segment Detector -- 3.3 Line Segment Merging -- 3.4 Diagram Localization -- 4 Experiment -- 4.1 Dataset -- 4.2 Experimental Method -- 4.3 Experimental Results and Numerical Analysis -- 5 Conclusion -- References -- Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing -- 1 Introduction -- 2 System Architecture -- 3 Optimization Problem -- 4 Setting I: Server S vs Single Client Ci -- 4.1 Client's Optimization Problem -- 4.2 Server's Optimization Problem -- 4.3 Proposed Algorithm -- 4.4 Analysis -- 5 Setting II: Server S vs Clients C1,@?????,Cm -- 5.1 Algorithm -- 5.2 Analysis -- 6 Conclusions and Future Works -- References -- A Survey of Face Image Inpainting Based on Deep Learning -- 1 Introduction -- 2 Face Inpainting Method Based on Deep Learning -- 2.1 Attention-Based Image Inpainting -- 2.2 Semantic-Based Image Inpainting -- 2.3 Progressive-Based Image Inpainting -- 3 Datasets and Evaluation Indicators -- 3.1 Dataset -- 3.2 Evaluating Indicator -- 4 Conclusion -- References -- Cloud Architecture and Challenges in Real-World Use -- Layered Service Model Architecture for Cloud Computing -- 1 Introduction -- 2 Important Terms and Definitions -- 2.1 Cloud Computing -- 2.2 Cloud Service Provider or CSP -- 2.3 Infrastructure as a Service or IaaS -- 2.4 Platform as a Service or PaaS -- 2.5 Software as a Service or SaaS -- 2.6 Serverless Computing -- 2.7 Containers and Containers as a Service (CaaS) -- 3 Need to Think Beyond IaaS, PaaS, and SaaS -- 3.1 Serverless vs IaaS, PaaS, and SaaS -- 3.2 CaaS vs IaaS, PaaS, and SaaS -- 4 Existing Approaches and the Need for New Approach. 327 $a4.1 XaaS (Anything as a Service) -- 4.2 Johan Den Haan Framework for Categorizing Cloud Services -- 5 Proposed Architecture -- 5.1 Preview -- 5.2 Design Methodology and Trends -- 5.3 Architecture Explanation -- 5.4 Layers Explanation and Criteria -- 6 Plotting Cloud Products in the Proposed Architecture -- 7 Future Research Directions -- 8 Conclusion -- References -- KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems -- 1 Introduction -- 2 Preliminary and Overview -- 2.1 Knowledge Graph (KG) -- 2.2 Node2vec Mechanism -- 2.3 Locality Sensitive Hashing (LSH) -- 2.4 Problem Formulation -- 3 Methodology -- 3.1 Construction of Property-Aware Graphs -- 3.2 Generation of Property-Aware Vectors -- 3.3 Regeneration of User Preference Sequence with LSH -- 3.4 Prediction Module -- 4 Experiments -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Impact of Parameters -- 4.4 Performance Evaluation -- 4.5 Evaluation of Different Properties -- 5 Related Work -- 5.1 Random Walk Algorithm -- 5.2 Recommendations Using Knowledge Graph -- 6 Conclusion -- References -- ERP as Software-as-a-Service: Factors Depicting Large Enterprises Cloud Adoption -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Results -- 4.1 Service Quality -- 4.2 Costs -- 4.3 Technical Limitations -- 4.4 Cloud Characteristics -- 5 Discussion and Conclusions -- References -- Design of an Evaluation System of Limb Motor Function Using Inertial Sensor -- 1 Introduction -- 2 Design of the Rehabilitation Assessment Module -- 2.1 General Structure Design -- 2.2 Realization of Upper Limb Real Time Motion Simulation -- 3 Discussion -- 4 Conclusion -- References -- Towards a GPU-Accelerated Open Source VDI for OpenStack -- 1 Motivation -- 2 Related Work -- 2.1 GPU Virtualization -- 2.2 Video Encoding and Decoding -- 2.3 Remote Desktop Transport -- 2.4 Preliminary Work in bwLehrpool. 327 $a2.5 OpenStack - Basis and Missing Pieces -- 3 Proposed System Architecture -- 4 Work Program and Planned Efforts -- 5 Conclusion and Outlook -- References -- Security in Cloud/Edge Platforms -- Trustworthy IoT Computing Environment Based on Layered Blockchain Consensus Framework -- 1 Introduction -- 2 Related Works -- 3 Trustworthy IoT Model with Integrated Blockchain -- 3.1 System Model Overview -- 3.2 Build a Two-Layer Blockchain for the IoT -- 4 Layered Chained BFT (LCBFT) Consensus Mechanism -- 4.1 Overview of the HotStuff -- 4.2 Consensus and Block Generation in Energy-Constrained Part -- 4.3 Global Blockchain Consensus and Joining Blocks onto the Chain -- 4.4 Liveness Mechanism of Consensus Process -- 5 Microservice-Based Consensus Protocol Deployment Plan -- 6 Evaluation -- 6.1 Computational Structure of the Two Consensus Mechanisms -- 6.2 Energy Consumption Analysis of Two Consensus Mechanism -- 7 Conclusion -- References -- Heuristic Network Security Risk Assessment Based on Attack Graph -- 1 Introduction -- 2 Related Work -- 3 Heuristic Network Security Risk Assessment Based on Attack Graph -- 3.1 Attack Graph -- 3.2 Heuristic Graph Arborescences of Maximum Weight Generation Algorithm -- 3.3 Heuristic Attack Path Finding Algorithm for Maximum Risk -- 3.4 Node Importance Evaluation Based on ISM -- 4 Experimental Settings and Results -- 4.1 Experimental Environment -- 4.2 Experimental Results -- 5 Conclusion -- References -- Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System -- 1 Introduction -- 2 Related Work -- 2.1 Anomaly Detection -- 2.2 Active Defense -- 3 Research Motivation -- 4 An Active Defense System Framework Design -- 4.1 The Behavioral Feature Extraction of Typical Network Security Events -- 4.2 The Security Disposal Strategy Generation of Typical Network Security Events. 327 $a4.3 The Automation Orchestration of Security Disposal Strategies -- 5 A Case Study -- 6 Conclusion and Future Work -- References -- Energy- and Reliability-Aware Computation Offloading with Security Constraints in MEC-Enabled Smart Cities -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Network System Model -- 3.2 Workflow Applications Model -- 3.3 Energy Consumption Model -- 3.4 Resource Utilization Model -- 3.5 Reliability Model -- 3.6 Privacy Preservation Model -- 3.7 Problem Formulation -- 4 Energy- and Reliability-Aware Multi-objective Optimization Method with Security Constraint (ERMOS) -- 5 Experimental Evaluation -- 5.1 Experimental Setting -- 5.2 Experimental Result and Discussion -- 6 Conclusion -- References -- A Review of Cross-Blockchain Solutions -- 1 Introduction -- 2 Mature Cross-Blockchain Solutions -- 2.1 Notary Schemes -- 2.2 Sidechain/Relay -- 2.3 Hash-Locking -- 3 Innovative Cross-Blockchain Solutions -- 3.1 DexTT -- 3.2 Blockchain Router -- 3.3 Satellite Chain -- 3.4 HyperService -- 4 Industrial Solutions -- 4.1 Cosmos -- 4.2 Polkadot -- 4.3 Aion -- 4.4 Wanchain -- 4.5 Lisk -- 4.6 Ark -- 4.7 Metronome -- 5 Conclusion -- References -- Author Index. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 606 $aCloud computing 615 0$aCloud computing. 676 $a004.6782 702 $aDai$b Haipeng 702 $aHe$b Qiang 702 $aKhosravi$b Mohammad R. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464550603316 996 $aCloud Computing$9773733 997 $aUNISA