


default search action
13th IDC 2019: St. Petersburg, Russia
- Igor V. Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic:

Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019. Studies in Computational Intelligence 868, Springer 2020, ISBN 978-3-030-32257-1
Internet of Things, Cloud Computing and Big Data
- Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci

, Giuseppe M. L. Sarné:
Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains. 3-12 - Oleg V. Baranov

, Nikolay V. Smirnov
, Tatiana E. Smirnova, Yefim V. Zholobov
:
Design of Fail-Safe Quadrocopter Configuration. 13-22 - Sasa Pesic

, Milos Radovanovic, Mirjana Ivanovic
, Costin Badica
, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic:
CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems. 23-34 - Vladimir Gorodetsky, Vladimir Larukchin, Petr Skobelev

:
Conceptual Model of Digital Platform for Enterprises of Industry 5.0. 35-40 - Maria A. Poltavtseva, Maxim O. Kalinin

:
Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security. 41-47 - Vincenza Carchiolo

, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Smart Topic Sharing in IoT Platform Based on a Social Inspired Broker. 48-55 - Ichiro Satoh:

Easy Development of Software for IoT Systems. 56-61
Data Analysis, Mining and Machine Learning
- Fatemeh Khodaparast, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli:

Privacy-Preserving LDA Classification over Horizontally Distributed Data. 65-74 - Ivan Kholod, Andrey Shorov, Sergei Gorlatch:

Improving Parallel Data Mining for Different Data Distributions in IoT Systems. 75-85 - Felix Petcusin, Liana Stanescu, Costin Badica

:
An Experiment on Automated Requirements Mapping Using Deep Learning Methods. 86-95 - Artem Kovalev

, Nikita Voinov, Igor Nikiforov
:
Using the Doc2Vec Algorithm to Detect Semantically Similar Jira Issues in the Process of Resolving Customer Requests. 96-101 - Diogo Ramos, Davide Carneiro

, Paulo Novais
:
evoRF: An Evolutionary Approach to Random Forests. 102-107 - Sergey I. Ivanov, G. N. Ilin:

The Method of Fuzzy Logic and Data Mining for Monitoring Troposphere Parameters Using Ground-Based Radiometric Complex. 108-114
Multi-agent and Service-Based Distributed Systems
- Yury Iskanderov

, Mikhail Pautov:
Actor-Network Approach to Self-organisation in Global Logistics Networks. 117-127 - Jing Tan, Rongjun Xu, Kai Chen, Lars Braubach, Kai Jander

, Alexander Pokahr:
Multi-agent System for Simulation of Response to Supply Chain Disruptions. 128-139 - Maria A. Butakova

, Andrey V. Chernov
, Ilias K. Savvas
, Georgia Garani
:
Data Warehouse Design for Security Applications Using Distributed Ontology-Based Knowledge Representation. 140-145
Distributed Algorithms and Optimization
- Amelia Badica, Costin Badica

, Mirjana Ivanovic
, Doina Logofatu:
Exploring the Space of Block Structured Scheduling Processes Using Constraint Logic Programming. 149-159 - Victor V. Toporkov, Anna S. Toporkova, Dmitry Yemelyanov:

Global and Private Job-Flow Scheduling Optimization in Grid Virtual Organizations. 160-169 - Roman A. Sizov, Dan A. Simovici:

Type-Based Genetic Algorithms. 170-176 - Tatiana M. Kosovskaya:

Distributed Construction of a Level Class Description in the Framework of Logic-Predicate Approach to AI Problems. 177-182 - Alina V. Boiko

, Nikolay V. Smirnov
:
On Approaches for Solving Nonlinear Optimal Control Problems. 183-188
Modeling Operational Processes for Intelligent Distributed Computing
- Valentin Olenev, Irina Lavrovskaya, Ilya Korobkov, Nikolay Sinyov, Yuriy Sheynin:

Hierarchical Simulation of Onboard Networks. 191-196 - Vincenza Carchiolo

, Marco Grassia
, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
Strategies Comparison in Link Building Problem. 197-202 - Pavel I. Sharikov

, Andrey V. Krasov
, Artem M. Gelfand, Nikita A. Kosov:
Research of the Possibility of Hidden Embedding of a Digital Watermark Using Practical Methods of Channel Steganography. 203-209 - Hitoshi Mitake, Hiroshi Yamada, Tatsuo Nakajima:

A Highly Scalable Index Structure for Multicore In-Memory Database Systems. 210-217 - Vladimir Lokhvickii, Yuri Ryzhikov, Andry Dudkin:

Applying the Split-Join Queuing System Model to Estimating the Efficiency of Detecting Contamination Content Process in Multimedia Objects Streams. 218-223 - Sergey Krasnov, Vladimir Lokhvitckii, Andry Dudkin:

On the Applicability of the Modernized Method of Latent-Semantic Analysis to Identify Negative Content in Multimedia Objects. 224-229
Advanced Methods for Social Network Analysis and Inappropriate Content Counteraction
- Dmitry Gavra

, Vladislav Dekalov
, Ksenia Naumenko:
Digital Subjects as New Power Actors: A Critical View on Political, Media-, and Digital Spaces Intersection. 233-243 - Lidiya Vitkova

, Igor Saenko
, Olga Tushkanova:
An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet. 244-254 - Abhishta Abhishta

, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis
:
A Note on Analysing the Attacker Aims Behind DDoS Attacks. 255-265 - Sergey Pilkevich, Konstantin Gnidko

:
Formation of the System of Signs of Potentially Harmful Multimedia Objects. 266-271 - Anastasiia O. Khlobystova

, Maxim V. Abramov, Alexander L. Tulupyev
:
Soft Estimates for Social Engineering Attack Propagation Probabilities Depending on Interaction Rates Among Instagram Users. 272-277 - Diana Gaifulina

, Andrey Chechulin
:
Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet. 278-284 - Lidia Vitkova

, Maxim Kolomeets
:
Approach to Identification and Analysis of Information Sources in Social Networks. 285-293 - Igor B. Parashchuk, Elena Doynikova

:
The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects' Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing. 294-301 - Alexander Branitskiy, Elena Doynikova

, Igor V. Kotenko
, Natalia Krasilnikova, Dmitry Levshun
, Artem Tishkov
, Nina Vanchakova:
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing. 302-310
Intelligent Distributed Computing for Cyber-Physical Security and Safety
- Diana Berbecaru

, Antonio Lioy, Cesare Cameroni
:
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure. 313-322 - Vasily Desnitsky

, Nikolay Rudavin, Igor V. Kotenko
:
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems. 323-332 - Dmitry Levshun

, Igor V. Kotenko
, Andrey Chechulin
:
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification. 333-343 - Alexey Lukashin, Mikhail Popov

, Anatoliy Bolshakov, Yuri Nikolashin:
Scalable Data Processing Approach and Anomaly Detection Method for User and Entity Behavior Analytics Platform. 344-349 - Anastasia Balueva, Vasily Desnitsky

, Igor Ushakov
:
Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning. 350-355 - Maria Usova, Sergey Chuprov

, Ilya I. Viksnin, Ruslan Gataullin, Antonina Komarova, Andrey Iuganson
:
Model of Smart Manufacturing System. 356-362
Intelligent Distributed Decision Support Systems
- Alexsander N. Pavlov, Dmitry A. Pavlov

, Valerii V. Zakharov
:
Technology Resolution Criterion of Uncertainty in Intelligent Distributed Decision Support Systems. 365-373 - Oleg Karsaev, Evgeniy Minakov:

Satellite Constellation Control Based on Inter-Satellite Information Interaction. 374-384 - Maad M. Khalill

, Anatoly D. Khomonenko
, Sergey I. Gindin:
Load Balancing Cloud Computing with Web-Interface Using Multi-channel Queuing Systems with Warming up and Cooling. 385-393 - Inna Trofimova

, Boris V. Sokolov, Dmitry Nazarov, Semyon A. Potryasaev, Andrey Musaev, Vladimir Kalinin:
Application of Cyber-Physical System and Real-Time Control Construction Algorithm in Supply Chain Management Problem. 394-403 - Andrey A. Tyugashev

, Sergei Orlov
:
Method for Design of 'smart' Spacecraft Onboard Decision Making in Case of Limited Onboard Resources. 404-413 - Elena Serova

:
Intelligent Technologies and Systems for Spatial Industrial Strategic Planning. 414-422 - Alexander S. Geyda:

Conceptual and Formal Models of Information Technologies Use for Decisions Support in Technological Systems. 423-429 - Andrey A. Tyugashev

, Alexander Kovalev, Vjacheslav Pjatkov:
Role and Future of Standards in Development of Intelligent and Dependable Control Software in Russian Space Industry. 430-436 - Samer El-Khatib, Yuri A. Skobtsov, Sergey Rodzin:

Improved Particle Swarm Medical Image Segmentation Algorithm for Decision Making. 437-442 - Dmitry N. Verzilin

, Tatyana Maximova
, Irina Sokolova:
Collecting and Processing Distributed Data for Decision Support in Social Ecology. 443-448 - V. V. Mikhailov, Alexandr V. Spesivtsev, Andrey Yu. Perevaryukha:

Evaluation of the Dynamics of Phytomass in the Tundra Zone Using a Fuzzy-Opportunity Approach. 449-454
Intelligent Human-Machine Interfaces
- Ildar Kagirov

, Alexey Karpov
, Irina S. Kipyatkova, Konstantin Klyuzhev, Alexander Kudryavcev, Igor Kudryavcev, Dmitry Ryumin
:
Lower Limbs Exoskeleton Control System Based on Intelligent Human-Machine Interface. 457-466 - Vlado Delic, Dragisa Miskovic, Branislav M. Popovic

, Milan Secujski, Sinisa Suzic
, Tijana Delic, Niksa Jakovljevic:
Central Audio-Library of the University of Novi Sad. 467-476 - Alena Velichko

, Viktor Budkov, Ildar Kagirov
, Alexey Karpov
:
Applying Ensemble Learning Techniques and Neural Networks to Deceptive and Truthful Information Detection Task in the Flow of Speech. 477-482
Security for Intelligent Distributed Computing - Machine Learning vs. Chains of Trust
- Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini:

Model Checking to Detect the Hummingbad Malware. 485-494 - Yannick Chevalier, Roland Rieke

, Florian Fenzl
, Andrey Chechulin
, Igor V. Kotenko
:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. 495-504 - Andre Lopes, Andrew Hutchison:

Experimenting with Machine Learning in Automated Intrusion Response. 505-514 - Alexander A. Grusho

, Nick A. Grusho
, Elena E. Timonina
:
Method of Several Information Spaces for Identification of Anomalies. 515-520 - Diethelm Bienhaus, Lukas Jäger, Roland Rieke

, Christoph Krauß
:
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors. 521-528
Visual Analytics in Distributed Environment
- Yulia A. Shichkina, Galina V. Kataeva, Yulia A. Irishina, Elizaveta S. Stanevich:

The Architecture of the System for Monitoring the Status in Patients with Parkinson's Disease Using Mobile Technologies. 531-540 - Yana A. Bekeneva, Vladimir Mochalov, Andrey Shorov:

Approach to Association and Classification Rules Visualization. 541-546 - Evgenia Novikova

, Mikhail Bestuzhev
, Andrey Shorov:
The Visualization-Driven Approach to the Analysis of the HVAC Data. 547-552

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














