Virtues 发表于 2025-3-23 11:42:49

http://reply.papertrans.cn/87/8657/865608/865608_11.png

制定法律 发表于 2025-3-23 15:29:56

Improving IoT Services Through Business-Process-Aligned Modeling Methodtion and integration among people, machines, and things. In industry, there exists a significant class of process-oriented information systems, known as Process-aware Information Systems (PAIS), which are supported by business process management (BPM). The aim of business processes is to provide pro

显微镜 发表于 2025-3-23 21:51:08

Research on Cascading Failure of Complex Networks Based on Edge Weight and Capacity Allocation Stratded by the network. In order to effectively prevent the occurrence of cascading failures in complex networks, this paper studies the impact of edge weight and capacity allocation strategies on complex network attack resistance. By analyzing the dynamic evolution mechanism of edge cascading fault pro

阻碍 发表于 2025-3-24 02:07:01

IoT Service Runtime Fault Tolerance Mechanism Based on Flink Dynamic Checkpointt (BPM) has the potential to become more flexible and adaptive. However, the integration of BPM and IoT faces challenges such as programming mechanism mismatches, resource management mechanism mismatches, and adaptive mechanism mismatches. This research considers IoT service-based technology as an e

热情的我 发表于 2025-3-24 03:24:06

Multi-round Collaborative Task Assignment Under the Edge Cloud in Mobile Crowdsourcing of smart terminal devices can help crowd workers complete large-scale tasks. MCS requires crowd workers to move to specific sensing regions to complete assigned tasks. However, the large amount of interactive data makes the traditional cloud computing cannot meet the requirements of MCS. Meanwhile,

无可争辩 发表于 2025-3-24 07:13:11

A Container Migration Method for Edge Environments Based on Malicious Traffic Detectionter, edge devices are deployed more decentralized. Also, due to size and resource constraints, edge devices are difficult to manage or update security patches uniformly in real time. It makes it easier for malicious traffic to affect the security of the edge environment. In this paper, we propose a

conjunctiva 发表于 2025-3-24 14:23:24

BIFData: A Secure Data Trading Marketplace Platform Based on Blockchain Technology and Smart Contracsuffer from data silos and lack effective data security mechanisms, which can easily lead to data theft and misuse. With the emergence of blockchain technology, a solution arises. Blockchain is a decentralized, distributed database that records all transactions occurring in a peer-to-peer network. I

Hyperopia 发表于 2025-3-24 17:35:31

http://reply.papertrans.cn/87/8657/865608/865608_18.png

Truculent 发表于 2025-3-24 22:06:38

Named Entity Recognition Service of Bert-Transformer-CRF Based on Multi-feature Fusion for Chronic Ddisease descriptions, making it difficult for some existing service recommendation methods to make accurate and personalised recommendations for patients with chronic diseases. Therefore, the paper proposes a service recommendation method based on the BERT-Transformer-CRF named entity recognition te

floodgate 发表于 2025-3-25 02:20:06

http://reply.papertrans.cn/87/8657/865608/865608_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Service Science; CCF 16th Internation Zhongjie Wang,Shangguang Wang,Hanchuan Xu Conference proceedings 2023 The Editor(s) (if applicable) a