Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








47 Hits in 8.6 sec

How to derive causal insights for digital commerce in china? a research commentary on computational social science methods

David C.W. Phang, Kanliang Wang, Qiuhong Wang, Robert J. Kauffman, Maurizio Naldi
2019 Electronic Commerce Research and Applications  
.; WANG, Kanliang; WANG, Qiu-hong; KAUFFMAN, Robert John; and NALDI, Maurizio. How to derive causal insights for digital commerce in China?  ...  They include: topic modeling and latent Dirichlet analysis; social networks, friends-of-friends, network and graph analytics; and visualization and graph modeling. implement performance metrics from DM  ...  Another example of the usefulness of data analytics research is represented by the study of online P2P lending published by Wang et al. (2018b) , who built a novel user a behavioral and a credit risk  ... 
doi:10.1016/j.elerap.2019.100837 fatcat:segj5fu3evdqdjveyd54w7cbwq

An introduction to Deep learning [article]

Dr. Pinki Nayak, Dr. Jyoti Parashar
2024 Zenodo  
The implementation is a difficult process that is comprised of several components, including peer-to-peer (P2P) networks, graphs, and blockchains.  ...  In contrast, the optimization of the risk that is associated with a model is a trade-off with the performance of the model. This is because the risk is connected with the model.  ...  Next, the network matches the pixels with the names that are connected with them.  ... 
doi:10.5281/zenodo.11001312 fatcat:qdbucnleibgvxlkgo7i2r72wai

Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks

Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Jesus Olivares-Mercado, Jose Portillo-Portilo, Juan-Gerardo Avalos, Luis Javier García Villalba
2022 Applied Sciences  
for accurate detection, creating a gap in multi-layer security mechanisms.  ...  Although in the state-of-the-art there are alternative solutions, mainly using machine learning techniques, one of the important issues to be solved is still the correct characterization of network and  ...  Acknowledgments: The authors thank the National Science and Technology Council of Mexico (CONACyT) and the Instituto Politécnico Nacional for the financial support for this research.  ... 
doi:10.3390/app12073234 fatcat:u65ziddminc2lf6ohgmzetnvne

D2.2 Multi-Source Analytics Methodological Foundations

Suite5, SingularLogic, The Smile Of The Child, NTUA
2018 Zenodo  
This deliverable is related to the first release of the methodology, algorithms and examples for predictive analytics and analytics over the case under investigation merging data from multiple sources.  ...  Deep Investment Behavior Profiling by Recurrent Neural Network in P2P Lending[25] 2017 • Deep learning • Recurrent Neural Networks (RNNs) with GRU and LSTM Dataset of 7455 investors of  ...  word2vec) • Deep Convolution Neural Networks Movie reviews and twitter messages (SSTb and STS corpora) Sentiment analysis with deep convolutional neural networks • Performs analysis using  ... 
doi:10.5281/zenodo.1477456 fatcat:zgxdgejcdjgxlgji6roswh22iq

The Vessel Schedule Recovery Problem (VSRP) – A MIP model for handling disruptions in liner shipping

Berit D. Brouer, Jakob Dirksen, David Pisinger, Christian E.M. Plum, Bo Vaaben
2013 European Journal of Operational Research  
We formulate and analyze a strategic design model for public bicycle sharing systems with service level considerations.  ...  In considering the interests of users and investors, the proposed model attempts to determine the number and locations of bike stations, the network structure of bike paths connected between the stations  ...  Starting from it two single objective models are formulated: a maximum expected return model and a minimum financial risk (pollution penalties) model.  ... 
doi:10.1016/j.ejor.2012.08.016 fatcat:c27kagfnxnhjfbil2rydhjhomm

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
There are various surveys on ML for specific areas in networking or for specific network technologies.  ...  Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management.  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue  ...  Deep Investment Behavior Profiling by Recurrent Neural Network in P2P Lending [66] 2017 • Deep learning • Recurrent Neural Networks (RNNs) with GRU and LSTM Dataset of 7455 investors  ...  word2vec) • Deep Convolution Neural Networks Movie reviews and twitter messages (SSTb and STS corpora) Sentiment analysis with deep convolutional neural networks • Performs analysis using  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

Investor sentiment-aware prediction model for P2P lending indicators based on LSTM

Yanyan Cui, Lixin Liu
2022
In recent years, online lending has created many risks while providing lending convenience to Chinese individuals and small and medium-sized enterprises.  ...  The timely assessment and prediction of the status of industry indicators is an important prerequisite for effectively preventing the spread of risks in China's new financial formats.  ...  on its website, and has become a network gathering place for P2P investors.  ... 
doi:10.1371/journal.pone.0262539 pmid:35085306 pmcid:PMC8794130 fatcat:pncgyx3rt5eupggroitbeivbty

A Manifesto for Future Generation Cloud Computing

Rajkumar Buyya, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente, Sabrina De Capitani Di Vimercati, Pierangela Samarati, Dejan Milojicic, Carlos Varela, Rami Bahsoon, Marcos Dias De Assuncao, Satish Narayana Srirama (+13 others)
2018 ACM Computing Surveys  
ACKNOWLEDGMENTS We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ...  for improving the paper.  ...  Moreover, location awareness can be taken into account for geo-distributed computing on edge nodes. The Fog model inherently lends itself to improving the QoS of streaming and real-time applications.  ... 
doi:10.1145/3241737 fatcat:bgb4qjtm5zgcbbtyy6x6anfeju

Academic Libraries: Sustaining Excellence Through Innovation & Technology [article]

Shahzeb Hasan, Sanjeev Kumar, Subhajit Panda, Abdul Haseeb Mir, Khalid Nadeem Khan, Ghulam Samdani
2024 Zenodo  
We also extend our thanks to the readers who embark on this journey with us, and we hope that the insights and ideas presented in these pages will inform and inspire your work in academic librarianship  ...  and fostering lifelong learning.  ...  shape is linked to targets in the data and also provides a way for a Data Graph to specify the Shapes Graph that should be used for validation.  ... 
doi:10.5281/zenodo.11074905 fatcat:mzbdvomgu5gqpfctqwezbzdvmy

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade [article]

Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente (+12 others)
2018 arXiv   pre-print
applications, and (4) different invocation/execution models for pervasive and ubiquitous applications.  ...  The recent technological developments and paradigms such as serverless computing, software-defined networking, Internet of Things, and processing at network edge are creating new opportunities for Cloud  ...  Acknowledgement We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ... 
arXiv:1711.09123v2 fatcat:xu3u75e6ind23ite3l6zfqi6hq

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
Such data lends itself to a variety of rich applications in which one can use the sensor data in order to model the underlying relationships and interactions.  ...  A schema for linear segments is presented in [64], consisting of a table, referred to as FunctionTable, where each row represents a linear model with attributes start time, end time, slope and intercept  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Convergence and Disruption in Digital Society – Money, Secure Communication, Digital Objects and Generative AI in Spatial Mixed Reality [article]

John Joseph O'Hare, Allen Fairchild, Umran Ali
2023 arXiv   pre-print
The digital society must navigate the fine balance between innovation and the potential risks associated with new technologies.  ...  The drive for an inclusive, innovative, and secure digital society necessitates a commitment to open-source principles and ethical AI application.  ...  This is where the Lightning Network comes into play, it's a p2p network of these payment channels.  ... 
arXiv:2207.09460v11 fatcat:lwlfkgn7c5fstkibrkjwoglc6q

Open Knowledge: Promises and Challenges [chapter]

Rufus Pollock, Jo Walsh
2012 The Digital Public Domain: Foundations for an Open Culture  
fashion, via email or P2P networks.  ...  With content registration services, converging networks and next-generation P2P environments in place, there will be a new market for micropayment.  ...  CC recommends exposing a mechanism to extract the CC REL abstract model from the XML, so that CC tools need not know about every possible XML schema ahead of time.  ... 
doi:10.11647/obp.0019.07 fatcat:r3yre7bnmndbvbhggtzvdhdyaq

MultiVul-GCN : automatic smart contract vulnerability detection using multi-graph convolutional networks

Robert Appiah, University Of British Columbia
2023
This research proposes a novel approach for detecting smart contract vulnerabilities using MultiVul-GCN, a tool based on Multi-graph Convolutional Networks (MCNs) designed to learn from multi-relational  ...  By modeling edges with abstract semantics as contract graphs, we explore various methods to combine the representations obtained from annotated and learned edges.  ...  Emeritus Victor Leung and Adjunct Professor Dr. Zehua Wang, for their diligent guidance and insightful advice throughout the research.  ... 
doi:10.14288/1.0431387 fatcat:jcoqtxpn2rcmzoulqhxrojer5u
« Previous Showing results 1 — 15 out of 47 results