A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to derive causal insights for digital commerce in china? a research commentary on computational social science methods
2019
Electronic Commerce Research and Applications
.; WANG, Kanliang; WANG, Qiu-hong; KAUFFMAN, Robert John; and NALDI, Maurizio. How to derive causal insights for digital commerce in China? ...
They include: topic modeling and latent Dirichlet analysis; social networks, friends-of-friends, network and graph analytics; and visualization and graph modeling. implement performance metrics from DM ...
Another example of the usefulness of data analytics research is represented by the study of online P2P lending published by Wang et al. (2018b) , who built a novel user a behavioral and a credit risk ...
doi:10.1016/j.elerap.2019.100837
fatcat:segj5fu3evdqdjveyd54w7cbwq
An introduction to Deep learning
[article]
2024
Zenodo
The implementation is a difficult process that is comprised of several components, including peer-to-peer (P2P) networks, graphs, and blockchains. ...
In contrast, the optimization of the risk that is associated with a model is a trade-off with the performance of the model. This is because the risk is connected with the model. ...
Next, the network matches the pixels with the names that are connected with them. ...
doi:10.5281/zenodo.11001312
fatcat:qdbucnleibgvxlkgo7i2r72wai
Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks
2022
Applied Sciences
for accurate detection, creating a gap in multi-layer security mechanisms. ...
Although in the state-of-the-art there are alternative solutions, mainly using machine learning techniques, one of the important issues to be solved is still the correct characterization of network and ...
Acknowledgments: The authors thank the National Science and Technology Council of Mexico (CONACyT) and the Instituto Politécnico Nacional for the financial support for this research. ...
doi:10.3390/app12073234
fatcat:u65ziddminc2lf6ohgmzetnvne
D2.2 Multi-Source Analytics Methodological Foundations
2018
Zenodo
This deliverable is related to the first release of the methodology, algorithms and examples for predictive analytics and analytics over the case under investigation merging data from multiple sources. ...
Deep
Investment
Behavior
Profiling
by
Recurrent Neural Network
in P2P Lending[25]
2017
• Deep learning
• Recurrent Neural
Networks (RNNs)
with GRU and LSTM
Dataset of 7455
investors of ...
word2vec)
• Deep Convolution
Neural Networks
Movie reviews and
twitter messages
(SSTb and STS
corpora)
Sentiment analysis
with deep
convolutional neural
networks
• Performs analysis using ...
doi:10.5281/zenodo.1477456
fatcat:zgxdgejcdjgxlgji6roswh22iq
The Vessel Schedule Recovery Problem (VSRP) – A MIP model for handling disruptions in liner shipping
2013
European Journal of Operational Research
We formulate and analyze a strategic design model for public bicycle sharing systems with service level considerations. ...
In considering the interests of users and investors, the proposed model attempts to determine the number and locations of bike stations, the network structure of bike paths connected between the stations ...
Starting from it two single objective models are formulated: a maximum expected return model and a minimum financial risk (pollution penalties) model. ...
doi:10.1016/j.ejor.2012.08.016
fatcat:c27kagfnxnhjfbil2rydhjhomm
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
2018
Journal of Internet Services and Applications
There are various surveys on ML for specific areas in networking or for specific network technologies. ...
Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management. ...
Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper. ...
doi:10.1186/s13174-018-0087-2
fatcat:jvwpewceevev3n4keoswqlcacu
D2.4 Profiling Analytics and Privacy Methodological Foundations Release I
2018
Zenodo
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue ...
Deep
Investment
Behavior
Profiling
by
Recurrent Neural Network
in P2P Lending [66]
2017
• Deep learning
• Recurrent Neural
Networks (RNNs)
with GRU and LSTM
Dataset of 7455
investors ...
word2vec)
• Deep Convolution
Neural Networks
Movie reviews and
twitter messages
(SSTb and STS
corpora)
Sentiment analysis
with deep
convolutional neural
networks
• Performs analysis using ...
doi:10.5281/zenodo.2542731
fatcat:ecplhyb5hrapffb4amahnfr6ry
Investor sentiment-aware prediction model for P2P lending indicators based on LSTM
2022
In recent years, online lending has created many risks while providing lending convenience to Chinese individuals and small and medium-sized enterprises. ...
The timely assessment and prediction of the status of industry indicators is an important prerequisite for effectively preventing the spread of risks in China's new financial formats. ...
on its website, and has become a network gathering place for P2P investors. ...
doi:10.1371/journal.pone.0262539
pmid:35085306
pmcid:PMC8794130
fatcat:pncgyx3rt5eupggroitbeivbty
A Manifesto for Future Generation Cloud Computing
2018
ACM Computing Surveys
ACKNOWLEDGMENTS We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality ...
for improving the paper. ...
Moreover, location awareness can be taken into account for geo-distributed computing on edge nodes. The Fog model inherently lends itself to improving the QoS of streaming and real-time applications. ...
doi:10.1145/3241737
fatcat:bgb4qjtm5zgcbbtyy6x6anfeju
Academic Libraries: Sustaining Excellence Through Innovation & Technology
[article]
2024
Zenodo
We also extend our thanks to the readers who embark on this journey with us, and we hope that the insights and ideas presented in these pages will inform and inspire your work in academic librarianship ...
and fostering lifelong learning. ...
shape is linked to targets in the data and also provides a way for a Data Graph to specify the Shapes Graph that should be used for validation. ...
doi:10.5281/zenodo.11074905
fatcat:mzbdvomgu5gqpfctqwezbzdvmy
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade
[article]
2018
arXiv
pre-print
applications, and (4) different invocation/execution models for pervasive and ubiquitous applications. ...
The recent technological developments and paradigms such as serverless computing, software-defined networking, Internet of Things, and processing at network edge are creating new opportunities for Cloud ...
Acknowledgement We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality ...
arXiv:1711.09123v2
fatcat:xu3u75e6ind23ite3l6zfqi6hq
An Introduction to Sensor Data Analytics
[chapter]
2012
Managing and Mining Sensor Data
Such data lends itself to a variety of rich applications in which one can use the sensor data in order to model the underlying relationships and interactions. ...
A schema for linear segments is presented in [64], consisting of a table, referred to as FunctionTable, where each row represents a linear model with attributes start time, end time, slope and intercept ...
Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. ...
doi:10.1007/978-1-4614-6309-2_1
fatcat:pfbx566yfzgqpnjcuzonmxr23q
Convergence and Disruption in Digital Society – Money, Secure Communication, Digital Objects and Generative AI in Spatial Mixed Reality
[article]
2023
arXiv
pre-print
The digital society must navigate the fine balance between innovation and the potential risks associated with new technologies. ...
The drive for an inclusive, innovative, and secure digital society necessitates a commitment to open-source principles and ethical AI application. ...
This is where the Lightning Network comes into play, it's a p2p network of these payment channels. ...
arXiv:2207.09460v11
fatcat:lwlfkgn7c5fstkibrkjwoglc6q
Open Knowledge: Promises and Challenges
[chapter]
2012
The Digital Public Domain: Foundations for an Open Culture
fashion, via email or P2P networks. ...
With content registration services, converging networks and next-generation P2P environments in place, there will be a new market for micropayment. ...
CC recommends exposing a mechanism to extract the CC REL abstract model from the XML, so that CC tools need not know about every possible XML schema ahead of time. ...
doi:10.11647/obp.0019.07
fatcat:r3yre7bnmndbvbhggtzvdhdyaq
MultiVul-GCN : automatic smart contract vulnerability detection using multi-graph convolutional networks
2023
This research proposes a novel approach for detecting smart contract vulnerabilities using MultiVul-GCN, a tool based on Multi-graph Convolutional Networks (MCNs) designed to learn from multi-relational ...
By modeling edges with abstract semantics as contract graphs, we explore various methods to combine the representations obtained from annotated and learned edges. ...
Emeritus Victor Leung and Adjunct Professor Dr. Zehua Wang, for their diligent guidance and insightful advice throughout the research. ...
doi:10.14288/1.0431387
fatcat:jcoqtxpn2rcmzoulqhxrojer5u
« Previous
Showing results 1 — 15 out of 47 results