首页 > 最新文献

2022 International Conference on Service Science (ICSS)最新文献

英文 中文
Multifunctional Module Design Based on Hybrid CMOS-Memristor Logic Circuit 基于cmos -忆阻混合逻辑电路的多功能模块设计
Pub Date : 2022-05-01 DOI: 10.1109/icss55994.2022.00025
Chaoqun Ji, Tuo Li, Xiaofeng Zou
With the rapid development of computer technology, logical circuits play an important role in many fields. Semiconductor transistors, as the basic logic circuit unit of modern computer hardware structure, also encounter more and more technical limitations in the highly integrated field such as computer chips. In order to continue Moore's Law effectively, higher requirements need to be put forward for the basic logic unit. The emergence of memristor opens up a new way to explore advanced computing architecture. This paper presents a MRL- based logic circuit in which input and output logic is provided by high and low voltage. Logic gate circuit elements such as XOR, NAND, NOR are implemented in conjunction with CMOS inverters. Through the construction of basic ratio logic gate, the adder and multiplier is simplified, and the result of signal simulation using LTspice software is completely correct. Finally, a multifunctional logic module is innovatively designed.
随着计算机技术的飞速发展,逻辑电路在许多领域发挥着重要作用。半导体晶体管作为现代计算机硬件结构的基本逻辑电路单元,在计算机芯片等高集成度领域也面临越来越多的技术限制。为了有效地延续摩尔定律,对基本逻辑单元提出了更高的要求。忆阻器的出现为探索先进的计算体系结构开辟了一条新的途径。本文提出了一种基于MRL的高、低压输入输出逻辑电路。逻辑门电路元件,如异或,NAND, NOR与CMOS逆变器一起实现。通过基本比率逻辑门的构建,对加法器和乘法器进行了简化,使用LTspice软件进行信号仿真的结果完全正确。最后,创新性地设计了一个多功能逻辑模块。
{"title":"Multifunctional Module Design Based on Hybrid CMOS-Memristor Logic Circuit","authors":"Chaoqun Ji, Tuo Li, Xiaofeng Zou","doi":"10.1109/icss55994.2022.00025","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00025","url":null,"abstract":"With the rapid development of computer technology, logical circuits play an important role in many fields. Semiconductor transistors, as the basic logic circuit unit of modern computer hardware structure, also encounter more and more technical limitations in the highly integrated field such as computer chips. In order to continue Moore's Law effectively, higher requirements need to be put forward for the basic logic unit. The emergence of memristor opens up a new way to explore advanced computing architecture. This paper presents a MRL- based logic circuit in which input and output logic is provided by high and low voltage. Logic gate circuit elements such as XOR, NAND, NOR are implemented in conjunction with CMOS inverters. Through the construction of basic ratio logic gate, the adder and multiplier is simplified, and the result of signal simulation using LTspice software is completely correct. Finally, a multifunctional logic module is innovatively designed.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Worker Selection Scheme for Vehicle Crowdsourcing Blockchain 车辆众包区块链的工人选择方案
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00017
Xin Ma, Shulin Sun, Zehua Liu, Lijun Sun
With the improvement of the computing power and storage capacity of vehicular equipment, as well as the growing privacy concerns over sharing sensitive raw data, federated learning can be a promising solution for realizing distributed vehicular crowdsourcing services. The global learning model can be used as crowdsourcing tasks and assigned to vehicles that utilize their local training models. In such a distributed scenario, it is essential to ensure the completion of high-quality training tasks and the security of sensitive data. We propose a vehicular crowdsourcing blockchain to achieve secure reputation management of vehicles in a distributed manner, providing a safe and trusted solution for vehicle crowdsourcing services. We design a worker selection scheme, which combines the reputation of workers with the amount of data as an indicator of worker reliability. We further propose an effective incentive machine to enable more workers with high reputations to participate in crowdsourcing tasks and to contribute higher quality local data. Simulation results show that the worker selection scheme improves the matching rate by 10% and significantly improves the total utility. The proposed scheme is deployed on the IBM Hyperledger Fabric platform to observe its real-world running time and overall performance.
随着车载设备计算能力和存储容量的提高,以及对敏感原始数据共享的隐私担忧日益增加,联邦学习可以成为实现分布式车辆众包服务的一个很有前景的解决方案。全局学习模型可以用作众包任务,并分配给使用其本地训练模型的车辆。在这种分布式场景下,确保高质量训练任务的完成和敏感数据的安全至关重要。我们提出车辆众包区块链,以分布式方式实现车辆的安全信誉管理,为车辆众包服务提供安全可信的解决方案。我们设计了一个工人选择方案,该方案将工人的声誉与数据量结合起来,作为工人可靠性的指标。我们进一步提出了一个有效的激励机制,使更多具有高声誉的工作者参与众包任务,并贡献更高质量的本地数据。仿真结果表明,该工人选择方案将匹配率提高了10%,显著提高了总效用。该方案部署在IBM Hyperledger Fabric平台上,观察其实际运行时间和整体性能。
{"title":"A Worker Selection Scheme for Vehicle Crowdsourcing Blockchain","authors":"Xin Ma, Shulin Sun, Zehua Liu, Lijun Sun","doi":"10.1109/ICSS55994.2022.00017","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00017","url":null,"abstract":"With the improvement of the computing power and storage capacity of vehicular equipment, as well as the growing privacy concerns over sharing sensitive raw data, federated learning can be a promising solution for realizing distributed vehicular crowdsourcing services. The global learning model can be used as crowdsourcing tasks and assigned to vehicles that utilize their local training models. In such a distributed scenario, it is essential to ensure the completion of high-quality training tasks and the security of sensitive data. We propose a vehicular crowdsourcing blockchain to achieve secure reputation management of vehicles in a distributed manner, providing a safe and trusted solution for vehicle crowdsourcing services. We design a worker selection scheme, which combines the reputation of workers with the amount of data as an indicator of worker reliability. We further propose an effective incentive machine to enable more workers with high reputations to participate in crowdsourcing tasks and to contribute higher quality local data. Simulation results show that the worker selection scheme improves the matching rate by 10% and significantly improves the total utility. The proposed scheme is deployed on the IBM Hyperledger Fabric platform to observe its real-world running time and overall performance.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129085389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Computing Force Network (MCFN): Computing and Network Convergence Supporting Integrated Communication Service 移动计算部队网络(MCFN):支持综合通信业务的计算和网络融合
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00028
Xiaonan Shi, Qin Li, Dan Wang, Lu Lu
Facing the integrated enhancement of network and computing requirements from emerging high-computing-demand service such as XR and metaverse, Mobile Computing Force Network (MCFN) is proposed to satisfy this kind of service. MCFN is the network which achieves computing and mobile network convergence based on the perception, control, and management over computing resources. MCFN could have the global knowledge of network topology and service endpoint, which could provide the best network and service path to satisfy end-to-end requirements. The main objectives of this paper are introducing use cases, requirements of MCFN, and potential influence on 5G-Advanced and 6G network architecture as well as the key technologies to realize MCFN.
面对XR、元宇宙等新兴的高计算需求业务对网络和计算需求的综合增强,提出了移动计算力网络(MCFN)来满足这种业务需求。MCFN是基于对计算资源的感知、控制和管理,实现计算网络与移动网络融合的网络。MCFN具有网络拓扑和服务端点的全局知识,能够提供满足端到端需求的最佳网络和服务路径。本文的主要目的是介绍MCFN的用例、需求、对5G-Advanced和6G网络架构的潜在影响以及实现MCFN的关键技术。
{"title":"Mobile Computing Force Network (MCFN): Computing and Network Convergence Supporting Integrated Communication Service","authors":"Xiaonan Shi, Qin Li, Dan Wang, Lu Lu","doi":"10.1109/ICSS55994.2022.00028","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00028","url":null,"abstract":"Facing the integrated enhancement of network and computing requirements from emerging high-computing-demand service such as XR and metaverse, Mobile Computing Force Network (MCFN) is proposed to satisfy this kind of service. MCFN is the network which achieves computing and mobile network convergence based on the perception, control, and management over computing resources. MCFN could have the global knowledge of network topology and service endpoint, which could provide the best network and service path to satisfy end-to-end requirements. The main objectives of this paper are introducing use cases, requirements of MCFN, and potential influence on 5G-Advanced and 6G network architecture as well as the key technologies to realize MCFN.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134003533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Non-standardized Chinese Express Delivery Address Identification Model Based on Enhanced Representation 基于增强表示的非标准化中文快递地址识别模型
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00011
Zi Ye, Xuefeng Piao, F. Meng, Bo Cao, Dianhui Chu
Intelligent recognition of express delivery address information is an important means to improve the efficiency of express list filling. At present, the confusion in user input and the inconsistent expression brings challenges to intelligent address information recognition. In addition, the recognition accuracy of the existing solutions has low identification and limited by the data format. To address the problems, this paper proposes a non-standardized Chinese express delivery address identification model based on enhanced representation, which has been improved from two aspects: entity extraction and memory network. The improved entity extraction model based on word embedding can mine the context information in the text in both positive and negative directions and consider the correlation between characters, thus outputting a more accurate prediction sequence. In order to solve the problem of information overload in existing models, a convolutional block memory network based on BERT was designed. The results of the experimental comparative analysis showed that the improved method effectively improved the identification accuracy of non-standardized Chinese express delivery address information, thus proving the effectiveness and availability of the method.
快递地址信息的智能识别是提高快递单填写效率的重要手段。目前,用户输入的混乱和表达的不一致给智能地址信息识别带来了挑战。此外,现有解决方案的识别精度辨识度较低,且受数据格式的限制。针对这些问题,本文提出了一种基于增强表示的非标准化中文快递地址识别模型,并从实体提取和记忆网络两方面进行了改进。改进的基于词嵌入的实体提取模型可以从正反两个方向挖掘文本中的上下文信息,并考虑字符之间的相关性,从而输出更准确的预测序列。为了解决现有模型中信息过载的问题,设计了一种基于BERT的卷积块记忆网络。实验对比分析结果表明,改进后的方法有效提高了非标准化中文快递地址信息的识别准确率,从而证明了该方法的有效性和可用性。
{"title":"A Non-standardized Chinese Express Delivery Address Identification Model Based on Enhanced Representation","authors":"Zi Ye, Xuefeng Piao, F. Meng, Bo Cao, Dianhui Chu","doi":"10.1109/ICSS55994.2022.00011","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00011","url":null,"abstract":"Intelligent recognition of express delivery address information is an important means to improve the efficiency of express list filling. At present, the confusion in user input and the inconsistent expression brings challenges to intelligent address information recognition. In addition, the recognition accuracy of the existing solutions has low identification and limited by the data format. To address the problems, this paper proposes a non-standardized Chinese express delivery address identification model based on enhanced representation, which has been improved from two aspects: entity extraction and memory network. The improved entity extraction model based on word embedding can mine the context information in the text in both positive and negative directions and consider the correlation between characters, thus outputting a more accurate prediction sequence. In order to solve the problem of information overload in existing models, a convolutional block memory network based on BERT was designed. The results of the experimental comparative analysis showed that the improved method effectively improved the identification accuracy of non-standardized Chinese express delivery address information, thus proving the effectiveness and availability of the method.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game difficulty prediction algorithm based on improved Monte Carlo tree 基于改进蒙特卡罗树的游戏难度预测算法
Pub Date : 2022-05-01 DOI: 10.1109/icss55994.2022.00045
Boqin Hu, Chen Fu
In the unreleased stage of the game, how to correctly set the game difficulty is an important task to user’s feeling. Whether the difficulty of the game can be accurately measured will directly affect whether the difficulty setting is reasonable. As a commonly used stochastic simulation algorithm, Monte Carlo tree Search(MCTS) has been widely used in the field of game simulation. However, the traditional MCTS does not consider the specific situation of the game during the simulation, resulting in a low simulation success rate.In this paper, an improved MCTS is proposed to address above problems, and the UCB formula used for node selection is improved. The distance factor is included in the consideration of the process of Monte Carlo tree select node in the maze game. After compared the simulation success rate with the unimproved UCB, and tested the influence of the number of obstacles and the distance of path-finding on the performance of the algorithm, it is proved that in the case of less and shorter path-finding distance, the simulation success rate is greatly improved compared to the previous algorithm.
在游戏未发行阶段,如何正确设置游戏难度对用户的感受是一项重要的任务。游戏的难度能否准确测量,将直接影响到难度设置是否合理。蒙特卡罗树搜索作为一种常用的随机仿真算法,在博弈仿真领域得到了广泛的应用。然而,传统的MCTS在模拟时没有考虑到游戏的具体情况,导致模拟成功率较低。针对上述问题,本文提出了一种改进的MCTS,并改进了用于节点选择的UCB公式。将距离因素纳入到迷宫游戏中蒙特卡罗树选择节点的考虑中。将仿真成功率与未改进的UCB进行了比较,并测试了障碍物数量和寻路距离对算法性能的影响,证明在寻路距离更少、更短的情况下,仿真成功率比之前的算法有很大提高。
{"title":"Game difficulty prediction algorithm based on improved Monte Carlo tree","authors":"Boqin Hu, Chen Fu","doi":"10.1109/icss55994.2022.00045","DOIUrl":"https://doi.org/10.1109/icss55994.2022.00045","url":null,"abstract":"In the unreleased stage of the game, how to correctly set the game difficulty is an important task to user’s feeling. Whether the difficulty of the game can be accurately measured will directly affect whether the difficulty setting is reasonable. As a commonly used stochastic simulation algorithm, Monte Carlo tree Search(MCTS) has been widely used in the field of game simulation. However, the traditional MCTS does not consider the specific situation of the game during the simulation, resulting in a low simulation success rate.In this paper, an improved MCTS is proposed to address above problems, and the UCB formula used for node selection is improved. The distance factor is included in the consideration of the process of Monte Carlo tree select node in the maze game. After compared the simulation success rate with the unimproved UCB, and tested the influence of the number of obstacles and the distance of path-finding on the performance of the algorithm, it is proved that in the case of less and shorter path-finding distance, the simulation success rate is greatly improved compared to the previous algorithm.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114429207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DTP and SoLiD based Service for Multi-Source Semantically-Heterogeneous Personal Data Management 基于DTP和SoLiD的多源语义异构个人数据管理服务
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00047
Zhenxiang Zhao, Chao Ma, Haochen Yuan, Zhongjie Wang
Privacy preservation is drawing growing concern. Due to personal data of massive users is centralizedly owned/managed by service providers at present, it is very easy to lead to privacy disclosure and personal data abuse, therefore many countries and regions put forward privacy protection laws and regulations and researchers also propose some de-centralized personal data management systems. Nevertheless, the implementation of decentralized data management model means a radical change in current service development and service model. For service providers, it is too difficult and costly to realize these personal data management systems, and there are also no additional economic benefits. These personal data management systems are too ideal to popularize from a business model perspective, so the development of decentralized models proceeds slowly. In response to this situation, we propose a new personal data management service which realizes the transition stage between reality and ideal where users’ data can exist both in users’ personal data cloud and service providers. To address the challenges of data collection and data semantic uniformity caused by personal data cloud at this transition stage, we propose a personal data management architecture based on SoLiD (Social Linked Data) and DTP (Data Transfer Project). The proposed architecture could transfer users’ data from service providers to personal data cloud and fuse heterogeneous data through data fusion technology so as to provide users with the ability to manage their own data and a unified view of data. The feasibility and efficiency of the proposed service are practically proved through conducting a case study.
隐私保护正引起越来越多的关注。由于目前大量用户的个人数据由服务提供商集中拥有/管理,很容易导致隐私泄露和个人数据滥用,因此许多国家和地区提出了隐私保护法律法规,研究人员也提出了一些分散的个人数据管理系统。然而,分散式数据管理模型的实现意味着当前服务开发和服务模型的彻底改变。对于服务提供商来说,实现这些个人数据管理系统难度太大,成本太高,也没有额外的经济效益。从商业模式的角度来看,这些个人数据管理系统过于理想而无法普及,因此分散模式的发展缓慢。针对这种情况,我们提出了一种新的个人数据管理服务,实现了用户数据既存在于用户个人数据云中,也存在于服务提供商中,从现实到理想的过渡阶段。为了解决个人数据云在这个过渡阶段带来的数据收集和数据语义统一性的挑战,我们提出了一种基于SoLiD (Social Linked data)和DTP (data Transfer Project)的个人数据管理架构。提出的架构可以将用户数据从服务提供商转移到个人数据云,并通过数据融合技术融合异构数据,为用户提供管理自己数据的能力和统一的数据视图。通过案例分析,实际证明了该服务的可行性和有效性。
{"title":"A DTP and SoLiD based Service for Multi-Source Semantically-Heterogeneous Personal Data Management","authors":"Zhenxiang Zhao, Chao Ma, Haochen Yuan, Zhongjie Wang","doi":"10.1109/ICSS55994.2022.00047","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00047","url":null,"abstract":"Privacy preservation is drawing growing concern. Due to personal data of massive users is centralizedly owned/managed by service providers at present, it is very easy to lead to privacy disclosure and personal data abuse, therefore many countries and regions put forward privacy protection laws and regulations and researchers also propose some de-centralized personal data management systems. Nevertheless, the implementation of decentralized data management model means a radical change in current service development and service model. For service providers, it is too difficult and costly to realize these personal data management systems, and there are also no additional economic benefits. These personal data management systems are too ideal to popularize from a business model perspective, so the development of decentralized models proceeds slowly. In response to this situation, we propose a new personal data management service which realizes the transition stage between reality and ideal where users’ data can exist both in users’ personal data cloud and service providers. To address the challenges of data collection and data semantic uniformity caused by personal data cloud at this transition stage, we propose a personal data management architecture based on SoLiD (Social Linked Data) and DTP (Data Transfer Project). The proposed architecture could transfer users’ data from service providers to personal data cloud and fuse heterogeneous data through data fusion technology so as to provide users with the ability to manage their own data and a unified view of data. The feasibility and efficiency of the proposed service are practically proved through conducting a case study.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121487010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Auction for Federated Learning with Non-IID Data 基于非iid数据的联邦学习差分私有拍卖
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00054
Kean Ren
With the increase in clients’ concerns about their privacy, federated learning, as a new model of machine learning process, was proposed to help people complete learning tasks on the basis of privacy protection. But the large-scale application of federated learning depends on the extensive participation of individual clients. This motivates the incentive mechanism design to increase clients’ willingness to participate. However, the incentive mechanism should take into account non-IID issues and privacy protection of clients’ sensitive information of data distribution. These two aspects are not well studied jointly in the existing incentive mechanism design. In this paper, we propose a differentially private auction for federated learning with non-IID data. It can not only protect clients’ private information of data distribution with differential privacy but also incentivize clients with suitable data distribution to deal with non-IID issues. Finally, we prove that the designed mechanism meets the design objective through detailed theoretical analysis.
随着客户对其隐私的关注日益增加,联邦学习作为一种新的机器学习过程模型被提出,以帮助人们在隐私保护的基础上完成学习任务。但是联邦学习的大规模应用依赖于个体客户的广泛参与。这就激发了激励机制的设计,以增加客户的参与意愿。但是,激励机制应考虑数据分发中客户敏感信息的非iid问题和隐私保护。在现有的激励机制设计中,这两个方面没有得到很好的综合研究。在本文中,我们提出了一种用于非iid数据的联邦学习的差分私有拍卖。它既能以差分隐私保护数据分布的客户私有信息,又能激励数据分布合适的客户处理非iid问题。最后,通过详细的理论分析,证明所设计的机构符合设计目标。
{"title":"Differentially Private Auction for Federated Learning with Non-IID Data","authors":"Kean Ren","doi":"10.1109/ICSS55994.2022.00054","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00054","url":null,"abstract":"With the increase in clients’ concerns about their privacy, federated learning, as a new model of machine learning process, was proposed to help people complete learning tasks on the basis of privacy protection. But the large-scale application of federated learning depends on the extensive participation of individual clients. This motivates the incentive mechanism design to increase clients’ willingness to participate. However, the incentive mechanism should take into account non-IID issues and privacy protection of clients’ sensitive information of data distribution. These two aspects are not well studied jointly in the existing incentive mechanism design. In this paper, we propose a differentially private auction for federated learning with non-IID data. It can not only protect clients’ private information of data distribution with differential privacy but also incentivize clients with suitable data distribution to deal with non-IID issues. Finally, we prove that the designed mechanism meets the design objective through detailed theoretical analysis.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task-role Performance Evaluation via Business Process Monitoring with BPMN Extension 基于BPMN扩展的业务流程监控的任务角色绩效评估
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00035
Hangyu Cheng, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Bowen Liang
Business process monitoring aims at identifying how well running processes are performing with respect to performance measures and objectives. The existing business process monitoring techniques focus on collecting and analyzing information on the way business processes themselves are executed. They neglect the evaluation of task-roles which play a key role in the performance of the whole business process execution. Different from the traditional perspective, this paper focuses on monitoring the behavior of task-roles and evaluating their performance with respect to timeliness. Specifically, this paper proposes to promote the performance of task-roles by time reminder via business process monitoring, which is implemented by semantic extension of BPMN elements. Further, we extend the information of process execution event log data, with which the performance of task-roles can be evaluated by analyzing the extended event log data. An empirical study of the proposed approach with real-world business processes reveals the effectiveness with respect to performance evaluation of task-roles.
业务流程监视的目的是确定运行过程在性能度量和目标方面的执行情况。现有的业务流程监视技术侧重于收集和分析有关业务流程本身执行方式的信息。它们忽视了对任务角色的评估,而任务角色在整个业务流程执行的绩效中起着关键作用。与传统观点不同,本文侧重于监控任务角色的行为,并从时效性的角度评估其绩效。具体来说,本文提出了通过业务流程监控的时间提醒来提高任务角色的性能,并通过BPMN元素的语义扩展来实现。进一步,我们扩展了流程执行事件日志数据的信息,可以通过分析扩展的事件日志数据来评估任务角色的性能。对现实世界业务流程的实证研究揭示了任务角色绩效评估的有效性。
{"title":"Task-role Performance Evaluation via Business Process Monitoring with BPMN Extension","authors":"Hangyu Cheng, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Bowen Liang","doi":"10.1109/ICSS55994.2022.00035","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00035","url":null,"abstract":"Business process monitoring aims at identifying how well running processes are performing with respect to performance measures and objectives. The existing business process monitoring techniques focus on collecting and analyzing information on the way business processes themselves are executed. They neglect the evaluation of task-roles which play a key role in the performance of the whole business process execution. Different from the traditional perspective, this paper focuses on monitoring the behavior of task-roles and evaluating their performance with respect to timeliness. Specifically, this paper proposes to promote the performance of task-roles by time reminder via business process monitoring, which is implemented by semantic extension of BPMN elements. Further, we extend the information of process execution event log data, with which the performance of task-roles can be evaluated by analyzing the extended event log data. An empirical study of the proposed approach with real-world business processes reveals the effectiveness with respect to performance evaluation of task-roles.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Service Scheduling in Computing Force Network 计算力网络中服务调度的优化
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00031
Yongqiang Dong, Chenchen Guan, Yunli Chen, Kun Gao, Lu Lu, Yuexia Fu
To improve the users satisfaction requesting services in Computing Force Network(CFN), the issues and challenges of existing service scheduling mechanisms are examined firstly in this paper. Then in view of users' specific preference and expectation for services, a service optimization scheduling algorithm based on Bkd-tree is proposed, taking service response time, service scheduling cost, availability, and successability into consideration. The method covers a search algorithm and a reconstructing strategy. To improve the efficiency of selecting the service instances that satisfy user expectation, a pruning strategy is used to narrow search space. To support dynamic updates of the service instances, a reconstructing strategy is proposed. The experimental results show that the improved service scheduling algorithm can schedule service instances with the best overall performance while maintaining higher efficiency.
为了提高计算力网络(CFN)中用户服务请求的满意度,本文首先分析了现有服务调度机制存在的问题和面临的挑战。然后,针对用户对服务的特定偏好和期望,提出了一种基于Bkd-tree的服务优化调度算法,考虑了服务响应时间、服务调度成本、可用性和可成功性。该方法包括搜索算法和重构策略。为了提高选择满足用户期望的服务实例的效率,采用剪枝策略来缩小搜索空间。为了支持服务实例的动态更新,提出了一种重构策略。实验结果表明,改进的服务调度算法能够在保持较高效率的同时,以最佳的综合性能调度服务实例。
{"title":"Optimization of Service Scheduling in Computing Force Network","authors":"Yongqiang Dong, Chenchen Guan, Yunli Chen, Kun Gao, Lu Lu, Yuexia Fu","doi":"10.1109/ICSS55994.2022.00031","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00031","url":null,"abstract":"To improve the users satisfaction requesting services in Computing Force Network(CFN), the issues and challenges of existing service scheduling mechanisms are examined firstly in this paper. Then in view of users' specific preference and expectation for services, a service optimization scheduling algorithm based on Bkd-tree is proposed, taking service response time, service scheduling cost, availability, and successability into consideration. The method covers a search algorithm and a reconstructing strategy. To improve the efficiency of selecting the service instances that satisfy user expectation, a pruning strategy is used to narrow search space. To support dynamic updates of the service instances, a reconstructing strategy is proposed. The experimental results show that the improved service scheduling algorithm can schedule service instances with the best overall performance while maintaining higher efficiency.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"42 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116310734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Evaluation of Smart Contracts based on Code and Transaction - A Survey 基于代码和交易的智能合约安全评估——综述
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00016
J. Su, Jiyi Liu, Yuhong Nan, Yin Li
As a computer program running on top of blockchain, smart contract not only proliferates the diversity of applications but also brings a myriad of security issues that lead to huge financial losses. As a result, security evaluation of smart contracts, such as vulnerability identification and attack detection, has received extensive attention in recent years. Given that various types of approaches have been proposed for smart contract security analysis, a systematization of knowledge for this domain is needed. To this end, in this paper, we systematically review the related literature in recent years and describe the mainstream approaches to the security evaluation of smart contracts. Specifically, we classify state-of-the-art analysis techniques for smart contract analysis into two categories, namely, code-based approaches and transaction-based approaches. Further, we elaborate on the key techniques adopted by these works respectively. We highlight and summarize the key challenges in future research for smart contract security analysis. Our research provides a more in-depth understanding of the state-of-the-art works for securing smart contracts, which may shed light on future research in this area.
智能合约作为运行在区块链之上的计算机程序,不仅增加了应用程序的多样性,也带来了无数的安全问题,导致巨大的经济损失。因此,智能合约的安全评估,如漏洞识别和攻击检测,近年来受到了广泛关注。鉴于已经提出了各种类型的智能合约安全分析方法,需要对该领域的知识进行系统化。为此,在本文中,我们系统地回顾了近年来的相关文献,并描述了智能合约安全评估的主流方法。具体来说,我们将智能合约分析的最先进分析技术分为两类,即基于代码的方法和基于交易的方法。并分别阐述了这些作品所采用的关键技术。我们强调并总结了未来智能合约安全分析研究中的关键挑战。我们的研究为确保智能合约的最新工作提供了更深入的了解,这可能会为该领域的未来研究提供启示。
{"title":"Security Evaluation of Smart Contracts based on Code and Transaction - A Survey","authors":"J. Su, Jiyi Liu, Yuhong Nan, Yin Li","doi":"10.1109/ICSS55994.2022.00016","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00016","url":null,"abstract":"As a computer program running on top of blockchain, smart contract not only proliferates the diversity of applications but also brings a myriad of security issues that lead to huge financial losses. As a result, security evaluation of smart contracts, such as vulnerability identification and attack detection, has received extensive attention in recent years. Given that various types of approaches have been proposed for smart contract security analysis, a systematization of knowledge for this domain is needed. To this end, in this paper, we systematically review the related literature in recent years and describe the mainstream approaches to the security evaluation of smart contracts. Specifically, we classify state-of-the-art analysis techniques for smart contract analysis into two categories, namely, code-based approaches and transaction-based approaches. Further, we elaborate on the key techniques adopted by these works respectively. We highlight and summarize the key challenges in future research for smart contract security analysis. Our research provides a more in-depth understanding of the state-of-the-art works for securing smart contracts, which may shed light on future research in this area.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132113821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Service Science (ICSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1