Search Results - "Sèdes, Florence"
-
1
Unsupervised collective-based framework for dynamic retraining of supervised real-time spam tweets detection model
Published in Expert systems with applications (30-11-2019)“…•Collective-based tweets analysis for retraining real-time spam tweet classifier.•Leveraging simple tweet meta-data for providing periodic annotated spam…”
Get full text
Journal Article -
2
Dynamic and scalable multi-level trust management model for Social Internet of Things
Published in The Journal of supercomputing (01-04-2022)“…The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate…”
Get full text
Journal Article -
3
Social collaborative service recommendation approach based on user’s trust and domain-specific expertise
Published in Future generation computer systems (01-03-2018)“…A few years ago, the Internet of (Web) Service vision came to offer services to all aspects of life and business. The increasing number of Web services make…”
Get full text
Journal Article -
4
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark
Published in Computer communications (01-09-2024)“…The Social Internet of Things (Social IoT) introduces a fresh approach to promote the usability of IoT networks and enhance service discovery by incorporating…”
Get full text
Journal Article -
5
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Published in International journal of information security (01-10-2024)“…Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects to…”
Get full text
Journal Article -
6
Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications
Published in Cluster computing (01-06-2024)“…Recent advances in smart connected vehicles and intelligent transportation systems are based on the collection and processing of massive amounts of sensor…”
Get full text
Journal Article -
7
An Hybridization of LSTM and Random Forest Model to Predict Road Situation
Published in 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (14-12-2023)“…Intelligent transport systems (ITS) play a pivotal role in enhancing safety, efficiency, and sustainability in modern transportation. Deep learning, a subfield…”
Get full text
Conference Proceeding -
8
Producing relevant interests from social networks by mining users' tagging behaviour: A first step towards adapting social information
Published in Data & knowledge engineering (01-03-2017)“…Social media provides an environment of information exchange. They principally rely on their users to create content, to annotate others’ content and to make…”
Get full text
Journal Article -
9
Profile reliability to improve recommendation in social-learning context
Published in Online information review (09-06-2020)“…Purpose Generally, the user requires customized information reflecting his/her current needs and interests that are stored in his/her profile. There are many…”
Get full text
Journal Article -
10
Detecting sociosemantic communities by applying social network analysis in tweets
Published in Social network analysis and mining (01-12-2015)“…Virtual social networks have led to a new way of communication that is different from the oral one, where the restriction of time and space generates new…”
Get full text
Journal Article -
11
A community-based algorithm for deriving users’ profiles from egocentrics networks: experiment on Facebook and DBLP
Published in Social network analysis and mining (01-09-2013)“…Nowadays, social networks are more and more widely used as a solution for enriching users’ profiles in systems such as recommender systems or personalized…”
Get full text
Journal Article -
12
Evaluating Seed Selection for Information Diffusion in Mobile Social Networks
Published in 2017 IEEE Wireless Communications and Networking Conference (WCNC) (01-03-2017)“…The integration of social networks with mobile communication has led to the rise of a new paradigm, the mobile social network (MSN). Recently, MSN has emerged…”
Get full text
Conference Proceeding -
13
A Semantic-Oriented Approach for Organizing and Developing Annotation for E-Learning
Published in IEEE transactions on learning technologies (01-07-2011)“…This paper presents a solution to extend the IEEE LOM standard with ontology-based semantic annotations for efficient use of learning objects outside Learning…”
Get full text
Journal Article -
14
Industrial Requirements Classification for Redundancy and Inconsistency Detection in SEMIOS
Published in 2018 IEEE 26th International Requirements Engineering Conference (RE) (01-08-2018)“…Requirements are usually "hand-written" and suffers from several problems like redundancy and inconsistency. The problems of redundancy and inconsistency…”
Get full text
Conference Proceeding -
15
Flexible querying of semistructured data: A fuzzy-set-based approach
Published in International journal of intelligent systems (01-07-2007)“…This article provides a general discussion about how flexible querying can be applied to semistructured data (SSD). We adapt flexible querying ideas, already…”
Get full text
Journal Article -
16
Descriptors generation from very high spatial resolution satellite images
Published in Cybergeo (2007)“…An approach of self-adapting morphological segmentation using new type of images associated to segmentation enables the exploitation of the extracted data, in…”
Get full text
Journal Article -
17
DiEvent: Towards an Automated Framework for Analyzing Dining Events
Published in 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW) (01-04-2018)“…The analysis of dining events is important and useful for a wide range of applications such as smart restaurants, and for different research areas like…”
Get full text
Conference Proceeding -
18
Clustering for Traceability Managing in System Specifications
Published in 2019 IEEE 27th International Requirements Engineering Conference (RE) (01-09-2019)“…System specifications are generally organized according to several documents hierarchies levels linked in order to represent the traceability information…”
Get full text
Conference Proceeding -
19
Visual-Based Eye Contact Detection in Multi-Person Interactions
Published in 2019 International Conference on Content-Based Multimedia Indexing (CBMI) (01-09-2019)“…Visual non-verbal behavior analysis (VNBA) methods mainly depend on extracting an important and essential social cue, called eye contact, for performing a wide…”
Get full text
Conference Proceeding -
20
Improving vehicle re‐identification using CNN latent spaces: Metrics comparison and track‐to‐track extension
Published in IET computer vision (01-03-2021)“…Herein, the problem of vehicle re‐identification using distance comparison of images in CNN latent spaces is addressed. First, the impact of the distance…”
Get full text
Journal Article