5th International Smart City Workshop @ The Webconf

Data4UrbanMobility wurde auf dem 5th International Smartcity Workshop, auf “The Web Conference” mit dem Paper “Data4UrbanMobility: Towards Holistic Data Analytics for Mobility Applications in Urban Regions” präsentiert. Fokus des Workshops war es, den Alltag in Städten durch digitale Technologien zu erleichtern. Vielen Dank für die interessanten Diskussion!

  • The Kourovka Notebook, mbox sixteenth ed., Russian Academy of Sciences. Mazurov, 1V. D.; Khukhro(eds.), E. I. (2006).
  • Automatic Classification of Museum Artifacts based on Unsupervised Models. Wang, Hao Y. Li, H. Nishi, P. Pang (eds.) (2024). 116–119.
  • Big Data 4.0 = Meta4 (Big Data) = The Era of Big Intelligence. Sun, Zhaohao Y. Li, H. Nishi, P. Pang (eds.) (2024). 14–22.
  • Architecture in the Peruvian Real Estate Sector Based on Blockchain to Prevent Fraud. Quiroz, Andres Raul Dolorier; Murillo, Christian Manuel Valera; Vargas, Pedro Segundo Castañeda Y. Li, H. Nishi, P. Pang (eds.) (2024). 7–13.
  • Infrared weak small ship detection based on improved local contrast algorithm. Zhu, Qinghua; Yuan, Weidong; Chen, Yucong; He, Runping; Wang, Zhefei Y. Li, H. Nishi, P. Pang (eds.) (2024). 98–102.
  • Construction of Virtual Simulation Teaching Platform for Risk Experimental Projects in VR Environment. Fu, Gaocai; Jiang, Yu; Xiao, Jun; Huang, Peide; Luo, Xu; Ni, Minhui; Liu, Xianjv Y. Li, H. Nishi, P. Pang (eds.) (2024). 92–97.
  • Unmanned Aerial Vehicle (UAV) Predictive Control Energy Management Model. Hendrarini, Nina; Sani, Muhammad Ikhsan Y. Li, H. Nishi, P. Pang (eds.) (2024). 147–152.
  • How to Find New Onion Hidden Service based on Blind Secret Key?. Ding, Jianwei; Li, Xinze; Li, Hang; Chen, Zhouguo Y. Li, H. Nishi, P. Pang (eds.) (2024). 1–6.
  • Using Data Mining to Uncover Association of Philippines’ Demographic Data to Tuberculosis. Hernando, Kimberly B.; Samonte, Mary Jane C. Y. Li, H. Nishi, P. Pang (eds.) (2024). 49–57.
  • Study on Course Group based on Clustering Algorithm and Association Rules. Ao, Xiqin; Wu, Weiwei; Meng, Cuicui; He, Aixiang Y. Li, H. Nishi, P. Pang (eds.) (2024). 71–76.
  • A measured inclusion of an RTI tool for the South Pacific. Sharma, Bibhya; Reddy, Pritika; Singh, Vineet Y. Li, H. Nishi, P. Pang (eds.) (2024). 159–164.
  • β-Blockers After Heart Attacks Might Not Lower Deaths for Some. Harris, Emily (2024).
  • Network-Transparent Service Container and Migration with Information Distribution Management in Edge Environments. Namba, Yohei; Shimahara, Shogo; Nishi, Hiroaki Y. Li, H. Nishi, P. Pang (eds.) (2024). 23–28.
  • Design of Portable Non-contact Physiological Data Acquisition System. Tian, Zandong; Chen, Qian; Peng, Jiahe; Zang, Dongyuan; Feng, Mianshi; Su, Weihua Y. Li, H. Nishi, P. Pang (eds.) (2024). 35–41.
  • College student employment quality assessment model based on BiLSTM-CNN. Wang, Chunjing; Xiao, Jun; Hong, Yue; Luo, Xu Y. Li, H. Nishi, P. Pang (eds.) (2024). 133–138.
  • Between Theory and Value Transactions: A Multifaceted Exploration of Relevance and Resilience of Decentralised Autonomous Organisations. Pinio, Pawel; Batko, Roman; Lewicka, Dagmara Y. Li, H. Nishi, P. Pang (eds.) (2024). 42–48.
  • Parenting Support System Based on Improved VGG19 Network. Zhang, Yan; Li, Jiacheng; Noto, Masato Y. Li, H. Nishi, P. Pang (eds.) (2024). 84–91.
  • Ensemble Model of Lanczos and Bicubic Interpolation with Neural Network and Resampling for Image Enhancement. Bituin, Ronie C.; Antonio, Ronielle B. Y. Li, H. Nishi, P. Pang (eds.) (2024). 110–115.
  • What Really Matters? Turnover Intention Factors of Software Developers. Lewicka, Dagmara; Zajac, Pawel; Batko, Roman Y. Li, H. Nishi, P. Pang (eds.) (2024). 139–146.
  • Data, analytics, and Intelligence: A Unified Approach. Sun, Zhaohao Y. Li, H. Nishi, P. Pang (eds.) (2024). 62–70.
  • Research on public housing allocation based on public housing information management system-Take Wuhan University of Technology. Xie, Yi; Wu, Yuting; Luo, Xu Y. Li, H. Nishi, P. Pang (eds.) (2024). 153–158.
  • How Natural Language Processing Enables AIGC Recognition? -Latest Trends and Future Prospects. Wang, Weizheng; Qiao, Hong Y. Li, H. Nishi, P. Pang (eds.) (2024). 103–109.
  • The Impact of Large Language Models on Social Media Communication. Qi, Jinhu Y. Li, H. Nishi, P. Pang (eds.) (2024). 165–170.
  • Deep Learning Method for Leakage Location Detection of Pneumatic Systems Based on Infrared Thermal Image Evaluation. Chang, Jiaqi; Shi, Yan; Yang, Liman; Niu, Yanxia; Nie, Yulong; Yang, Zhiguo; Li, Lei; Zhang, Wenchao Y. Li, H. Nishi, P. Pang (eds.) (2024). 77–83.
  • Easy Home Decorating: Simple Tips for Stylish Spaces. haran, shreya (H. decor items encompass a wide array of accessories; furnishings that elevate the ambiance; style of any living space. F. elegant vases; decorative throw pillows to statement- making wall art; these items add personality cozy rugs; the right home decor pieces can transform a house into a home. W. endless options available charm to every room. Whether you’re aiming for a modern minimalist aesthetic or a cozy farmhouse vibe; create a space that reflects your personality; lifestyle.; https://www.decorcorner.in/, eds.) (2024).
  • sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Cui, Hongrui; Liu, Hanlin; Yan, Di; Yang, Kang; Yu, Yu; Zhang, Kaiyi in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 229–258.
  • Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Wang, Hongxiao; Yiu, Siu-Ming; Zhao, Yanmin; Jiang, Zoe Lin in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 3–35.
  • Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. Campanelli, Matteo; Faonio, Antonio; Fiore, Dario; Li, Tianyu; Lipmaa, Helger in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 337–369.
  • Network-Agnostic Multi-party Computation Revisited (Extended Abstract). Bhimrajka, Nidhish; Choudhury, Ashish; Varadarajan, Supreeth in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 171–204.
  • On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes. Bartoli, Claudia; Cascudo, Ignacio in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 426–457.
  • Oblivious Accumulators. Baldimtsi, Foteini; Karantaidou, Ioanna; Raghuraman, Srinivasan in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 99–131.
  • Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting. Dutta, Moumita; Ganesh, Chaya; Jawalkar, Neha in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 305–336.
  • Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem. Baldi, Marco; Bitzer, Sebastian; Pavoni, Alessio; Santini, Paolo; Wachter-Zeh, Antonia; Weger, Violetta in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 243–274.
  • Witness Encryption for Succinct Functional Commitments and Applications. Campanelli, Matteo; Fiore, Dario; Khoshakhlagh, Hamidreza in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 132–167.
  • Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Ling, San; Nguyen, Khoa; Phan, Duong Hieu; Tang, Khai Hanh; Wang, Huaxiong; Xu, Yanhong in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 37–73.
  • Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Kosuge, Haruhisa; Xagawa, Keita in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 259–288.
  • Predicting ESG Ratings by Machine Learning and Analyzing Influencing Factors by XAI. Choi, Jeong-Cheol; Chen, Qiuying; Lee, Sang-Joon Y. Li, H. Nishi, P. Pang (eds.) (2024). 120–125.
  • On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Gay, Romain; Ursu, Bogdan in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 74–104.
  • Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Lin, Xiuhan; Suzuki, Moeto; Zhang, Shiduo; Espitau, Thomas; Yu, Yang; Tibouchi, Mehdi; Abe, Masayuki in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 387–412.
  • Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Katsumata, Shuichi; Lai, Yi-Fu; Reichle, Michael in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 319–351.
  • Formalizing Hash-then-Sign Signatures. Poettering, Bertram; Rastikian, Simon in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 289–315.
  • Updatable Policy-Compliant Signatures. Badertscher, Christian; Maitra, Monosij; Matt, Christian; Waldner, Hendrik in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 105–132.
  • Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Mitrokotsa, Aikaterini; Mukherjee, Sayantan; Sedaghat, Mahdi; Slamanig, Daniel; Tomy, Jenit in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 163–195.
  • On the Possibility of a Backdoor in the Micali-Schnorr Generator. Davis, Hannah; Green, Matthew D.; Heninger, Nadia; Ryan, Keegan; Suhl, Adam in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 352–386.
  • A Low-Ops IaaS Cloud Framework based on Cloud-native Architecture. Zhao, Haotian; Sun, Yuchen Y. Li, H. Nishi, P. Pang (eds.) (2024). 29–34.
  • Lightweight Cloud Native Application Management Platform. Chen, Yanpiao; Peng, Shan Y. Li, H. Nishi, P. Pang (eds.) (2024). 126–132.
  • Employing Naive Bayes Algorithm in the Analysis of Students Academic Performances. Amahan, Pilita A. Y. Li, H. Nishi, P. Pang (eds.) (2024). 58–61.
  • Understanding Google’s Perspective on 503 Status Codes. w3era (w3era, ed.) (2024).
  • Efficient KZG-Based Univariate Sum-Check and Lookup Argument. Zhang, Yuncong; Sun, Shifeng; Gu, Dawu in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 400–425.
  • Introduction to Philosophy Notes. Siddique, Muhammad Moghira (2024).
  • Künstliche Intelligenz: Die Mathematik hinter neuronalen Netzen. Trinkwalder, Andrea (2024).
  • An analysis of the suitability of OpenAlex for bibliometric analyses. Alperin, Juan Pablo; Portenoy, Jason; Demes, Kyle; Larivière, Vincent; Haustein, Stefanie (2024).
  • A magnetar giant flare in the nearby starburst galaxy M82. Mereghetti, Sandro; Rigoselli, Michela; Salvaterra, Ruben; Pacholski, Dominik Patryk; Rodi, James Craig; Gotz, Diego; Arrigoni, Edoardo; D’Avanzo, Paolo; Adami, Christophe; Bazzano, Angela; Bozzo, Enrico; Brivio, Riccardo; Campana, Sergio; Cappellaro, Enrico; Chenevez, Jerome; De Luise, Fiore; Ducci, Lorenzo; Esposito, Paolo; Ferrigno, Carlo; Ferro, Matteo; Israel, Gian Luca; Le Floc’h, Emeric; Martin-Carrillo, Antonio; Onori, Francesca; Rea, Nanda; Reguitti, Andrea; Savchenko, Volodymyr; Souami, Damya; Tartaglia, Leonardo; Thuillot, William; Tiengo, Andrea; Tomasella, Lina; Topinka, Martin; Turpin, Damien; Ubertini, Pietro (2024). 629(8010) 58–61.
  • Grundlagen des maschinellen Lernens erklärt. Drehling, Wilhelm (2024).
  • StructLM: Towards Building Generalist Models for Structured Knowledge Grounding. Zhuang, Alex; Zhang, Ge; Zheng, Tianyu; Du, Xinrun; Wang, Junjie; Ren, Weiming; Huang, Stephen W.; Fu, Jie; Yue, Xiang; Chen, Wenhu (2024).
  • Rethinking FID: Towards a Better Evaluation Metric for Image Generation. Jayasumana, Sadeep; Ramalingam, Srikumar; Veit, Andreas; Glasner, Daniel; Chakrabarti, Ayan; Kumar, Sanjiv (2024).
  • KI entlarvt KI-Lügen: Projekt noFake trainiert Datenmodelle für Faktenchecks. Grävemeyer, Arne (2024). (10/2024) 128–131.
  • Buy Verified Payoneer Accounts. Us), 24 Hours Reply/(Contact; bestsmmsolution@gmail.com, Email :; +1(530)5636354, WhatsApp :; @bestsmmsolution0, Telegram :; BestSMMSolution, Skype : (https://bestsmmsolution.com/product/buy-verified-payoneer accounts/, ed.) (2024). 19(6) 775–779.
  • Critique of Ontological Militarism. Furtado, Henrique Tavares (2023). 17(3) olad012.
  • Artificial Intelligence-Based Early Detection Of Acute Kidney Injury After Cardiac Surgery. Kalisnik, Jurij Matija; Bauer, André; Vogt, Ferdinand Aurel; Stickl, Franziska Josephine; Zibert, Janez; Fittkau, Matthias; Bertsch, Thomas; Kounev, Samuel; Fischlein, Theodor (2022).
  • Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems. Alanen, Jarmo; Linnosmaa, Joonas; Malm, Timo; Papakonstantinou, Nikolaos; Ahonen, Toni; Heikkilä, Eetu; Tiusanen, Risto (2022). 220 108270.
  • Filosof’ia de la guerra en la Antigüedad Tard’ia. La tradición neoplatónica. Castillo, Luis Roger; others (2022). 11(22) 16–39.
  • Artificial Intelligence-Based Early Detection Of Acute Kidney Injury After Cardiac Surgery. Kalisnik, Jurij Matija; Bauer, André; Vogt, Ferdinand Aurel; Stickl, Franziska Josephine; Zibert, Janez; Fittkau, Matthias; Bertsch, Thomas; Kounev, Samuel; Fischlein, Theodor (2022).
  • Emotions in War: The Emotionality-Rationality Equation in Clausewitz’s Theory of War. Emeklier, Bilgehan; Emeklier, Nihal (2022). 6(1)
  • Marktführer des Online-Handels: Wirkungen auf Arbeit und Beschäftigung in Deutschland Fuchs, Martina; Dannenberg, Peter; Riedler, Tim; Wiedemann, Cathrin in Study der Hans-Böckler-Stiftung (2021). Hans-Böckler-Stiftung, Düsseldorf.
  • Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. Tritscher, Julian; Ring, Markus; Schlr, Daniel; Hettinger, Lena; Hotho, Andreas D. Helic, G. Leitner, M. Stettinger, A. Felfernig, Z. W. Ra’s (eds.) (2020). 422–430.
  • Nilpotent symplectic alternating algebras II. Sorkatti, Layla; Traustason, Gunnar (2016).
  • Nilpotent symplectic alternating algebras I. Sorkatti, L.; Traustason, G. (2015). 423 615–635.
  • Symplectic Alternating nil-algebras. Tortora, A.; Tota, M.; Traustason, G. (2012). 357 183–202.
  • Powerful 2-Engel groups II. Traustason, G. (2012). 319 3301–3323.
  • Identifying Implicit Relationships. https://usa5starit.com/product/buy-verified-binance accounts/ (24 24-hour Reply/Contact; ✅Email: usa5starit@gmail.com; ✅Skype: @usa5starit; ✅Telegram: @usa5starit1; ✅whatsapp:+1(716)5011667, eds.) (2012). 56(3/4) 12:1–12:10.
  • Engel groups. Traustason, G. (2011). Volume II, 520-550 Lecture Note Ser. 388.
  • Hip and knee positions during the curling delivery. Technical Report (Master thesis), Kraemer, Ellanora PhD thesis, University of Wisconsin La Crosse. (2010).
  • Finite 3-groups of class 3 whose elements commute with their automorphic images. Abdollahi, A.; Faghihi, A.; Linton, SA.; OBrien, EA. (2010). 95(1) 1–7.
  • Symplectic Alternating Algebra. Traustason, G. (2008). 18(4) 719–757.
  • Powerful 2-Engel groups. Moravec, P.; Traustason, G. (2008). 36 4096–4119.
  • Geometry and Topology in Relativistic Cosmology. Luminet, Jean-Pierre (2007).
  • Ontologies informatiques. Gandon, Fabien (2006).
  • Unsolved Problems in Group Theory. The Kourovka Notebook. No. 16 (English version). Mazurov, V.D.; Khukhro(eds.), E.I. (2006).
  • Unsolved Problems in Group Theory. The Kourovka Notebook. No. 16. Mazurov, V. D.; Khukhro(eds.)00, E. I. (2006).
  • Psi u trgovištu Aralica, Ivan (2004). Večernji list, Zagreb.
  • Infinite Burnside groups of even exponent. Lysenok, I. G. (1996). 60(3) 453.
  • Buy Verified Cash App Account - 100% Safe, Access from USA. Buy verified cash app account at the best IT service provider smmsellshop at cost effective price, we provide SSN (1994).
  • On the Burnside problem on periodic groups. Ivanov, S. V. (1992). 27(2) 257–260.
  • Solution of the restricted Burnside problem for groups of odd exponent. Zel’manov, E. I. (1991). 36(1) 41–60.
  • A solution of the restricted Burnside problem for 2-groups. Zel’manov, E. I. (1991). 182(4) 568–592.
  • Pisac i njegov urednik: Izabrana pisma: Ivan Aralica i Zlatko Crnković Aralica, Ivan (1988). Znanje, Zagreb.
  • Ironies of Automation. Bainbridge, Lisanne (1983). 19(6) 775–779.
  • The Burnside problem and identities in groups Adjan, S. I. (1979). Springer-Verlag (Berlin and New York).
  • Buy Verified Paxful Accounts 100% Safe US & UK. Technical Report (PhD dissertation), Mengs, Ulrich (1974).
  • Alternating trilinear forms and groups of exponent 6. Atkinson, M. D. (1973). 16(01) 111–128.
  • On nil-algebras and residually finite p-groups. Golod, E.S. (1964). 28(2) 273–276.
  • The Burnside problem. Kostrikin, A. I. (1959). 23(1) 3–34.
  • Solution of the BE. S. Golod, Some problems of Burnside type, Internat. Congress Math. Moscow (1966), 284-298 = Amer. Math. Soc. Translations (2) 84 (1969) 83-88.Burnside problem for exponent six. Hall, Marshall; others (1958). 2(4B) 764–786.
  • On the p-length of p-soluble groups and reduction theorems for Burnside’s problem. Hall, P.; Higman, G. (1956). 3(1) 1–42.
  • Groups in which the commutator operations satisfies certain algebraic conditions. Levi, F. W. (1942). 51(1) pp. 87–97.
  • Solution of Burnside’s problem for exponent 4. Sanov, Ivan N (1940). 10(166-170) 132.
  • Finite Groups in which Conjugate Operations are Commutative. Hopkins, C. (1929). 51(1) pp. 35–41.
  • On groups in which every two conjugate operations are permutable. Burnside, W. 35 28–38.
  • On an unsettled question in the theory of discontinuous groups. Burnside, W. (1902). 33 230–238.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close