2011
DOI: 10.1016/j.jnca.2011.06.008
|View full text |Cite
|
Sign up to set email alerts
|

CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 16 publications
0
10
0
2
Order By: Relevance
“…In such attack, the spoofing is just a causing factor, while the mechanism of COP algorithm is the key. In comparison, for GPS spoofing attack, our work focuses on the revealing of algorithm-level security analysis caused by spoofing, not the security of GPS spoofing or context-aware sensing [21][22][23][24] itself.…”
Section: Defense Discussionmentioning
confidence: 99%
“…In such attack, the spoofing is just a causing factor, while the mechanism of COP algorithm is the key. In comparison, for GPS spoofing attack, our work focuses on the revealing of algorithm-level security analysis caused by spoofing, not the security of GPS spoofing or context-aware sensing [21][22][23][24] itself.…”
Section: Defense Discussionmentioning
confidence: 99%
“…Arti cial Intelligence is accepting the phenomenal changes of the business framework and transforming the business culture how to work in the digital era (Davenport, 2018, El-Najdawi et al, 1993, Hamscher, 1994, Metelskaia et al, 2018. Basically it is not just changing the culture of business but also fundamentally renovating the conventional thinking and signi cance of alliance and collaboration, vigorous competition, and digital and enriched innovation (Hagras, 2018, El-Najdawi et al, 1993, Niu et al, 2011, Schultel et al, 2017. While most AI inventiveness craft economical improvement by recognizing an exclusively innovative opening and breaks, pleasing to the eye contemporary energies, delivering a market fragment that others business tycoons have overlooked, or crafting fresh markets, linked devices that nourish a continual creek of digital data about functionality, treatment, fabrication, requests, automated and robotic help center and more to a signi cant setting will make even more captivating economical revolutions (Gentsch, 2018, Hagras, 2018, Liu, et al, 2020, Scheer, 2012, Maedche, 2019.…”
Section: Business Model Transformationmentioning
confidence: 99%
“…More specifically, the GPS spoofing [18,22] by sending interfering signals is very common. In addition to GPS sensors, other sensors including optical sensors [20,21] and context-aware services [23][24][25][26] can also be threatened to cause data spoofing physically [8,19,20,[27][28][29], wirelessly [9,30,31], or through malware [10,11]. Similar to previous work, our data spoofing is launched through a node in the ad hoc network.…”
Section: Data Spoofing In Uavmentioning
confidence: 99%