feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (12)
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    almafu_BV046680969
    Format: xi, 128 Seiten : , Diagramme.
    ISBN: 978-1-4704-5495-1
    Series Statement: University lecture series Volume 74
    Additional Edition: Erscheint auch als Online-Ausgabe, ebook ISBN 978-1-4704-5679-5
    Language: English
    Subjects: Mathematics
    RVK:
    Keywords: Algebraische Topologie
    Author information: Polterovich, Leonid 1963-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV019709498
    Format: XXIV, 1259 S. : , Ill., graph. Darst.
    ISBN: 3-540-24127-2
    Series Statement: Lecture notes in computer science 3314
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Informatik ; Angewandte Informatik ; Informationssystem ; World Wide Web ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947364099002882
    Format: XXIV, 1259 p. , online resource.
    ISBN: 9783540304975
    Series Statement: Lecture Notes in Computer Science, 3314
    Content: The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas and to explore new ground. The goal of the conference was to push the application of modern computing technologies to science, engineering, and information technologies to a new level of sophistication and understanding. Theinitialideatoorganizesuchaconferencewithafocusoncomputationand applicationswasoriginatedbyDr.JunZhang,duringhisvisittoChinainAugust 2003, in consultation with a few friends, including Dr. Jing Liu at the Chinese Academy of Sciences, Dr. Jun-Hai Yong at Tsinghua University, Dr. Geng Yang at Nanjing University of Posts and Communications, and a few others. After severaldiscussionswithDr.Ji-HuanHe,itwasdecidedthatDonghuaUniversity would host CIS 2004. CIS 2004 attempted to distinguish itself from other conferences in its - phasis on participation rather than publication. A submitted paper was only reviewed with the explicit understanding that, if accepted, at least one of the authors would attend and present the paper at the conference. It is our - lief that attending conferences is an important part of one’s academic career, through which academic networks can be built that may bene?t one’s academic life in the long run. We also made every e?ort to support graduate students in attending CIS 2004. In addition to set reduced registration fees for full-time graduate students, we awarded up to three prizes for to the Best Student Papers at CIS 2004. Students whose papers were selected for awards were given cash prizes, plus a waiver of registration fees.
    Note: High Performance Computing and Algorithms -- Computer Modeling and Simulations -- Biological and Medical Informatics -- Data and Information Sciences -- Computational Graphics and Visualization.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540241270
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948170570602882
    Format: XIII, 398 p. 201 illus., 90 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030306199
    Series Statement: Security and Cryptology ; 11806
    Content: This book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xi’an, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine learning in network infrastructure security, in network security detections and in application software security.
    Note: Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030306182
    Additional Edition: Printed edition: ISBN 9783030306205
    Language: English
    Keywords: Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Linköping :Linkopings Universitet,
    UID:
    almahu_9949845742802882
    Format: 1 online resource (97 pages)
    Edition: 1st ed.
    ISBN: 9789176851876
    Series Statement: Linköping Studies in Science and Technology. Dissertations Series ; v.1962
    Note: Intro -- Abstract -- Populärvetenskaplig sammanfattning -- Acknowledgements -- Papers included in the thesis -- Contribution to included papers -- Conference contributions -- Thesis Committee -- Abbreviations -- Table of Contents -- Preface -- 1. Introduction -- 2. Research aim -- 3. Methodology -- 4. Summary of papers -- 5. Conclusions -- 6. Future Perspectives -- 7. References -- Papers.
    Additional Edition: Print version: Zhang, Jun Synthesis and Characterization of Fluorescent Stilbene-Based Probes Targeting Amyloid Fibrils Linköping : Linkopings Universitet,c2018
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947363741002882
    Format: XXX, 313 p. 108 illus. , online resource.
    ISBN: 9783319038896
    Series Statement: Lecture Notes in Computer Science, 8286
    Content: This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing , ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-SmartCPS 2013).
    Note: Clustering and change detection of multiple streaming time series -- Layer-based Scheduling of Parallel Tasks for Heterogeneous Cluster Platforms -- Deadline-Constrained Workflow Scheduling in Volunteer Computing Systems -- Is Sensor Deployment using Gaussian Distribution Energy Balanced -- Shedder: a Metadata Sharing Management Method across Multi-Clusters -- PDB: A Reliability-Driven Data Reconstruction Strategy Based on Popular Data Backup for RAID4 SSD Arrays -- Load and Thermal-aware VM Scheduling on the Cloud -- Optimistic Concurrency Control for Energy Efficiency in the Wireless Environment -- Pastry Grid CP: A Decentralized Rollback-Recovery Protocol for Desktop Grid Systems -- Improving Continuation-Powered Method-Level Speculation for JVM Applications -- Unimodular loop transformations with source-to-source translation for GPUs -- HMHS: Hybrid Multistage Heuristic Scheduling Algorithm for Heterogeneous MapReduce System -- Candidate set parallelization strategies for Ant Colony Optimization on the GPU -- Synchronization-Reducing Variants of the Biconjugate Gradient and the Quasi-Minimal Residual Methods -- Hardware-assisted Intrusion Detection by Preserving Reference Information Integrity.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319038889
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham : Imprint: Springer
    UID:
    gbv_1694052338
    Format: 1 Online-Ressource (X, 146 Seiten) , 63 Ilustrationen
    ISBN: 9783030378882
    Series Statement: CRM short courses
    Content: Introduction -- Preliminary -- Tamarkin category theory -- Applications in symplectic geometry -- Supplements -- References -- Index.
    Content: This textbook offers readers a self-contained introduction to quantitative Tamarkin category theory. Functioning as a viable alternative to the standard algebraic analysis method, the categorical approach explored in this book makes microlocal sheaf theory accessible to a wide audience of readers interested in symplectic geometry. Much of this material has, until now, been scattered throughout the existing literature; this text finally collects that information into one convenient volume. After providing an overview of symplectic geometry, ranging from its background to modern developments, the author reviews the preliminaries with precision. This refresher ensures readers are prepared for the thorough exploration of the Tamarkin category that follows. A variety of applications appear throughout, such as sheaf quantization, sheaf interleaving distance, and sheaf barcodes from projectors. An appendix offers additional perspectives by highlighting further useful topics. Quantitative Tamarkin Theory is ideal for graduate students interested in symplectic geometry who seek an accessible alternative to the algebraic analysis method. A background in algebra and differential geometry is recommended. This book is part of the "Virtual Series on Symplectic Geometry" http://www.springer.com/series/16019.
    Additional Edition: ISBN 9783030378875
    Additional Edition: ISBN 9783030378899
    Additional Edition: ISBN 9783030378905
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030378875
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030378899
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030378905
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_166865167X
    Format: 1 Online-Ressource (XIV, 451 Seiten) , Illustrationen, Diagramme
    ISBN: 9783030121112
    Series Statement: Springer Proceedings in Physics volume 218
    Content: Part1: Instrumentation -- Chapter1. Discussion on elastic wave sources for AE sensor calibration at low frequency -- Chapter2. Proposal for an absolute AE sensor calibration setup -- Chapter3. Difference between FBG and PZT Acoustic Emission Sensor -- Chapter4. Research on fiber bragg grating acoustic emission sensor -- Chapter5. The optimization of magneto acoustic emission testing device -- Chapter6. Power over Ethernet Daisy Chained Acoustic Emission System for Structure Health Monitoring -- Chapter7. Uniscope - instrument integrating NDT methods -- Chapter8. Fiber bragg grating acoustic emission demodulation system -- Part2: Signal Processing and Analysis -- Chapter9. Application of modal acoustic emission technique for recognition of corrosion severity on a thin plate -- Chapter10. Research on the identification of crack status through axle acoustic emission signal based on LMD and grey correlation analysis -- Chapter11. Acoustic emission characteristics based on energy mode of IMFs -- Chapter12. Two-Dimensional Source Location of Acoustic Emission by Means of AI -- Part3: Material Characteristics -- Chapter13. Acoustic emission RA-value and granite fracture modes under dynamic and static loads -- Chapter14. Damage detection in glass fiber reinforced plastics using ultrasonic full-waveform comparison -- Chapter15. Fatigue damage evaluation of 2.25Cr-1Mo-0.25V steel using acoustic emission entropy -- Chapter16. Acoustic emission behavior of TC4 Titanium alloy manufactured by electron beam freeform fabrication during tensile deformation -- Chapter17. An entropy approach for characterization and assessment of fatigue damage accumulation in Q235 steel based on acoustic emission testing -- Chapter18. Tensile deformation damage and clustering analysis of acoustic emission signals for 3D woven composites -- Chapter19. The study of Mechanical Behavior of Alloy Structural Steel Based on Dynamic Acoustic Emission Signal -- Chapter20. Acoustic emission characteristic of ceramic matrix composite under static loading
    Content: This volume collects the papers from the World Conference on Acoustic Emission 2017 (WCAE-2017) in Xi'an, China. The latest research and applications of acoustic emission (AE) are explored, with a particular emphasis on detecting and processing AE signals, the development of AE instrument and testing standards, AE of materials, engineering structures and systems, including the processing of collected data and analytical techniques. Numerous case studies are also included. This proceedings volume will appeal to students, professors and researchers working in these fields as physicists and/or engineers
    Additional Edition: ISBN 9783030121105
    Additional Edition: Erscheint auch als Druck-Ausgabe World Conference on Acoustic Emission (2017 : Xi'an) Advances in acoustic emission technology Cham : Springer, 2019 ISBN 9783030121105
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore, Singapore :Springer, | [Beijing, P.R. China] :China Social Sciences Press.
    UID:
    almafu_BV048456794
    Format: 1 Online-Ressource (x, 65 Seiten) : , Diagramme.
    ISBN: 978-981-19-3085-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-19-3084-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-19-3086-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-19-3087-4
    Language: English
    Keywords: Verwaltungsreform ; Wirtschaftsförderung ; Ländlicher Raum ; Nachhaltigkeit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_BV044334742
    Format: 1 Online-Ressource (XIV, 428 p. 309 illus., 267 illus. in color).
    ISBN: 978-3-319-29052-2
    Series Statement: Springer Proceedings in Physics volume 179
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-29050-8
    Language: English
    Subjects: Physics
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages