Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949724042502882
    Format: XXVIII, 489 p. 177 illus., 124 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031578533
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies, 200
    Content: Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing, and information systems. The aim of the book "Advanced Information Networking and Applications" is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.
    Note: A Method for Estimating the Number of Diseases in Computed Tomography Reports of the Japanese Medical Image Database (J-MID): Variations among Facilities -- Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph -- Discovery of RESTful Web Services Based on the Openapi 3.0 Standard with Semantic Annotations -- Perfresolv: A Geo-distributed Approach for Performance Analysis of Public Dns Resolvers Based on Domain Popularity -- Dars: Empowering Trust in Blockchain-based Real-world Applications with a Decentralized Anonymous Reputation System -- An Empirical Comparison of Outlier Detection Methods for Identifying Grey-sheep Users in Recommender Systems -- Adaptive Consensus: Enhancing Robustness in Dynamic Environments -- Cottontrust: Reliability and Traceability in Cotton Supply Chain Using Self-sovereign Identity -- Interoperability Between Evm-based Blockchains -- Stand-up Indulgent Gathering on Lines for Myopic Luminous Robots -- Iot Identity Management Systems: The State-of-the-art, Challenges and a Novel Architecture -- Starm: Streaming Association Rules Mining in High-dimensional Data -- Regulation Compliance System for Iot Environments: Gdpr Compliance as a Use-case -- Two-dimensional Models of Markov Processes for System Availability -- Enabling Ai in Agriculture 4.: A Blockchain-based Mobile Crowdsensing Architecture.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031578526
    Additional Edition: Printed edition: ISBN 9783031578540
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_303157852
    Format: III, 122 S., 73 Taf , Ill
    Edition: Mikrofiche-Ausg. Erlangen Fischer 1998 4 Mikrofiches
    Series Statement: Die Siebmacherschen Wappenbücher : der "alte" Siebmacher (XVIII Teile) und der "neue" Siebmacher (101 Bände), neu zusammengeführt und alphabetisch geordnet Fiche 266-269 = Bd. 6, Abth. 9
    Language: German
    Author information: Siebmacher, Johann 1561-1612
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edoccha_9961492934002883
    Format: 1 online resource (514 pages)
    Edition: 1st ed.
    ISBN: 3-031-57853-8
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.200
    Note: Intro -- Welcome Message from AINA-2024 Organizers -- AINA-2024 Organizing Committee -- AINA-2024 Keynote Talks -- Agile Edge: Harnessing the Power of the Intelligent Edge by Agile Optimization -- Challenges in Entity Matching in AI Era -- Contents -- A Method for Estimating the Number of Diseases in Computed Tomography Reports of the Japanese Medical Image Database (J-MID): Variations Among Facilities -- 1 Introduction -- 2 Materials and Methods -- 2.1 Participants -- 2.2 Data Preprocessing -- 2.3 Creation of Predicate Lexicon -- 2.4 Estimation of Target Disease Count -- 3 Results -- 3.1 Number of CT Reports in J-MID 2022 -- 3.2 Affirmative Predicates in J-MID CT Report -- 3.3 Differences of Affirmative Predicates Among Facilities -- 3.4 Top 10 Extracted Disease Names -- 4 Discussions -- 5 Conclusion -- References -- Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph -- 1 Introduction -- 2 Related Work -- 3 Our Proposed Scheme -- 3.1 System Model Overview -- 3.2 OWASP ZAP -- 3.3 Our Proposed Dynamic Vulnerability Assessment Based on Executable DAG System -- 4 Evaluation -- 4.1 Functionality Comparison -- 4.2 Performance Evaluation -- 5 Conclusion -- References -- Discovery of RESTful Web Services Based on the OpenAPI 3.0 Standard with Semantic Annotations -- 1 Introduction -- 2 Related Work -- 3 Discovery System for REST Services -- 3.1 System Overview -- 3.2 OWL Ontology for REST Profile -- 3.3 Mapping Between the Profile Ontology and OpenApi/Swagger -- 3.4 OpenApi/Swagger Database -- 3.5 Mapping Using Ontop Protégé/CLI -- 3.6 Ontop SPARQL Query -- 3.7 Function for Similarity Calculation -- 3.8 Semantic Annotation -- 4 Experimental Results -- 5 Conclusions -- References -- PerfResolv: A Geo-Distributed Approach for Performance Analysis of Public DNS Resolvers Based on Domain Popularity. , 1 Introduction -- 2 Related Work -- 3 PerfResolv Approach -- 4 Evaluation -- 4.1 Popular Domains -- 4.2 New Domains -- 4.3 Discussion -- 5 Conclusions and Future Work -- References -- DARS: Empowering Trust in Blockchain-Based Real-World Applications with a Decentralized Anonymous Reputation System*-5pt -- 1 Introduction -- 2 Related Work -- 3 Security Model -- 3.1 Adversarial Model -- 3.2 Security Properties -- 4 DARS Building Blocks -- 4.1 Commitment Scheme -- 4.2 zkSNARKs -- 4.3 zkSNARKs for Set Membership via Merkle Trees -- 5 DARS Framework -- 6 Evaluation and Results -- 6.1 Evaluation Environment -- 6.2 Experimental Setup -- 6.3 Performance Evaluation -- 7 Security Analysis -- 8 Conclusion -- References -- An Empirical Comparison of Outlier Detection Methods for Identifying Grey-Sheep Users in Recommender Systems -- 1 Introduction -- 2 Related Work -- 2.1 Collaborative Filtering -- 2.2 Grey-Sheep Users -- 2.3 Outlier Detection -- 3 Experimental Design and Workflow -- 4 Experimental Results and Findings -- 5 Conclusions and Future Work -- References -- Adaptive Consensus: Enhancing Robustness in Dynamic Environments -- 1 Introduction -- 1.1 Our Contributions -- 2 Related Work -- 3 Methodology -- 3.1 Proposed Algorithm -- 3.2 Working -- 3.3 Comparison and Analysis -- 4 Conclusion and Future Directions -- References -- COTTONTRUST: Reliability and Traceability in Cotton Supply Chain Using Self-sovereign Identity -- 1 Introduction -- 2 Related Works -- 3 COTTONTRUST Architecture -- 3.1 COTTON-CELL Components and Structure -- 3.2 Operation of COTTONTRUST -- 3.3 COTTON-TRANSACTIONS -- 4 Experimental Analysis -- 4.1 Test Plan -- 4.2 Results and Discussions -- 5 Considerations and Future Work -- References -- Interoperability Between EVM-Based Blockchains -- 1 Introduction -- 2 Interoperability Problem and Use Cases -- 3 EVM-Based Interoperability. , 3.1 Events and Watchtowers Interoperability Protocol -- 4 Event Semantics -- 4.1 Initiator and Finaliser Smart Contracts -- 5 Discussion -- 6 Conclusion -- References -- Stand-Up Indulgent Gathering on Lines for Myopic Luminous Robots -- 1 Introduction -- 2 Model -- 3 Impossibility Results -- 4 Possibility Results for Myopic Robots -- 4.1 The Case Where Minit is Odd -- 4.2 The Case Where Oinit is Odd -- 5 Conclusion -- References -- IoT Identity Management Systems: The State-of-the-Art, Challenges and a Novel Architecture -- 1 Introduction -- 2 Background and Related Work -- 2.1 Internet of Things (IoT) Security -- 2.2 Identity Management System (IDMS) -- 2.3 Identity-Related Vulnerabilities and Attacks -- 2.4 Existing IDMS Solutions -- 3 Proposed Architecture -- 3.1 Risk Analysis of Attacks and Dataset Generation -- 3.2 Deep Learning-Based Attack Detection Mechanism -- 3.3 Decentralized DLT-Based Entity Profiling and Authentication -- 3.4 Trust Establishment Through Web of Trust -- 4 Use Cases -- 5 Conclusion -- References -- STARM: STreaming Association Rules Mining in High-Dimensional Data -- 1 Introduction -- 2 Problem Statement -- 2.1 Streaming Frequent Itemsets Mining -- 2.2 Dimensionality Reduction -- 3 Related Work -- 3.1 Landmark Windows -- 3.2 Sliding Windows -- 3.3 Damped Window -- 4 Streaming Association Rules Mining in High-Dimensional Data -- 4.1 Model Overview -- 4.2 STARM Algorithm -- 5 Computational Results -- 5.1 Experimental Protocol and Computing Environment -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Regulation Compliance System for IoT Environments: GDPR Compliance as a Use-Case -- 1 Introduction -- 1.1 Contributions -- 1.2 Structure of This Paper -- 2 Related Work and Background -- 2.1 IoT Security and Privacy -- 2.2 Self-Sovereign Identity -- 2.3 Existing Compliance Solution. , 3 Proposed Regulation Compliance System -- 3.1 The Blockchain Ledgers Network -- 3.2 The Issuers/Verifiers Entities -- 3.3 The Identity Holder Modules -- 4 Use-Case Scenario -- 4.1 Issuing an ID for an IoT Device -- 4.2 GDPR Compliance Module -- 4.3 BT Internet Access Module -- 5 Operational GDPR Compliance Example -- 5.1 ID Credentials -- 5.2 Issuing and Creating Credential -- 5.3 Access Request and Proof Request -- 6 Discussion -- 7 Conclusion -- References -- Two-Dimensional Models of Markov Processes for System Availability -- 1 Introduction -- 2 Related Work -- 2.1 Solution Techniques for Two-Dimensional Processes -- 2.2 Beyond Two-Dimensional Processes -- 3 Work Done -- 3.1 Two-Dimensional Model for Availability -- 3.2 Extended Availability Model -- 4 Results -- 5 Conclusion -- References -- Enabling AI in Agriculture 4.0: A Blockchain-Based Mobile CrowdSensing Architecture -- 1 Introduction -- 2 Related Work -- 3 Proposed Architecture -- 3.1 Physical Sensing Layer -- 3.2 Virtual Sensing Layer -- 3.3 Digital Twin (DT) Layer -- 3.4 Application Layer -- 4 Working Flow of the Proposed Architecture: An Implementation Perspective -- 4.1 Data Service: Data Collection Using Blockchain-Based Mobile Crowdsensing System -- 4.2 Agricultural Services -- 5 Result -- 6 Conclusion -- References -- HPC-SBC: An Experimental Effort to Evaluate Storage in High-Performance Computing Configurations Using a Context Approach -- 1 Introduction -- 2 Related Works -- 3 HPC-SBC Proposal -- 4 Experiments and Results -- 4.1 Experiments -- 4.2 Results -- 5 Conclusions and Future Works -- References -- Effective Parallel Formal Verification of Reconfigurable Discrete-Event Systems Formalizing with Isabelle/HOL -- 1 Introduction -- 2 Background -- 2.1 System Formalization -- 2.2 Properties Formalization -- 2.3 Classification of Properties -- 3 The Proposed Approach. , 3.1 Motivation -- 3.2 Formalization -- 3.3 Effective Parallel Verification Environment -- 3.4 Implementation -- 4 Experimentation -- 4.1 Case Study -- 4.2 Application -- 4.3 Evaluation -- 5 Conclusions -- References -- Data Poisoning Attacks in Gossip Learning -- 1 Introduction -- 2 Case Study: State-of-the-Art Gossip Learning -- 3 Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- The Home-Delivery Analysis of Prescription Drugs for Chronic Diseases in the Post-Pandemic Era-An Example of Local Community Pharmacy -- 1 Introduction -- 2 Research Background and Motivation -- 3 Research Purpose -- 4 Research Process -- 5 Research Methods -- 6 Basic Data Analysis of Research Results -- 7 Technology Options to Provide Instant Consultation -- 8 Conclusion and Suggestions -- References -- A Language-Agnostic Compression Framework for the Bitcoin Blockchain -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Bitcoin Transactions -- 3.2 User Transaction Graph and Address Clustering -- 3.3 Notations -- 4 Methodology -- 4.1 Normal Form, Denomination Flags, and MurmurHash -- 4.2 Transaction Indexing -- 4.3 Retrieving Input Addresses -- 4.4 UMap as a CPython dict -- 4.5 Handling Hash Collisions -- 5 Algorithms -- 5.1 First Stage: Transforming Raw Transaction Data into Normal Form -- 5.2 Second Stage: Resolving uout References -- 5.3 Third Stage: Address Clustering -- 5.4 Fourth Stage: User Transaction Graph -- 6 Results -- 6.1 Compression -- 6.2 Memory -- 6.3 Elapsed Time -- 6.4 Information Loss from Floating Point Arithmetic -- References -- Analyzing Topic Models: A Tourism Recommender System Perspective -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 Recent Studies -- 3 Materials and Methods -- 3.1 Datasets -- 3.2 Evaluation Parameters -- 3.3 Experiment and Results -- 4 Conclusion. , 5 Open Issues and Future Research Directions.
    Additional Edition: ISBN 3-031-57852-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9961492934002883
    Format: 1 online resource (514 pages)
    Edition: 1st ed. 2024.
    ISBN: 3-031-57853-8
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies, 200
    Content: Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing, and information systems. The aim of the book “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.
    Note: A Method for Estimating the Number of Diseases in Computed Tomography Reports of the Japanese Medical Image Database (J-MID): Variations among Facilities -- Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph -- Discovery of RESTful Web Services Based on the Openapi 3.0 Standard with Semantic Annotations -- Perfresolv: A Geo-distributed Approach for Performance Analysis of Public Dns Resolvers Based on Domain Popularity -- Dars: Empowering Trust in Blockchain-based Real-world Applications with a Decentralized Anonymous Reputation System -- An Empirical Comparison of Outlier Detection Methods for Identifying Grey-sheep Users in Recommender Systems -- Adaptive Consensus: Enhancing Robustness in Dynamic Environments -- Cottontrust: Reliability and Traceability in Cotton Supply Chain Using Self-sovereign Identity -- Interoperability Between Evm-based Blockchains -- Stand-up Indulgent Gathering on Lines for Myopic Luminous Robots -- Iot Identity Management Systems: The State-of-the-art, Challenges and a Novel Architecture -- Starm: Streaming Association Rules Mining in High-dimensional Data -- Regulation Compliance System for Iot Environments: Gdpr Compliance as a Use-case -- Two-dimensional Models of Markov Processes for System Availability -- Enabling Ai in Agriculture 4.: A Blockchain-based Mobile Crowdsensing Architecture.
    Additional Edition: ISBN 3-031-57852-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 303157860?
Did you mean 303127856?
Did you mean 303157062?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages