Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV046283757
    Format: 1 Online-Ressource (xiv, 412 Seitenp. 203 illus., 133 illus. in color) , 203 Illustrationen, 133 in Farbe
    ISBN: 9783030341398
    Series Statement: Lecture notes in computer science 11910
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-34138-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-34140-4
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948274404602882
    Format: XIV, 412 p. 203 illus., 133 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030341398
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI ; 11910
    Content: This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field.
    Note: A Survey of Deep Learning Applied to Story Generation. -- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates -- An Improved Prediction Model for the Network Security Situation -- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles -- An Improved Assessment Method for the Network Security Risk -- A High-Performance Storage System Based with Dual RAID Engine -- An Universal Perturbation Generator for Black-box Attacks against Object Detectors -- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle -- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification -- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs -- I2P Anonymous Communication Network Measurement and Analysis -- Plot Digitizing over Big Data Using Beam Search -- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud -- Do Top Socail APPS Effect Voice Call? Evidence from Propensity Score Matching Methods -- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB -- Smart Custom Package Decision for Mobile Internet Services -- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City -- Automated Classification of Attacker Privileges Based on Deep Neural Network -- nnD: Shallow Neural Network Based Collision Decoding in IoT communications -- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction -- An Elephant Ow Detection Method Based on Machine Learning -- AI Enhanced Automatic Response System for Resisting Network Threats -- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking -- EIGRP to OSPF Migration in Production Network -- A Hardware Trojan Detection Method Design Based on TensorFlow -- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation -- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery -- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network -- Analysis and Prediction of Commercial Big Data Based on WIFI Probe -- Design and Optimization of Camera HAL Layer Based on Android -- Music Rhythm Customized Mobile Application Based on Information Extraction -- Computational Challenges and Opportunities in Financial Services -- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme -- Applications of Machine Learning Tools in Genomics: A Review -- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context -- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts -- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi -- Research on Template-based Factual Automatic Question Answering Technology -- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm -- Machine Learning for Cancer Subtype Prediction with FSA Method -- Autonomous Vehicle Communication In V2X Network With LoRa Protocol. .
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030341381
    Additional Edition: Printed edition: ISBN 9783030341404
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1684964784
    Format: 1 Online-Ressource (XIV, 412 p. 203 illus., 133 illus. in color)
    Edition: 1st ed. 2019
    ISBN: 9783030341398
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI 11910
    Content: A Survey of Deep Learning Applied to Story Generation. -- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates -- An Improved Prediction Model for the Network Security Situation -- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles -- An Improved Assessment Method for the Network Security Risk -- A High-Performance Storage System Based with Dual RAID Engine -- An Universal Perturbation Generator for Black-box Attacks against Object Detectors -- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle -- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification -- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs -- I2P Anonymous Communication Network Measurement and Analysis -- Plot Digitizing over Big Data Using Beam Search -- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud -- Do Top Socail APPS Effect Voice Call? Evidence from Propensity Score Matching Methods -- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB -- Smart Custom Package Decision for Mobile Internet Services -- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City -- Automated Classification of Attacker Privileges Based on Deep Neural Network -- nnD: Shallow Neural Network Based Collision Decoding in IoT communications -- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction -- An Elephant Ow Detection Method Based on Machine Learning -- AI Enhanced Automatic Response System for Resisting Network Threats -- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking -- EIGRP to OSPF Migration in Production Network -- A Hardware Trojan Detection Method Design Based on TensorFlow -- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation -- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery -- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network -- Analysis and Prediction of Commercial Big Data Based on WIFI Probe -- Design and Optimization of Camera HAL Layer Based on Android -- Music Rhythm Customized Mobile Application Based on Information Extraction -- Computational Challenges and Opportunities in Financial Services -- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme -- Applications of Machine Learning Tools in Genomics: A Review -- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context -- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts -- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi -- Research on Template-based Factual Automatic Question Answering Technology -- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm -- Machine Learning for Cancer Subtype Prediction with FSA Method -- Autonomous Vehicle Communication In V2X Network With LoRa Protocol
    Content: This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field
    Additional Edition: ISBN 9783030341381
    Additional Edition: Erscheint auch als Druck-Ausgabe International Conference on Smart Computing and Communication (4. : 2019 : Birmingham) Smart computing and communication Cham : Springer, 2019 ISBN 9783030341381
    Additional Edition: ISBN 3030341380
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Deep learning ; Computersicherheit ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV046281188
    Format: xiv, 412 Seiten , Diagramme
    ISBN: 9783030341381
    Series Statement: Lecture notes in computer science 11910
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-030-34139-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030341831?
Did you mean 9783030041311?
Did you mean 9783030301781?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages