Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948017361702882
    Format: XII, 462 p. 268 illus., 170 illus. in color. , online resource.
    ISBN: 9783030057558
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI ; 11344
    Content: This book constitutes the refereed proceedings of the Third International Conference on Smart Computing and Communications, SmartCom 2018, held in Tokyo, Japan, in December 2018. The 45 papers presented in this volume were carefully reviewed and selected from 305 submissions. They focus on topics from smart data to smart communications, as well as smart cloud computing to smart security. .
    Note: A Two-Way Identity Authentication Scheme Based on Dynamic Password -- Adaptive Quality Control Scheme to Improve QoE of Video Streaming in Wireless Networks -- Traveler Review Analysis System with Big Data (TRAS) -- Vulnerability Assessment for PMU Communication Networks -- Proposal of parallel processing area extraction and data transfer number reduction for automatic GPU offloading of IoT applications -- Performance Evaluation of industrial OPC UA Gateway with energy cost-saving -- Travel-Time Prediction Methods: A Review -- The influence of sleep on opportunistic relay in linear wireless sensor networks -- Reconfigurable Hardware Generation for Tensor Flow Models of CNN Algorithms on a Heterogeneous Acceleration Platform -- Image Segmentation Algorithm Based on Spatial Pyramid and Visual Salience -- Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology -- Static Analysis of Android Apps Interaction with Automotive CAN -- Opportunistic Content Offloading for Mobile Edge Computing -- Image Annotation Algorithm Based on Semantic Similarity and Multi-Features -- One Secure IoT Scheme for Protection of True Nodes -- Predicted Mobile Data Offloading for Mobile Edge Computing Systems -- A Monte Carlo based Computation Offloading Algorithm for Feeding Robot IoT System -- Collective Behavior Aware Collaborative Caching for Mobile Edge Computing -- Implementation of distributed multi-agent scheduling algorithm based on Pi-calculus -- SmartDetect: A Smart Malicious Web Shell Code Detection Scheme via Ensemble Learning Algorithm -- An optimized MBE Algorithm on Sparse Bipartite Graphs -- IoT Framework for Interworking and Autonomous Interaction between Heterogeneous IoT Platforms -- Improvement of TextRank Based on Co-occurrence Word Pairs and Context Information -- Augmenting Embedding with Domain Knowledge for Oral Disease Diagnosis Prediction -- Regional Estimation Prior Network for Crowd Analyzing -- RBD: A Reference Railway Big Data System Model -- Artificial Intelligence Platform for Heterogeneous Computing -- Review on Application of artificial intelligence in photovoltaic output prediction -- Abnormal Flow Detection Technology In GPU Network Based On Statistical Classification Method -- Research on Data Forwarding Algorithm Based on Link Quality in Vehicular Ad Hoc Networks -- The Knowledge Map Analysis of User Profile Research Based on CiteSpace -- The Accuracy of Fuzzy C-Means in Lower-Dimensional Space for Topic Detection -- Information-Centric Fog Computing for Disaster Relief -- Smartly Deploying WeChat Mobile Application on Cloud Foundry PaaS -- Normal Profile Updating Method For Enhanced Packet Header Anomaly Detection -- Research on Arm Motion Capture of Virtual Reality Based on Kinematics -- Financial News Quantization and Stock Market Forecast Research Based on CNN and LSTM -- Correlation Coefficient based Cluster Data Preprocessing and LSTM Prediction Model for Time Series Data in Large Aircraft Test Flights -- PSPChord - A Novel Fault Tolerance Approach for P2P Overlay Network -- Studying Weariness Prediction Using SMOTE and Random Forests -- Design of Heterogeneous Evaluation Method for Redundant Circuits -- Senior2Local: a Machine Learning Based Intrusion Detection Method for VANETs -- Depth Prediction from Monocular Images with CGAN -- Anomaly Detection for Power Grid based on Network Flow -- A K-Anonymous Full Domain Generalization Algorithm Based on Heap Sort.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030057541
    Additional Edition: Printed edition: ISBN 9783030057565
    Language: English
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages