Computer Science (R0)
High Performance Computing. ISC High Performance 2024 International Workshops
Chronologie aller Bände (1 - 39)

Die Reihenfolge beginnt mit dem eBook "Guide to Cisco Routers Configuration". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Mohammed M. Alani beginnen. Der zweite Teil der Reihe "Artificial Intelligence for Knowledge Management" ist am 03.07.2021 erschienen. Mit insgesamt 39 Bänden wurde die Reihe über einen Zeitraum von ungefähr 9 Jahren fortgesetzt. Der neueste Band trägt den Titel "GenAI and LLMs for Beyond 5G Networks".
- Anzahl der Bewertungen für die gesamte Reihe: 5
- Ø Bewertung der Reihe: 3.67
- Start der Reihe: 09.05.2017
- Neueste Folge: 15.12.2025
Diese Reihenfolge enthält 35 unterschiedliche Autoren.
- Autor: Alani, Mohammed M.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.05.2017
- Genre: Sonstiges
Guide to Cisco Routers Configuration
This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WANtechnologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).
- Autor: Beck, Dennis
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 15.06.2019
- Genre: Sonstiges
Immersive Learning Research Network
This volume constitutes the refereed proceedings of the 5th International Conference of the Immersive Learning Network, iLRN 2019, held in London, UK, in June 2019.
The 18 revised full papers and presented in this volume were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on science, technology, engineering, and mathematics (STEM); disciplinary applications: special education; disciplinary applications: history; pedagogical strategies; immersion and presence.
- Autor: Mercier-Laurent, Eunika
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.07.2021
- Genre: Sonstiges
Artificial Intelligence for Knowledge Management
The 14 revised and extended papers presented together with an invited talk were carefully reviewed and selected for inclusion in this volume. They present new research and innovative aspects in the field of knowledge management and discuss methodological, technical and organizational aspects of artificial intelligence used for knowledge management.
*The workshop was held virtually.
- Autor: Morazán, Marco T.
- Anzahl Bewertungen: 3
- Ø Bewertung: 5.0
- Medium: E-Book
- Veröffentlicht: 13.01.2022
- Genre: Sachbuch
Animated Problem Solving
This textbook is about systematic problem solving and systematic reasoning using type-driven design. There are two problem solving techniques that are emphasized throughout the book: divide and conquer and iterative refinement. Divide and conquer is the process by which a large problem is broken into two or more smaller problems that are easier to solve and then the solutions for the smaller pieces are combined to create an answer to the problem. Iterative refinement is the process by which a solution to a problem is gradually made better–like the drafts of an essay. Mastering these techniques are essential to becoming a good problem solver and programmer.
The book is divided in five parts. Part I focuses on the basics. It starts with how to write expressions and subsequently leads to decision making and functions as the basis for problem solving. Part II then introduces compound data of finite size, while Part III covers compound data of arbitrarysize like e.g. lists, intervals, natural numbers, and binary trees. It also introduces structural recursion, a powerful data-processing strategy that uses divide and conquer to process data whose size is not fixed. Next, Part IV delves into abstraction and shows how to eliminate repetitions in solutions to problems. It also introduces generic programming which is abstraction over the type of data processed. This leads to the realization that functions are data and, perhaps more surprising, that data are functions, which in turn naturally leads to object-oriented programming. Part V introduces distributed programming, i.e., using multiple computers to solve a problem.
This book promises that by the end of it readers will have designed and implemented a multiplayer video game that they can play with their friends over the internet. To achieve this, however, there is a lot about problem solving and programming that must be learned first. The game is developed using iterative refinement. The reader learns step-by-step about programming and how to apply new knowledge to develop increasingly better versions of the video game. This way, readers practice modern trends that are likely to be common throughout a professional career and beyond.
- Autor: Hargood, Charlie
- Anzahl Bewertungen: 1
- Ø Bewertung: 4.0
- Medium: E-Book
- Veröffentlicht: 02.02.2023
- Genre: Sachbuch
The Authoring Problem
Authoring, its tools, processes, and design challenges are key issues for the Interactive Digital Narrative (IDN) research community. The complexity of IDN authoring, often involving stories co-created by procedures and user interaction, creates confusion for tool developers and raises barriers for new authors.
This book examines these issues from both the tool designer and the author’s perspective, discusses the poetics of IDN and how that can be used to design authoring tools, explores diverse forms of IDN and their demands, and investigates the challenges around conducting research on IDN authoring.
To address these challenges, the chapter authors incorporate a range of interdisciplinary perspectives on ‘The Authoring Problem’ in IDN. While existing texts provide ‘how-to’ guidance for authors, this book is a primer for research and practice-based investigations into the authoring problem, collecting the latest thoughts about this area from key researchers and practitioners.- Autor: Juan Ferrer, Ana
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 05.03.2023
- Genre: Sachbuch
Beyond Edge Computing
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture.
Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures.Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.
- Autor: Kizza, Joseph Migga
- Anzahl Bewertungen: 1
- Ø Bewertung: 2.0
- Medium: E-Book
- Veröffentlicht: 20.07.2023
- Genre: Krimi
Ethical and Secure Computing
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly evolving computing technologies and ever-changing communication ecosystems.
This thoroughly revised and updated third edition features revised chapters with new and updated content and hardened the ethical framework. To cope with the rapidly changing computing and telecommunication ecosystem, a new chapter, Ethics and Social Responsibility in the Metaverse, has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students’ and professionals’ interest and active participation in discussions of the issues we are facing now and those likely to emerge in the near future.
Topics and features—including fully updated content:
- Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres
- Describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties
- Discusses the security and ethical quagmire in the platforms of the developing metaverse (NEW chapter)
- Examines intellectual property rights in the context of computing, including the risks and liabilities associated with software
- Discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health
- Reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination
- Considers the ethical challenges arising from online social networks, mobile telecommunication technologies, virtual reality, the Internet of Things and 5G technologies
- Includes learning objectives, discussion questions and exercises throughout
This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, as well as offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
- Autor: Pavlovic, Dusko
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.09.2023
- Genre: Sonstiges
Programs as Diagrams
It is not always clear what computer programs mean in the various languages in which they can be written, yet a picture can be worth 1000 words, a diagram 1000 instructions.
In this unique textbook/reference, programs are drawn as string diagrams in the language of categories, which display a universal syntax of mathematics (Computer scientists use them to analyze the program semantics; programmers to display the syntax of computations). Here, the string-diagrammatic depictions of computations are construed as programs in a single-instruction programming language. Such programs as diagrams show how functions are packed in boxes and tied by strings. Readers familiar with categories will learn about the foundations of computability; readers familiar with computability gain access to category theory. Additionally, readers familiar with both are offered many opportunities to improve the approach.
Topics and features:
- Delivers a ‘crash’ diagram-based course in theory of computation
- Uses single-instruction diagrammatic programming language
- Offers a practical introduction into categories and string diagrams as computational tools
- Reveals how computability is programmability, rather than an ‘ether’ permeating computers
- Provides a categorical model of intensional computation is unique up to isomorphism
- Serves as a stepping stone into research of computable categories
In addition to its early chapters introducing computability for beginners, this flexible textbook/resource also contains both middle chapters that expand for suitability to a graduate course as well as final chapters opening up new research.
Dusko Pavlovic is a professor at the Department of Information and Computer Sciences at the University of Hawaii at Manoa, and by courtesy at the Department of Mathematics and the College of Engineering. He completed this book as an Excellence Professor at Radboud University in Nijmegen, The Netherlands.
- Autor: De Marsico, Maria
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 21.02.2024
- Genre: Sonstiges
Pattern Recognition Applications and Methods
This book constitutes the thoroughly refereed and revised selected papers from the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, held in Lisbon, Portugal, during February 22–24, 2023.
The 28 full papers and 42 short papers included in this book were carefully reviewed and selected from 157 submissions. They were organized in topical sections as follows: theory and methods and applications.
- Autor: Julian, Vicente
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 19.11.2024
- Genre: Sonstiges
Intelligent Data Engineering and Automated Learning – IDEAL 2024
This two-volume set, LNCS 15346 and LNCS 15347, constitutes the proceedings of the 25th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2024, held in Valencia, Spain, during November 20–22, 2024.
The 86 full papers and 6 short papers presented in this book were carefully reviewed and selected from 130 submissions. IDEAL 2024 is focusing on Big Data Analytics and Privacy, Machine Learning & Deep Learning for Real-World Applications, Data Mining and Pattern Recognition, Information Retrieval and Management, Bio and Neuro-Informatics, and Hybrid Intelligent Systems and Agents.
- Autor: Menéndez, Héctor D.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 24.01.2025
- Genre: Sonstiges
Testing Software and Systems
This book constitutes the refereed proceedings of the 36th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2024, held in London, UK, during October 30–November 1, 2024.
The 17 full papers and 5 short papers included in this book were carefully reviewed and selected from 40 submissions. They were organized in topical sections as follows: Best Paper Award; Industry and Challenge Tracks; Mutation Testing and Code Generation; Advancing Code Vulnerability Detection; Short Papers; Tutorial; Journal First; Health Track; Innovations in Software Testing and AI Compliance; Improving Software Testing Reliability and Advancements in Testing Methodologies.
- Autor: Juan, Angel A.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 28.04.2025
- Genre: Sonstiges
Simulation Tools and Techniques
This book constitutes the refereed post-conference proceedings of the 16th EAI International Conference on Simulation Tools and Techniques, SIMUTools 2024, held in Bratislava, Slovakia, in December 2024.
The 26 full papers included in this book were carefully reviewed and selected from 63 submissions. They were organized in topical sections as follows: simulation tools and methods, traffic simulations, logistics and manufacturing, robotics simulations, applications of simulations, and network simulations.
- Autor: Jager, Tibor
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.05.2025
- Genre: Sonstiges
Public-Key Cryptography – PKC 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
- Autor: Jager, Tibor
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.05.2025
- Genre: Sonstiges
Public-Key Cryptography – PKC 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.
The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
- Autor: Adi, Kamel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 29.05.2025
- Genre: Krimi
Foundations and Practice of Security
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024.
The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections:
Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical
infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.
- Autor: Caino-Lores, Silvina
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.06.2025
- Genre: Sonstiges
Euro-Par 2024: Parallel Processing Workshops
The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.
Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops:
– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)
In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions.
- Autor: Caino-Lores, Silvina
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 10.06.2025
- Genre: Sonstiges
Euro-Par 2024: Parallel Processing Workshops
The two-volume set LNCS 15385 + 15386 constitutes the proceedings of the workshops and associated events that were held in conjunction with the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26–30, 2024.
Overall, the Euro-Par Workshops received a total of 84 submissions of which 60 were accepted for presentation. They stem from the following workshops:
– The 1st European Workshop on Quantum Computing for High-Performance Computing (EUROQHPC 2024)
– The 19th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 2024)
– The 1st Workshop in High-Performance Computing in Physics (PHYSHPC 2024)
– The 4th Workshop on Asynchronous Many-Task Systems for Exascale (AMTE 2024)
– The 3rd EuroHPC Workshop on Dynamic Resources in HPC (DYNRESHPC 2024)
– The 22nd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2024)
– The 1st Workshop on Next Steps in IoT-Edge-Cloud Continuum Evolution: Research and Practice (IECCONT 2024)
– The 1st Workshop about High-Performance e-Science (HIPES 2024)
– The 2nd International Workshop on Scalable Compute Continuum (WSCC 2024)
In addition, the proceedings contain 14 poster and demo papers that have been accepted from 30 submissions, and 18 contributions in the PhD Symposium track that were accepted from 22 submissions.
- Autor: Egele, Manuel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 09.07.2025
- Genre: Krimi
Detection of Intrusions and Malware, and Vulnerability Assessment
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections:
Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation.
Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
- Autor: Drevin, Lynette
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.07.2025
- Genre: Krimi
Information Security Education. Empowering People Through Information Security Education
This book constitutes the refereed proceedings of the 17th IFIP WG 11.8 World Conference on Information Security Education, WISE 2025, held in Maribor, Slovenia, during May 21–23, 2025.
The 13 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in the following topical sections: Workforce and Curriculum Development; Curriculum and Research Development; Gamification in Cybersecurity Education; Innovative Approaches to Cybersecurity Awareness; Papers Invited from SEC; and Discussions.
- Autor: Mercier-Laurent, Eunika
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 30.09.2025
- Genre: Sonstiges
Computational Intelligence in Data Science
The three-volume set IFIP ICCIDS 748, 749 and 750 constitutes the refereed post-conference proceedings of the 8th IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2025, held in Chennai, India, during February 12–14, 2025.
The 91 papers including 70 regular papers and 21 short papers included in these proceedings were carefully reviewed and selected from 317 submissions. The papers are organized in the following topical sections:
Part I: Computer Vision for Real World Applications.
Part II: Computer Vision for Real World Applications; Emerging Trends in AI for Speech and Text.
Part III: Emerging Trends in AI for Speech and Text; Computational Intelligence for Secure, Smart and Sustainable Applications
- Autor: Singh, Sukhdeep
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 15.12.2025
- Genre: Sonstiges
GenAI and LLMs for Beyond 5G Networks
Beyond 5G and 6G Networks, the AI-Native Revolution explores the transformative convergence of generative artificial intelligence (GenAI), large language models (LLMs), and next-generation telecommunications. This book delves into the architectural innovations enabling AI-driven connectivity, from intelligent edge devices to adaptive radio access networks. It covers the integration of GenAI for real-time network optimization, generative modeling of wireless channels, and advanced analytics for actionable insights. Security frameworks for AI-native systems, orchestration of autonomous networks, and the fusion of AI with signal processing are thoroughly examined, offering practical solutions for researchers, engineers, and policymakers.
The book also addresses the challenges of computational constraints, ethical dilemmas, and regulatory complexities in deploying AI-driven networks. It provides a technical yet accessible roadmap for building equitable, trustworthy, and efficient systems, balancing innovation with responsibility. With insights grounded in rigorous research and real-world applications, this work is a guide for students, practitioners, and visionaries shaping the future of connectivity. It invites readers to reimagine networks as intelligent ecosystems that anticipate needs and empower humanity’s highest aspirations.
- Band: 441
- Autor: Gladyshev, Pavel
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.06.2022
- Genre: Krimi
Digital Forensics and Cyber Crime
The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
- Band: 570
- Autor: Goel, Sanjay
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 02.04.2024
- Genre: Krimi
Digital Forensics and Cyber Crime
The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.
- Band: 1524
- Autor: Kamp, Michael
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.02.2022
- Genre: Kinderbuch
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
- Band: 1621
- Autor: Vallecillo, Antonio
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 05.09.2022
- Genre: Krimi
Quality of Information and Communications Technology
The 18 full papers and 3 short papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections: smart and advanced systems; verification and validation; skills and education; industrial experiences and applications; safety, security and privacy.
- Band: 1689
- Autor: Dziech, Andrzej
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 14.10.2022
- Genre: Krimi
Multimedia Communications, Services and Security
The 13 full papers included in this book were carefully reviewed and selected from 33 submissions. The papers cover ongoing research activities in the following topics: cybersecurity, multimedia services; intelligent monitoring; audio-visual systems; biometric applications; experiments and deployments.
- Band: 1753
- Autor: Koprinska, Irena
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 30.01.2023
- Genre: Krimi
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
The 73 revised full papers and 6 short papers presented in this book were carefully reviewed and selected from 143 submissions. ECML PKDD 2022 presents the following five workshops:
Workshop on Data Science for Social Good (SoGood 2022)
Workshop on New Frontiers in Mining Complex Patterns (NFMCP 2022)
Workshop on Explainable Knowledge Discovery in Data Mining (XKDD 2022)
Workshop on Uplift Modeling (UMOD 2022)
Workshop on IoT, Edge and Mobile for Embedded Machine Learning (ITEM 2022)
Workshop on Mining Data for Financial Application (MIDAS 2022)
Workshop on Machine Learning for Cybersecurity (MLCS 2022)
Workshop on Machine Learning for Buildings Energy Management (MLBEM 2022)
Workshop on Machine Learning for Pharma and Healthcare Applications (PharML 2022)
Workshop on Data Analysis in Life Science (DALS 2022)
Workshop on IoT Streams for Predictive Maintenance (IoT-PdM 2022)
- Band: 1871
- Autor: Fernandes, José Maria
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 12.09.2023
- Genre: Krimi
Quality of Information and Communications Technology
- Band: 13041
- Autor: Yang, Min
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.01.2022
- Genre: Krimi
Network and System Security
This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021.
The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
- Band: 13049
- Autor: Batina, Lejla
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.04.2022
- Genre: Krimi
Security and Artificial Intelligence
The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blindmode and revised.
- Band: 13285
- Autor: Zhou, Jianying
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.09.2022
- Genre: Krimi
Applied Cryptography and Network Security Workshops
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event.
The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:
– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security
– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security
– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security
– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy
– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies
– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
- Band: 13504
- Autor: Cheng, Chen-Mou
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 11.08.2022
- Genre: Krimi
Advances in Information and Computer Security
- Band: 13556
- Autor: Atluri, Vijayalakshmi
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.09.2022
- Genre: Krimi
Computer Security – ESORICS 2022
The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows:
Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;
Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.- Band: 13620
- Autor: Su, Chunhua
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 18.11.2022
- Genre: Krimi
Information Security Practice and Experience
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022.
The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions.
The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
- Band: 13877
- Autor: Jourdan, Guy-Vincent
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 31.03.2023
- Genre: Krimi
Foundations and Practice of Security
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
- Band: 14128
- Autor: Shikata, Junji
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.08.2023
- Genre: Krimi
Advances in Information and Computer Security
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29–31, 2023. This event was held in hybrid mode.
The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
- Band: 14496
- Autor: Sheng, Bin
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 28.12.2023
- Genre: Sonstiges
Advances in Computer Graphics
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
- Band: 14498
- Autor: Sheng, Bin
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.12.2023
- Genre: Sonstiges
Advances in Computer Graphics
The 149 papers in this set were carefully reviewed and selected from 385 submissions. They are organized in topical sections as follows: Detection and Recognition; Image Analysis and Processing; Image Restoration and Enhancement; Image Attention and Perception; Reconstruction; Rendering and Animation; Synthesis and Generation; Visual Analytics and Modeling; Graphics and AR/VR; Medical Imaging and Robotics; Theoretical Analysis; Image Analysis and Visualization in Advanced Medical Imaging Technology; Empowering Novel Geometric Algebra for Graphics and Engineering.
- Band: 15181
- Autor: Wu, Jia
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.10.2024
- Genre: Sonstiges
Computational Mathematics Modeling in Cancer Analysis
This book constitutes the refereed proceedings of Third International Workshop on Computational Mathematics Modeling in Cancer Analysis, CMMCA 2024, held in Marrakesh, Morocco, on October 6, 2024, in conjunction with MICCAI 2024.
The 12 full papers presented in this book were carefully reviewed and selected from 14 submissions. CMMCA serves as a platform for collaboration among professionals in mathematics, engineering, computer science, and medicine, focusing on innovative mathematical methods for analyzing complex cancer data.






































