| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990002535300403321 |
|
|
Autore |
COMPSTAT 1976 |
|
|
Titolo |
Proceedings Computational Statistics Symposium held in Berlin West / Jhannes Gordesch, Peter Naeve |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Wien : Physica-Verlag, 1976 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910872192703321 |
|
|
Autore |
Kole Dipak Kumar |
|
|
Titolo |
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2 / / edited by Dipak Kumar Kole, Shubhajit Roy Chowdhury, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (694 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 975 |
|
|
|
|
|
|
Altri autori (Persone) |
|
Roy ChowdhuryShubhajit |
BasuSubhadip |
PlewczynskiDariusz |
BhattacharjeeDebotosh |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Artificial intelligence |
Computational intelligence |
Bioinformatics |
Communications Engineering, Networks |
Artificial Intelligence |
Computational Intelligence |
Computational and Systems Biology |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Chapter 1: An Optimal Edge Server Placement Algorithm based on Glow-Worm Swarm Optimization Technique -- Chapter 2: A 6G-enabled edge-assisted Internet of Drone Things ecosystem for fire detection -- Chapter 3: An automated secure smart-contract driven KYC solution -- Chapter 4: Enhancing PopSAD: A New Approach to Shilling Attack Detection in Collaborative Recommenders -- Chapter 5: Coverless Steganography: A Comprehensive Study on Concealing Data without a Cover Medium -- Chapter 6: IRS-assisted Wireless Systems: Phase Setting and BER Analysis -- Chapter 7: Secured Authentication Scheme for E-Healthcare in SIoT using ECC and Improved Hash function -- Chapter 8: Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing -- Chapter 9: Anomaly Detection based Resource Autoscaling Mechanism for Fog Computing -- Chapter 10: On Coverage and Connectivity with Reduced Sensing Redundancy based on Genetic Algorithm. etc. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book gathers high-quality research papers presented at the 4th International Conference on Frontiers in Computing and Systems (COMSYS 2023) held at Indian Institute of Technology Mandi, Himachal Pradesh, India, during 16–17 October 2023. The book is divided into two volumes, and it covers research in “cyber-physical systems for real-life applications” pertaining to AI, machine learning and data science; devices, circuits, and systems; computational biology, biomedical informatics, and network medicine; communication networks, cloud computing, and IoT; image, video, and signal processing; and security and privacy. |
|
|
|
|
|
|
|
| |