| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910484607003321 |
|
|
Titolo |
Simulation and Modeling Methodologies, Technologies and Applications : 8th International Conference, SIMULTECH 2018, Porto, Portugal, July 29-31, 2018, Revised Selected Papers / / edited by Mohammad S. Obaidat, Tuncer Ören, Floriano De Rango |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (211 pages) |
|
|
|
|
|
|
Collana |
|
Advances in Intelligent Systems and Computing, , 2194-5365 ; ; 947 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Artificial intelligence |
Computer simulation |
Computational Intelligence |
Artificial Intelligence |
Computer Modelling |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Atomistic Modelling and Simulation of Transmission Electron Microscopy Images: Application to Intrinsic Defects of Graphene -- Using Simulation in Business Process Analysis and Risk Management: The Blood Bank Case Study -- An SDN/NFV Based Approach for Mobility Management in 5G Networks -- Dockemu: An IoT Simulation Framework based on Linux Containers and the ns-3 Network Simulator - Application to CoAP IoT Scenarios -- Iterative Construction of Complete Lyapunov Functions: Analysis of Algorithm Efficiency -- A Pre-step Stabilization Method for Non-iterative Co-simulation and Effects of Interface-jacobians Identification -- A Heating Systems Application of Feedback Linearization for MTI Systems in a Tensor Framework -- Syntactic Generation of Similar Pictures -- Mathematical Modeling of Alkaline Methanol Oxidation for Design of Efficient Fuel Cells. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book includes a selection of papers from the 8th International |
|
|
|
|
|
|
|
|
|
|
|
|
|
Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2018), held in Porto, Portugal, from July 29 to 31, 2018. Presenting new and innovative solutions, the book features extended and revised versions of the very best conference papers as well as the latest research in the field. . |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910364954603321 |
|
|
Titolo |
Information Systems Security : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings / / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xviii, 345 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 11952 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer vision |
Computer networks |
Computers, Special purpose |
Application software |
Database management |
Data and Information Security |
Computer Vision |
Computer Communication Networks |
Special Purpose and Application-Based Systems |
Computer and Information Systems Applications |
Database Management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Smart contracts -- Formal techniques -- Access control -- Machine learning -- Distributed systems -- Cryptography -- Online social |
|
|
|
|
|
|
|
|
|
|
|
networks -- Images and cryptography. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019. The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions. The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography. |
|
|
|
|
|
|
|
| |