| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNIBAS000028915 |
|
|
Autore |
Irving, John <1942-> |
|
|
Titolo |
The hotel New Hampshire / John Irving |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9911015627203321 |
|
|
Autore |
Jin Hai |
|
|
Titolo |
Artificial Intelligence and Machine Learning : Second International Artificial Intelligence Conference, IAIC 2024, Jinyun, China, November 8–10, 2024, Revised Selected Papers, Part II / / edited by Hai Jin |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (325 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 2452 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Artificial intelligence |
Data protection |
Application software |
Computer networks |
Machine learning |
Artificial Intelligence |
Data and Information Security |
Computer and Information Systems Applications |
Computer Communication Networks |
Machine Learning |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Artificial Intelligence in Network and Security Systems. -- Noise-Resilient Compressive Sensing via Orthogonality Constraints. -- Joint Sensing of Computing Power and Network for Smart Grid: A Deep Matrix Completion Approach. -- Rethinking RSSI-based Key Extraction for UAVs and Ground Stations. -- Campus Card Security Depository System based on State Secret Algorithm. -- Network Traffic Classification via Deep Hashing Network. -- A Trust Management Integrated Bayesian Network Prediction in Vehicular Networks. -- Research and Development of Distribution Line Defects and Violations Detection Method and Edge Computing System Based on Improved PPYOLOe. -- A Joint Optimization Algorithm for Computing Resource Allocation, UAV Trajectory, and Task Offloading in Remote Regional VANETs. -- LSTMR: Spatio-Temporal 3D Multiscale ResNet Model for Cellular Network Traffic Prediction. -- An Efficient Name Lookup Approach Based on Character Indexing. -- A Multi-Channel Target Direction Speech Separation Model Based on Efficient Convolutional Networks. -- Secure Cloud-Edge Collaborative Task Scheduling Framework Across Data Centers. -- Research on Security Sharing Mechanism of Cyber Threat Intelligence Based on Consortium Blockchain. -- Towards Automated Decoding of Vehicle CAN Data using Deep Learning. -- Transfer Learning-driven Surrogate-assisted Differential Evolution Algorithm with User Generated Content. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024. The 38 full papers presented were carefully reviewed and selected from 100 submissions.They were organized in following topical sections as follows: Part I : Artificial Intelligence in Real-World Applications. Part II : Artificial Intelligence in Network and Security systems. |
|
|
|
|
|
|
|
| |