LEADER 00831nam0-22003011i-450- 001 990006072010403321 005 20080911113605.0 035 $a000607201 035 $aFED01000607201 035 $a(Aleph)000607201FED01 035 $a000607201 100 $a20000112d1959----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay---n---001yy 200 1 $aEpicuro e Marco Aurelio$edue studi sulla saggezza antica$fDomenico Pesce 210 $aFirenze$cLa nuova Italia$d1959 215 $a84 p.$d24 cm 225 1 $aPensatori antichi e moderni$v55 676 $a187 700 1$aPesce,$bDomenico$0155472 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006072010403321 952 $aXI Q 63 (55)$b63316$fFGBC 959 $aFGBC 996 $aEpicuro e Marco Aurelio$9220392 997 $aUNINA LEADER 06422nam 22006735 450 001 996466371503316 005 20200705131036.0 010 $a3-030-34139-9 024 7 $a10.1007/978-3-030-34139-8 035 $a(CKB)4100000009759183 035 $a(DE-He213)978-3-030-34139-8 035 $a(MiAaPQ)EBC5971327 035 $a(PPN)255496842 035 $a(EXLCZ)994100000009759183 100 $a20191102d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSmart Computing and Communication$b[electronic resource] $e4th International Conference, SmartCom 2019, Birmingham, UK, October 11?13, 2019, Proceedings /$fedited by Meikang Qiu 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIV, 412 p. 203 illus., 133 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11910 311 $a3-030-34138-0 320 $aIncludes bibliographical references and index. 327 $aA Survey of Deep Learning Applied to Story Generation. -- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates -- An Improved Prediction Model for the Network Security Situation -- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles -- An Improved Assessment Method for the Network Security Risk -- A High-Performance Storage System Based with Dual RAID Engine -- An Universal Perturbation Generator for Black-box Attacks against Object Detectors -- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle -- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification -- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs -- I2P Anonymous Communication Network Measurement and Analysis -- Plot Digitizing over Big Data Using Beam Search -- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud -- Do Top Socail APPS Effect Voice Call? Evidence from Propensity Score Matching Methods -- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB -- Smart Custom Package Decision for Mobile Internet Services -- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City -- Automated Classification of Attacker Privileges Based on Deep Neural Network -- nnD: Shallow Neural Network Based Collision Decoding in IoT communications -- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction -- An Elephant Ow Detection Method Based on Machine Learning -- AI Enhanced Automatic Response System for Resisting Network Threats -- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking -- EIGRP to OSPF Migration in Production Network -- A Hardware Trojan Detection Method Design Based on TensorFlow -- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation -- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery -- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network -- Analysis and Prediction of Commercial Big Data Based on WIFI Probe -- Design and Optimization of Camera HAL Layer Based on Android -- Music Rhythm Customized Mobile Application Based on Information Extraction -- Computational Challenges and Opportunities in Financial Services -- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme -- Applications of Machine Learning Tools in Genomics: A Review -- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context -- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts -- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi -- Research on Template-based Factual Automatic Question Answering Technology -- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm -- Machine Learning for Cancer Subtype Prediction with FSA Method -- Autonomous Vehicle Communication In V2X Network With LoRa Protocol. . 330 $aThis book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11910 606 $aComputer communication systems 606 $aArtificial intelligence 606 $aApplication software 606 $aComputer networks$xSecurity measures 606 $aOptical data processing 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 615 0$aComputer communication systems. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputer networks$xSecurity measures. 615 0$aOptical data processing. 615 14$aComputer Communication Networks. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aMobile and Network Security. 615 24$aImage Processing and Computer Vision. 676 $a004.6 702 $aQiu$b Meikang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466371503316 996 $aSmart Computing and Communication$91939023 997 $aUNISA LEADER 01150nam0 22002771i 450 001 UON00294114 005 20231205103934.732 010 $a88-8096-541-7 100 $a20070504d1997 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆL'‰ode 1., 4 di Orazio$etra modelli e struttura$fLuca Mondin - Napoli$eLoffredo, 1997 - 231 p. ; 22 cm 410 1$1001UON00087893$12001 $aStudi latini$eCollana diretta da Fabio e Giovanni Cupaiuolo$v22 510 1$3UON00376748$aCarmina : Soluitur acra 606 $aORAZIO FLACCO, Quinto$xOpere$xCarmina. L. 1., 4$3UONC063985$2FI 620 $aIT$dNapoli$3UONL000012 676 $a874.1$cPOESIA LIRICA LATINA. ORIGINI-500$v21 700 1$aMONDIN$bLuca$3UONV169297$0222922 712 $aLoffredo$3UONV247567$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00294114 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI T 2 HOR. 5100 $eSI MC 31114 5 996 $aOde 1., 4 di Orazio$9669658 997 $aUNIOR