top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cloud Computing and Security [[electronic resource] ] : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Cloud Computing and Security [[electronic resource] ] : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVIII, 743 p. 290 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer security
Artificial intelligence
Information Systems Applications (incl. Internet)
Systems and Data Security
Artificial Intelligence
ISBN 3-030-00009-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security.
Record Nr. UNISA-996466198703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cloud Computing, Security, Privacy in New Computing Environments [[electronic resource] ] : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings / / edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu
Cloud Computing, Security, Privacy in New Computing Environments [[electronic resource] ] : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings / / edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 240 p. 61 illus.)
Disciplina 004.6782
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Application software
Computer security
Data encryption (Computer science)
Data protection
Artificial intelligence
Computer Communication Networks
Information Systems Applications (incl. Internet)
Systems and Data Security
Cryptology
Security
Artificial Intelligence
ISBN 3-319-69605-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV.  .
Record Nr. UNINA-9910299289503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Collaborate Computing: Networking, Applications and Worksharing [[electronic resource] ] : 12th International Conference, CollaborateCom 2016, Beijing, China, November 10–11, 2016, Proceedings / / edited by Shangguang Wang, Ao Zhou
Collaborate Computing: Networking, Applications and Worksharing [[electronic resource] ] : 12th International Conference, CollaborateCom 2016, Beijing, China, November 10–11, 2016, Proceedings / / edited by Shangguang Wang, Ao Zhou
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 699 p. 279 illus.)
Disciplina 004.6
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Information storage and retrieval
Artificial intelligence
Application software
Computer communication systems
Computer security
E-commerce
Information Storage and Retrieval
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
Systems and Data Security
e-Commerce/e-business
ISBN 3-319-59288-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto participatory sensing -- crowdsourcing, and citizen science -- architectures, protocols, and enabling technologies for collaborative computing networks and systems -- autonomic computing and quality of services in collaborative networks, systems, and applications -- collaboration in pervasive and cloud computing environments -- collaboration in data-intensive scientific discovery -- collaboration in social media -- big data and spatio-temporal data in collaborative environments/systems -- collaboration techniques in data-intensive computing and cloud computing.
Record Nr. UNINA-9910254812103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VIII, 293 p. 182 illus., 114 illus. in color.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Artificial intelligence
Special purpose computers
Computer security
Computer Communication Networks
Artificial Intelligence
Special Purpose and Application-Based Systems
Systems and Data Security
ISBN 3-030-10659-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementation of Energy Efficient WBAN Using IEEE 802.15.6 Scheduled Access MAC for e-Healthcare -- Improved Physical Downlink Control Channel for 3GPP Massive Machine Type Communications -- User Response Based Recommendations -- Game Theory Based Network Partitioning Approaches for Controller Placement in SDN -- NeMoI: Network Mobility in ICN -- On the Impact of Duty Cycled LTE-U on Wi-Fi Users -- Pricing and Commission in Two-Sided Markets with Free Upgrades -- A Directional Medium Access Control Protocol for 5G Millimeter-Wave Local Area Networks -- INCARNATE: An Interference and Mobility Aware Spatial Scheme for Tightly Coupled LTE-Wi-Fi Networks -- PKHSN: A Pairing Based Key Management Scheme for Heterogeneous Sensor Networks -- Use of Facial Landmarks for Adaptive Compression of Videos on Mobile Devices -- Leveraging SDN for Early Detection and Mitigation of DDoS Attacks.
Record Nr. UNINA-9910337584403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VIII, 293 p. 182 illus., 114 illus. in color.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Artificial intelligence
Special purpose computers
Computer security
Computer Communication Networks
Artificial Intelligence
Special Purpose and Application-Based Systems
Systems and Data Security
ISBN 3-030-10659-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementation of Energy Efficient WBAN Using IEEE 802.15.6 Scheduled Access MAC for e-Healthcare -- Improved Physical Downlink Control Channel for 3GPP Massive Machine Type Communications -- User Response Based Recommendations -- Game Theory Based Network Partitioning Approaches for Controller Placement in SDN -- NeMoI: Network Mobility in ICN -- On the Impact of Duty Cycled LTE-U on Wi-Fi Users -- Pricing and Commission in Two-Sided Markets with Free Upgrades -- A Directional Medium Access Control Protocol for 5G Millimeter-Wave Local Area Networks -- INCARNATE: An Interference and Mobility Aware Spatial Scheme for Tightly Coupled LTE-Wi-Fi Networks -- PKHSN: A Pairing Based Key Management Scheme for Heterogeneous Sensor Networks -- Use of Facial Landmarks for Adaptive Compression of Videos on Mobile Devices -- Leveraging SDN for Early Detection and Mitigation of DDoS Attacks.
Record Nr. UNISA-996466454903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications [[electronic resource] /] / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications [[electronic resource] /] / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 455 p. 170 illus., 12 illus. in color.)
Disciplina 006.3
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Computer security
Artificial intelligence
Computational Intelligence
Systems and Data Security
Artificial Intelligence
ISBN 3-319-05885-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Forensic Discovery and Investigation -- Intelligent Forensic Science Applications.
Record Nr. UNINA-9910299719203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Cyber Security and Computational Models [[electronic resource] ] : Proceedings of ICC3 2015 / / edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten
Computational Intelligence, Cyber Security and Computational Models [[electronic resource] ] : Proceedings of ICC3 2015 / / edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (575 p.)
Disciplina 006
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Computer security
Computer science—Mathematics
Computer mathematics
Artificial intelligence
Computational Intelligence
Systems and Data Security
Mathematical Applications in Computer Science
Artificial Intelligence
ISBN 981-10-0251-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I_Keynote Address: 1. The game of Wall Cops and Robbers -- 2. Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition -- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique -- Chapter 3. Kernel Online Multi-task Learning -- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario -- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution -- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals -- Chapter 7. Suspicious Human Activity Detection in Classroom Examination -- Chapter 8. H ∞ State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach -- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References -- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain -- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set -- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques -- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services -- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach -- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays -- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms -- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features -- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission -- Chapter 19. An Efficient Approach for MapReduce Result Verification -- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System -- Chapter 23. Human Gait Recognition Using Fuzzy Logic -- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis -- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine -- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine -- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme -- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems -- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix -- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers -- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation -- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions -- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques -- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication -- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes -- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management -- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks -- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing -- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM) -- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping -- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model -- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection -- Chapter 44. Venus Flytrap Optimization -- Chapter 45. Zumkeller Cordial Labeling of Graphs -- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments -- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation -- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process -- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method.
Record Nr. UNINA-9910254198403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation [[electronic resource] ] : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings / / edited by Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation [[electronic resource] ] : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings / / edited by Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 255 p. 89 illus.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computational intelligence
Artificial intelligence
Optical data processing
Computer science—Mathematics
Systems and Data Security
Computational Intelligence
Artificial Intelligence
Image Processing and Computer Vision
Mathematics of Computing
ISBN 981-13-0716-4
978-981-13-0716-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Short Review of Recent ELM Applications -- Critical Feature Selection and Critical Sampling for Data Mining -- From Recognition to Generation using Deep Learning: A Case Study with Video Generation -- Economic Dispatch Problem using Clustered Firefly -- Algorithm for Wind Thermal Power System -- A Novel and Efficient Multi-Hop Routing Algorithm for Manet -- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm -- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images -- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks -- Frequent Sequence Mining Approach to Video Compression -- Deep Learning based Audio Scene Classification -- Cyber Security -- Certain Challenges in Biometrics System Development -- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks -- Computational Models -- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears -- Violation Resolution in Distributed Stream Networks -- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience -- Hyers-Ulam Stability of Linear Differential Equations -- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure -- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers -- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption -- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative -- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid.
Record Nr. UNINA-9910299301303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXIII, 596 p. 289 illus., 217 illus. in color.)
Disciplina 006.6
006.37
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Optical data processing
Pattern recognition
Artificial intelligence
Computer communication systems
Computer security
Image Processing and Computer Vision
Pattern Recognition
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-29891-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Systems -- Real-time and GPU Processing -- Image Segmentation -- Image and Texture Analysis -- Machine Learning for Image and Pattern Analysis -- Data Sets and Benchmarks -- Structural and Computational Pattern Recognition; Posters. .
Record Nr. UNINA-9910349303603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXIII, 596 p. 289 illus., 217 illus. in color.)
Disciplina 006.6
006.37
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Optical data processing
Pattern recognition
Artificial intelligence
Computer communication systems
Computer security
Image Processing and Computer Vision
Pattern Recognition
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-29891-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Systems -- Real-time and GPU Processing -- Image Segmentation -- Image and Texture Analysis -- Machine Learning for Image and Pattern Analysis -- Data Sets and Benchmarks -- Structural and Computational Pattern Recognition; Posters. .
Record Nr. UNISA-996466426503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui