Current Approaches and Applications in Natural Language Processing |
Autore | Montejo-Ráez Arturo |
Pubbl/distr/stampa | Basel, : MDPI Books, 2022 |
Descrizione fisica | 1 electronic resource (476 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
natural language processing
distributional semantics machine learning language model word embeddings machine translation sentiment analysis quality estimation neural machine translation pretrained language model multilingual pre-trained language model WMT neural networks recurrent neural networks named entity recognition multi-modal dataset Wikimedia Commons multi-modal language model concreteness curriculum learning electronic health records clinical text relationship extraction text classification linguistic corpus deception linguistic cues statistical analysis discriminant function analysis fake news detection stance detection social media abstractive summarization monolingual models multilingual models transformer models transfer learning discourse analysis problem-solution pattern automatic classification machine learning classifiers deep neural networks question answering machine reading comprehension query expansion information retrieval multinomial naive bayes relevance feedback cause-effect relation transitive closure word co-occurrence automatic hate speech detection multisource feature extraction Latin American Spanish language models fine-grained named entity recognition k-stacked feature fusion dual-stacked output unbalanced data problem document representation semantic analysis conceptual modeling universal representation trend analysis topic modeling Bert geospatial data technology and application attention model dual multi-head attention inter-information relationship question difficult estimation named-entity recognition BERT model conditional random field pre-trained model fine-tuning feature fusion attention mechanism task-oriented dialogue systems Arabic multi-lingual transformer model mT5 language marker mental disorder deep learning LIWC spaCy RobBERT fastText LIME conversational AI intent detection slot filling retrieval-based question answering query generation entity linking knowledge graph entity embedding global model DISC model personality recognition predictive model text analysis data privacy federated learning transformer |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910595079903321 |
Montejo-Ráez Arturo
![]() |
||
Basel, : MDPI Books, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Energy Data Analytics for Smart Meter Data |
Autore | Reinhardt Andreas |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
Descrizione fisica | 1 electronic resource (346 p.) |
Soggetto topico | Technology: general issues |
Soggetto non controllato |
smart grid
nontechnical losses electricity theft detection synthetic minority oversampling technique K-means cluster random forest smart grids smart energy system smart meter GDPR data privacy ethics multi-label learning Non-intrusive Load Monitoring appliance recognition fryze power theory V-I trajectory Convolutional Neural Network distance similarity matrix activation current electric vehicle synthetic data exponential distribution Poisson distribution Gaussian mixture models mathematical modeling machine learning simulation Non-Intrusive Load Monitoring (NILM) NILM datasets power signature electric load simulation data-driven approaches smart meters text convolutional neural networks (TextCNN) time-series classification data annotation non-intrusive load monitoring semi-automatic labeling appliance load signatures ambient influences device classification accuracy NILM signature load disaggregation transients pulse generator smart metering smart power grids power consumption data energy data processing user-centric applications of energy data convolutional neural network energy consumption energy data analytics energy disaggregation real-time smart meter data transient load signature attention mechanism deep neural network electrical energy load scheduling satisfaction Shapley Value solar photovoltaics review deep learning deep neural networks |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557645803321 |
Reinhardt Andreas
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNINA-9910293140103321 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNISA-996465583103316 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Theoretical Computer Science and Discrete Mathematics |
Autore | Rodríguez Velázquez Juan Alberto |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (257 p.) |
Soggetto topico |
Research & information: general
Mathematics & science |
Soggetto non controllato |
fuzzy set
n-Pythagorean n-PFS algebra triangular norms outer-independent Roman domination Roman domination vertex cover rooted product graph total domination domination secure domination secure Italian domination weak roman domination w-domination cryptanalysis group key establishment topology optimization optimization filtering method penalization weight factor FEM MATLAB SIMP estimated prime factor integer factorisation problem continued fraction Fermat's Factoring Algorithm genetic algorithm AES(t) heuristics microaggregation statistical disclosure control graph theory traveling salesman problem data privacy location privacy differentials in graphs strong differential quasi-total strong differential quasi-total Italian domination number numerical semigroup forest ordinarization transform quasi-ordinarization transform load redistribution leveling power consumption per phase three-phase asymmetric distribution networks ideal power consumption mixed-integer convex optimization strongly total Roman domination total Roman domination lexicographic product graph improved crow search algorithm normal Gaussian distribution phase swapping problem power losses asymmetric distribution grids vortex search algorithm nonidentical parallel production lines axle housing machining mixed model production eligibility constraint fuzzy due date grey wolf optimizer |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557617003321 |
Rodríguez Velázquez Juan Alberto
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|