Current Approaches and Applications in Natural Language Processing
| Current Approaches and Applications in Natural Language Processing |
| Autore | Montejo-Ráez Arturo |
| Descrizione fisica | 1 online resource (476 p.) |
| Soggetto topico |
History of engineering & technology
Technology: general issues |
| Soggetto non controllato |
abstractive summarization
Arabic attention mechanism attention model automatic classification automatic hate speech detection Bert BERT model cause-effect relation clinical text conceptual modeling concreteness conditional random field conversational AI curriculum learning data privacy deception deep learning deep neural networks DISC model discourse analysis discriminant function analysis distributional semantics document representation dual multi-head attention dual-stacked output electronic health records entity embedding entity linking fake news detection fastText feature fusion federated learning fine-grained named entity recognition fine-tuning geospatial data technology and application global model information retrieval intent detection inter-information relationship k-stacked feature fusion knowledge graph language marker language model Latin American Spanish language models LIME linguistic corpus linguistic cues LIWC machine learning machine learning classifiers machine reading comprehension machine translation mental disorder monolingual models mT5 multi-lingual transformer model multi-modal dataset multi-modal language model multilingual models multilingual pre-trained language model multinomial naive bayes multisource feature extraction n/a named entity recognition named-entity recognition natural language processing neural machine translation neural networks personality recognition pre-trained model predictive model pretrained language model problem-solution pattern quality estimation query expansion query generation question answering question difficult estimation recurrent neural networks relationship extraction relevance feedback retrieval-based question answering RobBERT semantic analysis sentiment analysis slot filling social media spaCy stance detection statistical analysis task-oriented dialogue systems text analysis text classification topic modeling transfer learning transformer transformer models transitive closure trend analysis unbalanced data problem universal representation Wikimedia Commons WMT word co-occurrence word embeddings |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910595079903321 |
Montejo-Ráez Arturo
|
||
| Lo trovi qui: Univ. Federico II | ||
| ||
Energy Data Analytics for Smart Meter Data
| Energy Data Analytics for Smart Meter Data |
| Autore | Reinhardt Andreas |
| Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
| Descrizione fisica | 1 online resource (346 p.) |
| Soggetto topico | Technology: general issues |
| Soggetto non controllato |
activation current
ambient influences appliance load signatures appliance recognition attention mechanism convolutional neural network Convolutional Neural Network data annotation data privacy data-driven approaches deep learning deep neural network deep neural networks device classification accuracy distance similarity matrix electric load simulation electric vehicle electrical energy electricity theft detection energy consumption energy data analytics energy data processing energy disaggregation ethics exponential distribution fryze power theory Gaussian mixture models GDPR K-means cluster load disaggregation load scheduling machine learning mathematical modeling multi-label learning n/a NILM NILM datasets non-intrusive load monitoring Non-intrusive Load Monitoring Non-Intrusive Load Monitoring (NILM) nontechnical losses Poisson distribution power consumption data power signature pulse generator random forest real-time review satisfaction semi-automatic labeling Shapley Value signature simulation smart energy system smart grid smart grids smart meter smart meter data smart metering smart meters smart power grids solar photovoltaics synthetic data synthetic minority oversampling technique text convolutional neural networks (TextCNN) time-series classification transient load signature transients user-centric applications of energy data V-I trajectory |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910557645803321 |
Reinhardt Andreas
|
||
| Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
| Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
| Autore | Ralf Küsters |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Springer Nature, 2018 |
| Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
| Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
| ISBN | 3-319-89722-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
| Record Nr. | UNINA-9910293140103321 |
Ralf Küsters
|
||
| Springer Nature, 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
| Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
| Autore | Ralf Küsters |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Springer Nature, 2018 |
| Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
| Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
| ISBN | 3-319-89722-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
| Record Nr. | UNISA-996465583103316 |
Ralf Küsters
|
||
| Springer Nature, 2018 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Theoretical Computer Science and Discrete Mathematics
| Theoretical Computer Science and Discrete Mathematics |
| Autore | Rodríguez Velázquez Juan Alberto |
| Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
| Descrizione fisica | 1 online resource (257 p.) |
| Soggetto topico |
Mathematics & science
Research & information: general |
| Soggetto non controllato |
AES(t)
asymmetric distribution grids axle housing machining continued fraction cryptanalysis data privacy differentials in graphs domination eligibility constraint estimated prime factor FEM Fermat's Factoring Algorithm filtering forest fuzzy due date fuzzy set genetic algorithm graph theory grey wolf optimizer group key establishment heuristics ideal power consumption improved crow search algorithm integer factorisation problem leveling power consumption per phase lexicographic product graph load redistribution location privacy MATLAB method microaggregation mixed model production mixed-integer convex optimization n-PFS algebra n-Pythagorean n/a nonidentical parallel production lines normal Gaussian distribution numerical semigroup optimization ordinarization transform outer-independent Roman domination penalization phase swapping problem power losses quasi-ordinarization transform quasi-total Italian domination number quasi-total strong differential Roman domination rooted product graph secure domination secure Italian domination SIMP statistical disclosure control strong differential strongly total Roman domination three-phase asymmetric distribution networks topology optimization total domination total Roman domination traveling salesman problem triangular norms vertex cover vortex search algorithm w-domination weak roman domination weight factor |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910557617003321 |
Rodríguez Velázquez Juan Alberto
|
||
| Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||