Advances in Intelligent Data Analysis XVIII [[electronic resource] ] : 18th International Symposium on Intelligent Data Analysis, IDA 2020, Konstanz, Germany, April 27–29, 2020, Proceedings / / edited by Michael R. Berthold, Ad Feelders, Georg Krempl |
Autore | Berthold Michael |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, : Springer Nature, 2020 |
Descrizione fisica | 1 online resource (XIV, 588 p. 210 illus., 132 illus. in color.) |
Disciplina | 005.74 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database management
Data mining Computers Machine learning Computer organization Database Management Data Mining and Knowledge Discovery Computing Milieux Machine Learning Computer Systems Organization and Communication Networks |
Soggetto non controllato |
Database Management
Data Mining and Knowledge Discovery Computing Milieux Machine Learning Computer Systems Organization and Communication Networks open access data mining learning systems classification clustering semantics learning algorithms supervised learning association rules social networks graphic methods neural networks artificial intelligence computer vision correlation analysis databases education engineering graph theory image analysis Databases Database programming Data mining Expert systems / knowledge-based systems Information technology: general issues Machine learning Computer networking & communications |
ISBN | 3-030-44584-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection of Derivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization. |
Record Nr. | UNISA-996418219903316 |
Berthold Michael
![]() |
||
Cham, : Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Intelligent Data Analysis XVIII : 18th International Symposium on Intelligent Data Analysis, IDA 2020, Konstanz, Germany, April 27–29, 2020, Proceedings / / edited by Michael R. Berthold, Ad Feelders, Georg Krempl |
Autore | Berthold Michael |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, : Springer Nature, 2020 |
Descrizione fisica | 1 online resource (XIV, 588 p. 210 illus., 132 illus. in color.) |
Disciplina | 005.74 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database management
Data mining Computers Machine learning Computer organization Database Management Data Mining and Knowledge Discovery Computing Milieux Machine Learning Computer Systems Organization and Communication Networks |
Soggetto non controllato |
Database Management
Data Mining and Knowledge Discovery Computing Milieux Machine Learning Computer Systems Organization and Communication Networks open access data mining learning systems classification clustering semantics learning algorithms supervised learning association rules social networks graphic methods neural networks artificial intelligence computer vision correlation analysis databases education engineering graph theory image analysis Databases Database programming Data mining Expert systems / knowledge-based systems Information technology: general issues Machine learning Computer networking & communications |
ISBN | 3-030-44584-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection of Derivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization. |
Record Nr. | UNINA-9910404119303321 |
Berthold Michael
![]() |
||
Cham, : Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Biodiversity of Vegetable Crops, A Living Heritage |
Autore | Santamaria Pietro |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
Descrizione fisica | 1 electronic resource (174 p.) |
Soggetto non controllato |
polyphenols
landraces artichoke wild edible plants microsatellite marker mountain agriculture HPLC analyses Posidonia oceanica (L.) Delile apulian landraces traditional crops genetic reserve landrace meristem-tip culture databases long storage time Tanzania cultivated vegetables crop wild relative history safeguarding nutrition conservation Crithmum maritimum L. Italy crop population Tiggiano carrot germplasm local varieties in situ conservation homegardens thermotherapy genetic resources Solanum lycopersicum L. plant genetic resources recovery vegetables sanitation agriculture ecology domestication heavy metal ecotype cropping patterns virus-sanitation agrobiodiversity ecotypes Apium graveolens genetic distance genetic variability plant genetic resources populations food safety neglected and underutilized species heirloom geographical origin area seed bank climate change adaptation bioactive compounds genetic differentiation growing substrate characterization |
ISBN | 3-03897-721-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910346853203321 |
Santamaria Pietro
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer aided verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, proceedings . Part II. / / editors, Sharon Shoham, Yakir Vizel |
Autore | Shoham Sharon |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (560 pages) : illustrations (black and white) |
Altri autori (Persone) | VizelYakir |
Collana | Lecture notes in computer science |
Soggetto topico | Computer software - Verification |
Soggetto non controllato |
architecting
architecture verification and validation artificial intelligence computer programming computer science computer systems databases distributed computer systems embedded systems engineering formal languages formal logic linguistics mathematics model checking software architecture software design software engineering software quality theoretical computer science |
ISBN | 3-031-13188-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996485664103316 |
Shoham Sharon
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
Autore | Lu Wei |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 electronic resource (239 p.) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996503561903316 |
Lu Wei
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
Autore | Lu Wei |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 electronic resource (239 p.) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910633995903321 |
Lu Wei
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
Autore | Lu Wei |
Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (234 pages) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
ISBN | 981-16-9229-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464545403316 |
Lu Wei
![]() |
||
Singapore, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
Autore | Lu Wei |
Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (234 pages) |
Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering Seguretat de les xarxes d'ordinadors Teoria de la codificació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
ISBN | 981-16-9229-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910522970803321 |
Lu Wei
![]() |
||
Singapore, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
Autore | Lu Wei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
ISBN | 981-334-922-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
Record Nr. | UNISA-996465362903316 |
Lu Wei
![]() |
||
Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
Autore | Lu Wei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networks Application software Computer architecture Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
ISBN | 981-334-922-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
Record Nr. | UNINA-9910447240103321 |
Lu Wei
![]() |
||
Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|