menu
{ "item_title" : "Smart Computing and Communication", "item_author" : [" Meikang Qiu "], "item_description" : "A Survey of Deep Learning Applied to Story Generation..- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates.- An Improved Prediction Model for the Network Security Situation.- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles.- An Improved Assessment Method for the Network Security Risk.- A High-Performance Storage System Based with Dual RAID Engine.- An Universal Perturbation Generator for Black-box Attacks against Object Detectors.- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle.- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification.- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs.- I2P Anonymous Communication Network Measurement and Analysis.- Plot Digitizing over Big Data Using Beam Search.- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud.- Do Top Socail APPS Effect Voice Call? Evidencefrom Propensity Score Matching Methods.- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB.- Smart Custom Package Decision for Mobile Internet Services.- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City.- Automated Classification of Attacker Privileges Based on Deep Neural Network.- nnD: Shallow Neural Network Based Collision Decoding in IoT communications.- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction.- An Elephant Ow Detection Method Based on Machine Learning.- AI Enhanced Automatic Response System for Resisting Network Threats.- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking.- EIGRP to OSPF Migration in Production Network.- A Hardware Trojan Detection Method Design Based on TensorFlow.- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation.- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery.- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network.- Analysis and Prediction of Commercial Big Data Based on WIFI Probe.- Design and Optimization of Camera HAL Layer Based on Android.- Music Rhythm Customized Mobile Application Based on Information Extraction.- Computational Challenges and Opportunities in Financial Services.- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme.- Applications of Machine Learning Tools in Genomics: A Review.- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context.- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts.- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi.- Research on Template-based Factual Automatic Question Answering Technology.- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm.- Machine Learning for Cancer Subtype Prediction with FSA Method.- Autonomous Vehicle Communication In V2X Network With LoRa Protocol.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/03/034/138/3030341380_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Smart Computing and Communication|Meikang Qiu

Smart Computing and Communication : 4th International Conference, Smartcom 2019, Birmingham, Uk, October 11-13, 2019, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

A Survey of Deep Learning Applied to Story Generation..- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates.- An Improved Prediction Model for the Network Security Situation.- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles.- An Improved Assessment Method for the Network Security Risk.- A High-Performance Storage System Based with Dual RAID Engine.- An Universal Perturbation Generator for Black-box Attacks against Object Detectors.- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle.- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification.- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs.- I2P Anonymous Communication Network Measurement and Analysis.- Plot Digitizing over Big Data Using Beam Search.- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud.- Do Top Socail APPS Effect Voice Call? Evidence

from Propensity Score Matching Methods.- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB.- Smart Custom Package Decision for Mobile Internet Services.- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City.- Automated Classification of Attacker Privileges Based on Deep Neural Network.- nnD: Shallow Neural Network Based Collision Decoding in IoT communications.- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction.- An Elephant Ow Detection Method Based on Machine Learning.- AI Enhanced Automatic Response System for Resisting Network Threats.- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking.- EIGRP to OSPF Migration in Production Network.- A Hardware Trojan Detection Method Design Based on TensorFlow.- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation.- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery.- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network.- Analysis and Prediction of Commercial Big Data Based on WIFI Probe.- Design and Optimization of Camera HAL Layer Based on Android.- Music Rhythm Customized Mobile Application Based on Information Extraction.- Computational Challenges and Opportunities in Financial Services.- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme.- Applications of Machine Learning Tools in Genomics: A Review.- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context.- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts.- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi.- Research on Template-based Factual Automatic Question Answering Technology.- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm.- Machine Learning for Cancer Subtype Prediction with FSA Method.- Autonomous Vehicle Communication In V2X Network With LoRa Protocol.

This item is Non-Returnable

Details

  • ISBN-13: 9783030341381
  • ISBN-10: 3030341380
  • Publisher: Springer
  • Publish Date: November 2019
  • Dimensions: 9.21 x 6.14 x 0.87 inches
  • Shipping Weight: 1.32 pounds
  • Page Count: 412

Related Categories

You May Also Like...

    1

BAM Customer Reviews