Web Information Systems and Applications: 17th International Conference, Wisa 2020, Guangzhou, China, September 23-25, 2020, Proceedings, Wang Guojun, Lin Xuemin, Hendler James
Описание: This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020.Due the COVID-19, the conference was held online and physical.
Описание: This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019. The 50 regular papers and the 19 short papers were carefully reviewed and selected from 130 submissions.
Описание: This book constitutes the proceedings of the 6th International Symposium on Dependable Software Engineering, SETTA 2020, held in Guangzhou, China, in November 2020. The 10 full and 1 short paper included in this volume were carefully reviewed and selected from 20 submissions.
Описание: This book constitutes the thoroughly refereed proceedings of the 11th International Symposium on Intelligence Computation and Applications, ISICA 2019, held in Guangzhou, China, in November 2019. The 65 papers presented were carefully reviewed and selected from the total of 112 submissions. This volume features the most up-to-date research in evolutionary algorithms, parallel computing and quantum computing, evolutionary multi-objective and dynamic optimization, intelligent multimedia systems, virtualization and AI applications, smart scheduling, intelligent control, big data and cloud computing, deep learning, and hybrid machine learning systems.The papers are organized according to the following topical sections: new frontier in evolutionary algorithms; evolutionary multi-objective and dynamic optimization; intelligent multimedia systems; virtualization and AI applications; smart scheduling; intelligent control; big data and cloud computing; statistical learning.
This book constitutes extended papers from the 4th International Conference on Technology in Education, ICTE 2019, held in Guangzhou, China, in March 2019.
The 27 full papers presented in this volume were carefully reviewed and selected from 109 submissions. They are organized in topical sections on blended bearning and computer-supported learning; virtual reality, augmented reality and game-based learning; open online courses and open educational resources; teaching and learning analysis and assessment; pedagogical, psychological and cultural issues.
Описание: Full Papers.- Reinforcement Learning based Group Event Invitation Algorithm.- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness.- Maximizing The Expected In uence in Face of The Non-Progressive Adversary.- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain.- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System.- A Novel Blockchain Network Structure Based on Logical Nodes.- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks.- Learning-Aided Mobile Charging for Rechargeable Sensor Networks.- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications.- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing.- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union.- Approximation Algorithm for the Offloading Problem in Edge Computing.- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning.- Camera Style Guided Feature Generation for Person Re-Identification.- Sync or Fork: Node-Level Synchronization Analysis of Blockchain.- Multi-user Cooperative Computation Offloading in Mobile Edge Computing.- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER.- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System.- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation.- Multiset Synchronization with Counting Cuckoo Filters.- Privacy-Aware Online Task Offloading for Mobile-Edge Computing.- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition.- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks.- Optimizing Motion Estimation With an ReRAM-based PIM Architecture.- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM.- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning.- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT.- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks.- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks.- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction.- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation.- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data.- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game.- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks.- An improved parallel network tra c anomaly detection method based on Bagging and GRU.- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs.- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing.- A Survey: Applications of Blockchains in the Internet of Vehicles.- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography.- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage.- A New Fully Homomorphic Signatures from Standard Lattices.- An Efficient Malicious User Detection Mechanism for Crowdsensing System.- Implementation of Video Transmission over Maritime Ad Hoc Network.- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing.- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme.- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs.- Consensus in Wireless Blockchain System.- Blockchain-based Service Recommendation Supporting Data Sharing.- Multi-objective disaster backup in inter-datacenter using reinforcement learning.- Detecting Internet-scale NATs for IoT Devices Based on Tri-net.- Data integrity
Описание: The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions.
Описание: This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi`an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions.
Описание: This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi`an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions.
Описание: This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi`an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions.
Описание: This book gathers research papers and surveys on the latest advances in Schubert Calculus, presented at the International Festival in Schubert Calculus, held in Guangzhou, China on November 6-10, 2017.
Описание: This bookgathers the proceedings of the conference "Cultures of Mathematics andLogic," held in Guangzhou, China. In this context, thecultural diversity can be diachronical (different cultures in differenthistorical periods), geographical (different cultures in different regions), orsociological in nature.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru