Selected Areas in Cryptography: 27th International Conference, Halifax, Ns, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers, Dunkelman Orr, Jacobson Jr Michael J., O`Flynn Colin
Описание: Dynamic Pick and Place Trajectory of Delta Parallel Manipulator.- Design of aquatic product traceability coding scheme based on EPC label.- DEVS-based Modeling and Simulation of Wireless Sensor Network.- Spatial Reciprocity Aided CSI Acquirement for HST Massive MIMO.- A flexible film thermocouple temperature sensor.- Design of a Morphing Surface Using Auxetic Lattice Skin for Space-Reconfigurable Reflectors.- The Method of User Information Fusion Oriented to Manufacturing Service Value Net.- Image Fusion Method for Transformer Substation Based on NSCT and Visual Saliency.- Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System.- New Technology Development and Application Trends Based on Monitoring of Patent Data.- A K-means clustering optimization algorithm for spatiotemporal trajectory data.- Temporal and Spatial Changes of Ecosystem Health in Guangdong Province in Recent 11 years.- Salient Attention Model and Classes Imbalance Remission for Video Anomaly Analysis with Weak Label.- A Data Fusion Model based on Multi-source Non-real-time Intelligence.- Ancient Chinese Lexicon Construction Based on Unsupervised Algorithm of Minimum Entropy and CBDB Optimization.- Availability Analysis of GNSS RAIM based on Maximum Undetectable Position Bias.- Psychological semantic differences of Zhang Juzheng before and after DuoQing event.- Digital Rights Management Platform Based on Blockchain Technology.- A Deep Hybrid Neural Network Forecasting for Multivariate Non-stationary Time Series.- Risk Assessment of Flood Disasters in Hechi City Based on GIS.- Cultural Symbol Recognition Algorithm Based on CTPN+CRNN.- Spatial-temporal Variation and Future Changing Trend of NDVI in the Pearl River Basin from 1982 to 2015.- An Improved Collaborative Filtering Algorithm Based on Filling Missing Data.- Diagnosis method of Alzheimer's disease in PET image based on CNN multi-mode network.- Research on Multi-floor Path Planning Based on Recommendation Factors.- E-commerce Review Classification Based on SVM.- Experimental Research of Galfenol Composite Cantilever.- A capacitive flexible tactile sensor.- Multi-objective optimization of e-commerce logistics warehouse layout based on genetic algorithm.- Magnetic Circuit Design of Galfenol Composite Cantilever.-A MEMS-based piezoelectric pump with a low frequency and high flow.- Micro-video learning resource portrait and its application.- Research on Downscaling and Correction of TRMM Data in the Central China.- Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database.- Scale-Aware Network with Attentional Selection For Human Pose Estimation.- Short-term Traffic Flow Prediction Based on SVR and LSTM.- A Logging Overhead Optimization Method Based on Anomaly Detection Model.- Multi-objective collaborative optimization of multi-level inventory: a model driven by after-sales service.- The Research About Spatial Distribution of Urban Functions Based on POI Data.- The Psychological Characteristics Changes Analysis of Su Shi before and after the Wutai Poetry Case - Based on the CC-LIWC.- A Conference Publishing System Based on Academic Social Network.- Software Component Library Management Mechanism for Equipment Parts Service Value-Net.- No-reference quality assessment for Uav patrol images of Transmission line.- An Inclusive Finance Consortium Blockchain Platform for Secure Data Storage and Value Analysis for Small and Medium-sized Enterprises.- An Under-Sampling Method of Unbalanced Data Classification Based on Support Vector.- Image classification algorithm for transmission line defects based on dual-channel feature fusion.- Research on Alarm Causality Filtering Based on Association Mining.- Exploring Psycholinguistic Differences between Song and Ming Emperoes bases on Literary Edicts.- The Influence of the Reform of Entrance Examination on University Development.
Описание: This book constitutes extended, revised and selected papers from the 22nd International Conference on Enterprise Information Systems, ICEIS 2020, held online during May 5-7, 2020.The 41 papers presented in this volume were carefully reviewed and selected for inclusion in this book from a total of 255 submissions.
Описание: This book constitutes the refereed post-conference proceedings of the 21st International Conference on Membrane Computing, CMC 2020, held as a virtual event, in September 2020. The 10 full papers presented were selected from 31 submissions. The papers deal with all aspects on membrane computing and related areas.
Описание: This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Data Management Technologies and Applications, DATA 2020, which was supposed to take place in Paris, France, in July 2020. data analytics; data and information quality; big data; data integrity.
Описание: This book constitutes refereed proceedings of the 27th International Workshop on Frontiers of Computer Vision, IW-FCV 2021, held in Daegu, South Korea, in February 2021. The 17 full papers and 8 short papers presented were thoroughly reviewed and selected from 44 submissions.
Описание: The theme of this year`s workshop was "Security Protocols for Humans" The topics covered included Designing for Humans and Understanding Humans, Human Limitations in Security, Secure sharing and collaboration and much more.
Описание: This book constitutes the refereed proceedings of the 9th International Symposium on From Data Models and Back, DataMod 2020, held virtually, in October 2020. The 11 full papers and 3 short papers presented in this book were selected from 19 submissions. The papers are grouped in these topical sections: machine learning;
Описание: Models of rewriting and rewriting logic.- Termination, confluence, coherence, and complexity.- Unification, generalization, and narrowing.- Graph rewriting.- Tree automata.- Rewriting strategies.- Rewriting-based declarative languages.- Explicit-state and symbolic model checking techniques.- Rewriting-based theorem proving, including (co)inductive theorem proving.- Rewriting-based constraint solving and satisfiability.
Описание: The papers are organized in topical sections on Lattice-based Cryptography, Learning with Errors, Cryptanalysis, Key Establishment, Isogeny-based Cryptography, Hash-based cryptography, Code-based Cryptography.
Описание: This book constitutes the revised post-conference proceedings of the 18th European Conference on Multi-Agent Systems, EUMAS 2021. The papers report on both early and mature research and cover a wide range of topics in the field of multi-agent systems.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020.The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions.
Описание: This book constitutes the refereed proceedings of the 16th China Conference on Machine Translation, CCMT 2020, held in Hohhot, China, in October 2020.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru