Cover image for Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings
Title:
Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings
Author:
Xiao, Zhu. editor.
ISBN:
9783031289903
Edition:
1st ed. 2023.
Physical Description:
XI, 322 p. 158 illus., 120 illus. in color. online resource.
Series:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 478
Contents:
Models and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.
Added Corporate Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 520391-1001 XX(520391.1)
Searching...

On Order