Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings için kapak resmi
Başlık:
Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings
Yazar:
Xiao, Zhu. editor.
ISBN:
9783031289903
Basım Bilgisi:
1st ed. 2023.
Fiziksel Tanımlama:
XI, 322 p. 158 illus., 120 illus. in color. online resource.
Seri:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 478
İçerik:
Models and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.
Tüzel Kişi Ek Girişi:
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 520391-1001 XX(520391.1)
Arıyor...

On Order