Información de la indexación
Documentos en la biblioteca con la clasificación 005.73 (47)



17th International Symposium, WADS 2021, Virtual Event, August 9–11, 2021, Proceedings / Lubiw, Anna ; Salavatipour, Mohammad ; He, Meng
![]()
TÃtulo : 17th International Symposium, WADS 2021, Virtual Event, August 9–11, 2021, Proceedings Tipo de documento: documento electrónico Autores: Lubiw, Anna, ; Salavatipour, Mohammad, ; He, Meng, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XVI, 670 p. 187 ilustraciones, 112 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-83508-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Algoritmos IngenierÃa Informática Red de computadoras Informática Matemáticas discretas Gráficos de computadora Estructuras de datos y teorÃa de la información Diseño y Análisis de Algoritmos IngenierÃa Informática y Redes Manipulación simbólica y algebraica Matemáticas discretas en informática Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas del 17º Simposio Internacional sobre Algoritmos y Estructuras de Datos, WADS 2021, celebrado virtualmente en agosto de 2021. Los 47 artÃculos completos, presentados junto con dos conferencias invitadas, fueron cuidadosamente revisados ​​y seleccionados de un total de 123 presentaciones. . Presentan investigaciones originales sobre la teorÃa, diseño y aplicación de algoritmos y estructuras de datos. Nota de contenido: Adjacency Labelling of Planar Graphs (and Beyond) -- Algorithms for Explainable Clustering -- On the Spanning and Routing Ratios of the Directed Ѳ6-Graph -- The Minimum Moving Spanning Tree Problem -- Scheduling with Testing on Multiple Identical Parallel Machines -- Online Makespan Minimization With Budgeted Uncertainty -- Pattern Matching in Doubling Spaces -- Reachability Problems for Transmission Graphs -- On Minimum Generalized Manhattan Connections -- HalftimeHash: Modern Hashing without 64-bit Multipliers or Finite Fields -- Generalized Disk Graphs -- A 4-Approximation of the 2Ï€/3 -MST -- Dynamic Dictionaries for Multisets and Counting Filters with Constant Time Operations -- The Neighborhood Polynomial of Chordal -- Incomplete Directed Perfect Phylogeny in Linear Time -- Euclidean maximum matchings in the plane—ÂÂÂÂlocal to global -- Solving Problems on Generalized Convex Graphs via Mim-Width -- Improved Bounds on the Spanning Ratio of the Theta-5 Graph -- Computing Weighted Subset Transversals in H-Free Graphs -- Computing the Fréchet Distance Between Uncertain Curves in One Dimension -- Finding a Largest-Area Triangle in a Terrain in Near-Linear Time -- Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees -- An APTAS for Bin Packing with Clique-graph Conflicts -- Fast deterministic algorithms for computing all eccentricities in (hyperbolic) Helly graphs -- ANN for time series under the Fréchet distance -- Strictly In-Place Algorithms for Permuting and Inverting -- A Stronger Lower Bound on Parametric Minimum Spanning Trees -- Online bin packing of squares and cubes -- Exploration of k-Edge-Deficient Temporal Graphs -- Parameterized Complexity of Categorical Clustering with Size Constraints -- Graph Pricing With Limited Supply -- Fair Correlation Clustering with Global and Local Guarantees -- Better Distance Labeling for Unweighted Planar Graphs -- How to Catch Marathon Cheaters: New Approximation Algorithms for Tracking Paths -- Algorithms for Radius-Optimally Augmenting Trees in a Metric Space -- Upper and Lower Bounds for Fully Retroactive Graph Problem -- Characterization of Super-stable Matching -- Uniform Embeddings for Robinson Similarity Matrices -- Particle-Based Assembly Using Precise Global Control Independent Sets in Semi-random Hypergraphs -- A Query-Efficient Quantum Algorithm for Maximum Matching on General Graphs -- Support Optimality and Adaptive Cuckoo Filters -- Computing the Union Join and Subset Graph of Acyclic Hypergraphs in Subquadratic Time -- Algorithms for the Line-Constrained Disk Coverage and Related Problems -- A universal cycle for strings with fixed-content (which are also known as multiset permutations) -- Routing on Heavy-Path WSPD-Spanners -- Mapping Multiple Regions to the Grid with Bounded Hausdorff Distance -- Diverse Partitions of Colored Points -- Reverse Shortest Path Problem for Unit-Disk Graphs. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Data Structures, WADS 2021, held in virtually in August 2021. The 47 full papers, presented together with two invited lectures, were carefully reviewed and selected from a total of 123 submissions. They present original research on the theory, design and application of algorithms and data structures. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 17th International Symposium, WADS 2021, Virtual Event, August 9–11, 2021, Proceedings [documento electrónico] / Lubiw, Anna, ; Salavatipour, Mohammad, ; He, Meng, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVI, 670 p. 187 ilustraciones, 112 ilustraciones en color.
ISBN : 978-3-030-83508-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Algoritmos IngenierÃa Informática Red de computadoras Informática Matemáticas discretas Gráficos de computadora Estructuras de datos y teorÃa de la información Diseño y Análisis de Algoritmos IngenierÃa Informática y Redes Manipulación simbólica y algebraica Matemáticas discretas en informática Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas del 17º Simposio Internacional sobre Algoritmos y Estructuras de Datos, WADS 2021, celebrado virtualmente en agosto de 2021. Los 47 artÃculos completos, presentados junto con dos conferencias invitadas, fueron cuidadosamente revisados ​​y seleccionados de un total de 123 presentaciones. . Presentan investigaciones originales sobre la teorÃa, diseño y aplicación de algoritmos y estructuras de datos. Nota de contenido: Adjacency Labelling of Planar Graphs (and Beyond) -- Algorithms for Explainable Clustering -- On the Spanning and Routing Ratios of the Directed Ѳ6-Graph -- The Minimum Moving Spanning Tree Problem -- Scheduling with Testing on Multiple Identical Parallel Machines -- Online Makespan Minimization With Budgeted Uncertainty -- Pattern Matching in Doubling Spaces -- Reachability Problems for Transmission Graphs -- On Minimum Generalized Manhattan Connections -- HalftimeHash: Modern Hashing without 64-bit Multipliers or Finite Fields -- Generalized Disk Graphs -- A 4-Approximation of the 2Ï€/3 -MST -- Dynamic Dictionaries for Multisets and Counting Filters with Constant Time Operations -- The Neighborhood Polynomial of Chordal -- Incomplete Directed Perfect Phylogeny in Linear Time -- Euclidean maximum matchings in the plane—ÂÂÂÂlocal to global -- Solving Problems on Generalized Convex Graphs via Mim-Width -- Improved Bounds on the Spanning Ratio of the Theta-5 Graph -- Computing Weighted Subset Transversals in H-Free Graphs -- Computing the Fréchet Distance Between Uncertain Curves in One Dimension -- Finding a Largest-Area Triangle in a Terrain in Near-Linear Time -- Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees -- An APTAS for Bin Packing with Clique-graph Conflicts -- Fast deterministic algorithms for computing all eccentricities in (hyperbolic) Helly graphs -- ANN for time series under the Fréchet distance -- Strictly In-Place Algorithms for Permuting and Inverting -- A Stronger Lower Bound on Parametric Minimum Spanning Trees -- Online bin packing of squares and cubes -- Exploration of k-Edge-Deficient Temporal Graphs -- Parameterized Complexity of Categorical Clustering with Size Constraints -- Graph Pricing With Limited Supply -- Fair Correlation Clustering with Global and Local Guarantees -- Better Distance Labeling for Unweighted Planar Graphs -- How to Catch Marathon Cheaters: New Approximation Algorithms for Tracking Paths -- Algorithms for Radius-Optimally Augmenting Trees in a Metric Space -- Upper and Lower Bounds for Fully Retroactive Graph Problem -- Characterization of Super-stable Matching -- Uniform Embeddings for Robinson Similarity Matrices -- Particle-Based Assembly Using Precise Global Control Independent Sets in Semi-random Hypergraphs -- A Query-Efficient Quantum Algorithm for Maximum Matching on General Graphs -- Support Optimality and Adaptive Cuckoo Filters -- Computing the Union Join and Subset Graph of Acyclic Hypergraphs in Subquadratic Time -- Algorithms for the Line-Constrained Disk Coverage and Related Problems -- A universal cycle for strings with fixed-content (which are also known as multiset permutations) -- Routing on Heavy-Path WSPD-Spanners -- Mapping Multiple Regions to the Grid with Bounded Hausdorff Distance -- Diverse Partitions of Colored Points -- Reverse Shortest Path Problem for Unit-Disk Graphs. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Data Structures, WADS 2021, held in virtually in August 2021. The 47 full papers, presented together with two invited lectures, were carefully reviewed and selected from a total of 123 submissions. They present original research on the theory, design and application of algorithms and data structures. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / Zhou, Jianying ; Luo, Xiapu ; Shen, Qingni ; Xu, Zhen
![]()
TÃtulo : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers Tipo de documento: documento electrónico Autores: Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVII, 833 p. 79 ilustraciones ISBN/ISSN/DL: 978-3-030-41579-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teorÃa de la información IngenierÃa de software Ordenador Red inform Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 199 presentaciones. Los artÃculos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografÃa aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografÃa y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers [documento electrónico] / Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVII, 833 p. 79 ilustraciones.
ISBN : 978-3-030-41579-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teorÃa de la información IngenierÃa de software Ordenador Red inform Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 199 presentaciones. Los artÃculos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografÃa aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografÃa y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings / Meng, Weizhi ; Gollmann, Dieter ; Jensen, Christian D. ; Zhou, Jianying
![]()
TÃtulo : 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings Tipo de documento: documento electrónico Autores: Meng, Weizhi, ; Gollmann, Dieter, ; Jensen, Christian D., ; Zhou, Jianying, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVI, 608 p. 51 ilustraciones ISBN/ISSN/DL: 978-3-030-61078-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Red informática TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aspectos Legales de la Computación Estructuras de datos y teorÃa de la información Ordenador Protección de datos Criptogra Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas de la 22.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2020, celebrada en Copenhague, Dinamarca*, en agosto de 2020. Los 33 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 139 presentaciones. Los artÃculos se centran en temas sobre seguridad informática y de comunicaciones, y están organizados en temas de seguridad y criptografÃa. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings [documento electrónico] / Meng, Weizhi, ; Gollmann, Dieter, ; Jensen, Christian D., ; Zhou, Jianying, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVI, 608 p. 51 ilustraciones.
ISBN : 978-3-030-61078-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Red informática TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aspectos Legales de la Computación Estructuras de datos y teorÃa de la información Ordenador Protección de datos Criptogra Clasificación: 005.73 Resumen: Este libro constituye las actas arbitradas de la 22.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2020, celebrada en Copenhague, Dinamarca*, en agosto de 2020. Los 33 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 139 presentaciones. Los artÃculos se centran en temas sobre seguridad informática y de comunicaciones, y están organizados en temas de seguridad y criptografÃa. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers / Singh, Mayank ; Gupta, P. K. ; Tyagi, Vipin ; Flusser, Jan. ; Ören, Tuncer ; Valentino, Gianluca
![]()
TÃtulo : 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers Tipo de documento: documento electrónico Autores: Singh, Mayank, ; Gupta, P. K., ; Tyagi, Vipin, ; Flusser, Jan., ; Ören, Tuncer, ; Valentino, Gianluca, Mención de edición: 1 ed. Editorial: Singapore [Malasya] : Springer Fecha de publicación: 2020 Número de páginas: XIV, 520 p. 249 ilustraciones, 172 ilustraciones en color. ISBN/ISSN/DL: 978-981-1566349-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Red de computadoras Aprendizaje automático Ciencias sociales IngenierÃa Informática Estructuras de datos y teorÃa de la información Redes de comunicación informática Aplicación informática en ciencias sociales y del comportamiento. IngenierÃa Informática y Redes Computadoras y Educación Clasificación: 005.73 Resumen: Este libro constituye las actas posteriores a la 4.ª Conferencia Internacional sobre Avances en Computación y Ciencias de Datos, ICACDS 2020, celebrada en La Valeta, Malta, en abril de 2020.* Los 46 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 354 presentaciones. Los artÃculos se centran en temas como informática avanzada, ciencias de datos, principios de organización de sistemas distribuidos, marcos y entornos de desarrollo, verificación y validación de software, complejidad computacional y criptografÃa, teorÃa del aprendizaje automático, teorÃa de bases de datos y representaciones probabilÃsticas. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Tipo de medio : Computadora Summary : This book constitutes the post-conference proceedings of the 4th International Conference on Advances in Computing and Data Sciences, ICACDS 2020, held in Valletta, Malta, in April 2020.* The 46 full papers were carefully reviewed and selected from 354 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations. * The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers [documento electrónico] / Singh, Mayank, ; Gupta, P. K., ; Tyagi, Vipin, ; Flusser, Jan., ; Ören, Tuncer, ; Valentino, Gianluca, . - 1 ed. . - Singapore [Malasya] : Springer, 2020 . - XIV, 520 p. 249 ilustraciones, 172 ilustraciones en color.
ISBN : 978-981-1566349--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Red de computadoras Aprendizaje automático Ciencias sociales IngenierÃa Informática Estructuras de datos y teorÃa de la información Redes de comunicación informática Aplicación informática en ciencias sociales y del comportamiento. IngenierÃa Informática y Redes Computadoras y Educación Clasificación: 005.73 Resumen: Este libro constituye las actas posteriores a la 4.ª Conferencia Internacional sobre Avances en Computación y Ciencias de Datos, ICACDS 2020, celebrada en La Valeta, Malta, en abril de 2020.* Los 46 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 354 presentaciones. Los artÃculos se centran en temas como informática avanzada, ciencias de datos, principios de organización de sistemas distribuidos, marcos y entornos de desarrollo, verificación y validación de software, complejidad computacional y criptografÃa, teorÃa del aprendizaje automático, teorÃa de bases de datos y representaciones probabilÃsticas. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Tipo de medio : Computadora Summary : This book constitutes the post-conference proceedings of the 4th International Conference on Advances in Computing and Data Sciences, ICACDS 2020, held in Valletta, Malta, in April 2020.* The 46 full papers were carefully reviewed and selected from 354 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations. * The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part I / Singh, Mayank ; Tyagi, Vipin ; Gupta, P. K. ; Flusser, Jan. ; Ören, Tuncer ; Sonawane, V. R.
![]()
TÃtulo : 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part I Tipo de documento: documento electrónico Autores: Singh, Mayank, ; Tyagi, Vipin, ; Gupta, P. K., ; Flusser, Jan., ; Ören, Tuncer, ; Sonawane, V. R., Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XX, 750 p. 403 ilustraciones, 274 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-81462-5 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Aprendizaje automático Software de la aplicacion Ciencias sociales Visión por computador Estructuras de datos y teorÃa de la información Aplicaciones informáticas y de sistemas de información Aplicación informática en ciencias sociales y del comportamiento. Computadoras y Educación Clasificación: 005.73 Resumen: Este libro de dos volúmenes constituye las actas posteriores a la 5.ª Conferencia Internacional sobre Avances en Computación y Ciencias de Datos, ICACDS 2021, celebrada en Nashik, India, en abril de 2021.* Los 103 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 781 presentaciones. . Los artÃculos de las Partes I y II se centran en temas como principios de organización de sistemas distribuidos, marcos y entornos de desarrollo, verificación y validación de software, complejidad computacional y criptografÃa, teorÃa del aprendizaje automático, teorÃa de bases de datos, motores de sistemas de gestión de bases de datos con representaciones probabilÃsticas, minerÃa de datos, información. procesamiento de consultas de recuperación, seguridad de bases de datos y almacenamiento, computación ubicua y móvil, metodologÃas de computación paralela y otros. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: An Energy-Efficient Hybrid Hierarchical Clustering Algorithm for Wireless Sensor Devices in IoT -- Fund Utilization under Parliament Local Development Scheme: Machine Learning base Approach -- Implementing Automatic Ontology Generation for the New Zealand Open Government Data: An Evaluative Approach -- Blockchain based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation. - A light SRGAN for Up-Scaling of Low Resolution and High Latency Images -- Energy Efficient Clustering Routing Protocol and ACO Algorithm in WSN -- Efficient Social Distancing Detection using Object Detection and Triangle Similarity -- Explaining a Black-Box Sentiment Analysis Model with Local Interpretable Model Diagnostics Explanation (LIME) -- Spelling Checking and Error Corrector System for Marathi Language Text using Minimum Edit Distance Algorithm -- A Study on Morphological Analyser for Indian Languages : A Literature Perspective -- Cyber Safety Against Social Media Abusing -- Predictive Rood Pattern Search for Efficient Video Compression -- An Effective Approach For Classifying Acute Lymbphoblastic Luekemia Using Hybrid Hierarchial Classifiers -- Abnormal Blood Vessels Segmentation for Proliferative Diabetic Retinopathy Screening Using Convolutional Neural Network. - Predictive Programmatic Classification Model to Improve Ad-Campaign Click Through Rate -- Live stream processing techniques to assist unmanned, regulated railway crossings -- Most Significant Bit-Plane based Local Ternary Pattern for Biomedical Image Retrieval -- Facial Monitoring Using Gradient Based Approach -- Overlapped Circular Convolution based feature extraction algorithm for classification of high dimensional datasets -- Binary Decision Tree Based Packet Queuing Schema for Next Generation Firewall -- Automatic Tabla Stroke Source Separation Using Machine Learning -- Classification of Immunity Booster Medicinal Plants using CNN: A Deep Learning Approach -- Machine Learning Model Interpretability in NLP and Computer Vision Applications -- Optimal Sizing and Siting of Multiple Dispersed Generation System using Metaheuristic Algorithm -- Design of a Fused Triple Convolutional Neural Network for Malware Detection: A Visual Classification Approach -- Mobile Agent Security using Lagrange Interpolation with Multilayer Perception Neural Network -- Performance Analysis of Channel coding techniques for 5G networks -- An Ensemble Learning Approach for Software Defect Prediction in Developing Quality Software Product -- A Study on Energy-Aware Virtual Machine Consolidation Policies in Cloud Data Centers using Cloudsim Toolkit -- Predicting Insomnia Using Multilayer Stacked Ensemble Model. - A novel encryption scheme based on Fully Homomorphic Encryption and RR-AES along with privacy preservation for vehicular network -- Key-Based Decoding for Coded Modulation Schemes in the presence of ISI -- Optimizing the Performance of KNN Classifier for Human Activity Recognition -- Face Recognition with Disguise and makeupVariations Using Image Processing and Machine Learning -- Attention-based deep Fusion Network for Retinal Lesion Segmentation in Fundus Image -- Visibility improvement in hazy conditions via a deep learning based image fusion approach -- Performance of Reinforcement Learning Simulation: x86 v/s ARM -- A Performance Study of Probabilistic Possibilistic Fuzzy C-Means Clustering Algorithm -- Optimized Random Forest Algorithm with Parameter Tuning for Predicting Heart Disease -- Machine Learning Based Techniques for Detection of Renal Calculi in Ultrasound Images -- Unsupervised Change Detection in Remote Sensing Images Using CNN Based Transfer Learning -- Biological Sequence Embedding based Classification for MERS and SARS -- Supply Path Optimization in Video Advertising Landscape -- Stack-based CNN Approach to Covid-19 Detection -- Performance Analysis of Various Classifiers for Social Intimidating Activities Detection -- Technique for Enhancing the efficiency and security of lightweight IoT devices -- Performance Improvement in Deep Learning Architecture for Phonocardiogram Signal Classification using Spectrogram -- Performance Analysis of Machine Learning Techniques in Device Free Localization in Indoor Environment -- D-Leach: An Energy Optimized Deterministic Sub-clustering and Multi-hop Routing Protocol for Wireless Sensor Networks -- Robust Image Watermarking Using Support Vector Machine and Multi-Objective Particle Swarm Optimization -- Generalized Intuitionistic Fuzzy Entropy on IFMARCOS Technique and its Application in Multi-Criteria Decision Making -- Feature Selection in Machine Learning by Hybrid Sine Cosine Metaheuristics -- Rainfall Prediction using Logistic Regression and Support Vector Regression Algorithms -- Collaborative Recommender System (CRS) using optimized SGD - ALS -- Violence Detection from CCTV Footage using Optical Flow and Deep Learning in inconsistent weather and lighting conditions -- Speech based Multiple Emotion Classification model using Deep Learning -- A Legal-Relationship Establishment in Smart Contracts: Ontological Semantics for Programming-Language Development -- Aspect Based Sentiment Analysis - An Incremental Model Learning Approach Using LSTM-RNN -- Cloud based Exon Prediction using Maximum Error Normalized Logarithmic Algorithms -- Unsupervised Learning of Visual Representations via Rotation and Future Frame Prediction for Video Retrieval -- Application of Deep Learning in Classification of Encrypted Images -- Ear Recognition Using Pretrained Convolutional Neural Networks -- An Adaptive Service Placement Framework in Fog Computing Environment -- Efficient Ink Mismatch Detection Using Supervised Approach. Tipo de medio : Computadora Summary : This two-volume book constitutes the post-conference proceedings of the 5th International Conference on Advances in Computing and Data Sciences, ICACDS 2021, held in Nashik, India, in April 2021.* The 103 full papers were carefully reviewed and selected from 781 submissions. The papers in Part I and II are centered around topics like distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations database management system engines, data mining, information retrieval query processing, database and storage security, ubiquitous and mobile computing, parallel computing methodologies, and others. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part I [documento electrónico] / Singh, Mayank, ; Tyagi, Vipin, ; Gupta, P. K., ; Flusser, Jan., ; Ören, Tuncer, ; Sonawane, V. R., . - 1 ed. . - [s.l.] : Springer, 2021 . - XX, 750 p. 403 ilustraciones, 274 ilustraciones en color.
ISBN : 978-3-030-81462-5
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Estructuras de datos (Informática) TeorÃa de la información Aprendizaje automático Software de la aplicacion Ciencias sociales Visión por computador Estructuras de datos y teorÃa de la información Aplicaciones informáticas y de sistemas de información Aplicación informática en ciencias sociales y del comportamiento. Computadoras y Educación Clasificación: 005.73 Resumen: Este libro de dos volúmenes constituye las actas posteriores a la 5.ª Conferencia Internacional sobre Avances en Computación y Ciencias de Datos, ICACDS 2021, celebrada en Nashik, India, en abril de 2021.* Los 103 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 781 presentaciones. . Los artÃculos de las Partes I y II se centran en temas como principios de organización de sistemas distribuidos, marcos y entornos de desarrollo, verificación y validación de software, complejidad computacional y criptografÃa, teorÃa del aprendizaje automático, teorÃa de bases de datos, motores de sistemas de gestión de bases de datos con representaciones probabilÃsticas, minerÃa de datos, información. procesamiento de consultas de recuperación, seguridad de bases de datos y almacenamiento, computación ubicua y móvil, metodologÃas de computación paralela y otros. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: An Energy-Efficient Hybrid Hierarchical Clustering Algorithm for Wireless Sensor Devices in IoT -- Fund Utilization under Parliament Local Development Scheme: Machine Learning base Approach -- Implementing Automatic Ontology Generation for the New Zealand Open Government Data: An Evaluative Approach -- Blockchain based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation. - A light SRGAN for Up-Scaling of Low Resolution and High Latency Images -- Energy Efficient Clustering Routing Protocol and ACO Algorithm in WSN -- Efficient Social Distancing Detection using Object Detection and Triangle Similarity -- Explaining a Black-Box Sentiment Analysis Model with Local Interpretable Model Diagnostics Explanation (LIME) -- Spelling Checking and Error Corrector System for Marathi Language Text using Minimum Edit Distance Algorithm -- A Study on Morphological Analyser for Indian Languages : A Literature Perspective -- Cyber Safety Against Social Media Abusing -- Predictive Rood Pattern Search for Efficient Video Compression -- An Effective Approach For Classifying Acute Lymbphoblastic Luekemia Using Hybrid Hierarchial Classifiers -- Abnormal Blood Vessels Segmentation for Proliferative Diabetic Retinopathy Screening Using Convolutional Neural Network. - Predictive Programmatic Classification Model to Improve Ad-Campaign Click Through Rate -- Live stream processing techniques to assist unmanned, regulated railway crossings -- Most Significant Bit-Plane based Local Ternary Pattern for Biomedical Image Retrieval -- Facial Monitoring Using Gradient Based Approach -- Overlapped Circular Convolution based feature extraction algorithm for classification of high dimensional datasets -- Binary Decision Tree Based Packet Queuing Schema for Next Generation Firewall -- Automatic Tabla Stroke Source Separation Using Machine Learning -- Classification of Immunity Booster Medicinal Plants using CNN: A Deep Learning Approach -- Machine Learning Model Interpretability in NLP and Computer Vision Applications -- Optimal Sizing and Siting of Multiple Dispersed Generation System using Metaheuristic Algorithm -- Design of a Fused Triple Convolutional Neural Network for Malware Detection: A Visual Classification Approach -- Mobile Agent Security using Lagrange Interpolation with Multilayer Perception Neural Network -- Performance Analysis of Channel coding techniques for 5G networks -- An Ensemble Learning Approach for Software Defect Prediction in Developing Quality Software Product -- A Study on Energy-Aware Virtual Machine Consolidation Policies in Cloud Data Centers using Cloudsim Toolkit -- Predicting Insomnia Using Multilayer Stacked Ensemble Model. - A novel encryption scheme based on Fully Homomorphic Encryption and RR-AES along with privacy preservation for vehicular network -- Key-Based Decoding for Coded Modulation Schemes in the presence of ISI -- Optimizing the Performance of KNN Classifier for Human Activity Recognition -- Face Recognition with Disguise and makeupVariations Using Image Processing and Machine Learning -- Attention-based deep Fusion Network for Retinal Lesion Segmentation in Fundus Image -- Visibility improvement in hazy conditions via a deep learning based image fusion approach -- Performance of Reinforcement Learning Simulation: x86 v/s ARM -- A Performance Study of Probabilistic Possibilistic Fuzzy C-Means Clustering Algorithm -- Optimized Random Forest Algorithm with Parameter Tuning for Predicting Heart Disease -- Machine Learning Based Techniques for Detection of Renal Calculi in Ultrasound Images -- Unsupervised Change Detection in Remote Sensing Images Using CNN Based Transfer Learning -- Biological Sequence Embedding based Classification for MERS and SARS -- Supply Path Optimization in Video Advertising Landscape -- Stack-based CNN Approach to Covid-19 Detection -- Performance Analysis of Various Classifiers for Social Intimidating Activities Detection -- Technique for Enhancing the efficiency and security of lightweight IoT devices -- Performance Improvement in Deep Learning Architecture for Phonocardiogram Signal Classification using Spectrogram -- Performance Analysis of Machine Learning Techniques in Device Free Localization in Indoor Environment -- D-Leach: An Energy Optimized Deterministic Sub-clustering and Multi-hop Routing Protocol for Wireless Sensor Networks -- Robust Image Watermarking Using Support Vector Machine and Multi-Objective Particle Swarm Optimization -- Generalized Intuitionistic Fuzzy Entropy on IFMARCOS Technique and its Application in Multi-Criteria Decision Making -- Feature Selection in Machine Learning by Hybrid Sine Cosine Metaheuristics -- Rainfall Prediction using Logistic Regression and Support Vector Regression Algorithms -- Collaborative Recommender System (CRS) using optimized SGD - ALS -- Violence Detection from CCTV Footage using Optical Flow and Deep Learning in inconsistent weather and lighting conditions -- Speech based Multiple Emotion Classification model using Deep Learning -- A Legal-Relationship Establishment in Smart Contracts: Ontological Semantics for Programming-Language Development -- Aspect Based Sentiment Analysis - An Incremental Model Learning Approach Using LSTM-RNN -- Cloud based Exon Prediction using Maximum Error Normalized Logarithmic Algorithms -- Unsupervised Learning of Visual Representations via Rotation and Future Frame Prediction for Video Retrieval -- Application of Deep Learning in Classification of Encrypted Images -- Ear Recognition Using Pretrained Convolutional Neural Networks -- An Adaptive Service Placement Framework in Fog Computing Environment -- Efficient Ink Mismatch Detection Using Supervised Approach. Tipo de medio : Computadora Summary : This two-volume book constitutes the post-conference proceedings of the 5th International Conference on Advances in Computing and Data Sciences, ICACDS 2021, held in Nashik, India, in April 2021.* The 103 full papers were carefully reviewed and selected from 781 submissions. The papers in Part I and II are centered around topics like distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations database management system engines, data mining, information retrieval query processing, database and storage security, ubiquitous and mobile computing, parallel computing methodologies, and others. *The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part II / Singh, Mayank ; Tyagi, Vipin ; Gupta, P. K. ; Flusser, Jan. ; Ören, Tuncer ; Sonawane, V. R.
![]()
Permalink8th International Conference, AlCoB 2021, Missoula, MT, USA, June 7–11, 2021, Proceedings / MartÃn-Vide, Carlos ; Vega-RodrÃguez, Miguel A. ; Wheeler, Travis
![]()
PermalinkAdvances in Computing and Data Sciences / Singh, Mayank ; Gupta, P. K. ; Tyagi, Vipin ; Flusser, Jan. ; Ören, Tuncer
![]()
PermalinkAdvances in Computing and Data Sciences / Singh, Mayank ; Gupta, P. K. ; Tyagi, Vipin ; Flusser, Jan. ; Ören, Tuncer
![]()
PermalinkPermalinkPermalinkPermalinkPermalinkPermalinkPermalink