000 06224nam a22006015i 4500
001 978-3-030-05755-8
003 DE-He213
005 20240730170753.0
007 cr nn 008mamaa
008 181208s2018 sz | s |||| 0|eng d
020 _a9783030057558
_9978-3-030-05755-8
024 7 _a10.1007/978-3-030-05755-8
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aSmart Computing and Communication
_h[electronic resource] :
_bThird International Conference, SmartCom 2018, Tokyo, Japan, December 10-12, 2018, Proceedings /
_cedited by Meikang Qiu.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXII, 462 p. 259 illus., 170 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v11344
505 0 _aA Two-Way Identity Authentication Scheme Based on Dynamic Password -- Adaptive Quality Control Scheme to Improve QoE of Video Streaming in Wireless Networks -- Traveler Review Analysis System with Big Data (TRAS) -- Vulnerability Assessment for PMU Communication Networks -- Proposal of parallel processing area extraction and data transfer number reduction for automatic GPU offloading of IoT applications -- Performance Evaluation of industrial OPC UA Gateway with energy cost-saving -- Travel-Time Prediction Methods: A Review -- The influence of sleep on opportunistic relay in linear wireless sensor networks -- Reconfigurable Hardware Generation for Tensor Flow Models of CNN Algorithms on a Heterogeneous Acceleration Platform -- Image Segmentation Algorithm Based on Spatial Pyramid and Visual Salience -- Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology -- Static Analysis of Android Apps Interaction with Automotive CAN -- Opportunistic Content Offloading for Mobile Edge Computing -- Image Annotation Algorithm Based on Semantic Similarity and Multi-Features -- One Secure IoT Scheme for Protection of True Nodes -- Predicted Mobile Data Offloading for Mobile Edge Computing Systems -- A Monte Carlo based Computation Offloading Algorithm for Feeding Robot IoT System -- Collective Behavior Aware Collaborative Caching for Mobile Edge Computing -- Implementation of distributed multi-agent scheduling algorithm based on Pi-calculus -- SmartDetect: A Smart Malicious Web Shell Code Detection Scheme via Ensemble Learning Algorithm -- An optimized MBE Algorithm on Sparse Bipartite Graphs -- IoT Framework for Interworking and Autonomous Interaction between Heterogeneous IoT Platforms -- Improvement of TextRank Based on Co-occurrence Word Pairs and Context Information -- Augmenting Embedding with Domain Knowledge for Oral Disease Diagnosis Prediction -- Regional Estimation Prior Network for Crowd Analyzing -- RBD: A Reference Railway Big Data System Model -- Artificial IntelligencePlatform for Heterogeneous Computing -- Review on Application of artificial intelligence in photovoltaic output prediction -- Abnormal Flow Detection Technology In GPU Network Based On Statistical Classification Method -- Research on Data Forwarding Algorithm Based on Link Quality in Vehicular Ad Hoc Networks -- The Knowledge Map Analysis of User Profile Research Based on CiteSpace -- The Accuracy of Fuzzy C-Means in Lower-Dimensional Space for Topic Detection -- Information-Centric Fog Computing for Disaster Relief -- Smartly Deploying WeChat Mobile Application on Cloud Foundry PaaS -- Normal Profile Updating Method For Enhanced Packet Header Anomaly Detection -- Research on Arm Motion Capture of Virtual Reality Based on Kinematics -- Financial News Quantization and Stock Market Forecast Research Based on CNN and LSTM -- Correlation Coefficient based Cluster Data Preprocessing and LSTM Prediction Model for Time Series Data in Large Aircraft Test Flights -- PSPChord - A Novel Fault Tolerance Approach for P2P Overlay Network -- Studying Weariness Prediction Using SMOTE and Random Forests -- Design of Heterogeneous Evaluation Method for Redundant Circuits -- Senior2Local: a Machine Learning Based Intrusion Detection Method for VANETs -- Depth Prediction from Monocular Images with CGAN -- Anomaly Detection for Power Grid based on Network Flow -- A K-Anonymous Full Domain Generalization Algorithm Based on Heap Sort.
520 _aThis book constitutes the refereed proceedings of the Third International Conference on Smart Computing and Communications, SmartCom 2018, held in Tokyo, Japan, in December 2018. The 45 papers presented in this volume were carefully reviewed and selected from 305 submissions. They focus on topics from smart data to smart communications, as well as smart cloud computing to smart security. .
650 0 _aComputer networks .
_931572
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aArtificial intelligence.
_93407
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 0 _aComputer vision.
_995191
650 1 4 _aComputer Communication Networks.
_995193
650 2 4 _aMobile and Network Security.
_933624
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aLegal Aspects of Computing.
_953952
650 2 4 _aComputer Vision.
_995195
700 1 _aQiu, Meikang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_995196
710 2 _aSpringerLink (Online service)
_995197
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030057541
776 0 8 _iPrinted edition:
_z9783030057565
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v11344
_995199
856 4 0 _uhttps://doi.org/10.1007/978-3-030-05755-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87155
_d87155