000 | 04718nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-57916-5 | ||
003 | DE-He213 | ||
005 | 20250516160021.0 | ||
007 | cr nn 008mamaa | ||
008 | 240408s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031579165 _9978-3-031-57916-5 |
||
050 | 4 | _aTA345-345.5 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aCOM018000 _2bisacsh |
|
072 | 7 |
_aUN _2thema |
|
082 | 0 | 4 |
_a620.00285 _223 |
245 | 1 | 0 |
_aAdvanced Information Networking and Applications _h[electronic resource] : _bProceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 4 / _cedited by Leonard Barolli. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXXVIII, 485 p. 178 illus., 141 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v202 |
|
505 | 0 | _aThe Deployment of E-Learning Application as a Web Service in a Cloud Broker Architecture -- CarbonApp: Blockchain Enabled Carbon Offset Project Management -- Investigating the Impact of Congestion Control Algorithms on Edge-Cloud Continuum -- Design and Implementation of a Fuzzy-based System for Assessment of Relationship Trust -- BarongTrace: A Malware Event Log Dataset for Linux -- Specifying SSI over EAP: Towards an Even Better Eduroam in the Future -- FastSGX: A Message-passing based Runtime for SGX -- Leveraging Chat-Based Large Vision-Language Models for Multimodal Out-of-Context Detection -- Enhancing the 5G-AKA Protocol with Post-Quantum Digital Signature Method -- SoK: Directions and Issues in Formal Verification of Payment Protocols -- PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN -- Design and Performance Evaluation of a Two-stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds -- Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings -- Towards User-Oriented Steganography -- AI-based Cybersecurity Systems. | |
520 | _aThe aim of the book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence, and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure, and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design, and applications of computer networks, distributed computing, and information systems. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aData Engineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aBarolli, Leonard. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031579158 |
776 | 0 | 8 |
_iPrinted edition: _z9783031579172 |
830 | 0 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v202 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-57916-5 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c274726 _d274725 |