000 05597nam a22005535i 4500
001 978-3-031-60023-4
003 DE-He213
005 20250516160057.0
007 cr nn 008mamaa
008 240701s2024 sz | s |||| 0|eng d
020 _a9783031600234
_9978-3-031-60023-4
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aIntelligent Distributed Computing XVI
_h[electronic resource] :
_b16th International Symposium on Intelligent Distributed Computing, IDC 2023 /
_cedited by Michael Köhler-Bußmeier, Wolfgang Renz, Jan Sudeikat.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXI, 318 p. 86 illus., 63 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v1138
505 0 _a Part I Keynote Abstracts -- New distributed cloud- and network architecture for true 3D Holography -- Trust Assessment in Distributed Energy Systems -- Why NOT Blockchain? -- Part II Position Papers -- Local Distribution Privacy in Federated Learning -- The Future of Everything is Distributed - A Plea for Reliable, Responsible, and Resilient Systems Engineering -- Analyzing the Transformation Path of the Local Energy Infrastructure -- Regional Planning Support as a Combination of Expert Judgement, Open Data, Simulation, and Machine Learning -- Part III Learning, Analysis and Prediction -- First Results of a Comparison of Machine Learning Hardware Acceleration Approaches Using Field Programmable Gate Arrays in an Agricultural Mobile Robotic Application Case -- Fighting TLS Attacks: an Autoencoder-based Model for Heartbleed Attack Detection -- Solar system object detection in time series data using synthetically trained neural networks -- Comparative analysis of machine learning methods in vulnerability categories prediction based on configuration similarity -- Part IV Data Analysis -- Towards application of the tabular data transformation to images in the intrusion detection tasks using deep learning techniques -- Emergent Topic-Based Classification of Literature Books Using Social Data Analysis -- A Data Space Experimentation Framework -- Part V Smart Cities and Energy Systems -- Intelligent selection of requirements for a secure design of Smart City transport infrastructure interfaces -- Privacy-Preserving Edge Processing in Decentralized Citizen-centric Sensor Networks -- Distributed Flexibility Fitness Landscape Analysis for Parameterization of Algorithms in Multi-Agent Energy Systems -- Risk-aware CPS Operation Scheme for Self-Organizing Balancing-Power Pools -- Part VI Networks -- Comparison of Power Consumption Models for 5G Cellular Network Base Stations -- Part VI Organization -- An Environmentally Friendly Race Timing System Based on Cameras Only -- Associative Composition of Web Service Invocation Sequences Based on Agent Interaction Diagrams -- Part VII Multi-Agent Systems -- Multi-Agent Reward-based Intruder Capture -- Robustness by Design -- Studying the Micro-Macro-Dynamics in MAPE-like Adaption Processes -- A Microservice-Based Multi-Agent System for the Job Market.
520 _aThis book presents selected contributions to the 16th Symposium on Intelligent Distributed Computing (IDC'23) held from September 13 to 15, 2023, at the HAW Hamburg, Germany. This unique collection of papers presents the latest findings, research achievements and ideas in the area of Intelligent Distributed Computing provided by researchers and practitioners from both distributed computing and intelligent computing communities. Distributed computing covers methods and technology to build complex computational systems composed of collaborating software components scattered across diverse computational elements. Intelligent computing offers a hybrid palette of methods, techniques and their applications ranging from classical artificial intelligence, information and data sciences, multi-agent technologies or computational intelligence to more recent trends such as swarm intelligence, bio-inspired computation, cloud computing, machine learning or social/cyber-physical trust and security.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aArtificial intelligence.
650 1 4 _aComputational Intelligence.
650 2 4 _aArtificial Intelligence.
700 1 _aKöhler-Bußmeier, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRenz, Wolfgang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSudeikat, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031600227
776 0 8 _iPrinted edition:
_z9783031600241
776 0 8 _iPrinted edition:
_z9783031600258
830 0 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v1138
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-60023-4
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c275528
_d275527