You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the symposia and workshops of the 10th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP. Each of the sympois and workshops focuses on a particular theme and complements the spectrum of the main conference.
Chapters “On the Current State of Reproducibility and Reporting of Uncertainty for Aspect-Based SentimentAnalysis” and “Contextualized Graph Embeddings for Adverse Drug Event Detection” are licensed under theterms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapter.
Use the Raspberry Pi and modern computing techniques to build industrial Internet of Things systems. Principles and theoretical aspects of IoT technologies combine with hands-on projects leading to detailed descriptions of several industrial IoT applications. This book presents real-life IoT applications based on the Raspberry Pi, beyond the relatively simplistic demos built for educational purposes or hobbyists. You'll make the transition from tinkering with a couple of sensors and simple devices to building fully developed products for commercial use and industrial systems. You'll also work with sensors and actuators, web technologies used for communications in IoT networks, and the large-...
This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012. The 9 revised full papers and 19 short papers were carefully revised and selected from 55 submissions. They are organized in topical sections on cloud computing, grid and service computing, green computing, mobile and pervasive computing, scheduling and performance, and trust and security. Also included are 4 papers presented at the 2012 International Workshop on Mobile Cloud and Ubiquitous Computing (Mobi-Cloud 2012) held in conjunction with GPC 2012.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, smart network management, and emerging applications of 5G-eabled IoT.
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Key Tasks of Network and Security Management AI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit. Sample ideas covered in thi...