Muutke küpsiste eelistusi

Cloud and Network Computing: Second International Conference, ICCNC 2025, Fuzhou, China, June 2022, 2025, Proceedings [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 436 pages, kõrgus x laius: 235x155 mm, 105 Illustrations, color; 23 Illustrations, black and white, 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2539
  • Ilmumisaeg: 02-Oct-2025
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9819501288
  • ISBN-13: 9789819501281
  • Pehme köide
  • Hind: 85,93 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 101,09 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 436 pages, kõrgus x laius: 235x155 mm, 105 Illustrations, color; 23 Illustrations, black and white, 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2539
  • Ilmumisaeg: 02-Oct-2025
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9819501288
  • ISBN-13: 9789819501281
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 2022, 2025.



The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions. 



They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
.- Cloud & Edge Computing.


.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.


.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning
Framework.


.- Multicast Communication in All-Optical Fat-Tree Networks.


.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional
Autoencoder and Prototype Alignment.


.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization
in Streaming Content Caching Systems.


.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting
in Agricultural Logistics Systems.


.- The Optimization Problem of Delivery Platforms.


.- Network Computing.


.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra
R-Component Pattern.


.- Efficient Cross-Layer Coordinated Buffer Management in
Datacenter Networks.


.- Reliability Analysis of Folded Hypercube-Like Networks.


.- Hybrid Gravity-Based Centrality Scheme for High-Resolution
Influencer Detection in Complex Networks.


.- The Approximate Concept of Variable Precision Rough Set on
Concept Lattice.


.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.


.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.


.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in
Multipath Indoor Environment.


.- Big Data Analysis and Artificial Intelligence.


.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph
Representation.


.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal
Hypergraph Generative Adversarial Networks.


.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and
Neural Network-Driven Elite Selection.


.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.


.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level
Anomaly Detection.


.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.


.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.


.- Distributed Resource Management Mechanism Based on Deep Reinforcement
Learning.


.- Security & Privacy.


.- An Adversarial Attack Method Based on Local Masking and Multi-Stage
Momentum Optimization.


.- Anomaly Detection Method of Source Code Vulnerability Detection Tools
Based on Differential Testing.


.- The Fractional Features of Separated Fuzzy Sets and Its
Intelligent Acquisition.


.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android
Apps.


.- DOL: A Dual Ownership License for Deep Neural Networks.


.- Android App Privacy Risk Assessment: Combining Policy Analysis and
Behavioral Monitoring.


.- Improvement of Provable Data Possession Scheme.


.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.