Muutke küpsiste eelistusi

E-raamat: Tools for Design, Implementation and Verification of Emerging Information Technologies: 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2022, which was held in Melbourne, Australia, in November 23-25,2022.

The 11 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on network security; network communication; network services; mobile and ad hoc networks; blockchain; machine learning.

Network Security.- POET: A Self-learning Framework for PROFINET
Industrial Operations Behaviour.- A Robust NFT Assisted Knowledge
Distillation Framework for Edge Computing.- Web Bot Detection based on Hidden
Features of HTTP Access Log.- 4 A GAN-Based Real-Time Covert Energy Theft
Attack against Data-Driven Detectors.- Network Communication.- Implementation
of an all-digital DRC for 100BASE-FX.- Network Services.- Research and
implementation of importing distributed cluster data into cloud platform
based on JMS.- Mobile ad hoc networks.- Design of a 5G experimental platform
based on OpenAirInterface.- MEC Application Migration by using AdvantEDGE.-
Blockchain.- An Efficient Data Retrieval Method for Blockchain.- Machine
learning.- A Survey On 3D Style Transfer.- FSVM: Federated Support Vector
Machines for Smart City.