Listing 1 - 8 of 8 |
Sort by
|
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Data protection. --- Computer engineering. --- Computer networks. --- Artificial intelligence. --- Application software. --- Computer vision. --- Data and Information Security. --- Computer Engineering and Networks. --- Artificial Intelligence. --- Computer and Information Systems Applications. --- Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Design and construction --- Computer security --- Machine learning
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Data protection. --- Computer engineering. --- Computer networks. --- Computer networks—Security measures. --- Data and Information Security. --- Computer Engineering and Networks. --- Mobile and Network Security. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Design and construction --- Computer security --- Machine learning
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Data protection. --- Computer engineering. --- Computer networks. --- Computer systems. --- Artificial intelligence. --- Data and Information Security. --- Computer Engineering and Networks. --- Computer System Implementation. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Network computers --- Computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Design and construction --- Computer security --- Machine learning
Choose an application
"This book forges a link between residential CO2 emissions and time use, focussing on China as a key case study. To provide a better understanding of the energy implications of the lifestyle differences between urban and rural China, Pui Ting Wong and Yuan Xu utilise time use methodology as an alternative way to explore the links between individual lifestyle and residential electricity consumption. They begin by examining how Chinese citizens divide their time between daily activities, highlighting patterns around indicators including age, gender, education, and economic status. They go on to quantify CO2 intensities of these time-use activities. Through this linkage, this book presents an alternative strategy for climate-friendly living, highlighting the ways in which urban planning can be deployed to help individuals adapt their time use patterns for CO2 mitigation. Providing a novel contribution to the growing literature on residential electricity consumption, Residential Electricity Consumption in Urbanizing China will be of great interest to scholars of climate policy, energy studies, time use and urban planning"--
Electric power consumption --- Climatic changes --- Urbanization
Choose an application
This two-volume book constitutes the refereed proceedings of the 3rd International Conference on Multimedia Technology and Enhanced Learning, ICMTEL 2021, held in April 2021. Due to the COVID-19 pandemic the conference was held virtually. The 97 revised full papers have been selected from 208 submissions. They describe new learning technologies which range from smart school, smart class and smart learning at home and which have been developed from new technologies such as machine learning, multimedia and Internet of Things.
Application software. --- Education --- Computer networks. --- Artificial intelligence. --- Computer engineering. --- Computer and Information Systems Applications. --- Computers and Education. --- Computer Communication Networks. --- Artificial Intelligence. --- Computer Engineering and Networks. --- Data processing. --- Computers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Design and construction --- Distributed processing
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- informatica --- netwerken (informatica) --- computerbeveiliging --- mobiele communicatie --- netwerk management --- Computer security --- Machine learning --- Seguretat informàtica --- Aprenentatge automàtic
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Programming --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- AI (artificiële intelligentie) --- architectuur (informatica) --- Computer security --- Machine learning --- Seguretat informàtica --- Aprenentatge automàtic
Choose an application
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- informatica --- programmeren (informatica) --- computerbeveiliging --- AI (artificiële intelligentie) --- Computer security --- Machine learning --- Aprenentatge automàtic --- Seguretat informàtica
Listing 1 - 8 of 8 |
Sort by
|