Listing 1 - 10 of 10 |
Sort by
|
Choose an application
As almost all human activities have been moved online due to the pandemic, novel robust and efficient approaches and further research have been in higher demand in the field of computer science and telecommunication. Therefore, this (reprint) book contains 13 high-quality papers presenting advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity.
Technology: general issues --- History of engineering & technology --- pointer instrumentation --- image processing --- object detection --- K-fold cross-validation --- Faster-RCNN --- vein detection --- digital image processing --- correlation --- displacement measurement --- semantic segmentation --- farmland vacancy segmentation --- strip pooling --- crop growth assessment --- encoder–decoder --- monotone curve --- tangent circle --- adjacent circle --- area of location of the curve --- contour --- fingerprinting --- malware analysis --- malicious network traffic analysis --- HTTP protocol analysis --- pcap file analysis --- malware tracking --- malware identification --- graph theory --- smart meter --- smart metering --- wireless sensor network --- interpolation --- tangent line --- curvature --- error --- ellipse --- B-spline --- dynamic dedicated path protection --- generic Dijkstra algorithm --- elastic optical network --- modulation constraints --- ECG signal --- classification --- PTB-XL --- deep learning --- computer vision --- adversarial attacks --- adversarial defences --- image quality assessment --- stitched images --- panoramic images --- image analysis --- image entropy --- NetFlow --- network intrusion detection --- network behavior analysis --- data quality --- feature selection --- fronthaul --- Xhaul --- DSB-RFoF --- A-RoF --- B5G --- 6G --- DIPP --- optical channel selection --- n/a --- encoder-decoder
Choose an application
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Data protection. --- Cryptography. --- Data encryption (Computer science). --- Computer networks --- Computer networks. --- Computer systems. --- Data and Information Security. --- Cryptology. --- Security Services. --- Mobile and Network Security. --- Computer Communication Networks. --- Computer System Implementation. --- Security measures. --- Data encryption (Computer science)
Choose an application
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Data protection. --- Cryptography. --- Data encryption (Computer science). --- Computer networks --- Computer networks. --- Computer systems. --- Data and Information Security. --- Cryptology. --- Security Services. --- Mobile and Network Security. --- Computer Communication Networks. --- Computer System Implementation. --- Security measures. --- Data encryption (Computer science)
Choose an application
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Data protection. --- Cryptography. --- Data encryption (Computer science). --- Computer networks --- Computer networks. --- Computer systems. --- Data and Information Security. --- Cryptology. --- Security Services. --- Mobile and Network Security. --- Computer Communication Networks. --- Computer System Implementation. --- Security measures. --- Data encryption (Computer science)
Choose an application
Choose an application
This volume is part of the Lecture Notes in Networks and Systems series and includes the proceedings of the 13th International Conference on Image Processing and the 13th International Conference on Computer Recognition Systems, held in 2023. The book presents cutting-edge research in the fields of image processing, computer recognition systems, networks, and advanced computer systems. It includes high-level papers selected through a rigorous review process, covering areas such as advanced data analysis, machine learning, artificial intelligence applications, and image processing techniques. The book is intended for researchers, developers, and educators in these fields, providing insights into current challenges and future developments in systems and networks.
Mathematical statistics --- Electronics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- patroonherkenning --- neuronale netwerken --- fuzzy logic --- cybernetica --- factoranalyse --- signal processing --- AI (artificiële intelligentie) --- signaalprocessoren --- signaalverwerking --- Image processing. --- Pattern recognition systems. --- Image processing --- Pattern recognition systems
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 10 |
Sort by
|