Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Choose an application
The reprint offers a selection of high-quality research articles that tackle the major difficulties in computer vision and machine learning for intelligent sensing systems from both theoretical and practical standpoints. This publication includes intelligent sensing techniques, twelve foundational investigations into sense-making methods, and discusses particular uses of intelligent sensing systems in autonomous driving and virtual reality.
Machine learning. --- Computer science. --- Artificial intelligence.
Choose an application
The reprint offers a selection of high-quality research articles that tackle the major difficulties in computer vision and machine learning for intelligent sensing systems from both theoretical and practical standpoints. This publication includes intelligent sensing techniques, twelve foundational investigations into sense-making methods, and discusses particular uses of intelligent sensing systems in autonomous driving and virtual reality.
Machine learning. --- Computer science. --- Artificial intelligence.
Choose an application
The reprint offers a selection of high-quality research articles that tackle the major difficulties in computer vision and machine learning for intelligent sensing systems from both theoretical and practical standpoints. This publication includes intelligent sensing techniques, twelve foundational investigations into sense-making methods, and discusses particular uses of intelligent sensing systems in autonomous driving and virtual reality.
Machine learning. --- Computer science. --- Artificial intelligence.
Choose an application
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Computer networks --- Telecommunication systems --- Data protection. --- Security measures.
Choose an application
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Computer architecture. Operating systems --- informatica --- computerbeveiliging
Choose an application
This book takes an in-depth look at the development of the private education sector in modern China. Readers will find valuable data and materials never before presented in such an accessible and transparent way, together with analyses of the major changes and challenges in the course of this development. The book is organized both chronologically and by topic: it employs a past-present-future order that unites the general arrangement; at the same time, each specific subject is approached historically, not only to show the origins of the problem, but also to link it with the historical-comparative context, in which the evaluation of alternative policy choices become highly viable. Further, the book provides a pioneering account of current problems, adopting a fresh perspective to address the most important aspects of Chinese private education reform. The elaboration on topics concerning private school assets, property rights, legal personality, school operators’ entrepreneurship, benefits and investment returns, school autonomy, and the development of teachers and students, is both empirically rich and highly insightful. The book’s content is chiefly derived from years of fieldwork in private schools and from extensive interviews with hundreds of policy makers, school operators, managers, teachers and students. Since these people are self-conscious about themselves as the actors in and witnesses to the development of Chinese private education over the past three decades, the book places great emphasis on neutrality, allowing the private education landscape to unfold in the context of the privatization of the socialist system after 1978. The book offers an essential guide for anyone who wishes to understand the transformation of Chinese education. It is highly recommendable as a detailed introduction to Chinese education, or as a resource for comparative research on private education from an international perspective.
Private schools --- Academies (Private schools) --- Independent schools --- Schools --- Administration, Organization and Leadership. --- Educational Policy and Politics. --- Teaching and Teacher Education. --- Learning & Instruction. --- School management and organization. --- School administration. --- Educational policy. --- Education and state. --- Teaching. --- Learning. --- Instruction. --- Administration, Educational --- Educational administration --- Inspection of schools --- Operation policies, School --- Policies, School operation --- School administration --- School inspection --- School operation policies --- School organization --- Education --- Management --- Organization --- Learning process --- Comprehension --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Instructional systems --- Pedagogical content knowledge --- Training --- Education policy --- Educational policy --- State and education --- Social policy --- Endowment of research --- Inspection --- Management and organization --- Government policy
Choose an application
Teacher education. Teacher's profession --- Didactics --- Educational sciences --- Organization theory --- onderwijspolitiek --- organisatiemanagement --- didactiek --- leidinggeven --- administratie --- lerarenopleiding --- lesgeven --- China
Choose an application
This book takes an in-depth look at the development of the private education sector in modern China. Readers will find valuable data and materials never before presented in such an accessible and transparent way, together with analyses of the major changes and challenges in the course of this development. The book is organized both chronologically and by topic: it employs a past-present-future order that unites the general arrangement; at the same time, each specific subject is approached historically, not only to show the origins of the problem, but also to link it with the historical-comparative context, in which the evaluation of alternative policy choices become highly viable. Further, the book provides a pioneering account of current problems, adopting a fresh perspective to address the most important aspects of Chinese private education reform. The elaboration on topics concerning private school assets, property rights, legal personality, school operators’ entrepreneurship, benefits and investment returns, school autonomy, and the development of teachers and students, is both empirically rich and highly insightful. The book’s content is chiefly derived from years of fieldwork in private schools and from extensive interviews with hundreds of policy makers, school operators, managers, teachers and students. Since these people are self-conscious about themselves as the actors in and witnesses to the development of Chinese private education over the past three decades, the book places great emphasis on neutrality, allowing the private education landscape to unfold in the context of the privatization of the socialist system after 1978. The book offers an essential guide for anyone who wishes to understand the transformation of Chinese education. It is highly recommendable as a detailed introduction to Chinese education, or as a resource for comparative research on private education from an international perspective.
Teacher education. Teacher's profession --- Didactics --- Educational sciences --- Organization theory --- onderwijspolitiek --- organisatiemanagement --- didactiek --- leidinggeven --- administratie --- lerarenopleiding --- lesgeven --- China
Choose an application
Listing 1 - 10 of 10 |
Sort by
|