Cantitate/Preț
Produs

Networked Systems: 11th International Conference, NETYS 2023, Benguerir, Morocco, May 22–24, 2023, Proceedings: Lecture Notes in Computer Science, cartea 14067

Editat de David Mohaisen, Thomas Wies
en Limba Engleză Paperback – 7 iul 2023
This book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22–24, 2023.
The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions.
The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 34543 lei

Preț vechi: 43178 lei
-20% Nou

Puncte Express: 518

Preț estimativ în valută:
6611 6891$ 5504£

Carte tipărită la comandă

Livrare economică 06-20 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031377648
ISBN-10: 3031377648
Pagini: 175
Ilustrații: X, 175 p. 40 illus., 17 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.27 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

​Machine Learning.- Detection of Fake News Through Heterogeneous Graph Interactions.- Species Recognition via Active Learning.- Federated Graph Neural Network for Threat Intelligence.- Formal Methods.- A Formal Analysis of Karn’s Algorithm.- Comparing Causal Convergence Consistency Models.- Security & Privacy.- Encrypted search is not enough to ensure privacy.- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN.- Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories.- Fault Tolerance.- Consensus on Unknown Torus with Dense Byzantine Faults.- Distributed Systems.- Approximation Algorithms for Drone Delivery Scheduling Problem.- Pebble guided Treasure Hunt in Plane.- Distance-2-Dispersion: Dispersion with Further Constraints.