Katalog
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
170008 results (page 1114/17001) | |||
![]()
24.21.1195 |
Ubiquitous Security
Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
DATA SECURITY
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022.
The 34 full papers and 4 short papers included in..selengkapnya..
|
|
![]()
24.21.1143 |
Image and Vision Computing: 37th International Conference, IVCNZ 2022, Auckland, New Zealand, November 24–25, 2022, Revised Selected Papers tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
COMPUTER VISION
|
|
![]()
24.21.1142 |
Artificial Intelligence in Mechatronics and Civil Engineering
Bridging the Gap tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
ARTIFICIAL INTELEGENCE
Geoengineering, Foundations, Hydraulics, Artificial Intelligence, Mechatronics, Geotechnical Engineering & Applied Earth Sciences, Mathematical Models of Cognitive Processes and Neural Networks
Recent studies highlight the application of artificial intelligence, machine learning, and simulation techniques in engineering. This book covers the successful implementation of different intelligent techniques in various areas of engineering..selengkapnya..
|
|
![]()
24.21.1141 |
Computer Vision – ECCV 2022 Workshops
Tel Aviv, Israel, October 23–27, 2022, Proceedings, Part II tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
IMAGE PROCESSING AND COMPUTER VISION
Computer Imaging, Vision, Pattern Recognition and Graphics, Machine Learning, Computer System Implementation, Computer Applications, Computers and Education
The 8-volume set, comprising the LNCS books 13801 until 13809, constitutes the refereed proceedings of 38 out of the 60 workshops held at the 17th European Conference on Computer Vision,..selengkapnya..
|
|
![]()
24.21.1153 |
Security Protocols XXVIII 28th International Workshop, Cambridge, UK, March 27–28, 2023, Revised Selected Papers tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
DATA SECURITY
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27–28, 2023.
Thirteen papers out of 23 submissions were selected..selengkapnya..
|
|
![]()
24.21.1140 |
Neuroscience and Entrepreneurship Research: Researching Brain-Driven Entrepreneurship tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
ENTREPRENEURSHIP
RESEARCH,
Buku ini menegaskan munculnya era keempat kewirausahaan, berdasarkan pendekatan yang digerakkan oleh otak dalam studi, pengajaran, dan praktik kewirausahaan. Pergeseran paradigma ini berasal dari kebutuhan untuk menggabungkan teknologi saraf yang..selengkapnya..
|
|
![]()
24.21.1139 |
Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
SYSTEMS AND DATA SECURITY
Computer Systems Organization and Communication Networks, Information Systems Applications (incl. Internet), Mobile and Network Security |
|
![]()
24.21.1138 |
Recent Trends in Algebraic Development Techniques 26th IFIP WG 1.3 International Workshop, WADT 2022, Aveiro, Portugal, June 28–30, 2022, Revised Selected Papers tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
CONTROLLING
This book constitutes the thoroughly refereed post-conference proceedings of the 26th International Workshop on Algebraic Development Techniques, WADT 2022, held in Aveiro, Portugal, in June 2022.
The 6 revised papers presented..selengkapnya..
|
|
![]()
24.21.1137 |
Halal Supply Chain Integrity: Concept, Constituents and Consequences tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
LOGISTIK
SUPPLY CHAIN MANAGEMENT,
The book carefully addresses and simplifies the issues of integrity in halal logistics and supply chain. It gathers findings from studies on halal supply chain integrity conducted in Malaysia, a..selengkapnya..
|
|
![]()
24.21.1136 |
Content Distribution for Mobile Internet: A Cloud-based Approach tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
CLOUD COMPUTING
Computer Communication Networks, Mobile Computing, Professional Computing, Mobile and Network Security, System Performance and Evaluation, Computer Systems Organization and Communication Networks
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon’s launch of EC2 in 2006..selengkapnya..
|
|