Computers and Their Applications
40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings
Herausgegeben:Bandi, Ajay; Hossain, Mohammad
Computers and Their Applications
40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings
Herausgegeben:Bandi, Ajay; Hossain, Mohammad
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
Andere Kunden interessierten sich auch für
- Computing, Communication and Learning64,99 €
- Artificial Intelligence and Machine Learning67,99 €
- Artificial Intelligence and Machine Learning56,99 €
- Amin ZollanvariMachine Learning with Python49,99 €
- Amin ZollanvariMachine Learning with Python67,99 €
- Irena CroninUnderstanding Generative AI Business Applications39,99 €
- Risks and Security of Internet and Systems49,99 €
-
-
-
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2435
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-92177-3
- Seitenzahl: 264
- Erscheinungstermin: 26. Juni 2025
- Englisch
- Abmessung: 235mm x 155mm x 15mm
- Gewicht: 406g
- ISBN-13: 9783031921773
- ISBN-10: 3031921771
- Artikelnr.: 73806406
- Herstellerkennzeichnung
- Springer Nature c/o IBS
- Benzstrasse 21
- 48619 Heek
- Tanja.Keller@springer.com
- Communications in Computer and Information Science 2435
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-92177-3
- Seitenzahl: 264
- Erscheinungstermin: 26. Juni 2025
- Englisch
- Abmessung: 235mm x 155mm x 15mm
- Gewicht: 406g
- ISBN-13: 9783031921773
- ISBN-10: 3031921771
- Artikelnr.: 73806406
- Herstellerkennzeichnung
- Springer Nature c/o IBS
- Benzstrasse 21
- 48619 Heek
- Tanja.Keller@springer.com
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.