Cloud and Network Computing (eBook, PDF)
Second International Conference, ICCNC 2025, Fuzhou, China, June 20-22, 2025, Proceedings
Redaktion: Lin, Limei; Lee, Chia-Wei
72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
72,95 €
Als Download kaufen
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
36 °P sammeln
Cloud and Network Computing (eBook, PDF)
Second International Conference, ICCNC 2025, Fuzhou, China, June 20-22, 2025, Proceedings
Redaktion: Lin, Limei; Lee, Chia-Wei
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20-22, 2025.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 41.31MB
Andere Kunden interessierten sich auch für
Euro-Par 2024: Parallel Processing Workshops (eBook, PDF)59,95 €
Euro-Par 2024: Parallel Processing Workshops (eBook, PDF)96,95 €
Applications and Techniques in Information Security (eBook, PDF)60,95 €
Applications and Techniques in Information Security (eBook, PDF)52,95 €
Dietmar P. F. MöllerCybersecurity in Digital Transformation (eBook, PDF)40,95 €
Policy-Based Autonomic Data Governance (eBook, PDF)52,95 €
Security in Computing and Communications (eBook, PDF)40,95 €-
-
-
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20-22, 2025.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 436
- Erscheinungstermin: 30. September 2025
- Englisch
- ISBN-13: 9789819501298
- Artikelnr.: 75557366
- Verlag: Springer Nature Singapore
- Seitenzahl: 436
- Erscheinungstermin: 30. September 2025
- Englisch
- ISBN-13: 9789819501298
- Artikelnr.: 75557366
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Cloud & Edge Computing.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- Cloud & Edge Computing.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.







