Computers and Their Applications (eBook, PDF)
40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings
Redaktion: Bandi, Ajay; Hossain, Mohammad
61,95 €
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
61,95 €
Als Download kaufen
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
31 °P sammeln
Computers and Their Applications (eBook, PDF)
40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings
Redaktion: Bandi, Ajay; Hossain, Mohammad
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 43.44MB
Andere Kunden interessierten sich auch für
- Risks and Security of Internet and Systems (eBook, PDF)53,95 €
- Risks and Security of Internet and Systems (eBook, PDF)89,95 €
- Rakesh M. VermaCybersecurity Analytics (eBook, PDF)47,95 €
- Decision Making and Security Risk Management for IoT Environments (eBook, PDF)113,95 €
- Malware Analysis Using Artificial Intelligence and Deep Learning (eBook, PDF)137,95 €
- Risks and Security of Internet and Systems (eBook, PDF)40,95 €
- Kevin Lynn McLaughlinCybersecurity Operations and Fusion Centers (eBook, PDF)48,95 €
-
-
-
This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 252
- Erscheinungstermin: 25. Juni 2025
- Englisch
- ISBN-13: 9783031921780
- Artikelnr.: 74732547
- Verlag: Springer Nature Switzerland
- Seitenzahl: 252
- Erscheinungstermin: 25. Juni 2025
- Englisch
- ISBN-13: 9783031921780
- Artikelnr.: 74732547
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.
ALGORITHMS AND AI.- Improving the Performance of 3D Printed Molds for Injection Molding using Hollow Structures.- AI-aided documentation of urban graffiti using NeRF and Gaussian Splatting.- Measurement and Characterization of Problems with Public API Support: A Case Study on YouTube APIs.- Conversational AI in Healthcare: A Framework for Privacy, Security, Ethics, Transparency and Harm Prevention.- Chain Table: Protecting Table-Level Data Integrity by Digital Ledger Technology.- Sentiment, Volume, and Topics in University Tweets: Methodology, Insights, and Challenges.- Automated Test Case Generation for Software Testing Using Generative AI.- Ensemble Machine Learning Approach to Phishing Website Detection.- Human Activity Recognition using an Ensemble Learning Approach.- Comparison of Some Pseudorandom Binary Generators Based on Combinatorial Functions.- Design Process of a New Pseudorandom Binary Generator Model.- MACHINE LEARNING AND DATA MINING.- Machine Learning for Real World Water Consumption Forecasting.- Comparative Analysis of Machine Learning Classifiers for Yellow Fever Diagnosis Using Causative Data: Evaluating Naïve Bayes, KNN, RIPPER, and PART.- An Automated Framework of Ontology Generation for Abstract Concepts using LLMs.- Using Machine Learning Techniques to Detect Network Intrusions.- SECURITY AND NETWORKING.- A Novel Feature Selection Method for Classification Against Email Phishing.- Reputation Proof with Load Services in Ad-hoc Peer-to-Peer Networks.- Scalable Automated Vulnerability Inspection Framework Using Nmap for CVE Detection in Distributed Remote Networks.- Clustering of Processing-Induced Martensitic Phases Using AC-GAN and Magnetic Susceptibility Evaluation in High-Gradient Fields.