Wireless Artificial Intelligent Computing Systems and Applications (eBook, PDF)
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part III
Redaktion: Cai, Zhipeng; Zou, Yifei; Guo, Shaoyong; Takabi, Daniel
53,95 €
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
53,95 €
Als Download kaufen
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
27 °P sammeln
Wireless Artificial Intelligent Computing Systems and Applications (eBook, PDF)
18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part III
Redaktion: Cai, Zhipeng; Zou, Yifei; Guo, Shaoyong; Takabi, Daniel
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024.
The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 35.19MB
Andere Kunden interessierten sich auch für
- Wireless Artificial Intelligent Computing Systems and Applications (eBook, PDF)66,95 €
- Wireless Artificial Intelligent Computing Systems and Applications (eBook, PDF)60,95 €
- Wireless Algorithms, Systems, and Applications (eBook, PDF)73,95 €
- ArtsIT, Interactivity and Game Creation (eBook, PDF)73,95 €
- Wireless Algorithms, Systems, and Applications (eBook, PDF)73,95 €
- Wireless Algorithms, Systems, and Applications (eBook, PDF)73,95 €
- -29%11Mobile Wireless Middleware, Operating Systems and Applications (eBook, PDF)113,95 €
-
-
-
The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024.
The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.
The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 320
- Erscheinungstermin: 12. November 2024
- Englisch
- ISBN-13: 9783031714702
- Artikelnr.: 72347265
- Verlag: Springer International Publishing
- Seitenzahl: 320
- Erscheinungstermin: 12. November 2024
- Englisch
- ISBN-13: 9783031714702
- Artikelnr.: 72347265
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC.
.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.
.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.
.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.
.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.
.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.
.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.
.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.
.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.
.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.
.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.
.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.
.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
.- AdMarks: Image Steganography Based on Adversarial Perturbation.
.- A Review on Binary Code Analysis Datasets.
.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.
.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.
.- Improving Anomaly Scene Recognition with Large Vision-Language Models.
.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.
.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.
.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.
.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.
.- Tree of Thought Prompt in Robotic Arm Control.
.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.
.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.
.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.
.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.
.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.
.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.
.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.
.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.
.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.
.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.
.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.
.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
.- AdMarks: Image Steganography Based on Adversarial Perturbation.
.- A Review on Binary Code Analysis Datasets.
.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.
.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.
.- Improving Anomaly Scene Recognition with Large Vision-Language Models.
.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.
.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.
.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.
.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.
.- Tree of Thought Prompt in Robotic Arm Control.
.- Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC.
.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.
.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.
.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.
.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.
.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.
.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.
.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.
.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.
.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.
.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.
.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.
.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
.- AdMarks: Image Steganography Based on Adversarial Perturbation.
.- A Review on Binary Code Analysis Datasets.
.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.
.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.
.- Improving Anomaly Scene Recognition with Large Vision-Language Models.
.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.
.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.
.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.
.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.
.- Tree of Thought Prompt in Robotic Arm Control.
.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.
.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.
.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.
.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.
.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.
.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.
.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.
.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.
.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.
.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.
.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.
.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
.- AdMarks: Image Steganography Based on Adversarial Perturbation.
.- A Review on Binary Code Analysis Datasets.
.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.
.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.
.- Improving Anomaly Scene Recognition with Large Vision-Language Models.
.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.
.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.
.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.
.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.
.- Tree of Thought Prompt in Robotic Arm Control.