1 - 20
Next
- International Conference on Sensor Systems and Software (5th : 2014 : Coventry, England)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (x, 121 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Design of a Novel Adaptive Indoor Air Quality Control for Co-learning Smart House
- A Design-led, materials based approach to human centered applications using modified dielectric electroactive polymer sensors
- How to ruin Sensor Network Performance using Duplicate Suppression
- A Open Hardware Wireless Sensor Monitoring System for Human Wellbeing Research in Ambient Assisted Living
- Artificial Immune System
- A New Approach For The Long-Term Data Monitoring in Ambient Assisted Living
- An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
- HUMsim: A Privacy-Oriented Human Mobility Simulator
- Mobile Health Applications: a Comparative Analysis and a Novel Mobile Health Platform
- Overview of Mobile Sensing for Special Needs: Lessons learned from I Can workshop
- A User-Centric Approach to building experience platforms for capturing lifestyle and wellbeing information
- From Silos to the IoT via oneM2M, a Standardized M2M Service Platform
- Decentralising Internet Of Things aware BPMN business processes.
2. PCI bus demystified [2004]
- Abbott, Doug, 1944-
- 2nd ed. - Amsterdam ; Boston : Newnes, ©2004.
- Description
- Book — 1 online resource (xiv, 250 pages) : illustrations
- Summary
-
- INTRODUCING THE PERIPHERAL COMPONENT INTERCONNECT (PCI) BUS bus taxonomy PCI signals signal groups signal types sideband signals definitions ARBITRATION the arbitration process bus parking
- latency BUS PROTOCOL PCI bus commands read/write transactions transaction termination error detection and reporting OPTIONAL AND ADVANCED FEATURES interrupt handling the interrupt acknowledge command 64-bit extensions ELECTRICAL AND MECHANICAL ISSUES signaling environments timing specifications 66 MHz PCI mechanical details PLUG AND PLAY CONFIGURATION configuration address space configuration header base address registers expansion ROM PCI BIOS operating modes BIOS services generate special cycle PCI BRIDGING bridge types configuration address types bus hierarchy and bus number registers address filtering prefetching and posting interrupt handling across a bridge palette snooping
- resource locking COMPACT PCI mechanical implementation electrical implementation Compact PCI bridging HOT PLUG AND HOT SWAP: PCI Hot Plug Hot Plug primitives Compact PCI Hot Swap primitives.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Domżał, Jerzy, author.
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xvii, 236 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Flow-Oriented Approaches Flow-Aware Networking Flow-Aware Networking for Net Neutrality Congestion Control in Flow-Aware Networks Fairness in Flow-Aware Networks FAN in Case of Failure Service Differentiation in FAN Service Degradation in FAN Implementation of Cross-Protect Router Summary Answers.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Wireless Internet (8th : 2014 : Lisbon, Portugal)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xii, 348 pages) : illustrations Digital: text file.PDF.
- Summary
-
- A Fast Handover Procedure based on Smart Association Decision for Mobile IEEE 802.15.4 Wireless Sensor Networks.- Building Efficient Multi-level Wireless Sensor Networks with Clustering.- Delay Accounting Optimization Procedure to Enhance End-to-End Delay Estimation in WSNs.- Effects of cooperation on wireless ad hoc network Performance.- Revisiting IEEE 802.11 Backoff Process Modeling through Information Entropy Estimation.- Transmission Window Optimization for Caching-based Transport Protocols in Wireless Sensor Networks.- Improved p-norm Energy Detector in AWGN Channel for Spectrum Sensing in Cognitive Radio.- Middleware Solution for HealthCare IoT Applications.- A Survey on Short-Term Electricity Price Prediction Models for Smart Grid Applications.- Analysis of RF-based Indoor Localization with Multiple Channels and Signal Strengths.- Can we apply clustering in fast moving objects?.- Product Network Codes for Reliable Communications in Diamond Networks.- Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities.- Quadratic Programming for Demand-Side Management in the Smart Grid.- Towards an Advanced PKI-based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach.- UTTB FDSOI Back-Gate Biasing for Low Power and High-Speed Chip Design.- An architectural framework for delivering SIP-AS multimedia services based on JADE/OSGi Technology.- Easily Guiding of Blind: providing information and navigation - SmartNav.- Intelligent and Efficient Car Management Application for Advanced Green Routing.- Artificial Neural Networks for Traffic Prediction in 4G Networks.- Pros and Cons of Software Standards Use.- Storm: Rateless MDS Erasure Codes.- A framework for object classication in fareld videos.- Positioning-Protocol-Based Digital Signature.- Verification of various attack approaches against CSI-based secret key in different types of LOS channels.- A method for localization of computational node and proxy server in educational data synchronization.- Social Networks and Internet of Things, an overview of the SITAC project.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Karkeraa, Shilpa.
- Berkeley, CA : Apress, 2020.
- Description
- Book — 1 online resource (324 pages) Digital: text file.PDF.
- Summary
-
- 1. Blockchains - The Complete Picturea. Introductionb. Historical Chain of Events - Distributed Computingc. Terminology - what is a distributed ledger?d. How a blockchain works?e. Consensus algorithmsf. Hidden Distributed Networks we never knew
- 2. Foundation of Blockchain Elementsa. Decentralization - Let's decentralise content (Use Case)b. Digital signature - Teaches you to encrypt & decrypt with Digital Signatures (usecase)c. Mining & Token Models (Mathematical deductions - example of creating value)d. Integrity & the proof of concept (Confluence of Biometrics, AI, DocumentVerification)e. Setting up of Blockchain Elements on Azure (Environment Setup)
- 3. Aspects of Blockchain Transactionsa. Encryption, Validationb. Distribution, Securityc. Practical Example of Transactions
- 4. Permissioned Blockchains - Mutual distributed ledgers - Use Case of FinancialInstitutions for Letter of Credits
- 5. Smart Contracts
- 6. Blockchain Points of Integrationa. Compliance & Regulatory requirement to create & run a nodeb. Enterprise integration to existing systems & data repositoriesc. Access control & security accessd. Automated process (auto-trigger/ alerts) of Smart Contracts [Use Case -Automated Billing for Power & Utility Bills]e. Life cycle events / maintenancef. Governance & Monitoring
- 7. Technological Tools
- 8. Technical Architecturesa. Designing a solution architecture - Trade Financeb. Designing a content distribution blockchain architecture - Gaming, Marketingc. Converting Legal contracts to Smart Contracts - AI, NLP
- 9. Use Casesa. Decentralized Customer Engagementb. Decentralized Trade Financec. Document Signing and Records Management.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
6. USB complete : the developer's guide [2009]
- Axelson, Jan.
- 4th ed. - Madison, Wis. : Lakeview Research LLC, 2009.
- Description
- Book — 1 online resource (xxiii, 504 pages)
- Summary
-
- Cover; Contents; USB Basics; Inside USB Transfers; A Transfer Type for Every Purpose; Enumeration: How the Host Learns about Devices; Control Transfers: Structured Requests for Critical Data; Chip Choices; Device Classes; How the Host Communicates; Matching a Driver to a Device; Detecting Devices; Human Interface Devices: Using Control and Interrupt Transfers; Human Interface Devices: Reports; Human Interface Devices: Host Application; Using WinUSB for Vendor-Defined Functions; All About Hubs; Managing Power; Testing and Debugging; Packets on the Bus; The Electrical and Mechanical Interface.
7. Hands-on Azure pipelines : understanding continuous integration and deployment in Azure DevOps [2020]
- Chandrasekara, Chaminda.
- [United States] : Apress, 2020.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Chapter 1: Understanding the Importance of Software Delivery Automation
- Chapter 2: Overview of Azure Pipelines
- Chapter 3: Setting Up Pools, Deployment Groups and Agents
- Chapter 4: Creating Build Pipelines
- Classic
- Source Control, Templates, Jobs and Tasks
- Chapter 5: Creating Build Pipelines
- Classic
- Variables, Triggers, Filters, Options and Retaining
- Chapter 6: Creating Build Pipelines
- Classic
- Queuing, Debugging, Task Groups, Artifacts and Import/Export
- Chapter 7: Using Artifacts
- Chapter 8: Creating and using YAML build pipelines
- Chapter 9: Azure Release Pipelines
- Service Connections, Templates, Artifacts, Stages and Environments
- Chapter 10: Azure Release Pipelines
- Jobs, Deployment Groups, Variable and Other Options
- Chapter 11: REST API, Command Line and Extension Development
- Chapter 12: Integrating Tests to Pipelines.
(source: Nielsen Book Data)
- SmartCom (Conference : Smart computing and communication) (2nd : 2017 : Shenzhen Shi, China)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xii, 458 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Sphere Decoding Algorithm Based on A New Radius Definition.- Inferring travel purposes for transit smart card data using.- A Hybrid Music Recommendation System Based on Scene-State Perception Model.- Research on Parallel Architecture of OpenCL-based FPGA.- Smart Resource Allocation Using Reinforcement Learning in Content-Centric Cyber-Physical Systems.- An Effective Malware Detection based on Behaviour and Data Features.- Load Pattern Shape Clustering Analysis for Manufacturing.- A New Architecture of Smart House Control System.- Big Data Analysis of TV Dramas Based on Machine Learning.- Face Based Advertisement Recommendation.- Ensemble Learning for Crowd Flows Prediction on Campus.- Impact of Probability Distribution Selection on RVFL Performance.- Joint sparse locality preserving projections.- Research on Dynamic Safe Loading Techniques in Android Application Protection System.- Research on Optimizing Last Level Cache Performance for Hybrid Main Memory.- Quality of Service (Qos)in Lan To Lan Environments Through Modification of Packages.- Heuristic Algorithm for Flexible Optical Networks OTN.- Design for 3D Modeling System based on Vive.- A Knowledge Graph based Solution for Entity Discovery and Linking in Open-domain Questions.- Predicting App Usage Based on Link Prediction in User-App Bipartite Network.- Sentiment Classification of Reviews on Automobile Websites by Combining Word2Vec and Dependency Parsing.- Data Quality Evaluation: Methodology and Key Factors.- SecTubeSGX-based Trusted Transmission System.- The Research How to judge Social Vehicles driving into ART.- PSVA: A Content-based Publish/Subscribe Video Advertising Framework.- Practice and Research on Private Cloud Platform Based on OpenStack.- Approach for Semi-Automatic Construction of Anti-infective Drug Ontology based on Entity Linking.- Constructing Ontology-based Cancer Treatment Decision Support System with Case-Based Reasoning.- Using Virtualization for Blockchain Testing.- DiPotA Distributed Industrial Honeypot System.- MSA vs.MVC: future trends for big data processing platforms.- Attention-aware Path-based Relation Extraction for Medical Knowledge Graph.- Information Centric Networking Media Streaming Experiment Platform Design.- An Implementation of Content-Based Pub/Sub System via Stream Computation.- Security Message Broadcast Mechanism Research in Vehicular Network.- Efficient Algorithm for Traffic Engineering in Multi-Domain Networks.- Reliable and efficient deployment for Virtual Network Functions.- Empirical Study of Data Allocation in Heterogeneous Memory.- NEM:A NEW In-VM Monitoring with High Efficiency and Strong Isolation.- k-CoFi: Modeling k-Granularity Preference Context in Collaborative Filtering.- Implementation Maximum Overall Coverage Constraint Nonnegative Matrix Factorization for Hyperspectral Mixed Pixels Analysis Using MapReduce.- Improved Three-dimensional Model Feature of Non-rigid Based on HKS.- An Object Detection Algorithm for Deep Learning Based on Batch Normalization.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- UNet (Symposium) (4th : 2018 : Hammamet, Tunisia)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xxx, 400 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Ubiquitous Communication Technologies and Networking.- IoT network management and applications.- Mobile Edge Networking and Fog-Cloud Computing.- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs.- Cyber Security for Ubiquitous Communications.- Special Session on Wireless Networking, Applications and Enabling Technologies for Unmanned Aerial Vehicles.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xviii, 229 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Machine generated contents note: pt. I Key Concepts
- 1. Privacy, Compliance and the Cloud / Chris Mitchell
- 2. Cryptographic Tools for Cloud Environments / Keith M. Martin
- 3. Migrating to Public Clouds
- From a Security Perspective / Lu Liu
- 4. Virtualization Security in Cloud Computing / Shao Ying Zhu
- 5. Security of Cloud-Based Storage / Gaurav Somani
- 6. Cloud Computing Governance, Risk, and Compliance
- The Quintessential Globalization Challenge / Rhonda L. Farrell
- 7. Cloud Computing and Security in the Future / Kenneth Johnston
- pt. II Application and Approaches
- 8. Security Certification for the Cloud: The CUMULUS Approach / Hristo Koshutanski
- 9. Improving Cloud Assurance and Transparency Through Accountability Mechanisms / Christoph Reich
- 10. DDoS Protection and Security Assurance in Cloud / Dheeraj Sanghi
- 11. Cloud Data Auditing Using Proofs of Retrievability / Sushmita Ruj
- 12. Vehicular Cloud Networks: Architecture and Security / Asma Adnane.
11. Practical wireless data modem design [1999]
- Cheah, Jonathon Y. C.
- Boston : Artech House, 1999.
- Description
- Book — 1 online resource (xvi, 379 pages) : illustrations
- Summary
-
- Introduction. A Wireless Modem Application Overview. Over-the-Air Medium and Link Budgets. Transceiver Passband Design. Frequency Source and Synthesizer Implementations. Modem Design Analyses and Implementations. Forward Error Correction Code. Introduction to Radio Regulatory Requirements. Listing of Ku-Band Geostationary Satellites. Listing of C-Band Geostationary Satellites. Listing of US Cities and Rain Zones. Mathcad - Data Files. Mathematical Formulas. Glossary of Terms.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (289 pages)
- Summary
-
- Preface 1) Internet of Things (IoTs) Evolutionary Computation, Enterprise Modeling and Simulation2) Organization Internet of Things (IoTs): Supervised, Unsupervised and Reinforcement Learning3) Enterprise IoT Modeling: Supervised, Unsupervised and Reinforcement Learning4) An Overall Perspective on Establishing End-To-End Security In Enterprise-IOT (E-IOT)5) Advanced Machine learning for Enterprise IoT modelling6) Enterprise Architecture for IoT: Challenges and Business Trends7) Semi Supervised Machine Learning Algorithm for Predicting Diabetes using Big Data Analytics8) On-The-Go Network Establishment of IoT Devices To Meet The Need of Processing Big Data Using Machine Learning Algorithms9) Analysis of Virtual Machine Placement and Optimization Using Swarm Intelligence Algorithms10) Performance Evaluation of Different Neural Network Classifiers for Sanskrit Character Recognition11) GA With Repeated Crossover for Rectifying Optimization Problems12) An Algorithmic Approach to System Identification In the Delta Domain Using FADFPA Algorithm13) An IoT Based Controller Realization for PV System Monitoring and Control14) Development of An Efficient, Cheap and Flexible IoT Based Wind Turbine Emulator15) An Application of IoT to Develop Concept of Smart Remote Monitoring System16) Heat-Maps for Human Group Activity in Academic Blocks17) Emphasizing on Space Complexity in Social Networks for the Investigation of Link Prediction Using Hybrid Approach18) Overview on Deep Neural Networks: Architecture, Application and Rising Analysis Trends.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
13. Fast and scalable cloud data management [2020]
- Gessert, Felix, author.
- Cham : Springer, [2020]
- Description
- Book — 1 online resource (xi, 193 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Preface.- 1 Introduction.- 2 Latency in Cloud-Based Applications.- 3 HTTP for Globally Distributed Applications.- 4 Systems for Scalable Data Management.- 5 Caching in Research & Industry.- 6 Transactional Semantics.-7 Polyglot Persistence in Data Management.- 8 The NoSQL Toolbox: The NoSQL Landscape in a Nutshell.- 9 Summary & Future Trends.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- MATES (Conference) (15th : 2017 : Leipzig, Germany)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource (xx, 291 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Multiagent Systems.- Distributed Artificial Intelligence.- Intelligent Agents.- Agent Architectures.- Multiagent Planning.- Scheduling.- Autonomous Coordination.- Machine Learning.- Agent-based Manufacturing.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Workshop on Security Protocols (24th : 2016 : Brno, Czech Republic)
- Cham : Springer, 2017.
- Description
- Book — 1 online resource (x, 233 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Evolving Security.- Considering that security protocols evolve.- Changing requirements.- Changing mechanisms.- Attackers' changing agendas and capabilities.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- EGC (Workshop) (1st : 2015 : Alma-Ata, Kazakhstan)
- 1st ed. 2015. - Cham : Springer International Publishing : Imprint : Springer, 2015.
- Description
- Book — 1 online resource (x, 149 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Intro; Preface; Organisation; Contents; Building Cloud Applications for Challenged Networks; 1 Introduction; 2 Problem Space; 3 Latency Is High, So What?; 4 Design Principles; 4.1 Application Signalling; 4.2 Data Exchange; 4.3 Data Repositories; 4.4 Communication Protocols; 5 Discussion; 5.1 Top-Down Approach; 5.2 Bottom-Up Approach; 6 Cross-Cloud Computing; 6.1 Entry; 6.2 Migration; 7 Conclusion; References; Agent Knowledge and Beliefs in a Cloud; 1 Introduction; 2 DRAP Special Cases; 2.1 RinS: Robots in a Space; 2.2 RAM: Rational Agents at the Marketplace; 2.3 RaceP: Race for Processors
- 3 Algorithm and Correctness4 Conclusion; 4.1 Summary; 4.2 Cloud vs. Crowd; References; Could We Fit the Internet in a Box?; 1 Introduction; 2 Background and Related Work; 3 Strawman Requirements and Design; 3.1 Storage; 3.2 Local Connectivity; 3.3 Backhaul Connectivity; 3.4 Service Management; 3.5 Remote Management; 4 Implementation Levels; 5 Conclusion; References; Exemplified Study of WRED Algorithm Parameters Influence on IP-based Networks; 1 Introduction; 2 WRED Features; 3 Experiments; 3.1 Study of the pc Parameter Influence to the WRED Algorithm
- 3.2 Study of the wq Parameter Influence to the WRED Algorithm3.3 Study of the TMIN and TMAX Thresholds Influence to the WRED Algorithm; 4 Conclusions; References; Mobility Types for Cloud Computing; 1 Introduction; 2 Describing Mobile Applications for Cloudlets; 2.1 Syntax; 2.2 Operational Semantics; 2.3 Example; 3 Mobility Types; 3.1 Global Types; 3.2 Local Types; 3.3 Typing System; 4 Conclusion and Related Work; References; Reversible Express Bus Lanes Simulation Software; 1 Introduction; 2 Reversible Bus Lanes; 3 Simulation Conditions; 4 Simulation Process; 4.1 Changing Lanes
- 4.2 Structures4.3 Appearance of Cars and Buses; 4.4 Vehicle Movement Principles; 5 Software Overview and Experiment Results; 5.1 Software Overview; 5.2 Experiment Results; 5.3 Programming Details; 6 Other Work; References; A Combinatorial Approach to Knot Recognition; 1 Introduction; 2 Classical Approach to Knot Recognition; 3 Combinatorial Approach to Knot Recognition; 3.1 Coloring Knots; 3.2 Quandles; 3.3 Colorability and Simple Quandles; 4 Finding a Coloring; 4.1 Theory; 4.2 Practice; 5 Recognizing Knots and Unknots; 5.1 Proving Inequivalence; 5.2 Recognizing Unknots
- 5.3 Classic Vs. Combinatorial6 Conclusion; References; MultiBox: Lightweight Containers for Vendor-Independent Multi-cloud Deployments; 1 Introduction; 2 Related Work; 3 MultiBox Design; 3.1 Requirements; 3.2 Design Choices; 3.3 System Components; 4 Implementation; 4.1 Kernel Support for Control Groups; 4.2 Container Manager; 4.3 Overall Workflow; 5 Evaluation; 5.1 Deployment Overhead; 5.2 Migration Time; 5.3 Human Costs and Portability; 6 Conclusion; References; Texture Recognition by Spatially Adaptive Classification; 1 Introduction; 2 Preprocessing; 3 Texture Recognition
(source: Nielsen Book Data)
- Morais, Douglas H.
- Cham, Switzerland : Springer, 2020.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Introduction.- Broadband Wireless Payload: Packet Switched Data.- Mathematical Tools for Digital Transmission Analysis.- The Wireless Access Path.- Digital Modulation: The Basic Principles.- Channel Coding and Link Adaptation.- Multi Carrier based Multiple Access Techniques.- Multiple Antenna Techniques.- Multiple Access Supporting Technologies.- 5G (NR) Overview and Physical Layer.- 5G Based Fixed Access.- Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Gupta, Aditya.
- [New York] : Apress, [2019]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Chapter 1. Internet of Things: A Primer
- Chapter 2. Performing an IoT Pentest
- Chapter 3. Analyzing Hardware
- Chapter 4. UART Communication
- Chapter 5. Exploitation Using I2C and SPI
- Chapter 6. JTAG Debugging and Exploitation
- Chapter 7. Firware Reverse Engineering and Exploitation
- Chapter 8. Exploiting Mobile, Web and Network for IoT
- Chapter 9. Software Defined Radio
- Chapter 10. Exploiting ZigBee and BLE .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- MSKI (Workshop) (5th : 2017 : Québec, Québec)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xii, 161 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Localization of Bone Surfaces from Ultrasound Data Using Local Phase Information and Signal Transmission Maps.- Shape-aware Deep Convolutional Neural Network for Vertebrae Segmentation.- Automated Characterization of Body Composition and Frailty with Clinically Acquired CT.- Unfolded cylindrical projection for rib fracture diagnosis.- 3D Cobb Angle Measurements from Scoliotic Mesh Models with Varying Face-Vertex Density.- Automatic Localization of the Lumbar Vertebral Landmarks in CT Images with Context Features.- Joint Multimodal Segmentation of Clinical CT and MR from Hip Arthroplasty Patients.- Reconstruction of 3D muscle fiber structure using high resolution cryosectioned volume.- Segmentation of Pathological Spines in CT Images Using a Two-Way CNN and a Collision-Based Model.- Attention-driven deep learning for pathological spine segmentation.- Automatic Full Femur Segmentation from Computed Tomography Datasets using an Atlas-Based Approach.- Classification of Osteoporotic Vertebral Fractures using Shape and Appearance Modelling.- DSMS-FCN: A Deeply Supervised Multi-Scale Fully Convolutional Network for Automatic Segmentation of Intervertebral Disc in 3D MR Images.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ESSoS (Symposium) (10th : 2018 : Paris, France)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (ix, 133 pages) : illustrations Digital: text file.PDF.
- Summary
-
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.