Atnaujinkite slapukų nuostatas

El. knyga: Distributed Computer and Communication Networks: 25th International Conference, DCCN 2022, Moscow, Russia, September 26-29, 2022, Revised Selected Papers

Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 25th International Conference on Distributed Computer and Communication Networks, DCCN 2022, held in Moscow, Russia, in September 2022.

The 27 full papers and 2 short papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: Distributed Systems Applications, Computer and Communication Networks, Analytical Modeling of Distributed Systems.
Distributed Systems Applications.- A Survey of the Implementations of
Model Inversion Attacks.- Multidimensional information system metadata
description using the "Data vault" methodology.- Application of convolutional
neural networks for image detection and recognition based on a self-written
generator.- Estimating a polyhedron method informativeness in the problem of
checking the automaton by the statistical properties of the input and output
sequences.- Visual Question Answering for Response Synthesis Based on
Spatial Actions.- Application of the piecewise linear approximation method in
a hardware accelerators of a neural networks based on a reconfigurable
computing environments.- Boosting Adversarial Training in Adversarial Machine
Learning.- Computer and Communication Networks.- On effectiveness of the
adversarial attacks on the computer systems of biomedical
images classification.- MultipathTransmission of Heterogeneous Traffic in
Acceptable Delays with Packet Replication and Destruction of Expired Replicas
in the Nodes that Make Up the Path.- The Probability of Timely Redundant
Service in a Two-level Cluster of a Flow of Requests that is Heterogeneous in
Functionality and Allowable Delays.- Characterizing the Effects of Base
Station Variable Capacity on 5G Network Slicing Performance.- On Waiting Time
Maxima in Queues with Exponential-Pareto Service Times.- Simulation of
multimedia traffic delivery in WLAN.- A Model for 5G Millimeter Wave Service
Rate Abstraction.- Cybersecurity System with State Observer and K-Means
Clustering Machine Learning Model.- Collision Provenance using Decentralized
Ledger.- A First-Priority Set of Telepresence Services and a Model Network
for Research and Education.- Analytical Modeling of Distributed
Systems.- Computational analysis of a service system with non-replenish
queue.- Neuro-Fuzzy Model Based on Multidimensional Membership
Function.- Controlled Markov Queueing Systems under Uncertainty.- Fuzzy
Classification Model Based on Genetic Algorithm with
Practical Example.- Preparing traffic to analyze the dynamics of its states
by method of partial correlations.- On approximation of the
time-probabilistic measures of a resource loss system with the waiting
buffer.- A unified regenerative stability analysis of some
non-conventional queueing models.- Speed-up simulation for reliability
analysis of Wiener degradation process with random failure
threshold.- Optimization and Stability of Some Discrete-Time Risk
Models.- The Markov Model of the Needham-Schroeder Protocol.- Analysis of
functioning photonic switches in next-generation networks using queueing
theory and simulation modeling.- Two-Way Communication Retrial Queue with
Markov Modulated Poisson Input and MultipleTypes of Outgoing Calls.