Computing and Combinatorics (eBook, PDF)
30th International Conference, COCOON 2024, Shanghai, China, August 23-25, 2024, Proceedings, Part II
Redaktion: Chen, Yong; Zhang, An; Sun, Xiaoming; Gao, Xiaofeng
66,95 €
66,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
66,95 €
Als Download kaufen
66,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
66,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Computing and Combinatorics (eBook, PDF)
30th International Conference, COCOON 2024, Shanghai, China, August 23-25, 2024, Proceedings, Part II
Redaktion: Chen, Yong; Zhang, An; Sun, Xiaoming; Gao, Xiaofeng
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30th International Conference, COCOON 2024, held in Shanghai, China, during August 23-25, 2024. The 90 full papers and 6 short papers were carefully reviewed and selected from 277 submissions. COCOON 2024 provided an excellent venue for researchers working in the area of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 40.76MB
Andere Kunden interessierten sich auch für
- Computing and Combinatorics (eBook, PDF)40,95 €
- Computing and Combinatorics (eBook, PDF)59,95 €
- Computing and Combinatorics (eBook, PDF)59,95 €
- Combinatorial Algorithms (eBook, PDF)61,95 €
- Frontiers of Algorithmics (eBook, PDF)53,95 €
- Frontiers of Algorithmics (eBook, PDF)53,95 €
- Mathematical Foundations of Computer Science 2014 (eBook, PDF)40,95 €
-
-
-
This three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30th International Conference, COCOON 2024, held in Shanghai, China, during August 23-25, 2024. The 90 full papers and 6 short papers were carefully reviewed and selected from 277 submissions. COCOON 2024 provided an excellent venue for researchers working in the area of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 567
- Erscheinungstermin: 19. Februar 2025
- Englisch
- ISBN-13: 9789819610938
- Artikelnr.: 73420663
- Verlag: Springer Nature Singapore
- Seitenzahl: 567
- Erscheinungstermin: 19. Februar 2025
- Englisch
- ISBN-13: 9789819610938
- Artikelnr.: 73420663
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems.
.- Topological network-control games played on graphs.
.- FAIR: Accurate Data Acquisition for Mobile Crowdsensing.
.- The Hybrid Diagnosability of Hypercube Under the HMM* (Hybrid MM*) Model.
.- Sponsored Search Auction Design Beyond Single Utility Maximization.
.- An On-orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game Approach.
.- Resource-limited Network Security Games with General Contagious Attacks.
.- HR-tree: A Hybrid PMem-DRAM and Write-Optimized R-tree for Spatial Data Storage.
.- A Dstributed Computation Offloading Scheme Based on Stackelberg Game in MEC.
.- Target Influence Maximization Against Overexposure under Threshold Dependent Model in Online Social Networks.
.- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large Graphs.
.- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attack.
.- An Approach to Tight I/O Lower Bounds for Algorithms with Composite Procedures.
.- Hedonic Games for Federated Learning with Model Sharing Data.
.- K-Division Framework Enhances GNNs' Expressive Power.
.- An Innovative Irregular Nesting Algorithm for Flaw Avoidance.
.- Efficient Partitioning Algorithms for Optimizing Big Graph Computation.
.- Distributed generalized Deutsch-Jozsa algorithm.
.- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic Arrivals.
.- Proactive Bi-objective Multi-Path Planning for Wireless Sensor Networks.
.- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series Classification.
.- Strong chromatic index of graphs with small girth.
.- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic Method.
.- Generative Flow Networks for Influence Maximization in Social Networks.
.- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive Networks.
.- Enumerating Floorplans with Any Set of Columns.
.- Streaming algorithm for balance gain and cost with cardinality constraint on the integer lattice.
.- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search Approach.
.- Construction of Binary Cooperative MSR Codes with Multiple Repair Degrees.
.- Opportunistic Routing using Q-Learning with Context Information.
.- A combinatorial view of Holant problems on higher domains.
.- Labor: Adaptive Lazy Compaction for Learned Index in LSM-Tree.
.- A Distributed Algorithm for Rumor Blocking on Social Networks.
.- Convex-area-wise Linear Regression and Algorithms for Data Analysis.
.- Approximating Continuous Multi-Agent Contracts with Lyapunov Function Methods.
.- Privacy-preserving Byzantine-robust Federated learning via Multiparty Homomorphic Encryption.
.- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via Learning.
.- IterLara: A Concise General-purpose Algebraic Model.
.- The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(log n)$ Deterministic Rounds on the Congested Clique.
.- Binary Jumbled Pattern Matching: Suffix tree indexing.
.- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node Classification.
.- Accelerating Topic-Sensitive PageRank by Exploiting the Query History.
.- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and Instances.
.- Parallel Truss Maintenance Algorithms for Dynamic Hypergraphs.
.- Topological Vulnerability-based Imperceptible Node Injection Attack against Dynamic Graph Neural Network.
.- Topological network-control games played on graphs.
.- FAIR: Accurate Data Acquisition for Mobile Crowdsensing.
.- The Hybrid Diagnosability of Hypercube Under the HMM* (Hybrid MM*) Model.
.- Sponsored Search Auction Design Beyond Single Utility Maximization.
.- An On-orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game Approach.
.- Resource-limited Network Security Games with General Contagious Attacks.
.- HR-tree: A Hybrid PMem-DRAM and Write-Optimized R-tree for Spatial Data Storage.
.- A Dstributed Computation Offloading Scheme Based on Stackelberg Game in MEC.
.- Target Influence Maximization Against Overexposure under Threshold Dependent Model in Online Social Networks.
.- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large Graphs.
.- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attack.
.- An Approach to Tight I/O Lower Bounds for Algorithms with Composite Procedures.
.- Hedonic Games for Federated Learning with Model Sharing Data.
.- K-Division Framework Enhances GNNs' Expressive Power.
.- An Innovative Irregular Nesting Algorithm for Flaw Avoidance.
.- Efficient Partitioning Algorithms for Optimizing Big Graph Computation.
.- Distributed generalized Deutsch-Jozsa algorithm.
.- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic Arrivals.
.- Proactive Bi-objective Multi-Path Planning for Wireless Sensor Networks.
.- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series Classification.
.- Strong chromatic index of graphs with small girth.
.- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic Method.
.- Generative Flow Networks for Influence Maximization in Social Networks.
.- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive Networks.
.- Enumerating Floorplans with Any Set of Columns.
.- Streaming algorithm for balance gain and cost with cardinality constraint on the integer lattice.
.- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search Approach.
.- Construction of Binary Cooperative MSR Codes with Multiple Repair Degrees.
.- Opportunistic Routing using Q-Learning with Context Information.
.- A combinatorial view of Holant problems on higher domains.
.- Labor: Adaptive Lazy Compaction for Learned Index in LSM-Tree.
.- A Distributed Algorithm for Rumor Blocking on Social Networks.
.- Convex-area-wise Linear Regression and Algorithms for Data Analysis.
.- Approximating Continuous Multi-Agent Contracts with Lyapunov Function Methods.
.- Privacy-preserving Byzantine-robust Federated learning via Multiparty Homomorphic Encryption.
.- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via Learning.
.- IterLara: A Concise General-purpose Algebraic Model.
.- The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(log n)$ Deterministic Rounds on the Congested Clique.
.- Binary Jumbled Pattern Matching: Suffix tree indexing.
.- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node Classification.
.- Accelerating Topic-Sensitive PageRank by Exploiting the Query History.
.- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and Instances.
.- Parallel Truss Maintenance Algorithms for Dynamic Hypergraphs.
.- Topological Vulnerability-based Imperceptible Node Injection Attack against Dynamic Graph Neural Network.
.- VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems.
.- Topological network-control games played on graphs.
.- FAIR: Accurate Data Acquisition for Mobile Crowdsensing.
.- The Hybrid Diagnosability of Hypercube Under the HMM* (Hybrid MM*) Model.
.- Sponsored Search Auction Design Beyond Single Utility Maximization.
.- An On-orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game Approach.
.- Resource-limited Network Security Games with General Contagious Attacks.
.- HR-tree: A Hybrid PMem-DRAM and Write-Optimized R-tree for Spatial Data Storage.
.- A Dstributed Computation Offloading Scheme Based on Stackelberg Game in MEC.
.- Target Influence Maximization Against Overexposure under Threshold Dependent Model in Online Social Networks.
.- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large Graphs.
.- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attack.
.- An Approach to Tight I/O Lower Bounds for Algorithms with Composite Procedures.
.- Hedonic Games for Federated Learning with Model Sharing Data.
.- K-Division Framework Enhances GNNs' Expressive Power.
.- An Innovative Irregular Nesting Algorithm for Flaw Avoidance.
.- Efficient Partitioning Algorithms for Optimizing Big Graph Computation.
.- Distributed generalized Deutsch-Jozsa algorithm.
.- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic Arrivals.
.- Proactive Bi-objective Multi-Path Planning for Wireless Sensor Networks.
.- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series Classification.
.- Strong chromatic index of graphs with small girth.
.- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic Method.
.- Generative Flow Networks for Influence Maximization in Social Networks.
.- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive Networks.
.- Enumerating Floorplans with Any Set of Columns.
.- Streaming algorithm for balance gain and cost with cardinality constraint on the integer lattice.
.- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search Approach.
.- Construction of Binary Cooperative MSR Codes with Multiple Repair Degrees.
.- Opportunistic Routing using Q-Learning with Context Information.
.- A combinatorial view of Holant problems on higher domains.
.- Labor: Adaptive Lazy Compaction for Learned Index in LSM-Tree.
.- A Distributed Algorithm for Rumor Blocking on Social Networks.
.- Convex-area-wise Linear Regression and Algorithms for Data Analysis.
.- Approximating Continuous Multi-Agent Contracts with Lyapunov Function Methods.
.- Privacy-preserving Byzantine-robust Federated learning via Multiparty Homomorphic Encryption.
.- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via Learning.
.- IterLara: A Concise General-purpose Algebraic Model.
.- The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(log n)$ Deterministic Rounds on the Congested Clique.
.- Binary Jumbled Pattern Matching: Suffix tree indexing.
.- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node Classification.
.- Accelerating Topic-Sensitive PageRank by Exploiting the Query History.
.- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and Instances.
.- Parallel Truss Maintenance Algorithms for Dynamic Hypergraphs.
.- Topological Vulnerability-based Imperceptible Node Injection Attack against Dynamic Graph Neural Network.
.- Topological network-control games played on graphs.
.- FAIR: Accurate Data Acquisition for Mobile Crowdsensing.
.- The Hybrid Diagnosability of Hypercube Under the HMM* (Hybrid MM*) Model.
.- Sponsored Search Auction Design Beyond Single Utility Maximization.
.- An On-orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game Approach.
.- Resource-limited Network Security Games with General Contagious Attacks.
.- HR-tree: A Hybrid PMem-DRAM and Write-Optimized R-tree for Spatial Data Storage.
.- A Dstributed Computation Offloading Scheme Based on Stackelberg Game in MEC.
.- Target Influence Maximization Against Overexposure under Threshold Dependent Model in Online Social Networks.
.- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large Graphs.
.- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attack.
.- An Approach to Tight I/O Lower Bounds for Algorithms with Composite Procedures.
.- Hedonic Games for Federated Learning with Model Sharing Data.
.- K-Division Framework Enhances GNNs' Expressive Power.
.- An Innovative Irregular Nesting Algorithm for Flaw Avoidance.
.- Efficient Partitioning Algorithms for Optimizing Big Graph Computation.
.- Distributed generalized Deutsch-Jozsa algorithm.
.- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic Arrivals.
.- Proactive Bi-objective Multi-Path Planning for Wireless Sensor Networks.
.- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series Classification.
.- Strong chromatic index of graphs with small girth.
.- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic Method.
.- Generative Flow Networks for Influence Maximization in Social Networks.
.- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive Networks.
.- Enumerating Floorplans with Any Set of Columns.
.- Streaming algorithm for balance gain and cost with cardinality constraint on the integer lattice.
.- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search Approach.
.- Construction of Binary Cooperative MSR Codes with Multiple Repair Degrees.
.- Opportunistic Routing using Q-Learning with Context Information.
.- A combinatorial view of Holant problems on higher domains.
.- Labor: Adaptive Lazy Compaction for Learned Index in LSM-Tree.
.- A Distributed Algorithm for Rumor Blocking on Social Networks.
.- Convex-area-wise Linear Regression and Algorithms for Data Analysis.
.- Approximating Continuous Multi-Agent Contracts with Lyapunov Function Methods.
.- Privacy-preserving Byzantine-robust Federated learning via Multiparty Homomorphic Encryption.
.- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via Learning.
.- IterLara: A Concise General-purpose Algebraic Model.
.- The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(log n)$ Deterministic Rounds on the Congested Clique.
.- Binary Jumbled Pattern Matching: Suffix tree indexing.
.- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node Classification.
.- Accelerating Topic-Sensitive PageRank by Exploiting the Query History.
.- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and Instances.
.- Parallel Truss Maintenance Algorithms for Dynamic Hypergraphs.
.- Topological Vulnerability-based Imperceptible Node Injection Attack against Dynamic Graph Neural Network.