Emerging Technologies in Computing (eBook, PDF)
Second International Conference, iCETiC 2019, London, UK, August 19-20, 2019, Proceedings
Redaktion: Miraz, Mahdi H.; Ali, Maaruf; Soomro, Safeeullah; Ware, Andrew; Excell, Peter S.
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Emerging Technologies in Computing (eBook, PDF)
Second International Conference, iCETiC 2019, London, UK, August 19-20, 2019, Proceedings
Redaktion: Miraz, Mahdi H.; Ali, Maaruf; Soomro, Safeeullah; Ware, Andrew; Excell, Peter S.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019. The 24 revised full papers were reviewed and selected from 52 submissions and are organized in topical sections covering blockchain and cloud computing, security, wireless sensor networks and Internet of Things, (IoT), FinTech, AI, big data and data analytics.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 21.58MB
Andere Kunden interessierten sich auch für
- Emerging Technologies in Computing (eBook, PDF)40,95 €
- Human Centered Computing (eBook, PDF)40,95 €
- Wireless Algorithms, Systems, and Applications (eBook, PDF)40,95 €
- Green, Pervasive, and Cloud Computing (eBook, PDF)40,95 €
- Emerging Technologies for Developing Countries (eBook, PDF)40,95 €
- Internet of Things, Smart Spaces, and Next Generation Networks and Systems (eBook, PDF)40,95 €
- Distributed Computing and Internet Technology (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019. The 24 revised full papers were reviewed and selected from 52 submissions and are organized in topical sections covering blockchain and cloud computing, security, wireless sensor networks and Internet of Things, (IoT), FinTech, AI, big data and data analytics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 316
- Erscheinungstermin: 31. Juli 2019
- Englisch
- ISBN-13: 9783030239435
- Artikelnr.: 57285115
- Verlag: Springer International Publishing
- Seitenzahl: 316
- Erscheinungstermin: 31. Juli 2019
- Englisch
- ISBN-13: 9783030239435
- Artikelnr.: 57285115
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Performance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms.- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs.- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding.- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies.- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing.- Security, Wireless Sensor Networks and Internet of Things (IoT).- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting.- A trust based mutual authentication and data encryption scheme for MANET security.- A Review and Survey on Smartphones: The Closest Enemy to Privacy.- Hybrid rule-based model for phishing URLs detection.- Smart Airports: Review and Open Research Issues.- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network.- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks.- A Data Science Methodology for Internet-of-Things.- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment.- Proposing a service quality framework for mobile commerce.- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text.- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio.- Automatic Speech Recognition in Taxi Call Service Systems.- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education.- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application.- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies.- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique.- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images.- Building Energy Management System Based on Microcontrollers.
Performance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms.- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs.- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding.- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies.- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing.- Security, Wireless Sensor Networks and Internet of Things (IoT).- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting.- A trust based mutual authentication and data encryption scheme for MANET security.- A Review and Survey on Smartphones: The Closest Enemy to Privacy.- Hybrid rule-based model for phishing URLs detection.- Smart Airports: Review and Open Research Issues.- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network.- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks.- A Data Science Methodology for Internet-of-Things.- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment.- Proposing a service quality framework for mobile commerce.- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text.- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio.- Automatic Speech Recognition in Taxi Call Service Systems.- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education.- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application.- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies.- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique.- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images.- Building Energy Management System Based on Microcontrollers.