As an alternative to virtualisation, containerisation has emerged as a significant trend in software development. Their introduction provides for the reduction of costs, time, and energy. A service function chain (SFC...
详细信息
Artificial Intelligence (AI) research in the past decade has led to the development of Generative AI, where AI systems create new information from almost nothing after learning from trained models. Generative AI can c...
详细信息
Visually handicapped people’s lives are subject to a multitude of unrelenting challenges because they’ve been made bereft of the gift of sight. The proposed solution is a wearable Smart Voice Assistant that is devel...
详细信息
In recent years, support vector machine has become one of the most important classification techniques in pattern recognition, machine learning, and data mining due to its superior classification effect and solid theo...
详细信息
In-network caching is one of the most important features of Information-Centricnetworking (icn), which reduces data-retrieval latency, especially at edge networks. However, in-network caching can lead to privacy leak...
详细信息
The proceedings contain 50 papers. The special focus in this conference is on Emerging networking Architecture and Technologies. The topics include: CQCF: A Cyclic Queuing Cluster Forwarding Based Transmission Mechani...
ISBN:
(纸本)9789811996962
The proceedings contain 50 papers. The special focus in this conference is on Emerging networking Architecture and Technologies. The topics include: CQCF: A Cyclic Queuing Cluster Forwarding Based Transmission Mechanism for Large-Scale Deterministic Network;a Task-Resource Joint Optimization Model in Distributed computing;cache Strategy for Information Center Satellite Networks Based on Node Importance;intelligent Online Traffic Optimization Based on Deep Reinforcement Learning for Information-Centric Networks;detection and Defense Schemes for Cache Pollution Attack in Content-Centric Network;SBR-based User Intent Extraction Mechanism for Intent-Based Network;SPOF-NDN: A POF-Based NDN Forwarding Scheme;customizable Service Identification Method and System Design for Smart Integration Identifier Network;a Dynamic Live Streaming Service Architecture Integrated Sensing and Control;Detection of SDN Flow Rule Conflicts Based on Knowledge Graph;Risk-Aware SFC Placement Method in Edge Cloud Environment;preface;An In-Network computing Service Placement Mechanism for NUMA-based Software Router;network Traffic Identification Method Based on Temporal and Multi-scale Spatial Fusion;a Trustworthy Content Moderation Scheme Based on Permissioned Blockchain;multi-agent Deep Reinforcement Learning-Based Content Caching in Cache-Enabled Networks;mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach;performance Evaluation of Transmission Protocols Based on Satellite Networks;optimizing Communication Topology for Collaborative Learning Across Datacenters;design of Reliable Parallel Transmission System in Complex Heterogeneous Network;design of Privacy-Preserving in Multi-link Vehicle-Ground Communication;smart Mobile Router Wireless Heterogeneous Network Access Mechanism;A Comparative Study on Routing Convergence of IP-Based and icn-Based Routing Protocols in Satellite Networks;implementation and Deployment of Digital Twin in Cloud-Nativ
This book presents the best-selected research papers presented at the Second International Conference on computing, Communication, Security & intelligent Systems (ic3SIS 2023), organized by SCMS School of Engineer...
详细信息
ISBN:
(数字)9789819983988
ISBN:
(纸本)9789819985753;9789819983971
This book presents the best-selected research papers presented at the Second International Conference on computing, Communication, Security & intelligent Systems (ic3SIS 2023), organized by SCMS School of Engineering and Technology, Kochi, on July 06–07, 2023. It discusses the latest technologies in communication and intelligent systems, covering various areas of computing, such as advanced computing, communication and networking, intelligent systems and analytics, 5G and IoT, soft computing, and cybersecurity in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers, academics, and industry practitioners.
暂无评论