This book presents 53 selected papers focused onMachine Learning and Applicationsfrom the 14th International Conference on Innovations in Bio-Inspired computing and Applications (IBICA 2023) and 13th World Congress on...
详细信息
ISBN:
(数字)9783031789496
ISBN:
(纸本)9783031789489
This book presents 53 selected papers focused on
Machine Learning and Applications
from the 14th International Conference on Innovations in Bio-Inspired computing and Applications (IBICA 2023) and 13th World Congress on Information and Communication Technologies (WICT 2023), which was held in five different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India and in online mode. IBICA-WICT 2023 had contributions by authors from 36 countries. This book offers a valuable reference guide for all scientists, academicians, researchers, students, and practitioners focused on real-world applications of modern ICT and bio-inspired computing.
This Festschrift volume includes a collection of papers written in honor of the accomplishments of Professor Yonezawa on the occasion of his 65th birthday in 2012. With a few exceptions, the papers in this Festschrift...
详细信息
ISBN:
(数字)9783662444719
ISBN:
(纸本)9783662444702
This Festschrift volume includes a collection of papers written in honor of the accomplishments of Professor Yonezawa on the occasion of his 65th birthday in 2012. With a few exceptions, the papers in this Festschrift were presented at an international symposium celebrating this occasion. Also included are reprints of two of Professor Yonezawa's most influential papers on the programming language ABCL. The volume is a testament strong and lasting impact Professor Yonezawa's research accomplishments as well as the inspiration he has been to colleagues and students alike.
The growing adoption of intelligent Electric Vehicles (EVs) has also created an opportunity for malicious actors to initiate attacks on the EV infrastructure, which can include a number of data exchange protocols acro...
详细信息
The growing adoption of intelligent Electric Vehicles (EVs) has also created an opportunity for malicious actors to initiate attacks on the EV infrastructure, which can include a number of data exchange protocols across the various entities that are part of the EV charging ecosystem. These protocols possess a range of underlying vulnerabilities that attackers can exploit to disrupt the regular flow of information and energy. While researchers have considered vulnerabilities of particular components within an EV charging ecosystem, there is still a notable gap in vulnerability analysis of charging protocols and the potential threats to these. We investigate threat vectors within the most widely adopted protocols used in EV infrastructure, explore the potential impact of cyberattacks and suggest various mitigation techniques investigated in literature. Potential future research directions are also identified.
This book constitutes the refereed proceedings of the Fourth International Conference on High Performance Embedded Architectures and Compilers, HiPEAC 2009, held in Paphos, Cyprus, in January 2009. The 27 revised ful...
详细信息
ISBN:
(数字)9783540929901
ISBN:
(纸本)9783540929895
This book constitutes the refereed proceedings of the Fourth International Conference on High Performance Embedded Architectures and Compilers, HiPEAC 2009, held in Paphos, Cyprus, in January 2009. The 27 revised full papers presented together with 2 invited keynote paper were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on dynamic translation and optimisation, low level scheduling, parallelism and resource control, communication, mapping for CMPs, power, cache issues as well as parallel embedded applications.
暂无评论