2nd International Conference on Cloud Computing and Computer Networks
Springer International Publishing (Verlag)
978-3-031-78130-8 (ISBN)
- Noch nicht erschienen - erscheint am 13.02.2025
- Portofrei ab CHF 40
- Auch auf Rechnung
- Artikel merken
The book consists of peer reviewed and presented papers of the 2nd International Conference on Cloud Computing and Computer Network (CCCN 2024), which took place in Singapore during April 19-21, 2024. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing, Case studies and theories in cloud computing, Cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization.
- Presents papers from the International Conference on Cloud Computing and Computer Network (CCCN 2024)
- Includes topics such as semantic web technologies, cloud applications, and cloud computing architecture
- Relevant to academics, researchers, students, and professionals in cloud computing and computer networks
Lei Meng is Professor affiliated with the School of Software, Shandong University since 2020. He is recognized as a Qilu Young Scholar (Tier 1) and a Taishan Scholar Young Expert of Shandong Province. He is selected as an Outstanding Young Scholar in China's Engineering Frontiers by the Chinese Academy of Engineering in 2021. He serves as the leader of an innovation team introduced under the "20 Policies for New Universities" initiative in Jinan City. He dedicates to the theoretical and technological research in machine learning applications for multimodal data representation. He authored a monograph published by Springer and over 70 peer-reviewed articles in prestigious journals and conferences such as MM, SIGGRAPH, AAAI, IJCAI, TKDE, TOIS, with over 3000 citations on Google Scholar. Research achievements have garnered the First Prize of Invention Innovation Award from the China Association of Inventions, the Second Prize of Scientific and Technological Progress Award from Shandong Computer Federation, the ACM Jinan Chapter Rising Star Award, and the Shandong Provincial Outstanding Young Award in Artificial Intelligence. Currently leading projects funded by the National Natural Science Foundation of China (Youth Fund), the National Key Research and Development Program, and the Shandong Provincial Excellent Youth Talent Program. Serving as an Associate Editor of Applied Soft Computing (SCI Q1, Chinese Academy of Sciences). Executive Committee Member of CSIG Youth Working Committee, CCF Multimedia Professional Committee, CAAI Embodied Intelligence Professional Committee, and Chair of CCF YOCSEF Jinan Chapter.
Part I: Computer Networks and Information Security.- Chapter 1: Convolutional Dictionary Super-resolution Network for Removing CT Metal Artifacts.- Chapter 2: Information and Communication Technology (ICT) based Temperature Monitoring for Cold Chain Management in Immunization Information System.- Chapter 3: Detecting the Unknown: Evaluating the Efficacy of Host-based Intrusion Detection Systems (IDS) in Zero-day Attacks.- Chapter 4: Performance Evaluation of Security Mechanisms for Erasure coded System in Hadoop.- Part II: Mobile Communication and Wireless Technology.- Chapter 5: Genetic Algorithms for Solving the Demand Clustering and Spectrum Allocation Problem.- Chapter 6: Virtual scan based approach for coverage hole detection in Wireless Sensor Networks.- Chapter 7: Multi-hash Chain Based Key Pre-distribution for Wireless Sensor Networks.- Part III: Mobile Applications and Data Security.- Chapter 8: An In-Depth Penetration Testing Study in Evaluating Bluetooth Vulnerabilities and Related Attacks in Smartphones.- Chapter 9: Kadiwa Anyware: A Mobile App Facilitating Produce Exchange Through Blockchain Integration.- Chapter 10: Bluetooth Simulated Reconnaissance Attack Through the use of HCITool: A Case Study.
Erscheint lt. Verlag | 13.2.2025 |
---|---|
Reihe/Serie | Signals and Communication Technology |
Zusatzinfo | X, 130 p. 74 illus., 64 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Applications • Cloud slicing • Cloud storage and file systems • Cloud traffic engineering • Computer Science • conference proceedings • Informatics • Research |
ISBN-10 | 3-031-78130-9 / 3031781309 |
ISBN-13 | 978-3-031-78130-8 / 9783031781308 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich