Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: "Machine Learning"



Treffer 162 von 36394 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1355029414
Titel Artificial Intelligence and Machine Learning : 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-II / edited by Khalid S. Soliman
Person(en) Soliman, Khalid S. (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2025
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2025
Umfang/Format Online-Ressource, XV, 454 p. 259 illus., 201 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-79085-0
Printed edition:: ISBN: 978-3-031-79087-4
Inhalt -- Software Engineering. -- Access Control Mechanisms in Java Applications. -- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot. -- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base. -- Model based approach for building dynamic UI with SPA. -- Scheduling User Acceptance Tests from A Process Perspective. -- Software Development Process Analysis – Ishikawa Diagram – Case Study. -- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation. -- Computer Security and Privacy. -- A Review of a Website Phishing Detection Taxonomy. -- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective. -- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review. -- Detection of Cryptographic Functions Within Binary Executable Ransomware Files. -- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis. -- Performance Comparison of Programming Interfaces for Microservices Architecture. -- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization. -- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks. -- Use of the System Event Register to Assess the Security Level of The IT System
Persistent Identifier URN: urn:nbn:de:101:1-2501311340219.321354652197
DOI: 10.1007/978-3-031-79086-7
URL https://doi.org/10.1007/978-3-031-79086-7
ISBN/Einband/Preis 978-3-031-79086-7
Sprache(n) Englisch (eng)
Beziehungen Communications in Computer and Information Science ; 2300
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 162 von 36394
< < > <


E-Mail-IconAdministration