Wireless Artificial Intelligent Computing Systems and Applications -

Wireless Artificial Intelligent Computing Systems and Applications

18th International Conference, WASA 2024, Qindao, China, June 21–23, 2024, Proceedings, Part III
Buch | Softcover
XI, 300 Seiten
2024
Springer International Publishing (Verlag)
978-3-031-71469-6 (ISBN)
70,61 inkl. MwSt

The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21-23, 2024.

The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.

.- Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC.
.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.
.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.
.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.
.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.
.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.
.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.
.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.
.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.
.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.
.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.
.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.
.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
.- AdMarks: Image Steganography Based on Adversarial Perturbation.
.- A Review on Binary Code Analysis Datasets.
.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.
.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.
.- Improving Anomaly Scene Recognition with Large Vision-Language Models.
.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.
.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.
.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.
.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.
.- Tree of Thought Prompt in Robotic Arm Control.

Erscheint lt. Verlag 16.12.2024
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XX, 298 p.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Artificial Intelligence • Computing Methodologies • distributed computing methodologies • machine learning • network algorithms • Network Architectures • network performance evaluation • Network Protocols • Networks • Network Security • network services • Security and Privacy • Systems Security
ISBN-10 3-031-71469-5 / 3031714695
ISBN-13 978-3-031-71469-6 / 9783031714696
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
dem Menschen überlegen – wie KI uns rettet und bedroht

von Manfred Spitzer

Buch | Hardcover (2023)
Droemer (Verlag)
24,00