Søkt på: Bøker av Wanlei Zhou
totalt 29 treff
Algorithms and Architectures for Parallel Processing
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held …
Differential Privacy and Applications
This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on …
Differential Privacy and Applications
This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on …
Algorithms and Architectures for Parallel Processing
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held …
Delay Tolerant Networks
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess …
Advances in Web-Based Learning -- ICWL 2003
nd The 2 International Conference on Web-Based Learning (ICWL 2003) took place in Melbourne, Australia. ICWL 2003 followed the tradition of the successful ICWL 2002 held in Hong …
Distributed Network Systems
Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved …
Delay Tolerant Networks
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess …
Advances in Web-Based Learning - ICWL 2021
This book constitutes the proceedings of the 20th International Conference on Advances in Web-Based Learning, ICWL 2021, which was held in Macau, China, in November 2021. The …
Distributed Network Systems
Both authors have taught the course of "e;Distributed Systems"e; for many years in the respective schools. During the teaching, we feel strongly that "e;Distributed …
Adversarial Machine Learning
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the …
Malicious Attack Propagation and Source Identification
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) …