Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Reinforcement Learning (RL) is a very dynamic area in terms of theory and application. This book brings together many different aspects of the current research on several fields associated to RL which has been growing rapidly, producing a wide variety of learning algorithms for different applications. Based on 24 Chapters, it covers a very broad variety of topics in RL and their application in autonomous systems. A set of chapters in this book provide a general overview of RL while other chapters focus mostly on the applications of RL paradigms: Game Theory, Multi-Agent Theory, Robotic, Networking Technologies, Vehicular Navigation, Medicine and Industrial Logistic.
Artificial intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Machine learning
Choose an application
Machine learning. --- Learning, Machine --- Artificial intelligence --- Machine theory
Choose an application
Machine Learning can be defined in various ways related to a scientific domain concerned with the design and development of theoretical and implementation tools that allow building systems with some Human Like intelligent behavior. Machine learning addresses more specifically the ability to improve automatically through experience.
Graphical modeling (Statistics) --- Multivariate analysis --- Graphic methods --- Machine learning
Choose an application
Choose an application
The analysis of QoE is not an easy task, especially for multimedia services, because all the factors (technical and non-technical) that directly or indirectly influence the user-perceived quality have to be considered. This book describes different methods to investigate users' QoE from the viewpoint of technical and non-technical parameters using multimedia services. It discusses the subjective methods for both controlled and uncontrolled environments. Collected datasets are used to analyze users' profiles, which sheds light on key factors to help network service providers understand end-users' behavior and expectations. Important adaptive video streaming technologies are discussed that run on unmanaged networks to achieve certain QoS features. The authors present a scheduling method to allocate resources to the end-user based on users' QoE and optimizes the power efficiency of users' device for LTE-A. Lastly, two key aspects of 5G networks are presented: QoE using multimedia services (VoIP and video), and power-saving model for mobile device and virtual base station.
Choose an application
The postal system is often used as an analogy when describing Internet routing. However, in addition to similarities, there are some significant differences. First, and most importantly, the Autonomous Systems (ASes) that operate the routers along the end-to-end path of a packet can often inspect and manipulate the packet and its content. Second, due to lack of secure routing mechanisms, packet paths can be diverted through additional non-trusted ASes. Although we often know the first network we connect through and the service that we access, we seldom know the networks that forward our packets. We can think of these networks as hidden mailmen. To better understand these networks and their potential access to information, we characterize the ASes along the paths of typical Internet packets between European example clients and the most popular web domains. We also identify ASes and countries with higher path coverage and investigate if there are differences in the HTTPS usage among paths that may take additional detours. Our results highlight the role played by North American (typically US-based) ASes and glean insights into how vulnerable the detoured traffic is to man-in-the-middle attacks compared to regular traffic.
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Wired/Wireless Internet Communications, WWIC 2013, held in St. Petersburg, Russia, during June 5-7, 2013. The 21 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on: MAC and scheduling; mobility; fixed networks; services and security; sensor networks; services; and wireless.
Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data protection. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Operating Systems. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer operating systems --- Computers --- Disk operating systems --- Informatics --- Operating systems --- Computer communication systems. --- Computer security. --- Operating systems (Computers) --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Paris, Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions. The papers cover a wide range of applications, commercial and military, such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks, and large-scale metropolitan networks for smart cities. They are organized in topical sections on Wireless Sensor Networks, Routing, Applications, and Security.
Computer science. --- Computer Communication Networks. --- Software engineering. --- Data protection. --- Computer Science. --- Special Purpose and Application-Based Systems. --- Computer Applications. --- Systems and Data Security. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Informatics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Application software. --- Computer communications and networks --- Ad hoc networks (Computer networks) --- MANETs (Computer networks) --- Mobile ad hoc networks --- Wireless ad hoc networks --- Computer networks --- Wireless communication systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Science --- Engineering --- Protection --- Security measures --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Wired/Wireless Internet Communication, WWIC 2014, held in Paris, France, during May 27-28, 2014. The 22 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless and wired networks; resource management and next generation services; next generation services, network architecture and applications.
Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Multimedia information systems. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Operating Systems. --- Multimedia systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer operating systems --- Disk operating systems --- Systems software --- Protection --- Security measures --- Operating systems --- Computer networks. --- Application software. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing
Listing 1 - 9 of 9 |
Sort by
|