International Conference on Machine Learning for Networking最新文献

筛选
英文 中文
Geographical Information Based Clustering Algorithm for Internet of Vehicles 基于地理信息的车联网聚类算法
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_7
Rim Gasmi, M. Aliouat, H. Seba
{"title":"Geographical Information Based Clustering Algorithm for Internet of Vehicles","authors":"Rim Gasmi, M. Aliouat, H. Seba","doi":"10.1007/978-3-030-70866-5_7","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_7","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Heuristic Optimization Algorithm for Solving the Delay-Constrained Least-Cost Problem 一种求解延迟约束最小代价问题的启发式优化算法
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_23
Amina Boudjelida, Ali Lemouari
{"title":"A Novel Heuristic Optimization Algorithm for Solving the Delay-Constrained Least-Cost Problem","authors":"Amina Boudjelida, Ali Lemouari","doi":"10.1007/978-3-030-70866-5_23","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_23","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"34 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122425380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Resource Allocation Algorithms for Cellular Networks 蜂窝网络的学习资源分配算法
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_12
Thi-Thuy-Lien Nguyen, O. Brun, B. Prabhu
{"title":"Learning Resource Allocation Algorithms for Cellular Networks","authors":"Thi-Thuy-Lien Nguyen, O. Brun, B. Prabhu","doi":"10.1007/978-3-030-70866-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_12","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"51 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion Detection 安全入侵检测中几种机器学习算法的性能评价
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_10
Ouafae Elaeraj, C. Leghris, É. Renault
{"title":"Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion Detection","authors":"Ouafae Elaeraj, C. Leghris, É. Renault","doi":"10.1007/978-3-030-70866-5_10","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_10","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121469769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Armed Bandit-Based Channel Hopping: Implementation on Embedded Devices 基于多臂强盗的信道跳变:在嵌入式设备上的实现
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-98978-1_3
Konrad-Felix Krentz, Alex Kangas, T. Voigt
{"title":"Multi-Armed Bandit-Based Channel Hopping: Implementation on Embedded Devices","authors":"Konrad-Felix Krentz, Alex Kangas, T. Voigt","doi":"10.1007/978-3-030-98978-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-98978-1_3","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Quantum Machine Learning Approaches for Mobile User Indoor-Outdoor Detection 移动用户室内外检测的三种量子机器学习方法
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_11
F. Phillipson, R. Wezeman, I. Chiscop
{"title":"Three Quantum Machine Learning Approaches for Mobile User Indoor-Outdoor Detection","authors":"F. Phillipson, R. Wezeman, I. Chiscop","doi":"10.1007/978-3-030-70866-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_11","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Android Malware Detection Through Dimensionality Reduction Techniques 通过降维技术改进Android恶意软件检测
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_4
Vasileios Kouliaridis, Nektaria Potha, G. Kambourakis
{"title":"Improving Android Malware Detection Through Dimensionality Reduction Techniques","authors":"Vasileios Kouliaridis, Nektaria Potha, G. Kambourakis","doi":"10.1007/978-3-030-70866-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_4","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130179112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Remote Sensing Scene Classification Based on Effective Feature Learning by Deep Residual Networks 基于深度残差网络有效特征学习的遥感场景分类
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_21
Ronald Tombe, Serestina Viriri
{"title":"Remote Sensing Scene Classification Based on Effective Feature Learning by Deep Residual Networks","authors":"Ronald Tombe, Serestina Viriri","doi":"10.1007/978-3-030-70866-5_21","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_21","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terms Extraction from Clustered Web Search Results 从聚类网络搜索结果中提取术语
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-70866-5_24
Chouaib Bourahla, R. Maamri, Z. Sahnoun, Nardjes Bouchemal
{"title":"Terms Extraction from Clustered Web Search Results","authors":"Chouaib Bourahla, R. Maamri, Z. Sahnoun, Nardjes Bouchemal","doi":"10.1007/978-3-030-70866-5_24","DOIUrl":"https://doi.org/10.1007/978-3-030-70866-5_24","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122857609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross Inference of Throughput Profiles Using Micro Kernel Network Method 基于微核网络方法的吞吐量曲线交叉推断
International Conference on Machine Learning for Networking Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-98978-1_4
N. Rao, Anees Al-Najjar, N. Imam, Zhengchun Liu, R. Kettimuthu, Ian T. Foster
{"title":"Cross Inference of Throughput Profiles Using Micro Kernel Network Method","authors":"N. Rao, Anees Al-Najjar, N. Imam, Zhengchun Liu, R. Kettimuthu, Ian T. Foster","doi":"10.1007/978-3-030-98978-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-98978-1_4","url":null,"abstract":"","PeriodicalId":141821,"journal":{"name":"International Conference on Machine Learning for Networking","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124177837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信