A comprehensive text on foundations and techniques of graph neural networks with applications in NLP, data mining, vision and healthcare.
The essays in this volume add enormously to the documentation of what late-period Chinese art learned from Japan, and begin to formulate conclusions that will enrich future accounts of both Japanese and Chinese art.”—James Cahill, ...
This open access book considers a pivotal era in Chinese history from a global perspective.
Naïve Top-k query algorithm computes the answer bottom-up over the network [4]. ... and the cost of query [5]. The authors proposed a parameterized ranking function ... After gathering data tuples from the cluster members, the cluster ...
This book includes papers presented at the Second International Conference on Electronic Engineering and Renewable Energy (ICEERE 2020), which focus on the application of artificial intelligence techniques, emerging technology and the ...
In [19], a hybrid technique was used to combine the symmetric cryptographic algorithm (AES) and the asymmetric algorithm (RSA) and hashing function (MD5). These algorithms were combined to ensure confidentiality, authentication and data ...
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019.
This text also deals with the role of discontinuous vertical flow barriers in reservoir engineering. The last chapters focus on the effect of reservoir heterogeneity on oil reservoir.
Porter, Alan L., Nils C. Newman, J . David Roessner, David M. Johnson, and Xiao-yin Jin. 2009. "Intemational High Tech Competitiveness: Does China Rank #1?” Technology Analysis and Strategic Management 21 (2): 173-193.