Advances in Knowledge Discovery and Data Mining : 25th Pacific-Asia Conference, PAKDD 2021, Virtual Event, May 11–14, 2021, Proceedings, Part I / edited by Kamal Karlapalem, Hong Cheng, Naren Ramakrishnan, R. K. Agrawal, P. Krishna Reddy, Jaideep Srivastava, Tanmoy Chakraborty
Applications of Knowledge Discovery -- Fuzzy World:A Tool Training Agent from Concept Cognitive to Logic Inference -- Collaborative Reinforcement Learning Framework to Model Evolution of Cooperation in Sequential Social Dilemmas -- SIGTRAN: Signature Vectors for Detecting Illicit Activities in Blockchain Transaction Networks -- VOA*: Fast Angle-Based Outlier Detection Over High-Dimensional Data Streams -- Learning Probabilistic Latent Structure for Outlier Detection from Multi-View Data -- GLAD-PAW: Graph-based Log Anomaly Detection by Position Aware Weighted Graph Attention Network -- CubeFlow: Money Laundering Detection with Coupled Tensors -- Unsupervised Boosting-based Autoencoder Ensembles for Outlier Detection -- Unsupervised Domain Adaptation for 3D Medical Image with High Efficiency -- A Hierarchical Structure-Aware Embedding Method for Predicting Phenotype-Gene Associations -- Autonomous Vehicle Path Prediction using Conditional Variational Autoencoder Networks -- Heterogeneous Graph Attention Network for Small and Medium-sized Enterprises Bankruptcy Prediction -- Algorithm Selection as Superset Learning: Constructing Algorithm Selectors from Imprecise Performance Data -- Sim2Real for Metagenomes: Accelerating Animal Diagnostics with Adversarial Co-Training -- Attack Is the Best Defense: A Multi-Mode Poisoning PUF against Machine Learning Attacks -- Combining exogenous and endogenous signals with a semi-supervised co-attention network for early detection of COVID-19 fake tweets -- TLife-LSTM: Forecasting Future COVID-19 Progression with Topological Signatures of Atmospheric Conditions -- Lifelong Learning based Disease Diagnosis on Clinical Notes -- GrabQC: Graph based Query Contextualization for automated ICD coding -- Deep Gaussian Mixture Model on Multiple Interpretable Features of Fetal Heart Rate for Pregnancy Wellness -- Adverse Drug Events Detection, Extraction and Normalization from Online Comments of Chinese Patent Medicines -- Adaptive Graph Co-Attention Networks for Traffic Forecasting -- Dual-Stage Bayesian Sequence to Sequence Embeddings for Energy Demand Forecasting -- AA-LSTM: An Adversarial Autoencoder Joint Model for Prediction of Equipment Remaining Useful Life -- Data Mining of Specialized Data -- Analyzing Topic Transitions in Text-based Social Cascades using Dual-Network Hawkes Process -- HiPaR: Hierarchical Pattern-Aided Regression -- Improved Topology Extraction using Discriminative Parameter Mining of Logs -- Back to Prior Knowledge: Joint Event Causality Extraction via Convolutional Semantic Infusion -- A k-MCST based Algorithm for Discovering Core-Periphery Structures in Graphs -- Detecting Sequentially Novel Classes with Stable Generalization Ability -- Learning-based Dynamic Graph Stream Sketch -- Discovering Dense Correlated Subgraphs in Dynamic Networks -- Fake News Detection with Heterogenous Deep Graph Convolutional Network -- Incrementally Finding the Vertices Absent from the Maximum Independent Sets -- Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network -- Graph Neural Networks for Soft Semi-Supervised Learning on Hypergraphs -- A Meta-path based Graph Convolutional Network with Multi-Scale Semantic Extractions for Heterogeneous Event Classification -- Noise-Enhanced Unsupervised Link Prediction -- Weak Supervision Network Embedding for Constrained Graph Learning -- RAGA: Relation-aware Graph Attention Networks for Global Entity Alignment -- Graph Attention Networks with Positional Embeddings -- Unified Robust Training for Graph Neural Networks against Label Noise -- Graph InfoClust: Maximizing Coarse-Grain Mutual Information in Graphs -- A Deep Hybrid Pooling Architecture for Graph Classification with Hierarchical Attention -- Maximizing Explainability with SF-Lasso and Selective Inference for Video and Picture Ads. -Reliably Calibrated Isotonic Regression -- Multiple Instance Learning for Unilateral Data -- An Online Learning Algorithm for Non-Stationary Imbalanced Data by Extra-Charging Minority Class -- Locally Linear Support Vector Machines for Imbalanced Data Classification. - Low-Dimensional Representation Learning from Imbalanced Data Streams -- PhotoStylist: Altering the Style of Photos based on the Connotations of Texts -- Gazetteer-Guided Keyphrase Generation from Research Papers -- Minits-AllOcc: An Efficient Algorithm for Mining Timed Sequential Patterns -- T^3N: Harnessing Text and Temporal Tree Network for Rumor Detection on Twitter -- AngryBERT: Joint Learning Target and Emotion for Hate Speech Detection -- SCARLET: Explainable Attention based Graph Neural Network for Fake News spreader prediction -- Content matters: A GNN-based Model Combined with Text Semantics for Social Network Cascade Prediction -- TERMCast: Temporal Relation Modeling for Effective Urban Flow Forecasting -- Traffic Flow Driven Spatio-Temporal Graph Convolutional Network for Ride-hailing Demand Forecasting -- A Proximity Forest for Multivariate Time Series Classification -- C²-Guard: A Cross-Correlation Gaining Framework for Urban Air Quality Prediction -- Simultaneous multiple POI population patternanalysis system with HDP mixture regression -- Interpretable Feature Construction for Time Series Extrinsic Regression -- SEPC: Improving Joint Extraction of Entities and Relations by Strengthening Entity Pairs Connection..
The 3-volume set LNAI 12712-12714 constitutes the proceedings of the 25th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2021, which was held during May 11-14, 2021. The 157 papers included in the proceedings were carefully reviewed and selected from a total of 628 submissions. They were organized in topical sections as follows: Part I: Applications of knowledge discovery and data mining of specialized data; Part II: Classical data mining; data mining theory and principles; recommender systems; and text analytics; Part III: Representation learning and embedding, and learning from data..
Medienart: |
E-Book |
---|
Erscheinungsjahr: |
2021. |
---|---|
Erschienen: |
Cham: Springer International Publishing ; 2021. Cham: Imprint: Springer ; 2021. |
Ausgabe: |
1st ed. 2021. |
Reihe: |
---|
Sprache: |
Englisch |
---|
Beteiligte Personen: |
Karlapalem, Kamal [HerausgeberIn] |
---|
Links: |
doi.org [lizenzpflichtig] |
---|
ISBN: |
---|
Themen: |
Algorithms. |
---|
Umfang: |
1 Online-Ressource(XXXV, 834 p. 30 illus.) |
---|
doi: |
10.1007/978-3-030-75762-5 |
---|
funding: |
|
---|---|
Förderinstitution / Projekttitel: |
|
PPN (Katalog-ID): |
1759347736 |
---|
LEADER | 01000cam a22002652 4500 | ||
---|---|---|---|
001 | 1759347736 | ||
003 | DE-627 | ||
005 | 20230103121738.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210601s2021 gw |||||o 00| ||eng c | ||
020 | |a 9783030757625 |9 978-3-030-75762-5 | ||
024 | 7 | |a 10.1007/978-3-030-75762-5 |2 doi | |
035 | |a (DE-627)1759347736 | ||
035 | |a (DE-599)KEP064471179 | ||
035 | |a (DE-He213)978-3-030-75762-5 | ||
035 | |a (EBP)064471179 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-DE | ||
072 | 7 | |a UYQ |2 bicssc | |
072 | 7 | |a COM004000 |2 bisacsh | |
245 | 1 | 0 | |a Advances in Knowledge Discovery and Data Mining |b 25th Pacific-Asia Conference, PAKDD 2021, Virtual Event, May 11–14, 2021, Proceedings, Part I |c edited by Kamal Karlapalem, Hong Cheng, Naren Ramakrishnan, R. K. Agrawal, P. Krishna Reddy, Jaideep Srivastava, Tanmoy Chakraborty |
250 | |a 1st ed. 2021. | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2021. | |
264 | 1 | |a Cham |b Imprint: Springer |c 2021. | |
300 | |a 1 Online-Ressource(XXXV, 834 p. 30 illus.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Artificial Intelligence |v 12712 | |
490 | 0 | |a Springer eBook Collection | |
520 | |a Applications of Knowledge Discovery -- Fuzzy World:A Tool Training Agent from Concept Cognitive to Logic Inference -- Collaborative Reinforcement Learning Framework to Model Evolution of Cooperation in Sequential Social Dilemmas -- SIGTRAN: Signature Vectors for Detecting Illicit Activities in Blockchain Transaction Networks -- VOA*: Fast Angle-Based Outlier Detection Over High-Dimensional Data Streams -- Learning Probabilistic Latent Structure for Outlier Detection from Multi-View Data -- GLAD-PAW: Graph-based Log Anomaly Detection by Position Aware Weighted Graph Attention Network -- CubeFlow: Money Laundering Detection with Coupled Tensors -- Unsupervised Boosting-based Autoencoder Ensembles for Outlier Detection -- Unsupervised Domain Adaptation for 3D Medical Image with High Efficiency -- A Hierarchical Structure-Aware Embedding Method for Predicting Phenotype-Gene Associations -- Autonomous Vehicle Path Prediction using Conditional Variational Autoencoder Networks -- Heterogeneous Graph Attention Network for Small and Medium-sized Enterprises Bankruptcy Prediction -- Algorithm Selection as Superset Learning: Constructing Algorithm Selectors from Imprecise Performance Data -- Sim2Real for Metagenomes: Accelerating Animal Diagnostics with Adversarial Co-Training -- Attack Is the Best Defense: A Multi-Mode Poisoning PUF against Machine Learning Attacks -- Combining exogenous and endogenous signals with a semi-supervised co-attention network for early detection of COVID-19 fake tweets -- TLife-LSTM: Forecasting Future COVID-19 Progression with Topological Signatures of Atmospheric Conditions -- Lifelong Learning based Disease Diagnosis on Clinical Notes -- GrabQC: Graph based Query Contextualization for automated ICD coding -- Deep Gaussian Mixture Model on Multiple Interpretable Features of Fetal Heart Rate for Pregnancy Wellness -- Adverse Drug Events Detection, Extraction and Normalization from Online Comments of Chinese Patent Medicines -- Adaptive Graph Co-Attention Networks for Traffic Forecasting -- Dual-Stage Bayesian Sequence to Sequence Embeddings for Energy Demand Forecasting -- AA-LSTM: An Adversarial Autoencoder Joint Model for Prediction of Equipment Remaining Useful Life -- Data Mining of Specialized Data -- Analyzing Topic Transitions in Text-based Social Cascades using Dual-Network Hawkes Process -- HiPaR: Hierarchical Pattern-Aided Regression -- Improved Topology Extraction using Discriminative Parameter Mining of Logs -- Back to Prior Knowledge: Joint Event Causality Extraction via Convolutional Semantic Infusion -- A k-MCST based Algorithm for Discovering Core-Periphery Structures in Graphs -- Detecting Sequentially Novel Classes with Stable Generalization Ability -- Learning-based Dynamic Graph Stream Sketch -- Discovering Dense Correlated Subgraphs in Dynamic Networks -- Fake News Detection with Heterogenous Deep Graph Convolutional Network -- Incrementally Finding the Vertices Absent from the Maximum Independent Sets -- Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network -- Graph Neural Networks for Soft Semi-Supervised Learning on Hypergraphs -- A Meta-path based Graph Convolutional Network with Multi-Scale Semantic Extractions for Heterogeneous Event Classification -- Noise-Enhanced Unsupervised Link Prediction -- Weak Supervision Network Embedding for Constrained Graph Learning -- RAGA: Relation-aware Graph Attention Networks for Global Entity Alignment -- Graph Attention Networks with Positional Embeddings -- Unified Robust Training for Graph Neural Networks against Label Noise -- Graph InfoClust: Maximizing Coarse-Grain Mutual Information in Graphs -- A Deep Hybrid Pooling Architecture for Graph Classification with Hierarchical Attention -- Maximizing Explainability with SF-Lasso and Selective Inference for Video and Picture Ads. -Reliably Calibrated Isotonic Regression -- Multiple Instance Learning for Unilateral Data -- An Online Learning Algorithm for Non-Stationary Imbalanced Data by Extra-Charging Minority Class -- Locally Linear Support Vector Machines for Imbalanced Data Classification. - Low-Dimensional Representation Learning from Imbalanced Data Streams -- PhotoStylist: Altering the Style of Photos based on the Connotations of Texts -- Gazetteer-Guided Keyphrase Generation from Research Papers -- Minits-AllOcc: An Efficient Algorithm for Mining Timed Sequential Patterns -- T^3N: Harnessing Text and Temporal Tree Network for Rumor Detection on Twitter -- AngryBERT: Joint Learning Target and Emotion for Hate Speech Detection -- SCARLET: Explainable Attention based Graph Neural Network for Fake News spreader prediction -- Content matters: A GNN-based Model Combined with Text Semantics for Social Network Cascade Prediction -- TERMCast: Temporal Relation Modeling for Effective Urban Flow Forecasting -- Traffic Flow Driven Spatio-Temporal Graph Convolutional Network for Ride-hailing Demand Forecasting -- A Proximity Forest for Multivariate Time Series Classification -- C²-Guard: A Cross-Correlation Gaining Framework for Urban Air Quality Prediction -- Simultaneous multiple POI population patternanalysis system with HDP mixture regression -- Interpretable Feature Construction for Time Series Extrinsic Regression -- SEPC: Improving Joint Extraction of Entities and Relations by Strengthening Entity Pairs Connection. | ||
520 | |a The 3-volume set LNAI 12712-12714 constitutes the proceedings of the 25th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2021, which was held during May 11-14, 2021. The 157 papers included in the proceedings were carefully reviewed and selected from a total of 628 submissions. They were organized in topical sections as follows: Part I: Applications of knowledge discovery and data mining of specialized data; Part II: Classical data mining; data mining theory and principles; recommender systems; and text analytics; Part III: Representation learning and embedding, and learning from data. | ||
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Data mining. | |
650 | 0 | |a Application software. | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Algorithms. | |
700 | 1 | |a Karlapalem, Kamal |e herausgeberin |4 edt | |
700 | 1 | |a Cheng, Hong |e herausgeberin |4 edt | |
700 | 1 | |a Ramakrishnan, Naren |e herausgeberin |4 edt | |
700 | 1 | |a Agrawal, R. K. |e herausgeberin |4 edt | |
700 | 1 | |a Reddy, P. Krishna |e herausgeberin |4 edt | |
700 | 1 | |a Srivastava, Jaideep |e herausgeberin |4 edt | |
700 | 1 | |a Chakraborty, Tanmoy |e herausgeberin |4 edt | |
776 | 1 | |z 9783030757618 | |
776 | 1 | |z 9783030757632 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783030757618 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783030757632 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-75762-5 |m X:SPRINGER |x Resolving-System |z lizenzpflichtig |
912 | |a ZDB-2-LNC |b 2021 | ||
912 | |a ZDB-2-SCS |b 2021 | ||
912 | |a ZDB-2-SXCS |b 2021 | ||
912 | |a ZDB-2-SEB |b 2021 | ||
912 | |a GBV_ILN_20 | ||
912 | |a ISIL_DE-84 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_22 | ||
912 | |a ISIL_DE-18 | ||
912 | |a GBV_ILN_22_i22818 | ||
912 | |a GBV_ILN_23 | ||
912 | |a ISIL_DE-830 | ||
912 | |a GBV_ILN_60 | ||
912 | |a ISIL_DE-705 | ||
912 | |a GBV_ILN_62 | ||
912 | |a ISIL_DE-28 | ||
912 | |a GBV_ILN_63 | ||
912 | |a ISIL_DE-Wim2 | ||
912 | |a GBV_ILN_65 | ||
912 | |a ISIL_DE-3 | ||
912 | |a GBV_ILN_100 | ||
912 | |a ISIL_DE-Ma9 | ||
912 | |a GBV_ILN_101 | ||
912 | |a ISIL_DE-Ma14 | ||
912 | |a GBV_ILN_105 | ||
912 | |a ISIL_DE-841 | ||
912 | |a GBV_ILN_110 | ||
912 | |a ISIL_DE-Luen4 | ||
912 | |a GBV_ILN_120 | ||
912 | |a ISIL_DE-715 | ||
912 | |a GBV_ILN_130 | ||
912 | |a ISIL_DE-700 | ||
912 | |a GBV_ILN_161 | ||
912 | |a ISIL_DE-960 | ||
912 | |a GBV_ILN_231 | ||
912 | |a ISIL_DE-527 | ||
912 | |a GBV_ILN_285 | ||
912 | |a ISIL_DE-517 | ||
912 | |a GBV_ILN_293 | ||
912 | |a ISIL_DE-960-3 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a ISIL_DE-21 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a ISIL_DE-25 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a ISIL_DE-291 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a ISIL_DE-14 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a ISIL_DE-352E | ||
912 | |a GBV_ILN_2009 | ||
912 | |a ISIL_DE-180 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a ISIL_DE-90 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a ISIL_DE-93 | ||
912 | |a GBV_ILN_2017 | ||
912 | |a ISIL_DE-576 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a ISIL_DE-Ch1 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a ISIL_DE-289 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a ISIL_DE-105 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a ISIL_DE-Rt2 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a ISIL_DE-840 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a ISIL_DE-Kon4 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a ISIL_DE-Fn1 | ||
912 | |a GBV_ILN_2105 | ||
912 | |a ISIL_DE-1019 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a ISIL_DE-Stg259 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a ISIL_DE-991 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a ISIL_DE-944 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a ISIL_DE-943 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a ISIL_DE-Ofb1 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a ISIL_DE-Rav1 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a ISIL_DE-Hed2 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a ISIL_DE-Stg258 | ||
951 | |a BO | ||
953 | |2 045F |a 006.3 | ||
980 | |2 20 |1 01 |x 0084 |b 3934275931 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h CATDESC_SPR-EB |u CATDESC_SPR-EB |y z |z 03-06-21 | ||
980 | |2 22 |1 01 |x 0018 |b 3934265138 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h olrm-h228-scs |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y zi22818 |z 03-06-21 | ||
980 | |2 23 |1 01 |x 0830 |b 4027330919 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h ACQ |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u i |y z |z 28-12-21 | ||
980 | |2 60 |1 01 |x 0705 |b 3934250068 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h SpringerLink |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |k Nur für Angehörige der HSU: Volltextzugang von außerhalb des Campus mit Anmeldung über Shibboleth mit Ihrer Bibliothekskennung |y z |z 03-06-21 | ||
980 | |2 62 |1 01 |x 0028 |b 3934337287 |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 03-06-21 | ||
980 | |2 63 |1 01 |x 3401 |b 4241921906 |h E-Books Lizenz Springer Computer Science |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 02-01-23 | ||
980 | |2 65 |1 01 |x 0003 |b 3934341098 |c 03 |f --%%-- |d ebook |e --%%-- |j --%%-- |h OLR-SEB-ZDB-2-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y k3o |z 03-06-21 | ||
980 | |2 100 |1 01 |x 3100 |b 3934313418 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 03-06-21 | ||
980 | |2 101 |1 01 |x 3101 |b 3934322115 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 03-06-21 | ||
980 | |2 105 |1 01 |x 0841 |b 3934356214 |c 05 |f --%%-- |d KaufEBook202103 |e --%%-- |j --%%-- |h OLR-ESP |k Campuslizenz Universität / Technische Hochschule Lübeck. - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y x |z 03-06-21 | ||
980 | |2 110 |1 01 |x 3110 |b 4243589445 |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 04-01-23 | ||
980 | |2 120 |1 01 |x 0715 |b 3963297751 |c 00 |f --%%-- |d --%%-- |e g |j --%%-- |h alma |y z |z 06-08-21 | ||
980 | |2 130 |1 01 |x 0700 |b 3934325297 |h OLR-SEB |k Vervielfältigungen (z. B. Kopien, Downloads) nur für den eigenen wissenschaftlichen Gebrauch. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots |y z |z 03-06-21 | ||
980 | |2 161 |1 01 |x 0960 |b 393420516X |h OLR-SEB |k Campusweiter Zugriff (Hochschule Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u fhebook |y z |z 02-06-21 | ||
980 | |2 231 |1 01 |x 0527 |b 4515390511 |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 23-04-24 | ||
980 | |2 285 |1 01 |x 0517 |b 4277418988 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h OLR-LNC |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 27-02-23 | ||
980 | |2 293 |1 01 |x 3293 |b 3934206611 |h OLR-SEB |k Campusweiter Zugriff (Hochschule Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u fhebook |y xf |z 02-06-21 | ||
980 | |2 2001 |1 01 |x DE-21 |b 3933740525 |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l01 |z 01-06-21 | ||
980 | |2 2003 |1 01 |x DE-25 |b 3933740533 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Elektronischer Volltext - Universitätslizenz |y l01 |z 01-06-21 | ||
980 | |2 2005 |1 01 |x DE-291 |b 3933835739 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |y l01 |z 01-06-21 | ||
980 | |2 2006 |1 01 |x DE-14 |b 3933835747 |c 00 |f --%%-- |d --%%-- |e --%%-- |j --%%-- |y l01 |z 01-06-21 | ||
980 | |2 2007 |1 01 |x DE-352E |b 3933835755 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |y l01 |z 01-06-21 | ||
980 | |2 2009 |1 01 |x DE-180 |b 3933835763 |c 00 |f --%%-- |d --%%-- |e --%%-- |j --%%-- |y l01 |z 01-06-21 | ||
980 | |2 2009 |1 02 |x DE-180 |b 3933949769 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l01 |z 02-06-21 | ||
980 | |2 2014 |1 01 |x DE-90 |b 3933835771 |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l01 |z 01-06-21 | ||
980 | |2 2014 |1 02 |x DE-90 |b 393383578X |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l02 |z 01-06-21 | ||
980 | |2 2015 |1 01 |x DE-93 |b 3933835798 |c 00 |f --%%-- |d --%%-- |e p |j --%%-- |k Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2017 |1 01 |x DE-576 |b 3933835801 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Besitznachweis BSZ nur für Dateneinspielung, keine echte Lizenz vorhanden |y l01 |z 01-06-21 | ||
980 | |2 2020 |1 01 |x DE-Ch1 |b 3933835828 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |k Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2021 |1 01 |x DE-289 |b 3933740541 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l01 |z 01-06-21 | ||
980 | |2 2027 |1 01 |x DE-105 |b 393374055X |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2034 |1 01 |x DE-Rt2 |b 3933740568 |c 00 |f --%%-- |d eBook |e --%%-- |j n |k Zugriff von allen im Hochschulnetz befindlichen Rechnern; Hochschulangehörige können auch über VPN von außerhalb des Campusnetzes zugreifen |y l01 |z 01-06-21 | ||
980 | |2 2055 |1 01 |x DE-840 |b 3933740576 |c 00 |f --%%-- |d Springer ebook ComputerScience |e --%%-- |j n |k Campuslizenz HHN |y l01 |z 01-06-21 | ||
980 | |2 2059 |1 01 |x DE-Kon4 |b 3933740584 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j kp |k Elektronischer Volltext - Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2068 |1 01 |x DE-Fn1 |b 3933740592 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j kn |y l01 |z 01-06-21 | ||
980 | |2 2105 |1 01 |x DE-1019 |b 400149924X |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |y l01 |z 11-11-21 | ||
980 | |2 2106 |1 01 |x DE-Stg259 |b 3933740606 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j n |k Elektronischer Volltext |y l01 |z 01-06-21 | ||
980 | |2 2108 |1 01 |x DE-991 |b 3933740614 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j kp |k Elektronischer Volltext - Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2111 |1 01 |x DE-944 |b 3933740622 |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2119 |1 01 |x DE-943 |b 3933740630 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j kp |k Elektronischer Volltext - Campuslizenz |y l01 |z 01-06-21 | ||
980 | |2 2119 |1 02 |x DE-943 |b 4255497931 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 31-01-23 | ||
980 | |2 2129 |1 01 |x DE-Ofb1 |b 3933740649 |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |y l01 |z 01-06-21 | ||
980 | |2 2143 |1 01 |x DE-Rav1 |b 3933740657 |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |y l01 |z 01-06-21 | ||
980 | |2 2153 |1 01 |x DE-Hed2 |b 4243044554 |c 00 |f --%%-- |d e-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 03-01-23 | ||
980 | |2 2232 |1 01 |x DE-Stg258 |b 4054664512 |c 00 |f --%%-- |d Ebook_Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 09-02-22 | ||
981 | |2 20 |1 01 |x 0084 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 22 |1 01 |x 0018 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 22 |1 01 |x 0018 |y Nur für Angehörige der Universität Hamburg: Volltextzugang von außerhalb des Campus |r http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 23 |1 01 |x 0830 |y Springer EBook |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 60 |1 01 |x 0705 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 62 |1 01 |x 0028 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 63 |1 01 |x 3401 |y E-Book |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 65 |1 01 |x 0003 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 100 |1 01 |x 3100 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 100 |1 01 |x 3100 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 101 |1 01 |x 3101 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 101 |1 01 |x 3101 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 105 |1 01 |x 0841 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 110 |1 01 |x 3110 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 120 |1 01 |x 0715 |r http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991015428377503501 | ||
981 | |2 130 |1 01 |x 0700 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 161 |1 01 |x 0960 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 231 |1 01 |x 0527 |y Nutzung ausschließlich für Angehörige der Hochschule Harz |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 285 |1 01 |x 0517 |y E-books (Springer) |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 293 |1 01 |x 3293 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2001 |1 01 |x DE-21 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2003 |1 01 |x DE-25 |r https://www.redi-bw.de/start/unifr/EBooks-springer/10.1007/978-3-030-75762-5 | ||
981 | |2 2005 |1 01 |x DE-291 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2006 |1 01 |x DE-14 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2007 |1 01 |x DE-352E |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2009 |1 02 |x DE-180 |r http://primo-49man.hosted.exlibrisgroup.com/openurl/MAN/MAN_UB_service_page?u.ignore_date_coverage=true&rft.mms_id=9918837832502561 | ||
981 | |2 2014 |1 01 |x DE-90 |y Zugang im Netz des KIT |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2014 |1 02 |x DE-90 |y Zugang im Netz der HKA |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2015 |1 01 |x DE-93 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2020 |1 01 |x DE-Ch1 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2021 |1 01 |x DE-289 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2034 |1 01 |x DE-Rt2 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2055 |1 01 |x DE-840 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2059 |1 01 |x DE-Kon4 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2068 |1 01 |x DE-Fn1 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2105 |1 01 |x DE-1019 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2106 |1 01 |x DE-Stg259 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2108 |1 01 |x DE-991 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2111 |1 01 |x DE-944 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2119 |1 01 |x DE-943 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2119 |1 02 |x DE-943 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2129 |1 01 |x DE-Ofb1 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2143 |1 01 |x DE-Rav1 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2153 |1 01 |x DE-Hed2 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
981 | |2 2232 |1 01 |x DE-Stg258 |r https://doi.org/10.1007/978-3-030-75762-5 | ||
982 | |2 2001 |1 01 |x DE-21 |8 00 |s s |a eBook-Springer-Computer-Science-2021 | ||
982 | |2 2027 |1 01 |x DE-105 |8 00 |s s |a ebook | ||
983 | |2 2143 |1 01 |x DE-Rav1 |8 00 |0 (DE-627)1343240476 |a eBook | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1357129785 |a e-Book | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1830158732 |a eBook Computer Science EBS | ||
985 | |2 23 |1 01 |x 0830 |a 2021-01234 | ||
985 | |2 63 |1 01 |x 3401 |a Lizenz2023 | ||
995 | |2 20 |1 01 |x 0084 |a CATDESC_SPR-EB | ||
995 | |2 22 |1 01 |x 0018 |a olrm-h228-scs | ||
995 | |2 23 |1 01 |x 0830 |a ACQ | ||
995 | |2 23 |1 01 |x 0830 |a ACQ-cs | ||
995 | |2 23 |1 01 |x 0830 |a olr-springer-cs | ||
995 | |2 23 |1 01 |x 0830 |a olr-springer | ||
995 | |2 60 |1 01 |x 0705 |a SpringerLink | ||
995 | |2 63 |1 01 |x 3401 |a E-Books Lizenz Springer Computer Science | ||
995 | |2 65 |1 01 |x 0003 |a OLR-SEB-ZDB-2-SCS | ||
995 | |2 100 |1 01 |x 3100 |a OLR-SEB | ||
995 | |2 101 |1 01 |x 3101 |a OLR-SEB | ||
995 | |2 105 |1 01 |x 0841 |a OLR-ESP | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SEB | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SPRINGER-EBS | ||
995 | |2 120 |1 01 |x 0715 |a alma | ||
995 | |2 130 |1 01 |x 0700 |a OLR-SEB | ||
995 | |2 161 |1 01 |x 0960 |a OLR-SEB | ||
995 | |2 231 |1 01 |x 0527 |a OLR-SEB | ||
995 | |2 285 |1 01 |x 0517 |a OLR-LNC | ||
995 | |2 293 |1 01 |x 3293 |a OLR-SEB | ||
998 | |2 23 |1 01 |x 0830 |0 2021.12.28 | ||
998 | |2 2003 |1 01 |x DE-25 |0 01-06-21 |f 13 |