語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced computing and systems for s...
~
(1998 :)
Advanced computing and systems for security.Volume three
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced computing and systems for security.edited by Rituparna Chaki ... [et al.].
其他作者:
Chaki, Rituparna.
出版者:
Singapore :Springer Singapore :2017.
面頁冊數:
xiii, 197 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer securityCongresses.
電子資源:
http://dx.doi.org/10.1007/978-981-10-3409-1
ISBN:
9789811034091$q(electronic bk.)
Advanced computing and systems for security.Volume three
Advanced computing and systems for security.
Volume three[electronic resource] /edited by Rituparna Chaki ... [et al.]. - Singapore :Springer Singapore :2017. - xiii, 197 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5672194-5357 ;. - Advances in intelligent systems and computing ;176..
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
ISBN: 9789811034091$q(electronic bk.)
Standard No.: 10.1007/978-981-10-3409-1doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advanced computing and systems for security.Volume three
LDR
:03001nmm a2200325 a 4500
001
509199
003
DE-He213
005
20170918090806.0
006
m d
007
cr nn 008maaau
008
171121s2017 si s 0 eng d
020
$a
9789811034091$q(electronic bk.)
020
$a
9789811034084$q(paper)
024
7
$a
10.1007/978-981-10-3409-1
$2
doi
035
$a
978-981-10-3409-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A244 2017
245
0 0
$a
Advanced computing and systems for security.
$n
Volume three
$h
[electronic resource] /
$c
edited by Rituparna Chaki ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2017.
300
$a
xiii, 197 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.567
505
0
$a
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520
$a
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computers
$x
Access control
$v
Handbooks, manuals, etc.
$3
435955
650
0
$a
Computer science
$3
252805
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Chaki, Rituparna.
$3
710543
710
2
$a
SpringerLink (Online service)
$3
273601
711
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
176.
$3
567349
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-3409-1
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000139132
電子館藏
1圖書
電子書
EB QA76.9.A25 A244 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-981-10-3409-1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入