語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced computing and systems for security.. Volume three
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advanced computing and systems for security./ edited by Rituparna Chaki ... [et al.].
其他作者:
Chaki, Rituparna.
出版者:
Singapore :Imprint: Springer, : 2017.,
面頁冊數:
xiii, 197 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-981-10-3409-1
ISBN:
9789811034091
Advanced computing and systems for security.. Volume three
Advanced computing and systems for security.
Volume three[electronic resource] /edited by Rituparna Chaki ... [et al.]. - Singapore :Imprint: Springer,2017. - xiii, 197 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5672194-5357 ;. - Advances in intelligent systems and computing ;173..
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
ISBN: 9789811034091
Standard No.: 10.1007/978-981-10-3409-1doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advanced computing and systems for security.. Volume three
LDR
:03001nam a2200325 a 4500
001
884105
003
DE-He213
005
20170918090806.0
006
m d
007
cr nn 008maaau
008
180530s2017 si s 0 eng d
020
$a
9789811034091
$q
(electronic bk.)
020
$a
9789811034084
$q
(paper)
024
7
$a
10.1007/978-981-10-3409-1
$2
doi
035
$a
978-981-10-3409-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A244 2017
245
0 0
$a
Advanced computing and systems for security.
$n
Volume three
$h
[electronic resource] /
$c
edited by Rituparna Chaki ... [et al.].
260
$a
Singapore :
$c
2017.
$b
Imprint: Springer,
$b
Springer Singapore :
300
$a
xiii, 197 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.567
505
0
$a
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520
$a
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
674616
$3
727783
650
0
$a
Computer science
$3
675907
650
1 4
$a
Engineering.
$3
561152
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Signal, Image and Speech Processing.
$3
670837
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Chaki, Rituparna.
$3
1062510
710
2
$a
SpringerLink (Online service)
$3
593884
711
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
173.
$3
884093
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-3409-1
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入