Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advanced computing and systems for s...
~
Chaki, Rituparna.
Linked to FindBook
Google Book
Amazon
博客來
Advanced computing and systems for security.. Volume three
Record Type:
Electronic resources : Monograph/item
Title/Author:
Advanced computing and systems for security./ edited by Rituparna Chaki ... [et al.].
other author:
Chaki, Rituparna.
Published:
Singapore :Springer Singapore : : 2017.,
Description:
xiii, 197 p. :ill., digital ;24 cm.
[NT 15003449]:
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
Contained By:
Springer eBooks
Subject:
Computer security - Congresses. -
Online resource:
http://dx.doi.org/10.1007/978-981-10-3409-1
ISBN:
9789811034091
Advanced computing and systems for security.. Volume three
Advanced computing and systems for security.
Volume three[electronic resource] /edited by Rituparna Chaki ... [et al.]. - Singapore :Springer Singapore :2017. - xiii, 197 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5672194-5357 ;. - Advances in intelligent systems and computing ;v.567..
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
ISBN: 9789811034091
Standard No.: 10.1007/978-981-10-3409-1doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advanced computing and systems for security.. Volume three
LDR
:03001nmm a2200325 a 4500
001
2092892
003
DE-He213
005
20170918090806.0
006
m d
007
cr nn 008maaau
008
171117s2017 si s 0 eng d
020
$a
9789811034091
$q
(electronic bk.)
020
$a
9789811034084
$q
(paper)
024
7
$a
10.1007/978-981-10-3409-1
$2
doi
035
$a
978-981-10-3409-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A244 2017
245
0 0
$a
Advanced computing and systems for security.
$n
Volume three
$h
[electronic resource] /
$c
edited by Rituparna Chaki ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2017.
300
$a
xiii, 197 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.567
505
0
$a
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520
$a
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Computer science
$v
Congresses.
$3
606819
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Signal, Image and Speech Processing.
$3
891073
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Chaki, Rituparna.
$3
2132758
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
International Doctoral Symposium on Applied Computation and Security Systems
$n
(3rd :
$d
2016 :
$c
Kolkata, India)
$3
3227213
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
v.567.
$3
3227214
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-3409-1
950
$a
Engineering (Springer-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9317266
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login