語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced computing and systems for s...
~
Chaki, Rituparna.
FindBook
Google Book
Amazon
博客來
Advanced computing and systems for security.. Volume three
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced computing and systems for security./ edited by Rituparna Chaki ... [et al.].
其他作者:
Chaki, Rituparna.
出版者:
Singapore :Springer Singapore : : 2017.,
面頁冊數:
xiii, 197 p. :ill., digital ;24 cm.
內容註:
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-981-10-3409-1
ISBN:
9789811034091
Advanced computing and systems for security.. Volume three
Advanced computing and systems for security.
Volume three[electronic resource] /edited by Rituparna Chaki ... [et al.]. - Singapore :Springer Singapore :2017. - xiii, 197 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5672194-5357 ;. - Advances in intelligent systems and computing ;v.567..
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
ISBN: 9789811034091
Standard No.: 10.1007/978-981-10-3409-1doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advanced computing and systems for security.. Volume three
LDR
:03001nmm a2200325 a 4500
001
2092892
003
DE-He213
005
20170918090806.0
006
m d
007
cr nn 008maaau
008
171117s2017 si s 0 eng d
020
$a
9789811034091
$q
(electronic bk.)
020
$a
9789811034084
$q
(paper)
024
7
$a
10.1007/978-981-10-3409-1
$2
doi
035
$a
978-981-10-3409-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A244 2017
245
0 0
$a
Advanced computing and systems for security.
$n
Volume three
$h
[electronic resource] /
$c
edited by Rituparna Chaki ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2017.
300
$a
xiii, 197 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.567
505
0
$a
A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520
$a
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Computer science
$v
Congresses.
$3
606819
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Signal, Image and Speech Processing.
$3
891073
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Chaki, Rituparna.
$3
2132758
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
International Doctoral Symposium on Applied Computation and Security Systems
$n
(3rd :
$d
2016 :
$c
Kolkata, India)
$3
3227213
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
v.567.
$3
3227214
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-3409-1
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9317266
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入