Advanced Computing and Systems for Security (Record no. 79117)

000 -LEADER
fixed length control field 04230nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-981-10-3409-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220938.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170309s2017 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789811034091
-- 978-981-10-3409-1
082 04 - CLASSIFICATION NUMBER
Call Number 006.3
245 10 - TITLE STATEMENT
Title Advanced Computing and Systems for Security
Sub Title Volume Three /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2017.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 197 p. 57 illus.
490 1# - SERIES STATEMENT
Series statement Advances in Intelligent Systems and Computing,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 A heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520 ## - SUMMARY, ETC.
Summary, etc This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
700 1# - AUTHOR 2
Author 2 Chaki, Rituparna.
700 1# - AUTHOR 2
Author 2 Saeed, Khalid.
700 1# - AUTHOR 2
Author 2 Cortesi, Agostino.
700 1# - AUTHOR 2
Author 2 Chaki, Nabendu.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-10-3409-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2017.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal processing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal, Speech and Image Processing .
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2194-5365 ;
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.