000 03809nam a22006135i 4500
001 978-3-642-55032-4
003 DE-He213
005 20200420221256.0
007 cr nn 008mamaa
008 140325s2014 gw | s |||| 0|eng d
020 _a9783642550324
_9978-3-642-55032-4
024 7 _a10.1007/978-3-642-55032-4
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
082 0 4 _a004
_223
245 1 0 _aInformation and Communication Technology
_h[electronic resource] :
_bSecond IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings /
_cedited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXXII, 699 p. 238 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8407
505 0 _aApplied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
520 _aThis book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData structures (Computer science).
650 0 _aInformation storage and retrieval.
650 0 _aComputers and civilization.
650 1 4 _aComputer Science.
650 2 4 _aComputers and Society.
650 2 4 _aSystems and Data Security.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aComputer Communication Networks.
700 1 _aLinawati.
_eeditor.
700 1 _aMahendra, Made Sudiana.
_eeditor.
700 1 _aNeuhold, Erich J.
_eeditor.
700 1 _aTjoa, A Min.
_eeditor.
700 1 _aYou, Ilsun.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642550317
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8407
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-55032-4
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c52921
_d52921