000 | 03512nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-981-10-0557-2 | ||
003 | DE-He213 | ||
005 | 20200421111849.0 | ||
007 | cr nn 008mamaa | ||
008 | 160215s2016 si | s |||| 0|eng d | ||
020 |
_a9789811005572 _9978-981-10-0557-2 |
||
024 | 7 |
_a10.1007/978-981-10-0557-2 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aInformation Science and Applications (ICISA) 2016 _h[electronic resource] / _cedited by Kuinam J. Kim, Nikolai Joukov. |
264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2016. |
|
300 |
_aXXI, 1505 p. 659 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v376 |
|
505 | 0 | _aPART 1 Ubiquitous Computing -- PART 2 Networks and Information Systems -- PART 3 Multimedia and Visualization -- PART 4 Middleware and Operating Systems -- PART 5 Security and Privacy -- PART 6 Data Mining and Artificial Intelligence -- PART 7 Software Engineering -- PART 8 Web Technology -- PART 9 Internet of Things -- PART 10 ICT Convergence -- PART 11 Convergence of Healthcare and Information Technology. | |
520 | _aThis book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The contributions describe the most recent developments in information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readers are researchers in academia, industry and other research institutes focusing on information science and technology. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
700 | 1 |
_aKim, Kuinam J. _eeditor. |
|
700 | 1 |
_aJoukov, Nikolai. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789811005565 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v376 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-981-10-0557-2 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c55983 _d55983 |