000 | 03927nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-19713-5 | ||
003 | DE-He213 | ||
005 | 20200421112052.0 | ||
007 | cr nn 008mamaa | ||
008 | 150526s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319197135 _9978-3-319-19713-5 |
||
024 | 7 |
_a10.1007/978-3-319-19713-5 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aInternational Joint Conference _h[electronic resource] : _bCISIS'15 and ICEUTE'15 / _cedited by �Alvaro Herrero, Bruno Baruque, Javier Sedano, H�ector Quinti�an, Emilio Corchado. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXXII, 641 p. 138 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Intelligent Systems and Computing, _x2194-5357 ; _v369 |
|
505 | 0 | _aApplications of Intelligent Methods for Security -- Infrastructure and Network Security -- CISIS15-SS01: Digital Identities Management by Means of Non-Standard Digital Signatures Schemes -- CISIS15-SS02: User-Centric Security & Privacy -- Domain Applications and Case Studies -- Information Technologies for Transnational Learning -- Teaching and Evaluation Methodologies. | |
520 | _aThis volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on EUropean Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aData mining. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aHigher education. | |
650 | 0 | _aComputational intelligence. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aHigher Education. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
700 | 1 |
_aHerrero, �Alvaro. _eeditor. |
|
700 | 1 |
_aBaruque, Bruno. _eeditor. |
|
700 | 1 |
_aSedano, Javier. _eeditor. |
|
700 | 1 |
_aQuinti�an, H�ector. _eeditor. |
|
700 | 1 |
_aCorchado, Emilio. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319197128 |
830 | 0 |
_aAdvances in Intelligent Systems and Computing, _x2194-5357 ; _v369 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-19713-5 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c57256 _d57256 |