Biometrics, computer security systems and artificial intelligence applications: [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005]
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2006
|
Schlagworte: | |
Online-Zugang: | http://deposit.dnb.de/cgi-bin/dokserv?id=2823540&prov=M&dok_var=1&dok_ext=htm Publisher description lizenzfrei Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 342 S. Ill., graf. Darst. |
ISBN: | 0387362320 9780387362328 0387365036 9780387365039 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023343201 | ||
003 | DE-604 | ||
005 | 20131219 | ||
007 | t | ||
008 | 080613s2006 a||| |||| 10||| eng d | ||
010 | |a 2006928847 | ||
015 | |a 06N280014 |2 dnb | ||
016 | 7 | |a 980087910 |2 DE-101 | |
020 | |a 0387362320 |9 0-387-36232-0 | ||
020 | |a 9780387362328 |9 978-0-387-36232-8 | ||
020 | |a 0387365036 |c EBook |9 0-387-36503-6 | ||
020 | |a 9780387365039 |c EBook |9 978-0-387-36503-9 | ||
035 | |a (OCoLC)255632910 | ||
035 | |a (DE-599)DNB980087910 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Biometrics, computer security systems and artificial intelligence applications |b [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |c ed. by Khalid Saeed ... |
264 | 1 | |a New York, NY |b Springer |c 2006 | |
300 | |a XI, 342 S. |b Ill., graf. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Biometric identification | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Saeed, Khalid |e Sonstige |0 (DE-588)1045773301 |4 oth | |
856 | 4 | |u http://deposit.dnb.de/cgi-bin/dokserv?id=2823540&prov=M&dok_var=1&dok_ext=htm | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0825/2006928847-d.html |z Publisher description |z lizenzfrei | |
856 | 4 | |u http://www.loc.gov/catdir/toc/fy0709/2006928847.html |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016526937&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016526937 |
Datensatz im Suchindex
_version_ | 1804137697099382784 |
---|---|
adam_text | Table of Contents
PART I
-
Image Analysis and Biometrics
ANDRYSIAK
Tomasz, CHORAŚ Michał
З
Image Filtration and Feature Extraction for Face Recognition
BARTKOWIAKAnna, EVELPIDOU
Niki
13
Visualization of Some Multi-Class Erosion Data Using GDA and
Supervised
SOM
BOBULSKI
Janusz
23
Wavelet Transform in Face Recognition
CHORAŚ Ryszard
S.
31
Content-Based Image Retrieval
-
A Survey
KUBANEK Mariusz
45
Method of Speech Recognition and Speaker Identification Using
Audio-Visual of Polish Speech and Hidden Markov Models
LIVSHITZ Michael, PETROVSKY Alexander
57
Synthesis of
Codebooks
with Perceptually Monitored Structure for
Multiband CELP-Coders
MICIAK
Mirosław
69
The Color Information as a Feature for Postage Stamps Recognition
RYDZEK
Szymon
79
Iris Shape Evaluation in Face Image with Simple Background
SAEED Khalid, ADAMSKI
Marcin
89
Experimental Algorithm for Characteristic Points Evaluation in Static
Images of Signatures
PART II
-
Computer Security Systems
BlELECKl
Włodzimierz, BURAK Dariusz
101
Parallelization of
Standard
Modes of Operation for Symmetric
Key Block Ciphers
Contents
CHMIEL Krzysztof
_
Ш
On Differential and Linear Approximation of S-box Functions
GROCHOLEWSKA-CZURYŁO
Anna,
STOKŁOSA Janusz
121
Random Generation of S-Boxes for Block Ciphers
KURIATA
Eugeniusz
137
Problems of Sending Sensitive Information
KURIATA
Eugeniusz, MAĆKÓW Witold, SUKIENNIK Paweł
155
Hash Chaining for Authenticated Data Structures Freshness
Checking
PUCZKO
Mirosław,
YARMOUK Vyatcheslav
N. 165
Stream Cipher Keys Generation with Low Power Consumption
Based on LFSR
WITKOWSKA Joanna
175
lbe
Quality of Obfuscation and Obfuscation Techniques
PART III
-
Artificial Intelligence and
Applications
ADDABBO Tindara, FACCHINETTI Gisella, MASTROLEO Giovanni
185
Capability and Functionings:
Ã
Fuzzy Way to Measure
Interaction between Father and Child
DAÑKO
Wiktor
197
Remarks on Computer Simulations
IGNATOWSKA
Bożena, MOSDORF Romuald
207
Analysis of
Е
-learning System Dynamics
IMADA
Akira
217
Can a Negative Selection Detect an Extremely Few Non-self
Among Enormous Amount of Self Cells?
KARBOWSKA-CHIUŃSKA
Joanna
227
An Average Length of Computations of Normalized Probabilistic
Algorithms
Contents
ŁEBKOWSKI Andrzej, DZIEDZICKI Krzysztof, TOBIASZ Marcin,
ŚMIERZCHALSKI Roman, TOMERA Mirosław
237
A Marine
Environment Simulator for Testing Ship
Control Systems in Dangerous Situations
MADANI Kurosh
247
Image Enhancement and Image Half-toning Using Fluid
Particles Physics Dynamics
ONISZCZUK
Walenty
259
Tandem Models with Blocking in the Computer Subnetworks
Performance Analysis
PIECH
Henryk, PTAK Aleksandra, MACHURA Marcin
269
Interchangeable Strategies in Games Without Side Payments
on the Base of Uncertain Information on Resources
PIEKARSKI Krzysztof, TADEJKO
Pawel, RAKOWSKI
Waldemar
279
Properties of Morphological Operators Applied to Analysis
of
ECG
Signals
REJER
Izabela
289
Input s Significance Evaluation in
a Multi
Input-Variable System
SZUSTALEWICZ Adam, VASSILOPOULOS Andreas
299
Calculating the Fractal Dimension of River Basins, Comparison
of Several Methods
TADEUSIEWICZ
Ryszard, AUGUSTYNIAK Piotr
311
Automatic Management of Tele-Interpretation Knowledge
in a Wearable Diagnostic Device
WIERZCHOÑ
Sławomir, KUŻELEWSKA Urszula
323
Evaluation of Clusters Quality in Artificial Immune
Clustering System
-
S
ArlS
ΉΕΝΙΙΙΚ
Eugeniusz, SZERSZEŃ Krzysztof, BOŁTUĆ Agnieszka
333
Convergence Analysis of the Boundary Geometry Identification
Obtained by Genetic Algorithms in the PIES
|
adam_txt |
Table of Contents
PART I
-
Image Analysis and Biometrics
ANDRYSIAK
Tomasz, CHORAŚ Michał
З
Image Filtration and Feature Extraction for Face Recognition
BARTKOWIAKAnna, EVELPIDOU
Niki
13
Visualization of Some Multi-Class Erosion Data Using GDA and
Supervised
SOM
BOBULSKI
Janusz
23
Wavelet Transform in Face Recognition
CHORAŚ Ryszard
S.
31
Content-Based Image Retrieval
-
A Survey
KUBANEK Mariusz
45
Method of Speech Recognition and Speaker Identification Using
Audio-Visual of Polish Speech and Hidden Markov Models
LIVSHITZ Michael, PETROVSKY Alexander
57
Synthesis of
Codebooks
with Perceptually Monitored Structure for
Multiband CELP-Coders
MICIAK
Mirosław
69
The Color Information as a Feature for Postage Stamps Recognition
RYDZEK
Szymon
79
Iris Shape Evaluation in Face Image with Simple Background
SAEED Khalid, ADAMSKI
Marcin
89
Experimental Algorithm for Characteristic Points Evaluation in Static
Images of Signatures
PART II
-
Computer Security Systems
BlELECKl
Włodzimierz, BURAK Dariusz
101
Parallelization of
Standard
Modes of Operation for Symmetric
Key Block Ciphers
Contents
CHMIEL Krzysztof
_
Ш
On Differential and Linear Approximation of S-box Functions
GROCHOLEWSKA-CZURYŁO
Anna,
STOKŁOSA Janusz
121
Random Generation of S-Boxes for Block Ciphers
KURIATA
Eugeniusz
137
Problems of Sending Sensitive Information
KURIATA
Eugeniusz, MAĆKÓW Witold, SUKIENNIK Paweł
155
Hash Chaining for Authenticated Data Structures Freshness
Checking
PUCZKO
Mirosław,
YARMOUK Vyatcheslav
N. 165
Stream Cipher Keys Generation with Low Power Consumption
Based on LFSR
WITKOWSKA Joanna
175
lbe
Quality of Obfuscation and Obfuscation Techniques
PART III
-
Artificial Intelligence and
Applications
ADDABBO Tindara, FACCHINETTI Gisella, MASTROLEO Giovanni
185
Capability and Functionings:
Ã
Fuzzy Way to Measure
Interaction between Father and Child
DAÑKO
Wiktor
197
Remarks on Computer Simulations
IGNATOWSKA
Bożena, MOSDORF Romuald
207
Analysis of
Е
-learning System Dynamics
IMADA
Akira
217
Can a Negative Selection Detect an Extremely Few Non-self
Among Enormous Amount of Self Cells?
KARBOWSKA-CHIUŃSKA
Joanna
227
An Average Length of Computations of Normalized Probabilistic
Algorithms
Contents
ŁEBKOWSKI Andrzej, DZIEDZICKI Krzysztof, TOBIASZ Marcin,
ŚMIERZCHALSKI Roman, TOMERA Mirosław
237
A Marine
Environment Simulator for Testing Ship
Control Systems in Dangerous Situations
MADANI Kurosh
247
Image Enhancement and Image Half-toning Using Fluid
Particles Physics Dynamics
ONISZCZUK
Walenty
259
Tandem Models with Blocking in the Computer Subnetworks
Performance Analysis
PIECH
Henryk, PTAK Aleksandra, MACHURA Marcin
269
Interchangeable Strategies in Games Without Side Payments
on the Base of Uncertain Information on Resources
PIEKARSKI Krzysztof, TADEJKO
Pawel, RAKOWSKI
Waldemar
279
Properties of Morphological Operators Applied to Analysis
of
ECG
Signals
REJER
Izabela
289
Input's Significance Evaluation in
a Multi
Input-Variable System
SZUSTALEWICZ Adam, VASSILOPOULOS Andreas
299
Calculating the Fractal Dimension of River Basins, Comparison
of Several Methods
TADEUSIEWICZ
Ryszard, AUGUSTYNIAK Piotr
311
Automatic Management of Tele-Interpretation Knowledge
in a Wearable Diagnostic Device
WIERZCHOÑ
Sławomir, KUŻELEWSKA Urszula
323
Evaluation of Clusters Quality in Artificial Immune
Clustering System
-
S
ArlS
ΉΕΝΙΙΙΚ
Eugeniusz, SZERSZEŃ Krzysztof, BOŁTUĆ Agnieszka
333
Convergence Analysis of the Boundary Geometry Identification
Obtained by Genetic Algorithms in the PIES |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)1045773301 |
building | Verbundindex |
bvnumber | BV023343201 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 300 |
ctrlnum | (OCoLC)255632910 (DE-599)DNB980087910 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02618nam a2200637 c 4500</leader><controlfield tag="001">BV023343201</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131219 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080613s2006 a||| |||| 10||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006928847</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06N280014</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">980087910</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387362320</subfield><subfield code="9">0-387-36232-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387362328</subfield><subfield code="9">978-0-387-36232-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387365036</subfield><subfield code="c">EBook</subfield><subfield code="9">0-387-36503-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387365039</subfield><subfield code="c">EBook</subfield><subfield code="9">978-0-387-36503-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255632910</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB980087910</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Biometrics, computer security systems and artificial intelligence applications</subfield><subfield code="b">[International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005]</subfield><subfield code="c">ed. by Khalid Saeed ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 342 S.</subfield><subfield code="b">Ill., graf. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Khalid</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1045773301</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2823540&prov=M&dok_var=1&dok_ext=htm</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0825/2006928847-d.html</subfield><subfield code="z">Publisher description</subfield><subfield code="z">lizenzfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy0709/2006928847.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016526937&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016526937</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV023343201 |
illustrated | Illustrated |
index_date | 2024-07-02T21:02:23Z |
indexdate | 2024-07-09T21:16:24Z |
institution | BVB |
isbn | 0387362320 9780387362328 0387365036 9780387365039 |
language | English |
lccn | 2006928847 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016526937 |
oclc_num | 255632910 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XI, 342 S. Ill., graf. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer |
record_format | marc |
spelling | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] ed. by Khalid Saeed ... New York, NY Springer 2006 XI, 342 S. Ill., graf. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Künstliche Intelligenz Artificial intelligence Biometric identification Computer security Biometrie (DE-588)4124925-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Biometrie (DE-588)4124925-2 s DE-604 Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s Künstliche Intelligenz (DE-588)4033447-8 s Saeed, Khalid Sonstige (DE-588)1045773301 oth http://deposit.dnb.de/cgi-bin/dokserv?id=2823540&prov=M&dok_var=1&dok_ext=htm http://www.loc.gov/catdir/enhancements/fy0825/2006928847-d.html Publisher description lizenzfrei http://www.loc.gov/catdir/toc/fy0709/2006928847.html lizenzfrei Inhaltsverzeichnis Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016526937&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] Künstliche Intelligenz Artificial intelligence Biometric identification Computer security Biometrie (DE-588)4124925-2 gnd Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4124925-2 (DE-588)4274324-2 (DE-588)4033447-8 (DE-588)4070085-9 (DE-588)1071861417 |
title | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |
title_auth | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |
title_exact_search | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |
title_exact_search_txtP | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |
title_full | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] ed. by Khalid Saeed ... |
title_fullStr | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] ed. by Khalid Saeed ... |
title_full_unstemmed | Biometrics, computer security systems and artificial intelligence applications [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] ed. by Khalid Saeed ... |
title_short | Biometrics, computer security systems and artificial intelligence applications |
title_sort | biometrics computer security systems and artificial intelligence applications international conference acs cisim which was held in elk poland in summer 2005 |
title_sub | [International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005] |
topic | Künstliche Intelligenz Artificial intelligence Biometric identification Computer security Biometrie (DE-588)4124925-2 gnd Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Künstliche Intelligenz Artificial intelligence Biometric identification Computer security Biometrie Computersicherheit Rechnernetz Konferenzschrift |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2823540&prov=M&dok_var=1&dok_ext=htm http://www.loc.gov/catdir/enhancements/fy0825/2006928847-d.html http://www.loc.gov/catdir/toc/fy0709/2006928847.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016526937&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT saeedkhalid biometricscomputersecuritysystemsandartificialintelligenceapplicationsinternationalconferenceacscisimwhichwasheldinelkpolandinsummer2005 |