Advances in computer science and information technology: AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6059 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 604 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642135767 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036515183 | ||
003 | DE-604 | ||
005 | 20100803 | ||
007 | t| | ||
008 | 100622s2010 xx ad|| |||| 10||| eng d | ||
015 | |a 10,N21 |2 dnb | ||
015 | |a 10,A26 |2 dnb | ||
016 | 7 | |a 1002540747 |2 DE-101 | |
020 | |a 9783642135767 |c kart. : EUR 84.53 (freier Pr.), sfr 123.00 (freier Pr.) |9 978-3-642-13576-7 | ||
024 | 3 | |a 9783642135767 | |
028 | 5 | 2 | |a 80015803 |
035 | |a (OCoLC)699653147 | ||
035 | |a (DE-599)DNB1002540747 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 | ||
082 | 0 | |a 004 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 001f |2 stub | ||
245 | 1 | 0 | |a Advances in computer science and information technology |b AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings |c Tai-hoon Kim ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XI, 604 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6059 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Miyazaki |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 2 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kim, T'ae-hun |e Sonstige |0 (DE-588)139711155 |4 oth | |
711 | 2 | |a AST |n 2 |d 2010 |c Miyazaki |j Sonstige |0 (DE-588)16070212-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6059 |w (DE-604)BV000000607 |9 6059 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3476833&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020437315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020437315 |
Datensatz im Suchindex
_version_ | 1820875238402949120 |
---|---|
adam_text |
TABLE OF CONTENTS INFORMATION SECURITY AND ASSURANCE FUZZY BASED THREAT
ANALYSIS IN TOTAL HOSPITAL INFORMATION SYSTEM . 1 NURZAINI MOHAMAD
ZAIN, GANTHAN NARAYANA SAMY, RABIAH AHMAD, ZURAINI ISMAIL, AND AZIZAH
ABDUL MANAF AN ID-BASED ANONYMOUS SIGNCRYPTION SCHEME FOR MULTIPLE
RECEIVERS SECURE IN THE STANDARD MODEL 15 BO ZHANG AND QIULIANG XU A
SUPERVISED LOCALITY PRESERVING PROJECTIONS BASED LOCAL MATCHING
ALGORITHM FOR FACE RECOGNITION 28 YINGQI LU, CHENG LU, MIAO QI, AND
SHUYAN WANG INFORMATION SYSTEMS SECURITY CRITICALITY AND ASSURANCE
EVALUATION 38 MOUSSA OUEDRAOGO, HARALAMBOS MOURATIDIS, ERIC DUBOIS, AND
DJAMEL KHADRAOUI SECURITY ANALYSIS OF 'TWO-FACTOR USER AUTHENTICATION IN
WIRELESS SENSOR NETWORKS' 55 MUHAMMAD KHURRAM KHAN AND KHALED ALGHATHBAR
DIRECTED GRAPH PATTERN SYNTHESIS IN LSB TECHNIQUE ON VIDEO STEGANOGRAPHY
61 DEBNATH BHATTACHARYYA, ARUP KUMAR BHAUMIK, MINKYU CHOI, AND TAI-HOON
KIM FEATURE LEVEL FUSION OF FACE AND PALMPRINT BIOMETRICS BY ISOMORPHIC
GRAPH-BASED IMPROVED K-MEDOIDS PARTITIONING 70 DAKSHINA RANJAN KISKU,
PHALGUNI GUPTA, AND JAMUNA KANTA SING POST-QUANTUM CRYPTOGRAPHY:
CODE-BASED SIGNATURES 82 PIERRE-LOUIS CAYREL AND MOHAMMED MEZIANI
SECURITY ANALYSIS OF THE PROPOSED PRACTICAL SECURITY MECHANISMS FOR HIG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1002540747 DIGITALISIERT
DURCH VIII TABLE OF CONTENTS AN ACTIVE INTRUSION DETECTION SYSTEM FOR
LAN SPECIFIC ATTACKS 129 NEMINATH HUBBALLI, S. ROOPA, RITESH RATTI, F.A.
BARBHUIYA, SANTOSH BISWAS, ARIJIT SUR, SUKUMAR NANDI, AND VIVEK
RAMACHANDRAN ANALYSIS ON THE IMPROVED SVD-BASED WATERMARKING SCHEME 143
HUO-CHONG LING, RAPHAEL C-W. PHAN, AND SWEE-HUAY HENG ADVANCED
COMMUNICATION AND NETWORKING APPLICATIONS OF ADAPTIVE BELIEF PROPAGATION
DECODING FOR LONG REED-SOLOMON CODES 150 ZHIAN ZHENG, DANG HAI PHAM, AND
TOMOHISA WADA DYNAMIC ROUTING FOR MITIGATING THE ENERGY HOLE BASED ON
HEURISTIC MOBILE SINK IN WIRELESS SENSOR NETWORKS 159 SEONG-YONG CHOI,
JIN-SU KIM, SEUNG-JIN HAN, JUN-HYEOG CHOI, KEE- WOOK RIM, AND JUNG-HYUN
LEE GRAMMAR ENCODING IN DNA-LIKE SECRET SHARING INFRASTRUCTURE 175 MAREK
R. OGIELA AND URSZULA OGIELA HATS: HIGH ACCURACY TIMESTAMPING SYSTEM
BASED ON NETFPGA 183 ZHIQIANG ZHOU, LIN CONG, GUOHAN LU, BEIXING DENG,
AND XING LI A ROADSIDE UNIT PLACEMENT SCHEME FOR VEHICULAR TELEMATICS
NETWORKS 196 JUNGHOON LEE AND CHEOL MIN KIM CONCURRENT COVERT
COMMUNICATION CHANNELS 203 MD AMIRUZZAMAN, HASSAN PEYRAVI, M.
ABDULLAH-AL-WADUD, AND YOOJIN CHUNG ENERGY EFFICIENCY OF COLLABORATIVE
COMMUNICATION WITH IMPERFECT FREQUENCY SYNCHRONIZATION IN WIRELESS
SENSOR NETWORKS 214 HUSNAIN TABLE OF CONTENTS IX A MODEL FOR
INTERFERENCE ON LINKS IN INTER-WORKING MULTI-HOP WIRELESS NETWORKS 264
OLADAYO SALAMI, ANTOINE BAGULA, AND H. ANTHONY CHAN AN OPTIMUM ICA BASED
MULTIUSER DATA SEPARATION FOR SHORT MESSAGE SERVICE 279 MAHDI KHOSRAVY,
MOHAMMAD REZA ALSHARIF, AND KATSUMI YAMASHITA ADVANCED COMPUTER SCIENCE
AND INFORMATION TECHNOLOGY MULTIPLE ASYNCHRONOUS REQUESTS ON A
CLIENT-BASED MASHUP PAGE 287 EUNJUNG LEE AND KYUNG-JIN SEO USING AN
INTEGRATED ONTOLOGY DATABASE TO CATEGORIZE WEB PAGES 300 RUJIANG BAI,
XIAOYUE WANG, AND JUNHUA LIAO TOPIC DETECTION BY TOPIC MODEL INDUCED
DISTANCE USING BIASED INITIATION 310 YONGHUI WU, YUXIN DING, XIAOLONG
WANG, AND JUN XU MINING SIGNIFICANT LEAST ASSOCIATION RULES USING FAST
SLP-GROWTH ALGORITHM 324 ZAILANI ABDULLAH, TUTUT HERAWAN, AND MUSTAFA
MAT DERIS MAXIMIZED POSTERIORI ATTRIBUTES SELECTION FROM FACIAL SALIENT
LANDMARKS FOR FACE RECOGNITION 337 PHALGUNI GUPTA, DAKSHINA RANJAN
KISKU, JAMUNA KANTA SING, AND MASSIMO TISTARELLI AGENT BASED APPROACH TO
REGRESSION TESTING 345 PRAVEEN RANJAN SRIVASTAVA AND TAI-HOON KIM A
NUMERICAL STUDY ON B&B ALGORITHMS FOR SOLVING SUM-OF-RATIOS PROBLEM 356
LIANBO GAO AND JIANMING SHI DEVELOPMENT OF A DIGITAL TEXTBOOK STANDARD
FORMAT BASED ON XML . . 363 MIHYE X TABLE OF CONTENTS EXTRACT SEMANTIC
INFORMATION FROM WORDNET TO IMPROVE TEXT CLASSIFICATION PERFORMANCE 409
RUJIANG BAI, XIAOYUE WANG, AND JUNHUA LIAO MANAGING UBIQUITOUS
SCIENTIFIC KNOWLEDGE ON SEMANTIC WEB 421 HAO XU A SEMANTIC PATTERN
APPROACH TO MANAGING SCIENTIFIC PUBLICATIONS 431 HAO XU A BOOTSTRAP
SOFTWARE RELIABILITY ASSESSMENT METHOD TO SQUEEZE OUT REMAINING FAULTS
435 MITSUHIRO KIMURA AND TAKAJI FUJIWARA MARKOV CHAIN MONTE CARLO RANDOM
TESTING 447 BO ZHOU, HIROYUKI OKAMURA, AND TADASHI DOHI AN INTEGRATED
APPROACH TO DETECT FAULT-PRONE MODULES USING COMPLEXITY AND TEXT FEATURE
METRICS 457 OSAMU MIZUNO AND HIDEAKI HATA UBIQUITOUS COMPUTING AND
MULTIMEDIA APPLICATIONS AN EFFECTIVE VIDEO STEGANOGRAPHY METHOD FOR
BIOMETRIE IDENTIFICATION 469 YINGQI LU, CHENG LU, AND MIAO QI A VIDEO
CODING TECHNIQUE USING OCTAGONAL MOTION SEARCH AND BTC-PF METHOD FOR
FAST RECONSTRUCTION 480 BIBHAS CHANDRA DHARA, SANJOY KUMAR SAHA, AND
BHABATOSH CHANDA ROUGH SET APPROACH IN ULTRASOUND BIOMICROSCOPY GLAUCOMA
ANALYSIS 491 SOUMYA BANERJEE, HAMEED AL-QAHERI, EL-SAYED A. EL-DAHSHAN,
AND ABOUL ELLA HASSANIEN VIDEO COPY DETECTION: SEQUENCE MATCHING USING
HYPOTHESIS TEST 499 DEBABRATA DUTTA, SANJOY KUMAR SAHA, AND BHABATOSH
CHANDA A TABLE OF CONTENTS XI DESIGN OF AN EFFICIENT MESSAGE COLLECTING
SCHEME FOR THE SLOT-BASED WIRELESS MESH NETWORK 534 JUNGHOON LEE AND
GYUNG-LEEN PARK A NOVEL APPROACH BASED ON FAULT TOLERANCE AND RECURSIVE
SEGMENTATION TO QUERY BY HUMMING 544 XIAOHONG YANG, QINGCAI CHEN, AND
XIAOLONG WANG CHINESE PROSODY GENERATION BASED ON C-TOBI REPRESENTATION
FOR TEXT-TO-SPEECH 558 BYEONGCHANG KIM CAS4UA: A CONTEXT-AWARE SERVICE
SYSTEM BASED ON WORKFLOW MODEL FOR UBIQUITOUS AGRICULTURE 572 YONGYUN
CHO, HYUN YOE, AND HAENG-KON KIM A POWER CONTROL SCHEME FOR AN
ENERGY-EFFICIENT MAC PROTOCOL 586 HO-CHUL LEE, JEONG-HWAN HWANG,
MEONG-HUN LEE, HAENG-KON KIM, AND HYUN YOE TOWARDS THE DESIGNING OF A
ROBUST INTRUSION DETECTION SYSTEM THROUGH AN OPTIMIZED ADVANCEMENT OF
NEURAL NETWORKS 597 IFTIKHAR AHMAD, AZWEEN B ABDULAH, AND ABDULLAH S
ALGHAMDI AUTHOR INDEX 603 |
any_adam_object | 1 |
author_GND | (DE-588)139711155 |
building | Verbundindex |
bvnumber | BV036515183 |
classification_rvk | SS 4800 |
classification_tum | DAT 001f |
ctrlnum | (OCoLC)699653147 (DE-599)DNB1002540747 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036515183</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100803</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100622s2010 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N21</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,A26</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1002540747</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642135767</subfield><subfield code="c">kart. : EUR 84.53 (freier Pr.), sfr 123.00 (freier Pr.)</subfield><subfield code="9">978-3-642-13576-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642135767</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80015803</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699653147</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1002540747</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 001f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in computer science and information technology</subfield><subfield code="b">AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings</subfield><subfield code="c">Tai-hoon Kim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 604 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6059</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Miyazaki</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, T'ae-hun</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)139711155</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">AST</subfield><subfield code="n">2</subfield><subfield code="d">2010</subfield><subfield code="c">Miyazaki</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16070212-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6059</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6059</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3476833&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020437315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020437315</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Miyazaki gnd-content |
genre_facet | Konferenzschrift 2010 Miyazaki |
id | DE-604.BV036515183 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:12:25Z |
institution | BVB |
institution_GND | (DE-588)16070212-4 |
isbn | 9783642135767 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020437315 |
oclc_num | 699653147 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 |
physical | XI, 604 S. Ill., graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings Tai-hoon Kim ... (eds.) Berlin [u.a.] Springer 2010 XI, 604 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6059 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Miyazaki gnd-content Informationstechnik (DE-588)4026926-7 s Informationssystem (DE-588)4072806-7 s Anwendungssystem (DE-588)4139375-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Biometrie (DE-588)4124925-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kim, T'ae-hun Sonstige (DE-588)139711155 oth AST 2 2010 Miyazaki Sonstige (DE-588)16070212-4 oth Lecture notes in computer science 6059 (DE-604)BV000000607 6059 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3476833&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020437315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Informationstechnik (DE-588)4026926-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anwendungssystem (DE-588)4139375-2 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Biometrie (DE-588)4124925-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4026926-7 (DE-588)4830502-9 (DE-588)4139375-2 (DE-588)4274324-2 (DE-588)4072806-7 (DE-588)4124925-2 (DE-588)1071861417 |
title | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings |
title_auth | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings |
title_exact_search | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings |
title_full | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings Tai-hoon Kim ... (eds.) |
title_fullStr | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings Tai-hoon Kim ... (eds.) |
title_full_unstemmed | Advances in computer science and information technology AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings Tai-hoon Kim ... (eds.) |
title_short | Advances in computer science and information technology |
title_sort | advances in computer science and information technology ast ucma isa acn 2010 conferences miyazaki japan june 23 25 2010 joint proceedings |
title_sub | AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23 - 25, 2010 ; joint proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Informationstechnik (DE-588)4026926-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anwendungssystem (DE-588)4139375-2 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Biometrie (DE-588)4124925-2 gnd |
topic_facet | Datensicherung Informationstechnik Kryptoanalyse Anwendungssystem Computersicherheit Informationssystem Biometrie Konferenzschrift 2010 Miyazaki |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3476833&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020437315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kimtaehun advancesincomputerscienceandinformationtechnologyastucmaisaacn2010conferencesmiyazakijapanjune23252010jointproceedings AT astmiyazaki advancesincomputerscienceandinformationtechnologyastucmaisaacn2010conferencesmiyazakijapanjune23252010jointproceedings |