Proceedings of the International Conference on IT Convergence and Security 2011:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Dordrecht
Springer Netherlands
2012
|
Schriftenreihe: | Lecture Notes in Electrical Engineering
120 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FHA01 FHI01 FHN01 FKE01 FWS01 FWS02 Volltext |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9789400729117 |
DOI: | 10.1007/978-94-007-2911-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040125589 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 120509s2012 |||| o||u| ||||||eng d | ||
020 | |a 9789400729117 |9 978-94-007-2911-7 | ||
024 | 7 | |a 10.1007/978-94-007-2911-7 |2 doi | |
035 | |a (OCoLC)863817074 | ||
035 | |a (DE-599)BVBBV040125589 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-862 |a DE-634 |a DE-Aug4 |a DE-92 |a DE-1043 |a DE-859 |a DE-573 | ||
245 | 1 | 0 | |a Proceedings of the International Conference on IT Convergence and Security 2011 |c edited by Kuinam J. Kim, Seong Jin Ahn |
264 | 1 | |a Dordrecht |b Springer Netherlands |c 2012 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Electrical Engineering |v 120 | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Engineering | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data mining | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Kim, Kuinam J. |e Sonstige |4 oth | |
700 | 1 | |a Ahn, Seong Jin |e Sonstige |4 oth | |
710 | 2 | |a SpringerLink (Online service) |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-94-007-2911-7 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-024982872 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-94-007-2911-7 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 436414 |
---|---|
_version_ | 1806178087855980544 |
any_adam_object | |
building | Verbundindex |
bvnumber | BV040125589 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)863817074 (DE-599)BVBBV040125589 |
doi_str_mv | 10.1007/978-94-007-2911-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02594nmm a2200601zc 4500</leader><controlfield tag="001">BV040125589</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">120509s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789400729117</subfield><subfield code="9">978-94-007-2911-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-94-007-2911-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)863817074</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040125589</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the International Conference on IT Convergence and Security 2011</subfield><subfield code="c">edited by Kuinam J. Kim, Seong Jin Ahn</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht</subfield><subfield code="b">Springer Netherlands</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Electrical Engineering</subfield><subfield code="v">120</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Kuinam J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahn, Seong Jin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">SpringerLink (Online service)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024982872</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-94-007-2911-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV040125589 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T11:47:33Z |
institution | BVB |
isbn | 9789400729117 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024982872 |
oclc_num | 863817074 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer Netherlands |
record_format | marc |
series2 | Lecture Notes in Electrical Engineering |
spellingShingle | Proceedings of the International Conference on IT Convergence and Security 2011 Ingenieurwissenschaften Künstliche Intelligenz Engineering Software engineering Data protection Data mining Artificial intelligence Telecommunication Communications Engineering, Networks Systems and Data Security Software Engineering Data Mining and Knowledge Discovery Artificial Intelligence (incl. Robotics) |
subject_GND | (DE-588)1071861417 |
title | Proceedings of the International Conference on IT Convergence and Security 2011 |
title_auth | Proceedings of the International Conference on IT Convergence and Security 2011 |
title_exact_search | Proceedings of the International Conference on IT Convergence and Security 2011 |
title_full | Proceedings of the International Conference on IT Convergence and Security 2011 edited by Kuinam J. Kim, Seong Jin Ahn |
title_fullStr | Proceedings of the International Conference on IT Convergence and Security 2011 edited by Kuinam J. Kim, Seong Jin Ahn |
title_full_unstemmed | Proceedings of the International Conference on IT Convergence and Security 2011 edited by Kuinam J. Kim, Seong Jin Ahn |
title_short | Proceedings of the International Conference on IT Convergence and Security 2011 |
title_sort | proceedings of the international conference on it convergence and security 2011 |
topic | Ingenieurwissenschaften Künstliche Intelligenz Engineering Software engineering Data protection Data mining Artificial intelligence Telecommunication Communications Engineering, Networks Systems and Data Security Software Engineering Data Mining and Knowledge Discovery Artificial Intelligence (incl. Robotics) |
topic_facet | Ingenieurwissenschaften Künstliche Intelligenz Engineering Software engineering Data protection Data mining Artificial intelligence Telecommunication Communications Engineering, Networks Systems and Data Security Software Engineering Data Mining and Knowledge Discovery Artificial Intelligence (incl. Robotics) Konferenzschrift |
url | https://doi.org/10.1007/978-94-007-2911-7 |
work_keys_str_mv | AT kimkuinamj proceedingsoftheinternationalconferenceonitconvergenceandsecurity2011 AT ahnseongjin proceedingsoftheinternationalconferenceonitconvergenceandsecurity2011 AT springerlinkonlineservice proceedingsoftheinternationalconferenceonitconvergenceandsecurity2011 |