Information and communication technology: Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8407 |
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 FHN01 FKE01 FRO01 TUM01 UBA01 UBG01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XXI, 699 S.) Ill., graph. Darst. |
ISBN: | 3642550312 9783642550324 |
DOI: | 10.1007/978-3-642-55032-4 |
Internformat
MARC
LEADER | 00000nmm a22000008cb4500 | ||
---|---|---|---|
001 | BV041913547 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 140612s2014 gw |||| o||u| ||||||eng d | ||
020 | |a 3642550312 |9 3-642-55031-2 | ||
020 | |a 9783642550324 |c eISBN |9 978-3-642-55032-4 | ||
024 | 7 | |a 10.1007/978-3-642-55032-4 |2 doi | |
024 | 3 | |a 9783642550317 | |
028 | 5 | 2 | |a Best.-Nr.: 86366700 |
035 | |a (OCoLC)875607667 | ||
035 | |a (DE-599)BVBBV041913547 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
082 | 0 | |a 004 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 001f |2 stub | ||
245 | 1 | 0 | |a Information and communication technology |b Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
263 | |a 201404 | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XXI, 699 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8407 | |
650 | 0 | 7 | |a E-Government |0 (DE-588)4728387-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Bali |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a E-Government |0 (DE-588)4728387-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 3 | 1 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 3 | 2 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 3 | 3 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 3 | 4 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
700 | 0 | |a Linawati |e Sonstige |4 oth | |
711 | 2 | |a ICT-EurAsia |n 2 |d 2014 |c Bali |j Sonstige |0 (DE-588)1050574087 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-55031-7 |
830 | 0 | |a Lecture notes in computer science |v 8407 |w (DE-604)BV014880109 |9 8407 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-55032-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027357206 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l TUM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-55032-4 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152278000599040 |
---|---|
adam_text | INFORMATION AND COMMUNICATION TECHNOLOGY
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
APPLIED MODELING AND SIMULATION
MOBILE COMPUTING
ADVANCED URBAN-SCALE ICT APPLICATIONS
SEMANTIC WEB AND KNOWLEDGE MANAGEMENT
CLOUD COMPUTING
IMAGE PROCESSING
SOFTWARE ENGINEERING
COLLABORATION TECHNOLOGIES AND SYSTEMS
E-LEARNING
DATA WAREHOUSING AND DATA MINING
E-GOVERNMENT AND E-HEALTH
BIOMETRIC AND BIOINFORMATICS SYSTEMS
NETWORK SECURITY
DEPENDABLE SYSTEMS AND APPLICATIONS
PRIVACY AND TRUST MANAGEMENT
CRYPTOGRAPHY
MULTIMEDIA SECURITY
DEPENDABLE SYSTEMS AND APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION AND COMMUNICATION TECHNOLOGY
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE SECOND IFIP TC 5/8
INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY,
ICT-EUR ASIA 2014, WITH THE COLLOCATION OF ASIA ARES 2014 AS A SPECIAL
TRACK ON AVAILABILITY, RELIABILITY AND SECURITY, HELD IN BALI,
INDONESIA, IN APRIL 2014. THE 70 REVISED FULL PAPERS PRESENTED WERE
CAREFULLY REVIEWED AND SELECTED FROM NUMEROUS SUBMISSIONS. THE PAPERS
HAVE BEEN ORGANIZED IN THE FOLLOWING TOPICAL SECTIONS: APPLIED MODELING
AND SIMULATION; MOBILE COMPUTING; ADVANCED URBAN-SCALE ICT APPLICATIONS;
SEMANTIC WEB AND KNOWLEDGE MANAGEMENT; CLOUD COMPUTING; IMAGE
PROCESSING; SOFTWARE ENGINEERING; COLLABORATION TECHNOLOGIES AND
SYSTEMS; E-LEARNING; DATA WAREHOUSING AND DATA MINING; E-GOVERNMENT AND
E-HEALTH; BIOMETRIC AND BIOINFORMATICS SYSTEMS; NETWORK SECURITY;
DEPENDABLE SYSTEMS AND APPLICATIONS; PRIVACY AND TRUST MANAGEMENT;
CRYPTOGRAPHY; MULTIMEDIA SECURITY AND DEPENDABLE SYSTEMS AND
APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041913547 |
classification_rvk | SS 4800 |
classification_tum | DAT 001f |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)875607667 (DE-599)BVBBV041913547 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-55032-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05112nmm a22009858cb4500</leader><controlfield tag="001">BV041913547</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140612s2014 gw |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642550312</subfield><subfield code="9">3-642-55031-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642550324</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-55032-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-55032-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642550317</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86366700</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)875607667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041913547</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 001f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communication technology</subfield><subfield code="b">Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">201404</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXI, 699 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8407</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">E-Government</subfield><subfield code="0">(DE-588)4728387-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Bali</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">E-Government</subfield><subfield code="0">(DE-588)4728387-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Linawati</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICT-EurAsia</subfield><subfield code="n">2</subfield><subfield code="d">2014</subfield><subfield code="c">Bali</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1050574087</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-55031-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8407</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8407</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027357206</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-55032-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Bali gnd-content |
genre_facet | Konferenzschrift 2014 Bali |
id | DE-604.BV041913547 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:08:10Z |
institution | BVB |
institution_GND | (DE-588)1050574087 |
isbn | 3642550312 9783642550324 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027357206 |
oclc_num | 875607667 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (XXI, 699 S.) Ill., graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings 201404 Berlin [u.a.] Springer 2014 1 Online-Ressource (XXI, 699 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8407 E-Government (DE-588)4728387-7 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Soft Computing (DE-588)4455833-8 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Bali gnd-content Rechnernetz (DE-588)4070085-9 s Zuverlässigkeit (DE-588)4059245-5 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s DE-604 Software Engineering (DE-588)4116521-4 s E-Government (DE-588)4728387-7 s Informationstechnik (DE-588)4026926-7 s Mobile Computing (DE-588)4694120-4 s Cloud Computing (DE-588)7623494-0 s Soft Computing (DE-588)4455833-8 s Anwendungssystem (DE-588)4139375-2 s 1\p DE-604 Linawati Sonstige oth ICT-EurAsia 2 2014 Bali Sonstige (DE-588)1050574087 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-55031-7 Lecture notes in computer science 8407 (DE-604)BV014880109 8407 https://doi.org/10.1007/978-3-642-55032-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings Lecture notes in computer science E-Government (DE-588)4728387-7 gnd Informationstechnik (DE-588)4026926-7 gnd Soft Computing (DE-588)4455833-8 gnd Cloud Computing (DE-588)7623494-0 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Rechnernetz (DE-588)4070085-9 gnd Mobile Computing (DE-588)4694120-4 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4728387-7 (DE-588)4026926-7 (DE-588)4455833-8 (DE-588)7623494-0 (DE-588)4116521-4 (DE-588)4139375-2 (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)4059245-5 (DE-588)4070085-9 (DE-588)4694120-4 (DE-588)4011144-1 (DE-588)1071861417 |
title | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_auth | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_exact_search | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_full | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_fullStr | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_full_unstemmed | Information and communication technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
title_short | Information and communication technology |
title_sort | information and communication technology second ifip tc 5 8 international conference ict eurasia 2014 bali indonesia april 14 17 2014 proceedings |
title_sub | Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14 - 17, 2014, Proceedings |
topic | E-Government (DE-588)4728387-7 gnd Informationstechnik (DE-588)4026926-7 gnd Soft Computing (DE-588)4455833-8 gnd Cloud Computing (DE-588)7623494-0 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Rechnernetz (DE-588)4070085-9 gnd Mobile Computing (DE-588)4694120-4 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | E-Government Informationstechnik Soft Computing Cloud Computing Software Engineering Anwendungssystem Kryptologie Computersicherheit Zuverlässigkeit Rechnernetz Mobile Computing Datensicherung Konferenzschrift 2014 Bali |
url | https://doi.org/10.1007/978-3-642-55032-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027357206&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT linawati informationandcommunicationtechnologysecondifiptc58internationalconferenceicteurasia2014baliindonesiaapril14172014proceedings AT icteurasiabali informationandcommunicationtechnologysecondifiptc58internationalconferenceicteurasia2014baliindonesiaapril14172014proceedings |