Applied computation and security systems: 2
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Delhi [u.a.]
Springer
2015
|
Schriftenreihe: | Advances in intelligent systems and computing
305 |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9788132219880 |
DOI: | 10.1007/978-81-322-1988-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 cc4500 | ||
---|---|---|---|
001 | BV042209140 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 141126s2015 |||| o||u| ||||||eng d | ||
020 | |a 9788132219880 |c Online |9 978-81-322-1988-0 | ||
024 | 7 | |a 10.1007/978-81-322-1988-0 |2 doi | |
035 | |a (OCoLC)900646574 | ||
035 | |a (DE-599)BVBBV042209140 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-Aug4 |a DE-1043 |a DE-1046 |a DE-859 |a DE-92 |a DE-898 |a DE-863 |a DE-862 |a DE-573 |a DE-B768 |a DE-861 |a DE-706 | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
245 | 1 | 0 | |a Applied computation and security systems |n 2 |c Rituparna Chaki ..., eds. |
264 | 1 | |a New Delhi [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in intelligent systems and computing |v 305 | |
490 | 0 | |a Advances in intelligent systems and computing |v ... | |
700 | 1 | |a Chaki, Rituparna |4 edt | |
773 | 0 | 8 | |w (DE-604)BV042209079 |g 2 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-81-322-1987-3 |
830 | 0 | |a Advances in intelligent systems and computing |v 305 |w (DE-604)BV040889154 |9 305 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-81-322-1988-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027647874 | ||
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1988-0 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 541359 |
---|---|
_version_ | 1806179182563033088 |
adam_text | APPLIED COMPUTATION AND SECURITY SYSTEMS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SOFTWARE ENGINEERING: NON-FUNCTIONAL PROPERTY AWARE BROKERAGE APPROACH
FOR CLOUD SERVICE DISCOVERY
A DWT BASED DIGITAL WATERMARKING SCHEME FOR IMAGE TAMPER DETECTION,
LOCALIZATION AND RESTORATION
SERVICE INSURANCE: A NEW APPROACH IN CLOUD BROKERAGE
USING SEMI-FORMAL AND FORMAL METHODS IN SOFTWARE DESIGN: AN INTEGRATED
APPROACH FOR INTELLIGENT LEARNING MANAGEMENT SYSTEM
A LIGHTWEIGHT IMPLEMENTATION OF OBSTRUCTION FREE SOFTWARE TRANSACTIONAL
MEMORY
CRYPTOGRAPHY: MULTIPLICATIVE POLYNOMIAL INVERSE OVER GF(7^3): CRISIS OF
EEA AND ITS SOLUTION
A NOVEL BIOMETRIC TEMPLATE ENCRYPTION SCHEME USING SUDOKU PUZZLE
COMPUTER AIDED DESIGN: AN ESOP BASED REVERSIBLE CIRCUIT SYNTHESIS FLOW
USING SIMULATED ANNEALING
AN EFFICIENT ALGORITHM FOR REDUCING WIRE LENGTH IN THREE-LAYER CHANNEL
ROUTING
A NEW MOVE TOWARDS PARALLEL ASSAY OPERATIONS IN A RESTRICTED SIZED CHIP
IN DIGITAL MICROFLUIDICS
A 2D GUARD ZONE COMPUTATION ALGORITHM FOR REASSIGNMENT OF SUBCIRCUITS TO
MINIMIZE THE OVERALL CHIP AREA
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
APPLIED COMPUTATION AND SECURITY SYSTEMS
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONTAINS THE EXTENDED VERSION OF THE WORKS THAT HAVE BEEN
PRESENTED AND DISCUSSED IN THE FIRST INTERNATIONAL DOCTORAL SYMPOSIUM ON
APPLIED COMPUTATION AND SECURITY SYSTEMS (ACSS 2014) HELD DURING APRIL
18-20, 2014 IN KOLKATA, INDIA. THE SYMPOSIUM HAS BEEN JOINTLY ORGANIZED
BY THE AGH UNIVERSITY OF SCIENCE & TECHNOLOGY, CRACOW, POLAND AND
UNIVERSITY OF CALCUTTA, INDIA. THE VOLUME I OF THIS DOUBLE-VOLUME BOOK
CONTAINS FOURTEEN HIGH QUALITY BOOK CHAPTERS IN THREE DIFFERENT
PARTS.PART 1IS ONPATTERN RECOGNITIONAND IT PRESENTS FOUR
CHAPTERS.PART 2IS ONIMAGING AND HEALTHCARE APPLICATIONSCONTAINS
FOUR MORE BOOK CHAPTERS. THEPART 3OF THIS VOLUME IS ONWIRELESS
SENSOR NETWORKINGAND IT INCLUDES AS MANY AS SIX CHAPTERS. VOLUME II OF
THE BOOK HAS THREEPARTS PRESENTING A TOTAL OF ELEVEN CHAPTERS IN
IT.PART 4 CONSISTS OF FIVE EXCELLENT CHAPTERS ONSOFTWARE
ENGINEERINGRANGING FROM CLOUD SERVICE DESIGN TO TRANSACTIONAL
MEMORY.PART 5IN VOLUME II IS ONCRYPTOGRAPHYWITH TWO BOOK
CHAPTERS IN IT.PART 6OF THIS VOLUME IS ONCOMPUTER AIDED
DESIGNWITH FOUR CHAPTERS IN IT. WE STRONGLY BELIEVE THAT THE TWENTY
FIVE CHAPTERS IN THESE TWO VOLUMES OF APPLIED COMPUTATION AND SECURITY
SYSTEMS WILL BE APPRECIATED BY ALL ITS READERS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chaki, Rituparna |
author2_role | edt |
author2_variant | r c rc |
author_facet | Chaki, Rituparna |
building | Verbundindex |
bvnumber | BV042209140 |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)900646574 (DE-599)BVBBV042209140 |
discipline | Informatik |
doi_str_mv | 10.1007/978-81-322-1988-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03089nmm a2200541 cc4500</leader><controlfield tag="001">BV042209140</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141126s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788132219880</subfield><subfield code="c">Online</subfield><subfield code="9">978-81-322-1988-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-81-322-1988-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900646574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042209140</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied computation and security systems</subfield><subfield code="n">2</subfield><subfield code="c">Rituparna Chaki ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">305</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">...</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Rituparna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV042209079</subfield><subfield code="g">2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-81-322-1987-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">305</subfield><subfield code="w">(DE-604)BV040889154</subfield><subfield code="9">305</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027647874</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1988-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042209140 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:04:56Z |
institution | BVB |
isbn | 9788132219880 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027647874 |
oclc_num | 900646574 |
open_access_boolean | |
owner | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
owner_facet | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Advances in intelligent systems and computing |
series2 | Advances in intelligent systems and computing |
spellingShingle | Applied computation and security systems Advances in intelligent systems and computing |
title | Applied computation and security systems |
title_auth | Applied computation and security systems |
title_exact_search | Applied computation and security systems |
title_full | Applied computation and security systems 2 Rituparna Chaki ..., eds. |
title_fullStr | Applied computation and security systems 2 Rituparna Chaki ..., eds. |
title_full_unstemmed | Applied computation and security systems 2 Rituparna Chaki ..., eds. |
title_short | Applied computation and security systems |
title_sort | applied computation and security systems |
url | https://doi.org/10.1007/978-81-322-1988-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647874&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042209079 (DE-604)BV040889154 |
work_keys_str_mv | AT chakirituparna appliedcomputationandsecuritysystems2 |