Computer information systems and industrial management: 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2020]
|
Schriftenreihe: | Lecture notes in computer science
12133 |
Schlagworte: | |
Beschreibung: | xxii, 486 Seiten Illustrationen, Diagramme |
ISBN: | 9783030476786 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV046752876 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 200608s2020 xx a||| |||| 10||| eng d | ||
020 | |a 9783030476786 |9 978-3-030-47678-6 | ||
035 | |a (OCoLC)1164654004 | ||
035 | |a (DE-599)BVBBV046752876 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 004 |2 23 | |
111 | 2 | |a CISIM |n 19. |d 2020 |c Białystok |j Verfasser |0 (DE-588)1211596893 |4 aut | |
245 | 1 | 0 | |a Computer information systems and industrial management |b 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |c Khalid Saeed, Jiří Dvorský (eds.) |
264 | 1 | |a Cham |b Springer |c [2020] | |
300 | |a xxii, 486 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 12133 | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Mathematics of Computing | |
650 | 4 | |a Software Engineering/Programming and Operating Systems | |
650 | 4 | |a Application software | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer science—Mathematics | |
650 | 4 | |a Software engineering | |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computermathematik |0 (DE-588)4788218-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2020 |z Białystok |2 gnd-content | |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 3 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 1 | 1 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 3 | 1 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 3 | 2 | |a Computermathematik |0 (DE-588)4788218-9 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
700 | 1 | |a Saeed, Khalid |0 (DE-588)1045773301 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-47679-3 |
830 | 0 | |a Lecture notes in computer science |v 12133 |w (DE-604)BV000000607 |9 12133 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032162561 |
Datensatz im Suchindex
_version_ | 1820875766353625088 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Saeed, Khalid |
author2_role | edt |
author2_variant | k s ks |
author_GND | (DE-588)1045773301 |
author_corporate | CISIM Białystok |
author_corporate_role | aut |
author_facet | Saeed, Khalid CISIM Białystok |
author_sort | CISIM Białystok |
building | Verbundindex |
bvnumber | BV046752876 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)1164654004 (DE-599)BVBBV046752876 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV046752876</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">200608s2020 xx a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030476786</subfield><subfield code="9">978-3-030-47678-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164654004</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046752876</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CISIM</subfield><subfield code="n">19.</subfield><subfield code="d">2020</subfield><subfield code="c">Białystok</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1211596893</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer information systems and industrial management</subfield><subfield code="b">19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings</subfield><subfield code="c">Khalid Saeed, Jiří Dvorský (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 486 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12133</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering/Programming and Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science—Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computermathematik</subfield><subfield code="0">(DE-588)4788218-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Białystok</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Computermathematik</subfield><subfield code="0">(DE-588)4788218-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Khalid</subfield><subfield code="0">(DE-588)1045773301</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-47679-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12133</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">12133</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032162561</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2020 Białystok gnd-content |
genre_facet | Konferenzschrift 2020 Białystok |
id | DE-604.BV046752876 |
illustrated | Illustrated |
index_date | 2024-07-03T14:42:30Z |
indexdate | 2025-01-10T15:20:51Z |
institution | BVB |
institution_GND | (DE-588)1211596893 |
isbn | 9783030476786 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032162561 |
oclc_num | 1164654004 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xxii, 486 Seiten Illustrationen, Diagramme |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | CISIM 19. 2020 Białystok Verfasser (DE-588)1211596893 aut Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings Khalid Saeed, Jiří Dvorský (eds.) Cham Springer [2020] xxii, 486 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 12133 Computer Applications Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Mathematics of Computing Software Engineering/Programming and Operating Systems Application software Artificial intelligence Computers Computer communication systems Computer science—Mathematics Software engineering Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf Computermathematik (DE-588)4788218-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Datenbanksystem (DE-588)4113276-2 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2020 Białystok gnd-content Zugriffskontrolle (DE-588)4293034-0 s Eindringerkennung (DE-588)4706627-1 s Trusted Computing (DE-588)7562931-8 s Netzwerktopologie (DE-588)4208537-8 s DE-604 Datenbanksystem (DE-588)4113276-2 s Anwendungssystem (DE-588)4139375-2 s Datensicherung (DE-588)4011144-1 s Biometrie (DE-588)4124925-2 s Künstliche Intelligenz (DE-588)4033447-8 s Anwendungssoftware (DE-588)4120906-0 s Computermathematik (DE-588)4788218-9 s 1\p DE-604 Saeed, Khalid (DE-588)1045773301 edt Erscheint auch als Online-Ausgabe 978-3-030-47679-3 Lecture notes in computer science 12133 (DE-604)BV000000607 12133 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings Lecture notes in computer science Computer Applications Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Mathematics of Computing Software Engineering/Programming and Operating Systems Application software Artificial intelligence Computers Computer communication systems Computer science—Mathematics Software engineering Netzwerktopologie (DE-588)4208537-8 gnd Anwendungssoftware (DE-588)4120906-0 gnd Computermathematik (DE-588)4788218-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Datenbanksystem (DE-588)4113276-2 gnd Biometrie (DE-588)4124925-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Anwendungssystem (DE-588)4139375-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4120906-0 (DE-588)4788218-9 (DE-588)4706627-1 (DE-588)4113276-2 (DE-588)4124925-2 (DE-588)4033447-8 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4139375-2 (DE-588)7562931-8 (DE-588)1071861417 |
title | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |
title_auth | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |
title_exact_search | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |
title_exact_search_txtP | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |
title_full | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings Khalid Saeed, Jiří Dvorský (eds.) |
title_fullStr | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings Khalid Saeed, Jiří Dvorský (eds.) |
title_full_unstemmed | Computer information systems and industrial management 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings Khalid Saeed, Jiří Dvorský (eds.) |
title_short | Computer information systems and industrial management |
title_sort | computer information systems and industrial management 19th international conference cisim 2020 bialystok poland october 16 18 2020 proceedings |
title_sub | 19th international conference, CISIM 2020, Bialystok, Poland, October 16-18, 2020 : proceedings |
topic | Computer Applications Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Mathematics of Computing Software Engineering/Programming and Operating Systems Application software Artificial intelligence Computers Computer communication systems Computer science—Mathematics Software engineering Netzwerktopologie (DE-588)4208537-8 gnd Anwendungssoftware (DE-588)4120906-0 gnd Computermathematik (DE-588)4788218-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Datenbanksystem (DE-588)4113276-2 gnd Biometrie (DE-588)4124925-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Anwendungssystem (DE-588)4139375-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computer Applications Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Mathematics of Computing Software Engineering/Programming and Operating Systems Application software Artificial intelligence Computers Computer communication systems Computer science—Mathematics Software engineering Netzwerktopologie Anwendungssoftware Computermathematik Eindringerkennung Datenbanksystem Biometrie Künstliche Intelligenz Datensicherung Zugriffskontrolle Anwendungssystem Trusted Computing Konferenzschrift 2020 Białystok |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT cisimbiałystok computerinformationsystemsandindustrialmanagement19thinternationalconferencecisim2020bialystokpolandoctober16182020proceedings AT saeedkhalid computerinformationsystemsandindustrialmanagement19thinternationalconferencecisim2020bialystokpolandoctober16182020proceedings |