컨텐츠로 이동
Network computing and information security : second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012, proceedings 해당 항목을 미리보기
닫기해당 항목을 미리보기
확인중입니다…

Network computing and information security : second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012, proceedings

저자: Jingsheng Lei; et al
출판사: Berlin ; New York : Springer, ©2012.
시리즈: Communications in computer and information science, 345.
판/형식:   전자도서 : 문서 : 컨퍼런스 간행물 : 영어모든 판과 형식 보기
데이터베이스:WorldCat
요약:
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing;  더 읽기…
평가:

(아무런 평가가 없습니다.) 0 리뷰와 함께 - 첫번째로 올려주세요.

주제
다음과 같습니다:

 

온라인으로 문서 찾기

이 항목에 대한 링크

도서관에서 사본 찾기

&AllPage.SpinnerRetrieving; 해당항목을 보유하고 있는 도서관을 찾는 중

상세정보

장르/형태: Electronic books
Conference proceedings
Congresses
추가적인 물리적 형식: Print version:
Network computing and information security.
[S.l.] : Springer, 2012
(OCoLC)816512493
자료 유형: 컨퍼런스 간행물, 문서, 인터넷 자료
문서 형식: 인터넷 자원, 컴퓨터 파일
모든 저자 / 참여자: Jingsheng Lei; et al
ISBN: 9783642352119 3642352111
OCLC 번호: 822030012
메모: International conference proceedings.
설명: 1 online resource.
내용: Cloud Computing --
A Deep Understanding of Cloud Computing Security --
Study of Layers Construct for Data Mining Platform Based on Cloud Computing --
Cloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment --
Method of Construct High Performance StaaS Infrastructure Base on Dynamic Request Data Supporting Cloud Computing --
GIS Application Model Based on Cloud Computing --
Development Framework for Cloud Services --
Research on Distributed File System with Hadoop --
Requirement Uncertainty Analysis for Service-Oriented Self-Adaptation Software --
Cloud Computing --
Optimization of Green Passive Optical Networks with Minimum Cost --
Communication and Information Systems --
Based on Wavelet Packet Transform and Embedded Web Technology of Buried Water Remote Monitoring System Design and Implementation --
Primary Educational Resources Classification Study Based on Gagne Learning Classification Theory --
A Special Subject Database in CALIS Project: Database of Local Resources in the Northwestern Guangxi --
The Design and Implementation of Automatic Drug Matching System --
Design and Analysis of Cryptographic Algorithms --
Asymmetric Encryption Scheme Based on Fingerprint Topological Transformation --
A Kind of Digital Signature System Based on Linear Computing --
Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme --
Information Hiding and Watermarking --
Robust Software Watermarking Scheme Using RC4 and HASH --
A Novel Digital Watermarking Method Based on Lifting Wavelet Transform --
A New Practical Template Attack of AES --
Intelligent Networked Systems --
Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication --
A Relaxed Iterative Thresholding Reconstruction Algorithm Based on Compressed Sensing --
Multi-granule Association Rule Mining Based on Quantitative Concept Lattice --
Visual Scene Simulation to Civil Aviation Aircraft Approaching and Landing Using Dual Fuzzy Neural Network --
An Intelligent Knowledge Discovery Method Based on Genetic Algorithms and Conditional Probability --
Brushless DC Motor Speed Control System Based on Fuzzy PID Controller --
Learning Sequent Patterns Discovery Scheme on Line --
Extension Control and Its Application Research in Power System --
Modified Information Retrieval Model Based on Markov Network --
Intelligent Networked Systems --
Software Simulation of Lifts --
Analysis on Power Flow of Distribution Network with DGs --
Multimedia Computing and Intelligence --
Audio and Video Real Time Broadcast System Based on Android Platform --
Critical Chain Project Scheduling Problem Based on the Thermodynamic Particle Swarm Optimization Algorithm --
A Forgetting Scheme for Layered-Neurons Procedure --
Network and Wireless Network Security --
A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals --
A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold --
Exploratory Study on Campus Network Security Solutions --
Research and Improvement of Adjustment Algorithm of Matching Rules of Intrusion Detection --
Principal Component Analysis of Network Security Data Based on Projection Pursuit --
Multi-recipient Signcryption Algorithm for Communication of Mobile Ad Hoc Networks --
A Survey of Research on Smart Grid Security --
Network Communication --
Performance Analysis of the IEEE 802.16e Adaptive Cooperative ARQ Mechanism --
The Strategic Interaction Based on Public Goods Provision on Infinite Endogenous Plane Lattice --
Closed Circle DNA Model to QoS Routing for Ad Hoc Networks --
Research and Implementation of Embedded Remote Measurement and Control System Based on Industrial Ethernet --
Analysis of Time-Varying Characteristics of Internet End-to-End Network Delay --
The Research of Agile Web Development Process and Quality Model --
Study on Nonlinear Parametrically Excited Vibration in Automatic Gauge Control System of the Rolling Mill --
Study on Self-excited Vibration for Displacement Delayed Feedback System in the Rolling Mill Main Drive System --
Parallel and Distributed Systems --
Detection of Abnormal Nodes in Clustered Control Systems Based on Multiagent Group Prominence Analyses --
Heterogeneous Clustering Computing Based on Parallel Task Distribution --
Pedestrian Detection Based on Combining Classifier in Surveillance Video --
A New Electronic Image Stabilization Technology Based on Random Ferns for Fixed Scene --
A CPS Design Mode of Scheduling Management for Hydro-Junction Project --
Research on Framework of Information Security for Ship Electronic Information System --
The Analysis of Influencing Factors of College Students' Learning Effect in Face-to-Face, Online and Blended Learning --
DHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model --
Risk Assessment for Information Security Based on Fuzzy Membership Matrix --
No-Reference Image Quality Assessment Based on SVM for Video Conferencing System --
Research on Mining Association Rules in University Scientific Projects Management --
Public Key Encryption with Multi-keyword Search --
S&T Novelty Search and R&D of Removing Duplicate Software --
Optimization Model for Three-State Devices Networks Reliability and Its Particle Swarm Optimization Algorithm --
Application of the Webcam for High Voltage Transmission Towers Constructing and Building --
The Remote Video Monitoring System Design and Development for Underground Substation Construction Process --
Modelling Emotional Agents Based on Graded BDI Architectures --
Instrument System of Airport Fire Engine Simulator Based on Parallel Simulation Technology --
Material Database Design and Realization Based on the Metadata Management of Electric Power --
Security Modeling and Architectures --
A Strategy of Network Security Situation Autonomic Awareness --
Security Modeling and Architectures --
Stuxnet Vulnerabilities Analysis of SCADA Systems --
Probe into Digital Resources Service Model in Web3.0 --
The Periodicity of Nonlinear Pseudo Random Sequence Based on Latin Squares --
Security Research on the Interfaces of Information Appliances Described by XML --
Research on Flexible Trusted Terminal Model --
Secure Obfuscation of a Two-Step Oblivious Signature --
A Formal Description for Multi-owner Privacy --
Sensor Network --
A Novel Multi-channel MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks --
The Design of Wireless Medical Monitoring Network Based on ZigBee --
Design and Application of ZigBee Locating and Transparent Transmission Serial Port Module for Tele-health Monitoring --
Power Line Short Circuit Fault Orientation System Based on Wireless Sensor Network --
Signal and Information Processing --
Multidimensional LDPC for the Reconciliation of the Continuous Variables Quantum Key Distribution System --
A New Hybrid Semantic Similarity Measure Based on WordNet --
Research of Dynamic Axle Load Truck Scale Sampling Data Selection Method --
Virtualization Techniques and Applications --
A New Method of Smoothing of Boolean Operations of Surfaces --
Performance Evaluation of Virtualization Technologies for Windows Programs Running on Linux Operating System --
A Replica Management Strategy of Hybrid P2P Network for Massive Terrain Data --
Wireless Network --
The Application of LBS Based on Android --
Research on 3G Application with NFC --
Short-Term BF Research on TD-LTE System --
Wireless Network --
Building M-Learning System Based on Wireless Network in Colleges --
Mobility Support in OLSR Routing Protocol --
An Efficient and Rapid Address Assignment Algorithm for LR-WPAN Meshes --
A RF Repeater for Low Data Rate Communication. Applications of Cryptography --
Authentication and Non-repudiation --
Cloud Computing --
Communication and Information Systems --
Design and Analysis of Cryptographic Algorithms --
Information Hiding and Watermarking --
Intelligent Networked Systems --
Multimedia Computing and Intelligence --
Network and Wireless Network Security --
Network Communication --
Parallel and Distributed Systems --
Security Modeling and Architectures --
Sensor Network --
Signal and Information Processing --
Virtualization Techniques and Applications --
Wireless Network.
일련 제목: Communications in computer and information science, 345.
다른 제목 NCIS 2012
책임: Jingsheng Lei ... [et al.] (eds.).
더 많은 정보:

초록:

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

리뷰

사용자-기여 리뷰
GoodReads 리뷰 가져오는 중…
DOGObooks 리뷰를 가지고 오는 중…

태그

첫번째 되기
요청하신 것을 확인하기

이 항목을 이미 요청하셨을 수도 있습니다. 만약 이 요청을 계속해서 진행하시려면 Ok을 선택하세요.

링크된 데이터


<http://www.worldcat.org/oclc/822030012>
library:oclcnum"822030012"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/822030012>
rdf:typeschema:Book
schema:about
schema:about
<http://id.worldcat.org/fast/872484>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures."
schema:name"Computer security"
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network."
schema:description"Applications of Cryptography -- Authentication and Non-repudiation -- Cloud Computing -- Communication and Information Systems -- Design and Analysis of Cryptographic Algorithms -- Information Hiding and Watermarking -- Intelligent Networked Systems -- Multimedia Computing and Intelligence -- Network and Wireless Network Security -- Network Communication -- Parallel and Distributed Systems -- Security Modeling and Architectures -- Sensor Network -- Signal and Information Processing -- Virtualization Techniques and Applications -- Wireless Network."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1207077285>
schema:genre"Conference proceedings"
schema:genre"Conference proceedings."
schema:genre"Electronic books."
schema:inLanguage"en"
schema:name"Network computing and information security second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012, proceedings"
schema:name"NCIS 2012"
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-35211-9>
schema:workExample

Content-negotiable representations

윈도우 닫기

WorldCat에 로그인 하십시오 

계정이 없으세요? 아주 간단한 절차를 통하여 무료 계정을 만드실 수 있습니다.