skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity Preview this item
ClosePreview this item
Checking...

Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity

Author: Marina L Gavrilova; C J Kenneth Tan; Alexei Sourin
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2017.
Series: Lecture notes in computer science, 10560.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Erscheint auch als:
Druck-Ausgabe
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Marina L Gavrilova; C J Kenneth Tan; Alexei Sourin
ISBN: 9783662560068 3662560062
OCLC Number: 1011368097
Description: 1 Online-Ressource (XIII, 111 Seiten 59 Illustrationen)
Series Title: Lecture notes in computer science, 10560.
Responsibility: edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin.

Abstract:

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This, the 30th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, held in Chongqing, China, in September 2016. The first paper is a position paper giving an outline of current research at the intersection of cybersecurity and cyberworlds, and specifically focusing on mining behavioral data from online social networks. The remaining 5 papers focus on a range of topics, including privacy assurance in online location services, human gait recognition using KINECT sensors, hand-gesture recognition for computer games, scene matching between the source image and the target image for virtual reality applications, and human identification using brain waves.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1011368097<\/a>> # Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1011368097<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/user_interfaces_and_human_computer_interaction<\/a>> ; # User Interfaces and Human Computer Interaction<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computers_and_society<\/a>> ; # Computers and Society<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometrics<\/a>> ; # Biometrics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computers_and_civilization<\/a>> ; # Computers and civilization<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometry<\/a>> ; # Biometry<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_science<\/a>> ; # Computer science<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/image_processing<\/a>> ; # Image processing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/user_interfaces_computer_systems<\/a>> ; # User interfaces (Computer systems)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometrics_biology<\/a>> ; # Biometrics (Biology)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_graphics<\/a>> ; # Computer graphics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/systems_and_data_security<\/a>> ; # Systems and Data Security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/image_processing_and_computer_vision<\/a>> ; # Image Processing and Computer Vision<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/tan_c_j_kenneth<\/a>> ; # C. J. Kenneth Tan<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/l_gavrilova_marina<\/a>> ; # Marina L. Gavrilova<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/sourin_alexei<\/a>> ; # Alexei Sourin<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This, the 30th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, held in Chongqing, China, in September 2016. The first paper is a position paper giving an outline of current research at the intersection of cybersecurity and cyberworlds, and specifically focusing on mining behavioral data from online social networks. The remaining 5 papers focus on a range of topics, including privacy assurance in online location services, human gait recognition using KINECT sensors, hand-gesture recognition for computer games, scene matching between the source image and the target image for virtual reality applications, and human identification using brain waves.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4586809791<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Series\/lecture_notes_in_computer_science<\/a>> ; # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/4586809791#CreativeWork\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1011368097<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1011368097#PublicationEvent\/2017<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/swbplus.bsz-bw.de\/bsz495032654cov.htm<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-662-56006-8<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783662560068<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-662-56006-8<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1011368097<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1007\/978-3-662-56006-8<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/l_gavrilova_marina<\/a>> # Marina L. Gavrilova<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"L. Gavrilova<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Marina<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Marina L. Gavrilova<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/sourin_alexei<\/a>> # Alexei Sourin<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Sourin<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Alexei<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Alexei Sourin<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Person\/tan_c_j_kenneth<\/a>> # C. J. Kenneth Tan<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Tan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"C. J. Kenneth<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"C. J. Kenneth Tan<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Series\/lecture_notes_in_computer_science<\/a>> # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1011368097<\/a>> ; # Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture notes in computer science ;<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture Notes in Computer Science ;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometrics<\/a>> # Biometrics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Biometrics<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometrics_biology<\/a>> # Biometrics (Biology)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Biometrics (Biology)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/biometry<\/a>> # Biometry<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Biometry<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_graphics<\/a>> # Computer graphics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer graphics<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer Graphics<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_science<\/a>> # Computer science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer science<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer Science<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computers_and_civilization<\/a>> # Computers and civilization<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computers and civilization<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/computers_and_society<\/a>> # Computers and Society<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computers and Society<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/image_processing<\/a>> # Image processing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Image processing<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/image_processing_and_computer_vision<\/a>> # Image Processing and Computer Vision<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Image Processing and Computer Vision<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/systems_and_data_security<\/a>> # Systems and Data Security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Systems and Data Security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/user_interfaces_and_human_computer_interaction<\/a>> # User Interfaces and Human Computer Interaction<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"User Interfaces and Human Computer Interaction<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4586809791#Topic\/user_interfaces_computer_systems<\/a>> # User interfaces (Computer systems)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"User interfaces (Computer systems)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/4586809791#CreativeWork\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Erscheint auch als:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1011368097<\/a>> ; # Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783662560068<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3662560062<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783662560068<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1011368097<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1011368097<\/a>> ; # Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-07-04<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n