| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465740903316 |
|
|
Titolo |
Computer Information Systems and Industrial Management [[electronic resource] ] : 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Proceedings / / edited by Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Sławomir Wierzchoń |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2012.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 444 p. 176 illus.) |
|
|
|
|
|
|
Collana |
|
Information Systems and Applications, incl. Internet/Web, and HCI ; ; 7564 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer communication systems |
Application software |
Artificial intelligence |
Software engineering |
Algorithms |
Information storage and retrieval |
Computer Communication Networks |
Information Systems Applications (incl. Internet) |
Artificial Intelligence |
Software Engineering |
Algorithm Analysis and Problem Complexity |
Information Storage and Retrieval |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Security, Access Control and Intrusion Detection -- Pattern Recognition and Image Processing -- Biometric Applications -- Algorithms and Data Management -- Networking -- System Models and Risk Assessment. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September |
|
|
|
|
|
|
|
|
|
|
2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection; pattern recognition and image processing; biometric applications; algorithms and data management; networking; and system models and risk assessment. |
|
|
|
|
|
| |