Violence in Nigeria : Patterns and Trends / / by Patricia Taft, Nate Haken |
Autore | Taft Patricia |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (149 p.) |
Disciplina | 966.9/03 |
Collana | Terrorism, Security, and Computation |
Soggetto topico |
Computer security
Geographical information systems Application software Culture - Study and teaching Systems and Data Security Geographical Information Systems/Cartography Computer Appl. in Social and Behavioral Sciences Regional and Cultural Studies Information Systems Applications (incl. Internet) |
ISBN | 3-319-14935-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Niger Delta Overview -- North Central Overview -- Middle Belt Overview -- Northwest Overview -- Southwest Overview -- Conclusion. |
Record Nr. | UNINA-9910299244403321 |
Taft Patricia
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Virtualization Techniques for Mobile Systems / / by David Jaramillo, Borko Furht, Ankur Agarwal |
Autore | Jaramillo David |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (86 p.) |
Disciplina | 005.8 |
Collana | Multimedia Systems and Applications |
Soggetto topico |
Computer communication systems
Multimedia information systems Electrical engineering Computer security Computer Communication Networks Multimedia Information Systems Communications Engineering, Networks Systems and Data Security |
ISBN | 3-319-05741-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Mobile Virtualization Technologies -- Mobile Virtualization Comparative Analysis -- Mobile Virtualization Case Study -- Mobile Virtualization Reference Architecture -- Mobile Virtualization Container Performance Analysis -- Conclusion, Contributions and Future Work. |
Record Nr. | UNINA-9910298560803321 |
Jaramillo David
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications / / by Feng Liu, Wei Qi Yan |
Autore | Liu Feng |
Edizione | [2nd ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVI, 167 p. 65 illus., 14 illus. in color.) |
Disciplina | 005.82 |
Soggetto topico |
Optical data processing
Computer security Coding theory Information theory Image Processing and Computer Vision Systems and Data Security Coding and Information Theory |
ISBN | 3-319-23473-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Various Problems in Visual Cryptography -- Cheating Prevention of Visual Cryptography -- Various Visual Cryptography Schemes -- Various Color Schemes of Visual Cryptography -- Various Applications of Visual Cryptography. |
Record Nr. | UNINA-9910299201903321 |
Liu Feng
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications / / by Feng Liu, Wei Qi Yan |
Autore | Liu Feng |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (154 p.) |
Disciplina | 005.82 |
Soggetto topico |
Optical data processing
Computer security Coding theory Information theory Image Processing and Computer Vision Systems and Data Security Coding and Information Theory |
ISBN | 3-319-09644-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fundamental Theory of Visual Cryptography -- Various Problems in Visual Cryptography -- Various Visual Cryptography Schemes -- Various Color Schemes of Visual Cryptography -- Various Applications of Visual Cryptography. |
Record Nr. | UNINA-9910298989503321 |
Liu Feng
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
VLSI Design and Test [[electronic resource] ] : 23rd International Symposium, VDAT 2019, Indore, India, July 4–6, 2019, Revised Selected Papers / / edited by Anirban Sengupta, Sudeb Dasgupta, Virendra Singh, Rohit Sharma, Santosh Kumar Vishvakarma |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 775 p. 545 illus., 336 illus. in color.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer hardware
Computer organization Artificial intelligence Computer security Optical data processing Mathematical logic Computer Hardware Computer Systems Organization and Communication Networks Artificial Intelligence Systems and Data Security Image Processing and Computer Vision Mathematical Logic and Formal Languages |
ISBN | 981-329-767-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analog and Mixed Signal Design -- Computing Architecture and Security -- Hardware Design and Optimization -- Low Power VLSI and Memory Design. -Device Modelling -- Hardware Implementation. |
Record Nr. | UNINA-9910349286803321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
VLSI Design and Test for Systems Dependability [[electronic resource] /] / edited by Shojiro Asai |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Tokyo : , : Springer Japan : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 800 p. 585 illus., 352 illus. in color.) |
Disciplina | 621.3815 |
Soggetto topico |
Electronic circuits
Quality control Reliability Industrial safety Engineering design Computer security Circuits and Systems Electronic Circuits and Devices Quality Control, Reliability, Safety and Risk Engineering Design Systems and Data Security |
ISBN | 4-431-56594-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Challenges and Opportunities in VLSI for Systems Dependability -- Design and Development of Electronic Systems for Quality and Dependability -- Radiation-Induced Soft Errors -- Electromagnetic Noises -- Variations in Device Characteristics -- Time-Dependent Degradation in Device Characteristics -- Connectivity in Wireless Telecommunications -- Connectivity in Electronic Packaging -- Responsiveness for Hard Real Time Control -- The Role of Security LSI and the Example of Malicious Attacks -- Verification and Test Coverage -- Unknown Threats and Provisions -- Design Automation for Reliability -- Formal Verification and Debugging of VLSI Logic Design for Systems Dependability:Experiments and Evaluation -- Virtualization: System-Level Fault Simulation of SRAM Errors in Automotive Electronic Control Systems -- DART – A Concept of In-Field Testing for Enhancing System De-pendability -- Design of SRAM Resilient against Dynamic Voltage Variations -- Design and Applications of Dependable Non-Volatile Memory Systems -- Network-on-Chip Based Multiple-Core Centrized ECUs for Safety-Critical Automotive Applications -- An On-Chip Router Architecture for Dependable Multicore Processor -- Wireless Interconnect in Electronic Systems -- Wireless Power Delivery Resilient against Loading Variations -- Extended Dependable Air: Use of Satellites in Boosting Dependability of PublicWireless Communications -- Responsive Multithreaded Processor for Hard Real-Time Robotic Applications -- A Low-Latency DMR Architecture with Fast Checkpoint Recovery Scheme Using Simultaneously Copyable SRAM -- A 3D-VLSI Architecture for Future Automotive Visual Recognition -- Applications of Reconfigurable Processors as Embedded Automatons in the IoT Sensor Networks in Space -- An FPGA Implementation of Comprehensive Security Functions for Systems-Level Authentication -- SRAM-Based Physically Unclonable Functions (PUFs) to Generate Signature out of Silicon for Authentication and Encryption. |
Record Nr. | UNINA-9910337600903321 |
Tokyo : , : Springer Japan : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
VoIP and PBX Security and Forensics : A Practical Approach / / by Iosif I. Androulidakis |
Autore | Androulidakis Iosif I |
Edizione | [2nd ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (112 p.) |
Disciplina | 004.695 |
Collana | SpringerBriefs in Electrical and Computer Engineering |
Soggetto topico |
Electrical engineering
Computer security System safety Forensic science Communications Engineering, Networks Systems and Data Security Security Science and Technology Forensic Science |
ISBN | 3-319-29721-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Confidentiality, Integrity, and Availability Threats in PBXs -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusion. |
Record Nr. | UNINA-9910254251003321 |
Androulidakis Iosif I
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Watermarking Security [[electronic resource] /] / by Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon |
Autore | Bas Patrick |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 125 p. 70 illus., 29 illus. in color.) |
Disciplina | 005.82 |
Collana | SpringerBriefs in Signal Processing |
Soggetto topico |
Signal processing
Image processing Speech processing systems Computer security System safety Data encryption (Computer science) Signal, Image and Speech Processing Systems and Data Security Security Science and Technology Cryptology |
ISBN | 981-10-0506-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | General Introduction -- A quick tour of watermarking techniques -- Fundamentals -- Secure Design -- Attacks -- Conclusions and Open Problems. |
Record Nr. | UNINA-9910254240103321 |
Bas Patrick
![]() |
||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Web Information Systems and Mining [[electronic resource] ] : International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings / / edited by Wu Lee Wang, Jingsheng Lei, Gong Zhiguo, Xiangfeng Luo |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XVIII, 718 p. 271 illus.) |
Disciplina | 006.3/12 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Information storage and retrieval Data mining E-commerce Computer security Management information systems Computer science Information Systems Applications (incl. Internet) Information Storage and Retrieval Data Mining and Knowledge Discovery e-Commerce/e-business Systems and Data Security Management of Computing and Information Systems |
ISBN | 3-642-33469-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Study on the Design of Automatic Cotton Bale Inspecting Management System -- The Smallest Randi´c Index for Trees -- Design of Meridian and Acupoints Compatibility Analysis System -- Invariant Subspaces for Operators with Thick Spectra -- Voronoi Feature Selection Model Considering Variable-Scale Map’s Balance and Legibility -- A Code Dissemination Protocol of Low Energy Consumption -- Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise -- Port-Based Composable Modeling and Simulation for Safety Critical System Testbed -- Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment -- Learning Research in Knowledge Transfer -- A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System -- Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates -- A Blocked Statistics Method Based on Directional Derivative -- Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition -- Research on Internet Public Opinion Detection System Based on Domain Ontology -- A Security Analysis Model Based on Artificial Neural Network -- Social Network Analyses on Knowledge Diffusion of China’s Management Science -- A Parallel Association-Rule Mining Algorithm -- An Algorithm of Parallel Programming Design Based on Problem Domain Model -- Metadata-Aware Small Files Storage Architecture on Hadoop -- Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System -- On the Deployment of Wireless Sensor Networks with Regular Topology Patterns -- An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce -- Process Modeling and Reengineering in the Integration Stage of Electronic Government -- Development of Vertical Industrial B2B in China: Based on Cases Study -- Personalized Recommendation System on Massive Content Processing Using Improved MFNN -- A Speaker Recognition Based Approach for Identifying Voice Spammer -- Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE -- Information Encryption Based on Virtual Optical Imaging System and Chen’s Chaos -- A New Scheme with Secure Cookie against SSLStrip Attack -- ID-Based Signatures from Lattices in the Random Oracle Model -- Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability -- A New Public Key Signature Scheme Based on Multivariate Polynomials -- Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing -- Research on Security Management in Active Network Node Operating Systems -- An Integrity Verification Scheme for Multiple Replicas in Clouds -- Multi-stage Attack Detection Algorithm Based on Hidden Markov Model -- Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme -- Formal Construction of Secure Information Transmission in Office Automation System -- A Novel CBCD Scheme Based on Local Features Category -- Research and Improvement on Association Rule Algorithm Based on FP-Growth -- Encrypted Remote User Authentication Scheme by Using Smart Card -- A Web Visualization System of Cyberinfrastructure Resources -- A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks -- Design of Underground Miner Positioning System Based on ZigBee Technology -- Metadata Management of Context Resources in Context-Aware Middleware System -- Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition -- Study on the Scheme of Tianjin Area E-commerce Platform Construction -- Research on Chinese Hydrological Data Quality Management -- Using IoT Technologies to Resolve the Food Safety Problem – An Analysis Based on Chinese Food Standards -- Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together -- Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants -- Dimensional Modeling for Landslide Monitoring Data Warehouse -- A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency -- Service Lifecycle Management in Distributed JBI Environment -- Graded BDI Models for Agent Architectures Based on _Lukasiewicz Logic and Propositional Dynamic Logic -- Energy Model of SARA and Its Performance Analysis -- Data Profiling for Semantic Web Data -- Checking and Handling Inconsistency of DBpedia -- Conceptual Representing of Documents and Query Expansion Based on Ontology -- Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model -- Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease -- Fault Forecast of Electronic Equipment Based on ε – SVR -- Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP -- Using Similes to Extract Basic Sentiments across Languages -- Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis -- A Webpage Deletion Algorithm Based on Hierarchical Filtering -- Research in Keyword Extraction -- Tuple Refinement Method Based on Relationship Keyword Extension -- An Agent Based Intelligent Meta Search Engine -- A Novel Image Annotation Feedback Model Based on Internet-Search -- The Design and Application of an Ancient Porcelain Online Identification Analysis System -- Web Crawler in In-Site Search -- A Novel Shark-Search Algorithm for Theme Crawler -- A Framework of Online Proxy-Based Web Prefetching -- Mapping the Intellectual Structure by Co-word: A Case of International Management Science -- Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof -- Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining -- KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents -- Associating Labels and Elements of Deep Web Query Interface Based on DOM -- Design and Implementation of the Online Shopping System -- System Development of Residence Property Management Based on WEB -- An Intelligent Metadata Extraction Approach Based on Programming by Demonstration -- OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML -- Structural Similarity Evaluation of XML Documents Based on Basic Statistics -- An XML Data Query Method Based on Structure-Encoded. |
Record Nr. | UNISA-996465481603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Web Technologies and Applications [[electronic resource] ] : APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014, Proceedings / / edited by Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 404 p. 158 illus.) |
Disciplina | 004.678 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data mining
Information storage and retrieval Application software Computer security Computer communication systems Management information systems Computer science Data Mining and Knowledge Discovery Information Storage and Retrieval Information Systems Applications (incl. Internet) Systems and Data Security Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-319-11119-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | First International Workshop on Social Network Analysis, SNA 2014 -- First International Workshop on Network and Information Security, NIS 2014 -- First International Workshop on Internet of Things Search, IoTS 2014. |
Record Nr. | UNISA-996202529503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|