top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Computer Science and Information Technology [[electronic resource] ] : AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings / / edited by Tai-hoon Kim, Hojjat Adeli
Advances in Computer Science and Information Technology [[electronic resource] ] : AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings / / edited by Tai-hoon Kim, Hojjat Adeli
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 604 p. 261 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Computer programming
Application software
Information storage and retrieval
Artificial intelligence
Algorithms
Computer Communication Networks
Programming Techniques
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Artificial Intelligence
Algorithm Analysis and Problem Complexity
ISBN 1-280-38711-4
9786613565037
3-642-13577-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Security and Assurance -- Fuzzy Based Threat Analysis in Total Hospital Information System -- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model -- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition -- Information Systems Security Criticality and Assurance Evaluation -- Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’ -- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography -- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning -- Post-quantum Cryptography: Code-Based Signatures -- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol -- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems -- An Active Intrusion Detection System for LAN Specific Attacks -- Analysis on the Improved SVD-Based Watermarking Scheme -- Advanced Communication and Networking -- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes -- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks -- Grammar Encoding in DNA-Like Secret Sharing Infrastructure -- HATS: High Accuracy Timestamping System Based on NetFPGA -- A Roadside Unit Placement Scheme for Vehicular Telematics Networks -- Concurrent Covert Communication Channels -- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks -- High Performance MAC Architecture for 3GPP Modem -- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T -- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network -- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks -- An Optimum ICA Based Multiuser Data Separation for Short Message Service -- Advanced Computer Science and Information Technology -- Multiple Asynchronous Requests on a Client-Based Mashup Page -- Using an Integrated Ontology Database to Categorize Web Pages -- Topic Detection by Topic Model Induced Distance Using Biased Initiation -- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm -- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition -- Agent Based Approach to Regression Testing -- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem -- Development of a Digital Textbook Standard Format Based on XML -- A Pattern-Based Representation Approach for Online Discourses -- A Fault Tolerant Architecture for Transportation Information Services of E-Government -- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS -- Extract Semantic Information from WordNet to Improve Text Classification Performance -- Managing Ubiquitous Scientific Knowledge on Semantic Web -- A Semantic Pattern Approach to Managing Scientific Publications -- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults -- Markov Chain Monte Carlo Random Testing -- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics -- Ubiquitous Computing and Multimedia Applications -- An Effective Video Steganography Method for Biometric Identification -- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction -- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis -- Video Copy Detection: Sequence Matching Using Hypothesis Test -- An XML-Based Digital Textbook and Its Educational Effectiveness -- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition -- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network -- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming -- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech -- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture -- A Power Control Scheme for an Energy-Efficient MAC Protocol -- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Record Nr. UNISA-996465642503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in computer science and information technology : AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23-25, 2010 : joint proceedings / / Tai-hoon Kim, Hojjat Adeli (eds.)
Advances in computer science and information technology : AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23-25, 2010 : joint proceedings / / Tai-hoon Kim, Hojjat Adeli (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 604 p. 261 illus.)
Disciplina 004
Altri autori (Persone) KimTai-hoon
AdeliHojjat <1950->
Collana Lecture notes in computer science
LNCS sublibrary. SL 3, information systems and application, incl. Internet/Web and HCI
Soggetto topico Computer science
Information technology
ISBN 1-280-38711-4
9786613565037
3-642-13577-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Security and Assurance -- Fuzzy Based Threat Analysis in Total Hospital Information System -- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model -- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition -- Information Systems Security Criticality and Assurance Evaluation -- Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’ -- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography -- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning -- Post-quantum Cryptography: Code-Based Signatures -- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol -- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems -- An Active Intrusion Detection System for LAN Specific Attacks -- Analysis on the Improved SVD-Based Watermarking Scheme -- Advanced Communication and Networking -- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes -- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks -- Grammar Encoding in DNA-Like Secret Sharing Infrastructure -- HATS: High Accuracy Timestamping System Based on NetFPGA -- A Roadside Unit Placement Scheme for Vehicular Telematics Networks -- Concurrent Covert Communication Channels -- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks -- High Performance MAC Architecture for 3GPP Modem -- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T -- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network -- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks -- An Optimum ICA Based Multiuser Data Separation for Short Message Service -- Advanced Computer Science and Information Technology -- Multiple Asynchronous Requests on a Client-Based Mashup Page -- Using an Integrated Ontology Database to Categorize Web Pages -- Topic Detection by Topic Model Induced Distance Using Biased Initiation -- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm -- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition -- Agent Based Approach to Regression Testing -- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem -- Development of a Digital Textbook Standard Format Based on XML -- A Pattern-Based Representation Approach for Online Discourses -- A Fault Tolerant Architecture for Transportation Information Services of E-Government -- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS -- Extract Semantic Information from WordNet to Improve Text Classification Performance -- Managing Ubiquitous Scientific Knowledge on Semantic Web -- A Semantic Pattern Approach to Managing Scientific Publications -- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults -- Markov Chain Monte Carlo Random Testing -- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics -- Ubiquitous Computing and Multimedia Applications -- An Effective Video Steganography Method for Biometric Identification -- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction -- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis -- Video Copy Detection: Sequence Matching Using Hypothesis Test -- An XML-Based Digital Textbook and Its Educational Effectiveness -- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition -- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network -- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming -- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech -- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture -- A Power Control Scheme for an Energy-Efficient MAC Protocol -- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Record Nr. UNINA-9910484604103321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in information security and assurance : third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings / / Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo, editors
Advances in information security and assurance : third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings / / Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo, editors
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Descrizione fisica 1 online resource (XXXII, 841 p.)
Disciplina 004
Altri autori (Persone) AtiquzzamanMohammed
ChenHsiao-Hwa
KimTai-hoon
LeeChanghoon
YeoSang-Soo
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data protection
ISBN 1-280-38306-2
9786613560971
3-642-02617-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Algorithms -- Authentication and Identity Management -- Authorization and Access Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy -- Key Management and Recovery -- Mobile and RFID Network Security -- Firewall, IDS, Anti-virus, and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-terrorism -- Other Security Research -- MoWiN 2009 -- NASSUE 2009 -- IAWSN 2009 -- WNGS 2009 and CGMS 2009 -- SHCI-ISA 2009.
Record Nr. UNINA-9910484473603321
Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Generation Information Technology [[electronic resource] ] : 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings / / edited by Tai-hoon Kim, Young-hoon Lee, Wai-chi Fang
Future Generation Information Technology [[electronic resource] ] : 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings / / edited by Tai-hoon Kim, Young-hoon Lee, Wai-chi Fang
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 284 p. 141 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Computer communication systems
Software engineering
Information storage and retrieval
Artificial intelligence
Algorithms
Information Systems Applications (incl. Internet)
Computer Communication Networks
Software Engineering
Information Storage and Retrieval
Artificial Intelligence
Algorithm Analysis and Problem Complexity
ISBN 3-642-35585-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frequency Sharing Method for High Frequency Ocean Surface Radar Using Matched Filtering and Orthogonal Waveforms -- Vertical Handover Security in 4G Heterogeneous Networks: Threat Analysis and Open Challenges -- Three-Dimensional Stacked Memory System for Defect Tolerance -- VCPU Shaping for Supporting Latency Sensitive Workloads -- Architecture for Convergence Mobile Cooperation Service Using Components Integration.
Record Nr. UNISA-996465941403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Generation Information Technology [[electronic resource] ] : Third International Conference, FGIT 2011, Jeju Island, December 8-10, 2011. Proceedings / / edited by Tai-hoon Kim, Hojjat Adeli, Dominik Slezak, Frode Eika Sandnes, Xiaofeng Song, Kyo-il Chung, Kirk P. Arnett
Future Generation Information Technology [[electronic resource] ] : Third International Conference, FGIT 2011, Jeju Island, December 8-10, 2011. Proceedings / / edited by Tai-hoon Kim, Hojjat Adeli, Dominik Slezak, Frode Eika Sandnes, Xiaofeng Song, Kyo-il Chung, Kirk P. Arnett
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 424 p. 227 illus., 125 illus. in color.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Computer communication systems
Data mining
Database management
Software engineering
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computer Communication Networks
Data Mining and Knowledge Discovery
Database Management
Software Engineering
ISBN 3-642-27142-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465987603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Generation Information Technology : Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010 : proceedings / / Tai-hoon Kim ... [et al.] (eds.)
Future Generation Information Technology : Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010 : proceedings / / Tai-hoon Kim ... [et al.] (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2010
Descrizione fisica 1 online resource (XVI, 756 p. 414 illus.)
Disciplina 004.6
Altri autori (Persone) KimTai-hoon
Collana Lecture notes in computer science
Soggetto topico Information technology
Technology
ISBN 1-280-39066-2
9786613568588
3-642-17569-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote and Plenary Papers -- Wavelet-Chaos-Neural Network Models for EEG-Based Diagnosis of Neurological Disorders -- An Introduction to Perception Based Computing -- Social Networks: Research and Applications -- The Roadmap for Sharing Electronic Health Records: The Emerging Ubiquity and Cloud Computing Trends -- Compound Analytics of Compound Data within RDBMS Framework – Infobright’s Perspective -- From Grid Computing to Cloud Computing: Experiences on Virtualization Technology -- Data Analysis, Data Processing, Advanced Computation Models -- Recursive Queries Using Object Relational Mapping -- Agent Based Ontology Driven Virtual Meeting Assistant -- Topic Number Estimation by Consensus Soft Clustering with NMF -- Infrastructure Aided Privacy Preserving-Authentication in VANETs -- Computational Analysis of a Power Distribution System with Petri Nets -- Analysis of Effect of Different Factors on Burst Dropping Probability in Optical Burst Switching Network -- An Optimization of Fundamental Frequency and Length of Syllables for Rule-Based Speech Synthesis -- Grid Smoothing for Image Enhancement -- Suppressing False Nagatives in Skin Segmentation -- Steady State Analysis of an Energy Efficient Mobility Management Scheme in IP-Based Wireless Networks -- Performance Comparison of Handoff Modes in Terms of Energy -- Energy Efficient Coexistence of WiFi and WiMAX Systems Sharing Frequency Band -- IP Mobility Performance Enhancement Using Link-Layer Prediction -- Header Compression for Resource and Energy Efficient IP over Tactical Data Link -- A Frequency-Based Algorithm for Workflow Outlier Mining -- A Framework to Describe and Search for Virtual Resource Objects -- Developer Toolkit for Embedded Fuzzy System Based on E-Fuzz -- A Quadsection Algorithm for Grammar-Based Image Compression -- Effective Storage Structure for Multi-version XML Documents -- An Ontology-Based Platform for Scientific Writing and Publishing -- Multi-facade and Ubiquitous Web Navigation and Access through Embedded Semantics -- New Format and Framework for Managing Scientific Knowledge -- A General Bayesian Network-Assisted Ensemble System for Context Prediction: An Emphasis on Location Prediction -- Bayesian Network Approach to Predict Mobile Churn Motivations: Emphasis on General Bayesian Network, Markov Blanket, and What-If Simulation -- Logical Mechanism for Allocating Resources to Exploitation and Exploration to Achieve Ambidexterity: Team Level Analysis -- Analyzing Economic Impact of Disruptive Technology Using Multi-Agent Simulation: Smart Payment Case -- Research on Mobile Payment Technology and Business Models in China under e-Commerce Environment -- Fusion of Gaussian Mixture Densities for Face and Ear Biometrics Using Support Vector Machines -- Benchmarking Query Complexity between RDB and OWL -- FEDTIC: A Security Design for Embedded Systems with Insecure External Memory -- Security, Software Engineering, Communication and Networking -- Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation -- End-to-End Security Methods for UDT Data Transmissions -- Evading Virus Detection Using Code Obfuscation -- High Flexible Sanitizing Signature Scheme Based on Bilinear Maps -- An Access Control Framework of Federated IPTV Providers for Mobile IPTV Services -- A Novel Scheme for PMIPv6 Based Wireless Sensor Network -- Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model -- A Privacy Preserving Service Broker Architecture for Data Sharing -- Checking the Paths to Identify Mutant Application on Embedded Systems -- Enhanced Sinkhole System by Improving Post-processing Mechanism -- A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot Response -- Real Time Watermarking and Encryption Method for DMB Contents Protection -- A Study on Data Transmission Performance of Sensor Networks for Livestock Feedlot -- Development of an MPEG-4 Scene Converter for Rich Media Services in Mobile Environments -- Dynamic Profiling for Efficiency Searching System in Distributed Computing -- Evaluating the Intention to Use the Use Case Precedence Diagram in Software Development Projects -- A Simple Method Using Multi-Core and Multiple GbE Ports for Improving Parallel Performance in Commodity PC Cluster -- Proposal for Sophisticated Periodic Execution Control in Embedded Systems -- Videogames and Virtual Reality as Effective Edutainment Tools -- An SMS Spam Filtering System Using Support Vector Machine -- Telecommunications User Behaviors Analysis Based on Fuzzy C-Means Clustering -- Performance Evaluation of a Hybrid TOA/AOA Based IR-UWB Positioning System -- All-Optical RZ-to-NRZ Converted Data Transmission at 10 Gb/s -- Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets -- State of the Art in Wireless Sensor Networks Operating Systems: A Survey -- A Study on the Implementation of Pigpen Management System Using Wireless Sensor Networks -- A Study on Energy Efficient MAC Protocol of Wireless Sensor Network for Ubiquitous Agriculture -- Design and Implementation of Wireless Sensor Networks Based Paprika Green House System -- A Smart Service Model Using Smart Devices -- An Implementation of the Salt-Farm Monitoring System Using Wireless Sensor Network -- Mobile Business Agents Model and Architecture -- Implementation of Greenhouse Monitoring System Using Ubiquitous Sensor Networks Based on WMN -- A Study of the Energy Efficient MAC Protocol Apply to Ubiquitous Livestock Farming -- Design and Implementation of Middleware for GreenHouse Based on Ubiquitous Sensor Network -- A Context-Aware Streaming Agent Method for Optimal Seamless Service in a Vertical Handover Environment -- A Message Priority Routing Protocol for Delay Tolerant Networks (DTN) in Disaster Areas -- A Queue Management Algorithm for QoS Provisioning in WMSN -- Keynote and Plenary Papers (Continued) -- OLAP Data Cube Compression Techniques: A Ten-Year-Long History.
Altri titoli varianti FGIT 2010
Record Nr. UNINA-9910484801503321
Berlin ; ; New York, : Springer, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui