A Lignano per studiare Pirandello : Convegno di studi, Lignano 28-29 settembre 2011 / / a cura di Vincenzo Orioles [[electronic resource]]
| A Lignano per studiare Pirandello : Convegno di studi, Lignano 28-29 settembre 2011 / / a cura di Vincenzo Orioles [[electronic resource]] |
| Pubbl/distr/stampa | [Place of publication not identified], : Metauro, 2013 |
| Descrizione fisica | 1 online resource (221 pages ) : color illustrations ; |
| Collana | Studi |
| Soggetto topico |
Romance Literatures
Languages & Literatures Italian Literature |
| Soggetto genere / forma |
Conference proceedings.
Criticism, interpretation, etc. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ita |
| Altri titoli varianti | A Lignano per studiare Pirandello |
| Record Nr. | UNINA-9910141696403321 |
| [Place of publication not identified], : Metauro, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad-hoc, mobile, and wireless networks [[electronic resource] ] : 12th International Conference, ADHOC-NOW 2013, Wroclaw, Poland, July 8-10, 2013Proceedings / / edited by Jacek Cichon, Maciej Gebala, Marek Klonowski
| Ad-hoc, mobile, and wireless networks [[electronic resource] ] : 12th International Conference, ADHOC-NOW 2013, Wroclaw, Poland, July 8-10, 2013Proceedings / / edited by Jacek Cichon, Maciej Gebala, Marek Klonowski |
| Pubbl/distr/stampa | Berlin, : Springer, 2013 |
| Descrizione fisica | xiv, 329p. ; : ill |
| Disciplina | 384.5/34 |
| Altri autori (Persone) |
CichonJacek
GebalaMaciej KlonowskiMarek |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer communication systems
Application software Electrical engineering Management information systems Computer science Software engineering Information storage and retrieval |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-39247-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465422203316 |
| Berlin, : Springer, 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 14th International Conference, ACIVS 2012, Brno, Czech Republic, September 4-7, 2012, Proceedings / / edited by Jaques Blanc-Talon, Wilfried Philips, Dan Popescu, Paul Scheunders, Pavel Zemcik
| Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 14th International Conference, ACIVS 2012, Brno, Czech Republic, September 4-7, 2012, Proceedings / / edited by Jaques Blanc-Talon, Wilfried Philips, Dan Popescu, Paul Scheunders, Pavel Zemcik |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XVI, 540 p. 253 illus.) |
| Disciplina | 006.3/7 |
| Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
| Soggetto topico |
Optical data processing
Artificial intelligence Pattern recognition Computer graphics Computer communication systems Algorithms Image Processing and Computer Vision Artificial Intelligence Pattern Recognition Computer Graphics Computer Communication Networks Algorithm Analysis and Problem Complexity |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-33140-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465584503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advanced nanomaterials and nanotechnology : proceedings of the 2nd International Conference on Advanced Nanomaterials and Nanotechnology, Dec 8-10, 2011, Guwahati, India / / P.K. Giri, D.K. Goswami, A. Perumal, editors
| Advanced nanomaterials and nanotechnology : proceedings of the 2nd International Conference on Advanced Nanomaterials and Nanotechnology, Dec 8-10, 2011, Guwahati, India / / P.K. Giri, D.K. Goswami, A. Perumal, editors |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Heidelberg [Germany] : , : Springer, , 2013 |
| Descrizione fisica | 1 online resource (xi, 608 pages) : illustrations (some color) |
| Disciplina | 620.5 |
| Collana | Springer Proceedings in Physics |
| Soggetto topico |
Nanotechnology
Nanostructured materials |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-34216-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Synthesis And Self Assembly Of Nanomaterials -- Nanoscale Characterisation -- Nanophotonics & Nanoelectronics -- Nanobiotechnology -- Nanocomposites -- Nanomagnetism -- Nanomaterials For Energy -- Computational Nanotechnology -- Commercialization Of Nanotechnology. |
| Record Nr. | UNINA-9910437975103321 |
| Heidelberg [Germany] : , : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Artificial Intelligence - SBIA 2012 [[electronic resource] ] : 21st Brazilian Symposium on Artificial Intelligence, Curitiba, Brazil, October 20-25, 2012, Proceedings / / edited by Leliane N. Barros, Marcelo Finger, Aurora T.R. Pozo, Gustavo Alberto Giménez Lugo, Marcos Castilho
| Advances in Artificial Intelligence - SBIA 2012 [[electronic resource] ] : 21st Brazilian Symposium on Artificial Intelligence, Curitiba, Brazil, October 20-25, 2012, Proceedings / / edited by Leliane N. Barros, Marcelo Finger, Aurora T.R. Pozo, Gustavo Alberto Giménez Lugo, Marcos Castilho |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XVI, 233 p. 77 illus.) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Artificial Intelligence |
| Soggetto topico |
Artificial intelligence
Application software Information storage and retrieval Database management Computer communication systems Data mining Artificial Intelligence Information Systems Applications (incl. Internet) Information Storage and Retrieval Database Management Computer Communication Networks Data Mining and Knowledge Discovery |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-34459-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | knowledge representation -- machine learning -- machine learning and computer vision -- agent-based and multi-agent systems -- robotics and language.- constraints. |
| Record Nr. | UNISA-996465274503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Artificial Intelligence -- IBERAMIA 2012 [[electronic resource] ] : 13th Ibero-American Conference on AI, Cartagena de Indias, Colombia, November 13-16, 2012, Proceedings / / edited by Juan Pavón, Néstor D. Duque-Méndez, Rubén Fuentes Fernández
| Advances in Artificial Intelligence -- IBERAMIA 2012 [[electronic resource] ] : 13th Ibero-American Conference on AI, Cartagena de Indias, Colombia, November 13-16, 2012, Proceedings / / edited by Juan Pavón, Néstor D. Duque-Méndez, Rubén Fuentes Fernández |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XXVI, 745 p. 240 illus.) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Artificial Intelligence |
| Soggetto topico |
Artificial intelligence
Natural language processing (Computer science) Computer simulation Application software Pattern recognition Computers Artificial Intelligence Natural Language Processing (NLP) Simulation and Modeling Information Systems Applications (incl. Internet) Pattern Recognition Computation by Abstract Devices |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-34654-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Knowledge Representation and Reasoning -- Information and Knowledge Processing -- Knowledge Discovery and Data Mining -- Machine Learning -- Bio-inspired Computing -- Fuzzy Systems -- Modelling and Simulation -- Ambient Intelligence -- Multi-Agent Systems -- Human-Computer Interaction -- Natural Language Processing -- Computer Vision & Robotics -- Planning and Scheduling -- AI in Education -- Knowledge Engineering and Applications. |
| Record Nr. | UNISA-996466311103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Cryptology -- ASIACRYPT 2012 [[electronic resource] ] : 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings / / edited by Xiaoyun Wang, Kazue Sako
| Advances in Cryptology -- ASIACRYPT 2012 [[electronic resource] ] : 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings / / edited by Xiaoyun Wang, Kazue Sako |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XVI, 780 p. 64 illus.) |
| Disciplina | 005.8/2 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Algorithms Management information systems Computer science Computer science—Mathematics Computer security Applied mathematics Engineering mathematics Cryptology Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Discrete Mathematics in Computer Science Systems and Data Security Applications of Mathematics |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-34961-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Pairing-Based Cryptography -- Past, Present, and Future -- Some Mathematical Mysteries in Lattices -- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions -- Dual Form Signatures: An Approach for Proving Security from Static Assumptions -- Breaking Pairing-Based Cryptosystems Using ηT Pairing over GF(397) -- On the (Im)possibility of Projecting Property in Prime-Order Setting -- Optimal Reductions of Some Decisional Problems to the Rank Problem -- Signature Schemes Secure against Hard-to-Invert Leakage -- Completeness for Symmetric Two-Party Functionalities - Revisited -- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing -- The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions -- Symmetric Cipher Perfect Algebraic Immune Functions -- Differential Analysis of the LED Block Cipher -- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract -- Analysis of Differential Attacks in ARX Constructions -- Integral and Multidimensional Linear Distinguishers with Correlation Zero -- Differential Attacks against Stream Cipher ZUC -- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher -- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound -- Understanding Adaptivity: Random Systems Revisited -- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures -- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption -- Computing on Authenticated Data: New Privacy Definitions and Constructions -- A Coding-Theoretic Approach to Recovering Noisy RSA Keys -- Certifying RSA -- Lattice-Based Cryptography and Number Theory Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic -- Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures -- On Polynomial Systems Arising from a Weil Descent -- ECM at Work -- IND-CCA Secure Cryptography Based on a Variant of the LPN Problem -- Provable Security of the Knudsen-Preneel Compression Functions -- Optimal Collision Security in Double Block Length Hashing with Single Length Key -- Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings -- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks -- Generic Related-Key Attacks for HMAC -- The Five-Card Trick Can Be Done with Four Cards -- A Mix-Net from Any CCA2 Secure Cryptosystem -- How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios -- Sequential Aggregate Signatureswith Lazy Verification from Trapdoor Permutations (Extended Abstract) -- Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise -- Calling Out Cheaters: Covert Security with Public Verifiability -- A Unified Framework for UC from Only OT -- Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication -- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note -- Theory and Practice of a Leakage Resilient Masking Scheme. |
| Record Nr. | UNISA-996466297403316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Cryptology -- CRYPTO 2012 [[electronic resource] ] : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings / / edited by Reihaneh Safavi-Naini, Ran Canetti
| Advances in Cryptology -- CRYPTO 2012 [[electronic resource] ] : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings / / edited by Reihaneh Safavi-Naini, Ran Canetti |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XV, 888 p. 103 illus.) |
| Disciplina | 005.8/2 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computer communication systems Computer security Computers and civilization Computer science—Mathematics Cryptology Management of Computing and Information Systems Computer Communication Networks Systems and Data Security Computers and Society Discrete Mathematics in Computer Science |
| Soggetto genere / forma | Conference proceedings. |
| ISBN | 3-642-32009-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric Cryptosystems -- An Enciphering Scheme Based on a Card Shuffle.- Tweakable Blockciphers with Beyond Birthday-Bound Security.- Breaking and Repairing GCM Security Proofs.- On the Distribution of Linear Biases: Three Instructive Examples.- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.- Invited Talk -- The End of Crypto.- Secure Computation I.- Adaptively Secure Multi-Party Computation with Dishonest Majority.- Collusion-Preserving Computation.- Secret Sharing Schemes for Very Dense Graphs.- Attribute-Based and Functional Encryption -- Functional Encryption with Bounded Collusions via Multi-party Computation.- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption -- Functional Encryption for Regular Languages.- Proof Systems.- Database Commitments and Universal Arguments of Quasi Knowledge.- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.- Protocols -- On the Security of TLS-DHE in the Standard Model.- Semantic Security for the Wiretap Channel.- Multi-instance Security and Its Application to Password-Based Cryptography.- Hash Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.- Hash or Not to Hash Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1.- Stam’s Conjecture and Threshold Phenomena in Collision Resistance.- Composable Security -- Universal Composability from Essentially Any Trusted Setup.- Impossibility Results for Static Input Secure Computation.- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.- Black-Box Constructions of Composable Protocols without Set-Up.- Privacy -- Crowd-Blending Privacy.- Differential Privacy with Imperfect Randomness.- Leakage and Side-Channels -- Tamper and Leakage Resilience in the Split-State Model.- Securing Circuits against Constant-Rate Tampering.- How to Compute under AC0 Leakage without Secure Hardware.- Invited Talk -- Recent Advances and Existing Research Questions in Platform Security.- Signatures -- Group Signatures with Almost-for-Free Revocation.- Tightly Secure Signatures and Public-Key Encryption.- Implementation Analysis -- Efficient Padding Oracle Attacks on Cryptographic Hardware.- Public Keys.- Secure Computation II -- Multiparty Computation from Somewhat Homomorphic Encryption -- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority -- A New Approach to Practical Active-Secure Two-Party Computation -- Black-Box Separation -- The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitive -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems -- Resistance against Iterated Attacks by Decorrelation Revisited -- Quantum Cryptography -- Secure Identity-Based Encryption in the Quantum Random Oracle Model -- Quantum to Classical Randomness Extractors -- Actively Secure Two-Party Evaluation of Any Quantum Operation -- Key Encapsulation and One-Way functions -- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups -- Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves -- Homomorphic Evaluation of the AES Circuit -- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. An Enciphering Scheme Based on a Card Shuffle.- Tweakable Blockciphers with Beyond Birthday-Bound Security.- Breaking and Repairing GCM Security Proofs.- On the Distribution of Linear Biases: Three Instructive Examples.- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs.- Invited Talk -- The End of Crypto.- Secure Computation I.- Adaptively Secure Multi-Party Computation with Dishonest Majority.- Collusion-Preserving Computation.- Secret Sharing Schemes for Very Dense Graphs.- Attribute-Based and Functional Encryption -- Functional Encryption with Bounded Collusions via Multi-party Computation.- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption -- Functional Encryption for Regular Languages.- Proof Systems.- Database Commitments and Universal Arguments of Quasi Knowledge.- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.- Protocols -- On the Security of TLS-DHE in the Standard Model.- Semantic Security for the Wiretap Channel.- Multi-instance Security and Its Application to Password-Based Cryptography.- Hash Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.- Hash or Not to Hash Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1.- Stam’s Conjecture and Threshold Phenomena in Collision Resistance.- Composable Security -- Universal Composability from Essentially Any Trusted Setup.- Impossibility Results for Static Input Secure Computation.- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.- Black-Box Constructions of Composable Protocols without Set-Up.- Privacy -- Crowd-Blending Privacy.- Differential Privacy with Imperfect Randomness.- Leakage and Side-Channels -- Tamper and Leakage Resilience in the Split-State Model.- Securing Circuits against Constant-Rate Tampering.- How to Compute under AC0 Leakage without Secure Hardware.- Invited Talk -- Recent Advances and Existing Research Questions in Platform Security.- Signatures -- Group Signatures with Almost-for-Free Revocation.- Tightly Secure Signatures and Public-Key Encryption.- Implementation Analysis -- Efficient Padding Oracle Attacks on Cryptographic Hardware.- Public Keys.- Secure Computation II -- Multiparty Computation from Somewhat Homomorphic Encryption -- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority -- A New Approach to Practical Active-Secure Two-Party Computation -- Black-Box Separation -- The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitive -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems -- Resistance against Iterated Attacks by Decorrelation Revisited -- Quantum Cryptography -- Secure Identity-Based Encryption in the Quantum Random Oracle Model -- Quantum to Classical Randomness Extractors -- Actively Secure Two-Party Evaluation of Any Quantum Operation -- Key Encapsulation and One-Way functions -- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups -- Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves -- Homomorphic Evaluation of the AES Circuit -- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. |
| Record Nr. | UNISA-996465545803316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances on Data Mining: Applications and Theoretical Aspects [[electronic resource] ] : 11th Industrial Conference, ICDM 2011, New York, NY, USA, August 30 – September 3, 2011, Proceedings / / edited by Petra PErner
| Advances on Data Mining: Applications and Theoretical Aspects [[electronic resource] ] : 11th Industrial Conference, ICDM 2011, New York, NY, USA, August 30 – September 3, 2011, Proceedings / / edited by Petra PErner |
| Edizione | [1st ed. 2011.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
| Descrizione fisica | 1 online resource (XI, 329 p.) |
| Disciplina | 006.3/12 |
| Collana | Lecture Notes in Artificial Intelligence |
| Soggetto topico |
Data mining
Multimedia information systems Optical data processing Application software Database management Artificial intelligence Data Mining and Knowledge Discovery Multimedia Information Systems Image Processing and Computer Vision Information Systems Applications (incl. Internet) Database Management Artificial Intelligence |
| Soggetto genere / forma |
Kongress2011.New York (NY)
Conference proceedings. |
| Soggetto non controllato | ICDM |
| ISBN | 3-642-23184-5 |
| Classificazione |
DAT 703f
DAT 708f DAT 825f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Improvements over adaptive local hyperplane to achieve better classification / Hongmin Cai -- Prognostic models based on linear separability / Leon Bobrowski -- One class classification for anomaly detection : support vector data description revisited / Eric J. Pauwels and Onkar Ambekar -- How to interpret decision trees? / Petra Perner -- Comparing classifiers and metaclassifiers / Elio Lozano and Edgar Acuña -- Fast data acquisition in cost-sensitive learning / Victor S. Sheng -- Applications of a unified medical data miner (UMDM) for prediction, classification, interpretation and visualization on medical datasets : the diabetes dataset case / Nawaz Mohamudally and Dost Muhammad Khan -- Melanoma diagnosis and classification web center system : the non-invasive diagnosis support subsystem / Wiesław Paja and Mariusz Wrzesień -- Characterizing cell types through differentially expressed gene clusters using a model-based approach / Juliane Perner and Elena Zotenko -- Experiments with hybridization and optimization of the rules knowledge base for classification of MMPI profiles / Jerzy Gomuła ... (et al.) -- Unsupervised classification of hyperspectral images on spherical manifolds / Dalton Lunga and Okan Ersoy -- Recognition of porosity in wood microscopic anatomical images / Shen Pan and Mineichi Kudo -- Exploratory hierarchical clustering for management zone delineation in precision agriculture / Georg Russ and Rudolf Kruse -- High classification rates for continuous cow activity recognition using low-cast GPS positioning sensors and standard machine learning techniques / Torben Godsk and Mikkel Baun Kjaergaard -- Mining pixel evolutions in satellite image time series for agricultural monitoring / Andreea Julea ... (et al.) -- Robust, non-redundant feature selection for yield analysis in semiconductor manufacturing / Eric St. Pierre and Eugen Tuv -- Integrated use of ICA and ANN to recognize the mixture control chart patterns in a process / Yuehjen E. Shao, Yini Lin, and Ya-Chi Chan -- Optimized fuzzy decision tree data mining for engineering applications / Liam Evans and Niels Lohse -- Graph-based data warehousing using the core-facets model / Dung N. Lam, Alexander Y. Liu, and Cheryl E. Martin -- General sales forecast models for automobile markets based on time series analysis and data mining techniques / Marco Hülsmann ... (et al.) -- Towards a spatial instance learning method for deep web pages / Ermelinda Oro and Massimo Ruffolo -- Applying user signatures on fraud detection in telecommunications networks / João Lopes, Orlando Belo, and Carlos Vieira -- Methods in case-based classification in bioinformatics : lessons learned / Isabelle Bichindaritz -- Prediction of batch-end quality for an industrial polymerization process / Geert Gins ... (et al.). |
| Record Nr. | UNISA-996465567803316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Aging : its challenge to the individual and to society : [papers] / / edited by William C. Bier [[electronic resource]]
| Aging : its challenge to the individual and to society : [papers] / / edited by William C. Bier [[electronic resource]] |
| Pubbl/distr/stampa | New York, : Fordham University Press, [1974] |
| Descrizione fisica | 1 online resource (xi, 292 p. ) |
| Disciplina | 301.43/5 |
| Altri autori (Persone) | BierWilliam Christian <1911-1980> |
| Collana |
The Pastoral psychology series Aging
The Pastoral psychology series |
| Soggetto topico |
Gerontology
Retirement Older people Human Activities Medicine Health Occupations Occupations Geriatrics Social Welfare & Social Work Social Sciences |
| Soggetto genere / forma |
Conference proceedings.
Congress. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | ; I. Aging in perspective : historical, cultural, religious -- Aging in preindustrial and in contemporary industrial societies / Charles F. O'Donnell -- The aged in Chinese and Japanese cultures / Gino K. Piovesana -- The challenge of aging for contemporary religion / William F. Hogan -- ; II. The basic scientific dimensions -- Demography of aging / Leon F. Bouvier -- Physiology of aging / Nathan W. Shock -- Sociology of aging / Howard A. Rosencranz -- ; III. The psychology and psychopathology of aging -- Psychology of aging / M. Powell Lawton -- Individual differences in aging / Anne Anastasi -- Psychopathology of aging / Robert J. Campbell -- ; IV. Retirement : center of the aging challenge -- Retirement : the emerging social pattern / Ruth G. Bennett -- Pre-retirement : planning and programs / Vito A. Giordano -- Retirement among priests and religious / Rose Mary Strain -- ; V. The experience of retirement -- The experience of a retired priest / Benjamin L. Masse -- The experiences of a retired businessman / Samuel Scheiber -- The experience of a retired nun / Marie Laurette Lovely -- The experience of a retired business executive / Harry A. Schwartz -- The experience of a retired religious educator / Rae Bragman -- ; VI. The challenge for the aging individual -- The challenge of aging for married partners / Seymour B. Jacobson -- Aging and career development / Tom Hickey -- The prospect of death / Leo J. O'Donovan -- ; VII. The challenge for society -- The older person and his family / Mary Scholastica Handren -- Community services to the aging / Clare J. Kagel -- Creating homes for the aged / John B. Ahern -- ; VIII. Successful aging : the ultimate challenge -- A sociological viewpoint / Marie Mercedes Hartman -- A psychological viewpoint / Comilda S. Weinstock -- A religious viewpoint / Rosaria Buesching. |
| Record Nr. | UNINA-9910170983803321 |
| New York, : Fordham University Press, [1974] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||