Networked Digital Technologies, Part I: Second International Conference, NDT 2010, Prague, Czech Republic: Communications in Computer and Information Science, cartea 87
Editat de Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmehen Limba Engleză Paperback – 30 iun 2010
Din seria Communications in Computer and Information Science
- 20% Preț: 318.93 lei
- 20% Preț: 655.52 lei
- 20% Preț: 318.12 lei
- 20% Preț: 331.04 lei
- 20% Preț: 642.92 lei
- 20% Preț: 646.61 lei
- 20% Preț: 327.16 lei
- 20% Preț: 330.73 lei
- 20% Preț: 643.08 lei
- 20% Preț: 643.42 lei
- 20% Preț: 645.97 lei
- Preț: 384.70 lei
- 20% Preț: 322.96 lei
- Preț: 378.26 lei
- 20% Preț: 329.26 lei
- 20% Preț: 327.80 lei
- 20% Preț: 325.06 lei
- 20% Preț: 642.59 lei
- 20% Preț: 331.68 lei
- 20% Preț: 327.16 lei
- 20% Preț: 327.80 lei
- 20% Preț: 331.86 lei
- 20% Preț: 653.10 lei
- 20% Preț: 307.20 lei
- 20% Preț: 329.26 lei
- 20% Preț: 331.86 lei
- 20% Preț: 323.59 lei
- 20% Preț: 647.43 lei
- 15% Preț: 635.31 lei
- 20% Preț: 640.35 lei
- 20% Preț: 325.38 lei
- 20% Preț: 331.04 lei
- 20% Preț: 1033.89 lei
- 20% Preț: 819.57 lei
- 20% Preț: 643.42 lei
- 20% Preț: 1206.03 lei
- 20% Preț: 324.60 lei
- 20% Preț: 329.26 lei
- 20% Preț: 316.51 lei
- 20% Preț: 113.94 lei
- 20% Preț: 329.44 lei
- Preț: 379.96 lei
- 20% Preț: 470.58 lei
- 20% Preț: 735.66 lei
- 20% Preț: 330.23 lei
- 20% Preț: 321.35 lei
- 20% Preț: 401.75 lei
- 20% Preț: 328.63 lei
- 20% Preț: 523.80 lei
- 20% Preț: 659.40 lei
Preț: 642.34 lei
Preț vechi: 755.69 lei
-15% Nou
Puncte Express: 964
Preț estimativ în valută:
122.93€ • 127.69$ • 102.11£
122.93€ • 127.69$ • 102.11£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642142918
ISBN-10: 3642142915
Pagini: 603
Ilustrații: XXIII, 580 p. 231 illus.
Greutate: 0.84 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642142915
Pagini: 603
Ilustrații: XXIII, 580 p. 231 illus.
Greutate: 0.84 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Information and Data Management.- A New Approach for Fingerprint Matching Using Logic Synthesis.- Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions.- Distributed Data-Mining in the LISp-Miner System Using Techila Grid.- Non-negative Matrix Factorization on GPU.- Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language.- Handwritten Digits Recognition Based on Swarm Optimization Methods.- A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique.- An Efficient Indexing and Compressing Scheme for XML Query Processing.- Development of a New Compression Scheme.- Compression of Layered Documents.- Classifier Hypothesis Generation Using Visual Analysis Methods.- Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager.- A Framework for In-House Prediction Markets.- Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection.- Process Mining Approach to Promote Business Intelligence in Iranian Detectives’ Police.- Copyright Protection of Relational Database Systems.- Resolving Semantic Interoperability Challenges in XML Schema Matching.- Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras.- Security.- The Effect of Attentiveness on Information Security.- A Secured Mobile Payment Model for Developing Markets.- Security Mapping to Enhance Matching Fine-Grained Security Policies.- Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor.- On the Algebraic Expression of the AES S-Box Like S-Boxes.- Student’s Polls for Teaching Quality Evaluation as an Electronic Voting System.- An Improved Estimation of the RSA Quantum Breaking Success Rate.-Mining Bluetooth Attacks in Smart Phones.- Users’ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model.- Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism.- A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks.- Human Authentication Using FingerIris Algorithm Based on Statistical Approach.- Aerial Threat Perception Architecture Using Data Mining.- Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography.- An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization.- Genetic Cryptanalysis.- Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques.- Modeling and Analysis of Reconfigurable Systems Using Flexible Nets.- Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing.- Social Networks.- Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities.- A Collaborative Social Decision Model for Digital Content Credibility Improvement.- Improving Similarity-Based Methods for Information Propagation on Social Networks.- Approaches to Privacy Protection in Location-Based Services.- Social Media as Means for Company Communication and Service Design.- A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems.- Bridging the Gap between Web 2.0 Technologies and Social Computing Principles.- Ontology.- Using Similarity Values for Ontology Matching in the Grid.- Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework.-Incorporating Semantics into an Intelligent Clothes Search System Using Ontology.- SPPODL: Semantic Peer Profile Based on Ontology and Description Logic.- Ontology Based Tracking and Propagation of Provenance Metadata.- Real Time Biometric Solutions for Networked Society.- A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer.- On-Demand Biometric Authentication of Computer Users Using Brain Waves.- Encrypting Fingerprint Minutiae Templates by Random Quantization.- Web Applications.- Method for Countering Social Bookmarking Pollution Using User Similarities.- A Human Readable Platform Independent Domain Specific Language for WSDL.- A Human Readable Platform Independent Domain Specific Language for BPEL.- Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler.- Assessing the LCC Websites Quality.- Expediency Heuristic in University Conference Webpage.
Caracteristici
Up-to-date results Fast track conference Proceedings state-of-art report