Fr. 421.00

Information Science and Applications (ICISA) 2016, 2 Teile

Inglese · Copertina rigida

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

This book contains selected papers from the 7th InternationalConference on Information Science and Applications (ICISA 2016) and provides asnapshot of the latest issues encountered in technical convergence andconvergences of security technology. It explores how information science iscore to most current research, industrial and commercial activities andconsists of contributions covering topics including Ubiquitous Computing,Networks and Information Systems, Multimedia and Visualization, Middleware andOperating Systems, Security and Privacy, Data Mining and ArtificialIntelligence, Software Engineering, and Web Technology.
                                                                  
The contributions describe the most recent developments ininformation technology and ideas, applications and problems related totechnology convergence, illustrated through case studies, and reviews convergingexisting security techniques. Through this volume, readers will gain an understandingof the current state-of-the-art information strategies and technologies ofconvergence security.  The intended readers are researchers in academia,industry and other research institutes focusing on information science andtechnology.
 

 

Sommario

PART 1 Ubiquitous Computing.- PART 2 Networks andInformation Systems.- PART 3 Multimedia and Visualization.- PART 4 Middlewareand Operating Systems.- PART 5 Security and Privacy.- PART 6 Data Mining andArtificial Intelligence.- PART 7 Software Engineering.- PART 8 Web Technology.-PART 9 Internet of Things.- PART 10 ICT Convergence.- PART 11 Convergence ofHealthcare and Information Technology.

Info autore

Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.

His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. 
He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). 

Nikolai
Joukov
is a technical leader and evangelist of enterprise IT transformation
process and tools. He is a recognized expert in large-scale enterprise IT
modeling, transformation planning, security assessments, visualization,
cloudification, data center relocation, reliability assessments, energy
optimization, and storage architectures.

 

During the last seven
years Nikolai led and participated in dozens of large-scale enterprise IT
transformation initiatives worldwide for largest banks, insurance,
telecommunication, retailer, manufacturing, medical, airline, and energy companies,
governments, and universities. He pioneered in the use of new automated
scalable IT transformation planning processes and related tools. Nikolai’s work
at IBM was recognized with a number of awards for business and corporate
strategy impacts. Prof. Joukov was sharing his unique experiences with the
students at Columbia University, NYU Poly, and NYU Courant Institute of
Mathematical Science of his publicationin the top venues such as OSDI, FAST
and Eurosys. Several of his publications won best paper awards including
Eurosys’08. IEEE recognized Dr. Joukov’s Chairmanship of IEEE Computer Society
Committee and Community  on Operating
Systems with an award for excellent service

Riassunto

This book contains selected papers from the 7th International
Conference on Information Science and Applications (ICISA 2016) and provides a
snapshot of the latest issues encountered in technical convergence and
convergences of security technology. It explores how information science is
core to most current research, industrial and commercial activities and
consists of contributions covering topics including Ubiquitous Computing,
Networks and Information Systems, Multimedia and Visualization, Middleware and
Operating Systems, Security and Privacy, Data Mining and Artificial
Intelligence, Software Engineering, and Web Technology.
                                                                  
The contributions describe the most recent developments in
information technology and ideas, applications and problems related to
technology convergence, illustrated through case studies, and reviews converging
existing security techniques. Through this volume, readers will gain an understanding
of the current state-of-the-art information strategies and technologies of
convergence security.  The intended readers are researchers in academia,
industry and other research institutes focusing on information science and
technology.
 

 

Dettagli sul prodotto

Con la collaborazione di Kuina J Kim (Editore), Kuinam J Kim (Editore), Joukov (Editore), Joukov (Editore), Nikolai Joukov (Editore), Kuinam J Kim (Editore), Kuinam J. Kim (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Copertina rigida
Pubblicazione 01.01.2017
 
EAN 9789811005565
ISBN 978-981-10-0556-5
Pagine 1505
Dimensioni 160 mm x 240 mm x 10 mm
Illustrazioni XXI, 1505 p. 659 illus. In 2 volumes, not available separately.
Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Categorie Scienze naturali, medicina, informatica, tecnica > Tecnica > Elettronica, elettrotecnica, telecomunicazioni

C, Artificial Intelligence, engineering, Electrical Engineering, Systems and Data Security, Data and Information Security, Data Structures and Information Theory, Communications Engineering, Networks, Algorithms & data structures, Network Security, Computer security, Information theory, Computational Intelligence, Data structures (Computer science)

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.