Information Science and Applications (ICISA) 2016
Springer Verlag, Singapore
978-981-10-0556-5 (ISBN)
Conference on Information Science and Applications (ICISA 2016) and provides a
snapshot of the latest issues encountered in technical convergence and
convergences of security technology. It explores how information science is
core to most current research, industrial and commercial activities and
consists of contributions covering topics including Ubiquitous Computing,
Networks and Information Systems, Multimedia and Visualization, Middleware and
Operating Systems, Security and Privacy, Data Mining and Artificial
Intelligence, Software Engineering, and Web Technology.
The contributions describe the most recent developments in
information technology and ideas, applications and problems related to
technology convergence, illustrated through case studies, and reviews converging
existing security techniques. Through this volume, readers will gain an understanding
of the current state-of-the-art information strategies and technologies of
convergence security. The intended readers are researchers in academia,
industry and other research institutes focusing on information science and
technology.
Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association. His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards. He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). Nikolai Joukov is a technical leader and evangelist of enterprise IT transformation process and tools. He is a recognized expert in large-scale enterprise IT modeling, transformation planning, security assessments, visualization, cloudification, data center relocation, reliability assessments, energy optimization, and storage architectures. During the last seven years Nikolai led and participated in dozens of large-scale enterprise IT transformation initiatives worldwide for largest banks, insurance, telecommunication, retailer, manufacturing, medical, airline, and energy companies, governments, and universities. He pioneered in the use of new automated scalable IT transformation planning processes and related tools. Nikolai’s work at IBM was recognized with a number of awards for business and corporate strategy impacts. Prof. Joukov was sharing his unique experiences with the students at Columbia University, NYU Poly, and NYU Courant Institute of Mathematical Science of his publicationin the top venues such as OSDI, FAST and Eurosys. Several of his publications won best paper awards including Eurosys’08. IEEE recognized Dr. Joukov’s Chairmanship of IEEE Computer Society Committee and Community on Operating Systems with an award for excellent service
PART 1 Ubiquitous Computing.- PART 2 Networks and
Information Systems.- PART 3 Multimedia and Visualization.- PART 4 Middleware
and Operating Systems.- PART 5 Security and Privacy.- PART 6 Data Mining and
Artificial Intelligence.- PART 7 Software Engineering.- PART 8 Web Technology.-
PART 9 Internet of Things.- PART 10 ICT Convergence.- PART 11 Convergence of
Healthcare and Information Technology.
Erscheinungsdatum | 16.03.2016 |
---|---|
Reihe/Serie | Lecture Notes in Electrical Engineering ; 376 | Lecture Notes in Electrical Engineering ; 376 |
Zusatzinfo | 659 Illustrations, black and white; XXI, 1505 p. 659 illus. In 2 volumes, not available separately. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Ad hoc and Sensor Networks • Cloud Computing • Computer Graphics and Virtual Reality • Data Warehousing and Data Mining • Digital Signal Processing and Computer Vision • ICISA 2015 proceedings • Information Recommendation and Filtering • Information Retrieval and Knowledge Discovery • Model-Driven Development of Web Applications • Parallel and distributed processing • Privacy Masking • Safety and Security Critical Software • VoIP, MoIP and Computer Networks • Web-based Collaboration and Social Networks |
ISBN-10 | 981-10-0556-7 / 9811005567 |
ISBN-13 | 978-981-10-0556-5 / 9789811005565 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich