Information Science and Applications (ICISA) 2016 (eBook)

eBook Download: PDF
2016 | 1st ed. 2016
XXI, 1505 Seiten
Springer Singapore (Verlag)
978-981-10-0557-2 (ISBN)

Lese- und Medienproben

Information Science and Applications (ICISA) 2016 -
Systemvoraussetzungen
309,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.

                                                                  

The contributions describe the most recent developments in information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.  The intended readers are researchers in academia, industry and other research institutes focusing on information science and technology.

 

 



Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.

His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. 

He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). 

Nikolai Joukov is a technical leader and evangelist of enterprise IT transformation process and tools. He is a recognized expert in large-scale enterprise IT modeling, transformation planning, security assessments, visualization, cloudification, data center relocation, reliability assessments, energy optimization, and storage architectures.

 

During the last seven years Nikolai led and participated in dozens of large-scale enterprise IT transformation initiatives worldwide for largest banks, insurance, telecommunication, retailer, manufacturing, medical, airline, and energy companies, governments, and universities. He pioneered in the use of new automated scalable IT transformation planning processes and related tools. Nikolai's work at IBM was recognized with a number of awards for business and corporate strategy impacts. Prof. Joukov was sharing his unique experiences with the students at Columbia University, NYU Poly, and NYU Courant Institute of Mathematical Science of his publication in the top venues such as OSDI, FAST and Eurosys. Several of his publications won best paper awards including Eurosys'08. IEEE recognized Dr. Joukov's Chairmanship of IEEE Computer Society Committee and Community  on Operating Systems with an award for excellent service
This book contains selected papers from the 7th InternationalConference on Information Science and Applications (ICISA 2016) and provides asnapshot of the latest issues encountered in technical convergence andconvergences of security technology. It explores how information science iscore to most current research, industrial and commercial activities andconsists of contributions covering topics including Ubiquitous Computing,Networks and Information Systems, Multimedia and Visualization, Middleware andOperating Systems, Security and Privacy, Data Mining and ArtificialIntelligence, Software Engineering, and Web Technology.                                                                   The contributions describe the most recent developments ininformation technology and ideas, applications and problems related totechnology convergence, illustrated through case studies, and reviews convergingexisting security techniques. Through this volume, readers will gain an understandingof the current state-of-the-art information strategies and technologies ofconvergence security.  The intended readers are researchers in academia,industry and other research institutes focusing on information science andtechnology.  

Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).  Nikolai Joukov is a technical leader and evangelist of enterprise IT transformation process and tools. He is a recognized expert in large-scale enterprise IT modeling, transformation planning, security assessments, visualization, cloudification, data center relocation, reliability assessments, energy optimization, and storage architectures.   During the last seven years Nikolai led and participated in dozens of large-scale enterprise IT transformation initiatives worldwide for largest banks, insurance, telecommunication, retailer, manufacturing, medical, airline, and energy companies, governments, and universities. He pioneered in the use of new automated scalable IT transformation planning processes and related tools. Nikolai’s work at IBM was recognized with a number of awards for business and corporate strategy impacts. Prof. Joukov was sharing his unique experiences with the students at Columbia University, NYU Poly, and NYU Courant Institute of Mathematical Science of his publication in the top venues such as OSDI, FAST and Eurosys. Several of his publications won best paper awards including Eurosys’08. IEEE recognized Dr. Joukov’s Chairmanship of IEEE Computer Society Committee and Community  on Operating Systems with an award for excellent service

PART 1 Ubiquitous Computing. PART 2 Networks and
Information Systems. PART 3 Multimedia and Visualization. PART 4 Middleware
and Operating Systems. PART 5 Security and Privacy. PART 6 Data Mining and
Artificial Intelligence. PART 7 Software Engineering. PART 8 Web Technology.PART 9 Internet of Things. PART 10 ICT Convergence. PART 11 Convergence of
Healthcare and Information Technology.

Erscheint lt. Verlag 15.2.2016
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXI, 1505 p. 659 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Ad hoc and Sensor Networks • Cloud Computing • Computer Graphics and Virtual Reality • Data Warehousing and Data Mining • Digital Signal Processing and Computer Vision • ICISA 2015 proceedings • Information Recommendation and Filtering • Information Retrieval and Knowledge Discovery • Model-Driven Development of Web Applications • Parallel and distributed processing • Privacy Masking • Safety and Security Critical Software • VoIP, MoIP and Computer Networks • Web-based Collaboration and Social Networks
ISBN-10 981-10-0557-5 / 9811005575
ISBN-13 978-981-10-0557-2 / 9789811005572
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 67,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90