Information Science and Applications 2017 -

Information Science and Applications 2017 (eBook)

ICISA 2017
eBook Download: PDF
2017 | 1st ed. 2017
XXI, 838 Seiten
Springer Singapore (Verlag)
978-981-10-4154-9 (ISBN)
Systemvoraussetzungen
309,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology.



Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.

His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards. 

He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). 
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology.

Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards. He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). 

Track 1. Ubiquitous Computing Ad hoc and Sensor Networks; Home Networks; Wireless and MobileTrack 2. Networks and Information Systems Internet-based Computing Model; Parallel and Distributed Processing; VoIP, MoIP and Computer NetworksTrack 3. Multimedia and Visualization Computer Graphics and Virtual Reality; Digital Signal Processing and Computer Vision; Video SurveillanceTrack 4. Middleware and Operating Systems Cloud Computing; Embedded Systems; Middleware for Collaboration; Real-Time SystemsTrack 5. Security and Privacy Computer and Network Forensics; Infrastructure Security; Multimedia Security; Privacy Masking; Software SecurityTrack 6. Data Mining and Artificial Intelligence Autonomous and intelligent Agent; Data Warehousing and Data Mining; Information Retrieval and Knowledge DiscoveryTrack 7. Software Engineering Distributed Object-Oriented Systems; Reusable Object-Oriented Architectures and Applications; Safety and Security Critical Software; Software Modeling, Development and MaintenanceTrack 8. Web Technology Information Recommendation and Filtering; Model-Driven Development of Web Applications; Web-based Collaboration and Social NetworksTrack 9. Internet of Things Mobile IoT, IoT device or circuit design, IoT applications and services, IoT analytics

Erscheint lt. Verlag 16.3.2017
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXI, 838 p. 385 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Ad hoc and Sensor Networks • Cloud Computing • Computer Graphics • Data Warehousing • ICISA 2017 • Internet-based Computing Model • multimedia security • Object-Oriented Systems • Safety and Security Critical Software • Software Security • video surveillance • VoIP, MoIP and Computer Networks • Web-based Collaboration and Social Networks • Wireless and Mobile
ISBN-10 981-10-4154-7 / 9811041547
ISBN-13 978-981-10-4154-9 / 9789811041549
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 97,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90