E-Book, Englisch, 699 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
Linawati / Mahendra / Neuhold Information and Communication Technology
Erscheinungsjahr 2014
ISBN: 978-3-642-55032-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings
E-Book, Englisch, 699 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-642-55032-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Applied modeling and simulation.- Mobile computing.- Advanced urban-scale ICT applications.- Semantic web and knowledge management.- Cloud computing.- Image processing.- Software engineering.- Collaboration technologies and systems.- E-learning.- Data warehousing and data mining.- E-government and e-health.- Biometric and bioinformatics systems.- Network security.- Dependable systems and applications.- Privacy and trust management.- Cryptography.- Multimedia security.- Dependable systems and applications.