Information Science and Applications (ICISA) 2016 (eBook)
XXI, 1505 Seiten
Springer Singapore (Verlag)
978-981-10-0557-2 (ISBN)
This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.
The contributions describe the most recent developments in information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readers are researchers in academia, industry and other research institutes focusing on information science and technology.
Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.
His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards.
He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).Nikolai Joukov is a technical leader and evangelist of enterprise IT transformation process and tools. He is a recognized expert in large-scale enterprise IT modeling, transformation planning, security assessments, visualization, cloudification, data center relocation, reliability assessments, energy optimization, and storage architectures.
During the last seven years Nikolai led and participated in dozens of large-scale enterprise IT transformation initiatives worldwide for largest banks, insurance, telecommunication, retailer, manufacturing, medical, airline, and energy companies, governments, and universities. He pioneered in the use of new automated scalable IT transformation planning processes and related tools. Nikolai's work at IBM was recognized with a number of awards for business and corporate strategy impacts. Prof. Joukov was sharing his unique experiences with the students at Columbia University, NYU Poly, and NYU Courant Institute of Mathematical Science of his publication in the top venues such as OSDI, FAST and Eurosys. Several of his publications won best paper awards including Eurosys'08. IEEE recognized Dr. Joukov's Chairmanship of IEEE Computer Society Committee and Community on Operating Systems with an award for excellent service
This book contains selected papers from the 7th InternationalConference on Information Science and Applications (ICISA 2016) and provides asnapshot of the latest issues encountered in technical convergence andconvergences of security technology. It explores how information science iscore to most current research, industrial and commercial activities andconsists of contributions covering topics including Ubiquitous Computing,Networks and Information Systems, Multimedia and Visualization, Middleware andOperating Systems, Security and Privacy, Data Mining and ArtificialIntelligence, Software Engineering, and Web Technology. The contributions describe the most recent developments ininformation technology and ideas, applications and problems related totechnology convergence, illustrated through case studies, and reviews convergingexisting security techniques. Through this volume, readers will gain an understandingof the current state-of-the-art information strategies and technologies ofconvergence security. The intended readers are researchers in academia,industry and other research institutes focusing on information science andtechnology.
Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards. He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE). Nikolai Joukov is a technical leader and evangelist of enterprise IT transformation process and tools. He is a recognized expert in large-scale enterprise IT modeling, transformation planning, security assessments, visualization, cloudification, data center relocation, reliability assessments, energy optimization, and storage architectures. During the last seven years Nikolai led and participated in dozens of large-scale enterprise IT transformation initiatives worldwide for largest banks, insurance, telecommunication, retailer, manufacturing, medical, airline, and energy companies, governments, and universities. He pioneered in the use of new automated scalable IT transformation planning processes and related tools. Nikolai’s work at IBM was recognized with a number of awards for business and corporate strategy impacts. Prof. Joukov was sharing his unique experiences with the students at Columbia University, NYU Poly, and NYU Courant Institute of Mathematical Science of his publication in the top venues such as OSDI, FAST and Eurosys. Several of his publications won best paper awards including Eurosys’08. IEEE recognized Dr. Joukov’s Chairmanship of IEEE Computer Society Committee and Community on Operating Systems with an award for excellent service
PART 1 Ubiquitous Computing. PART 2 Networks and
Information Systems. PART 3 Multimedia and Visualization. PART 4 Middleware
and Operating Systems. PART 5 Security and Privacy. PART 6 Data Mining and
Artificial Intelligence. PART 7 Software Engineering. PART 8 Web Technology.PART 9 Internet of Things. PART 10 ICT Convergence. PART 11 Convergence of
Healthcare and Information Technology.
Erscheint lt. Verlag | 15.2.2016 |
---|---|
Reihe/Serie | Lecture Notes in Electrical Engineering | Lecture Notes in Electrical Engineering |
Zusatzinfo | XXI, 1505 p. 659 illus. |
Verlagsort | Singapore |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Naturwissenschaften | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Ad hoc and Sensor Networks • Cloud Computing • Computer Graphics and Virtual Reality • Data Warehousing and Data Mining • Digital Signal Processing and Computer Vision • ICISA 2015 proceedings • Information Recommendation and Filtering • Information Retrieval and Knowledge Discovery • Model-Driven Development of Web Applications • Parallel and distributed processing • Privacy Masking • Safety and Security Critical Software • VoIP, MoIP and Computer Networks • Web-based Collaboration and Social Networks |
ISBN-10 | 981-10-0557-5 / 9811005575 |
ISBN-13 | 978-981-10-0557-2 / 9789811005572 |
Haben Sie eine Frage zum Produkt? |
Größe: 67,6 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich