Treffer:
Information and Communication Technology: Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings
Gespeichert in:
Title:
Information and Communication Technology: Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings
Applied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
This record is part of the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others, OCLC Online Computer Library Center, Inc. and the Library of Congress.
Accession Number:
edshlc.013990569.3
Database:
Harvard Library Bibliographic Dataset
Weitere Informationen
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.