feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV048885776
    Format: 1 Online-Ressource (IX, 719 p. 197 illus., 117 illus. in color)
    Edition: 1st ed. 2022
    ISBN: 9789811993077
    Series Statement: Springer Proceedings in Mathematics & Statistics 415
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1993-06-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1993-08-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1993-09-1
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1839668105
    Format: 1 Online-Ressource(IX, 719 p. 197 illus., 117 illus. in color.)
    ISBN: 9789811993077
    Series Statement: Springer Proceedings in Mathematics & Statistics 415
    Content: PART 1: APPLIED ALGEBRA AND ANALYSIS: S. Krishnan and K. Shunmugaiah, On the Genus of the Annihilator-Ideal Graph of Commutative Ring -- Niranjan P.K., The Radio $k$-Chromatic Number for the Corona of Arbitrary Graph and $K_1$ -- Latha Devi Puli and Manjula K., Some Parameters of Restricted Super Line Graphs -- G. Ganesan, Edge Constrained Eulerian Extensions -- C. Phanjoubam and S. Mawiong, Bounds of Some Energy-Like Invariants of Neigbourhood Corona of Graphs -- M. Kumar, Neelesh S. Upadhye, and A.K.B. Chand, Linear Recurrent Fractal Interpolation Function for Data Set with Gaussian Noise -- V. Vijay and A.K.B. Chand, $C^1$-Rational Quadratic Trigonometric Spline Fractal Interpolation Functions -- P. Rajan, A. K. Bedabrata Chand and María A. Navascués, Cyclic Multivalued Iterated Function Systems -- E. Savas, On Almost Convergence and Statistical Convergence of Weight g -- Tamilarasi W. and Balamurugan B.J., Non-Neighbor Topological Indices on Covid-19 Drugs with Qspr Analysis -- Tejuswini M. and Shilpa N., Some Results on Differential Polynomials of Meromorphic Functions Sharing Certain Values -- G. Murugusundaramoorthy, Thomas Rosy, and Asha Thomas, A Subclass of Pseudo-Type Meromorphic Bi-Univalent Functions of Complex Order Associated with Linear Operator -- Malathi V. and Vijaya K., Bi-Starlike Function of Complex Order based on Double Zeta Functions Associated with Crescent Shaped Region -- G. Bisht and S. Kumar, Fuzzy Rule based Expert System for Multi Assets Portfolio Optimization -- B. Ganesan and M. Annamala, Stability Analysis of Additive Time Varying T-S Fuzzy System using Augmented Lyapunov Functional -- PART 2: FRACTIONAL CALCULUS AND INTEGRAL EQUATIONS: R. Teppawar, R. Ingle and R. Muneshwar, Solution of Fractional Differential Equations by using Conformable Fractional Differential Transform Method with Adomain Polynomials -- R. Muneshwar, K. Bondar, Y. Shirole, and V. Mathpati, Generalized results on Existence and Uniqueness with Wronskian and Abel Formula for α-Fractional Differential Equations -- D. Karunarathna and M. Dewasurendra, Method of Directly Defining the Inverse Mapping for Nonlinear Ordinary and Partial Fractional Order Differential Equations -- M. Latha Maheswari and R. Nandhini, Existence Results for Nonlocal Impulsive Fractional Neutral Functional Integro-Differential Equations with Bounded Delay -- G Tamil Preethi, N. B. Gatti, and N. Magesh, An Application of Conformable Fractional Differential Transform Method for Smoking Epidemic Model -- K. Sarkar and B. Mondal, Analysis of a Fractional Order Predator-Prey Model with Nonlinear Harvesting -- Rahul and N. K. Mahato, Solvability of Infinite System of Volterra Integral Equations in the Tempered Spaces -- S.V. Babar and S.G. Latpate, On Generalizations of Integral Inequalities and Its Applications -- PART 3: MATHEMATICAL MODELLING AND FLUID DYNAMICS: B. Belay and A. Abebaw, Optimizing Multi-Objective Chance Constraint Quadratic Fractional Programming Problem -- S. Khatri and A. Prasad, Higher-Order Variational Symmetric Duality Over Cone Constraint -- S. Pal and D. Chutia, On Generalized Energy Inequality of the Damped Navier–Stokes Equations with Navier–Slip Boundary Conditions -- S. Sangapatnam, S. Ketineni, B. Anki R. Polu, and R. ul Haq Satti, The Diathermic Oils over a Thin Liquid Film with Mos2 Nano Particles: A Model with Analysis of Shape Factor Effects -- B. Sarkar and Soumen De, Dissipation of Wave Energy by Thin Multiple Partially Immersed Vertical Porous Walls in Water of Uniform Finite Depth -- A. Adhe and A. Kirtiwant Ghadle, Thermal Stress Analysis of Inhomogeneous Infinite Solid to 2D Elasticity of Thermoelastic Problems -- M. Udupa and S. Saha, Study of Non-Newtonian Models for 1D Blood Flow through a Stenosed Carotid Artery -- M. Nagavalli, T. Ling Raju, and P. K. Kameswaran, Two-Layered Fluid Flow of Ionized Gases in a Channel between Two Parallel Porous Plates under Applied Magnetic Field with Hall Effect -- S. Rao Gunakala, V. Job, and J. Veronique, Influence of Heat Transfer, Chemical Reaction and Variable Fluid Properties on Oscillatory MHD Couette Flow through a Partially-Porous Channel -- I. Ramarao, P. N Basavaraju, and Jagadeesha S., Effect of Heat Transfer on Peristaltic Transport of Prandtl Fluid in an Inclined Porous Channel -- A. Kumar Das and S. C. Rana, Comparative Analysis of Flow in S-Diffusers using Standard K-ɛ, Realizable K-ɛ and Renormalized Group K-ɛ Models -- N. Lakhmara and H. S. Mahato, A Multiscale Model of Stokes–Cahn–Hilliard Equations in a Porous Medium: Modeling Analysis and Homegenization -- A. Samanta, Water Wave Scattering by a Wide Rectangular Impediment with a Vent Placed under a Finite Depth Water Body with Ice Covered Surface -- P. Kumar and Dipesh, Sensitivity and Directional Analysis of Two Mutually Competing Plant Population under Allelopathy using DDE -- N. Ghosh and H. S. Mahato, Pore Scale Analysis and Homogenization of a Diffusion–Reaction–Dissolution–Precipitation Model -- R. Saha, C. Benitez, K. Cimbalista, J. Pek, and Padmanabhan Seshaiye, Mathematical Modeling and Computing to Study the Influence of Quarantine Levels and Common Mitigation Strategies on the Spread of Covid-19 on a Higher Education Campus -- PART 4: NUMERICAL ANALYSIS: S. Patel, L. Panigrahi, and G. Nelakanti, Numerical Solution of the Fredholm Integral Equations of the First Kind by using Multi-Projection Methods -- A. Kumar and S. Kumari, Local Convergence of a Family of Kurchatov Like Methods for Nonlinear Equations -- S. Tomar and K. Vajravelu, An Effective Scheme for Solving Second-Order Two-Point Boundary Value Problems -- M. M. Ayub Hossain and B. M. Ikramul Haque, An Analytic Solution for the Helmholtz–Duffing Oscillator by Modified Mickens’ Extended Iteration Procedure -- K. Takale and V. Sangvikar, C. Nicolson, Finite Difference Scheme for Time–Space Fractional Diffusion Equation -- N. C. Bhagat and P. K. Parida, Gauss-Newton–Kurchatov Method for the Solution of Nonlinear Least Square Problem using Omega Condition -- P.K. Parida and S. Nisha, An Exponential Bisection Newton-Like Method of Third-Order for Enclosing Simple Roots of Nonlinear Equations -- PART 5: COMPUTER SCIENCE AND APPLICATION: S. Karanwal, Color Multiscale Block-ZigZag LBP: An Efficient and Discriminant Face Descriptor -- A. Dhiman, Effect of Noise in the Quantum Network Implementation of Cop and Robber Game -- P. Singh, N. Bhandari, N. Bisht, and S. Bisht, Design of Energy Efficient IoMT Electrocardiogram Machine on 28 nm FPGA -- Study of Decoherence in Quantum Cournot Duopoly Game using Modified EWL Scheme.
    Content: This book comprises select peer-reviewed articles submitted for the proceedings of the International Conference on Mathematics and Computing (ICMC 2022), held by the School of Advanced Sciences, Vellore Institute of Technology, Vellore, India, in association with Ramanujan Mathematical Society, India, Cryptology Research Society of India and Society for Electronic Transactions and Security, India, from 6–8 January 2022. With an aim to identify the existing challenges in the areas of mathematics and computing, the book emphasizes the importance of establishing new methods and algorithms to address these challenges. The book includes topics on diverse applications of cryptology, network security, cyber security, block chain, IoT, mobile network, data analytics, applied algebra, mathematical analysis, mathematical modelling, fluid dynamics, fractional calculus, multi-optimization, integral equations, dynamical systems, numerical analysis and scientific computing. Divided into five major parts—applied algebra and analysis, fractional calculus and integral equations, mathematical modelling and fluid dynamics, numerical analysis, and computer science and applications—the book is a useful resource for students, researchers and faculty as well as practitioners.
    Additional Edition: ISBN 9789811993060
    Additional Edition: ISBN 9789811993084
    Additional Edition: ISBN 9789811993091
    Additional Edition: Erscheint auch als Druck-Ausgabe International Conference on Mathematics and Computing (8. : 2022 : Vellore, India; Online) Mathematics and computing Singapore : Springer, 2022 ISBN 9789811993060
    Additional Edition: ISBN 9789811993084
    Additional Edition: ISBN 9789811993091
    Language: English
    Author information: Ponnusamy, Saminathan 1960-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1801192855
    Format: 1 Online-Ressource , Illustrationen
    ISBN: 9781665416832
    Note: SCC 2021 hat im Rahmen von IEEE SERVICES (IEEE World Congress on Services) 2021 stattgefunden , Literaturangaben
    Additional Edition: ISBN 9781665416849
    Language: English
    Keywords: Web Services ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    San Rafael, California 〈1537 Fourth Street, San Rafael, CA 94901 USA〉 : Morgan & Claypool
    UID:
    gbv_165460903X
    Format: Online Ressource (1 PDF (ix, 110 pages))
    Edition: Online-Ausg.
    ISBN: 9781627052665
    Series Statement: Synthesis lectures on information security, privacy, & trust 1945-9750 # 8
    Content: The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields
    Note: Part of: Synthesis digital library of engineering and computer science. - Series from website. - Includes bibliographical references (pages 81-108). - Compendex. INSPEC. Google scholar. Google book search. - Title from PDF title page (viewed on January 13, 2014) , System requirements: Adobe Acrobat Reader.
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781627052658
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_776794361
    Format: 1 Online-Ressource (122 Seiten)
    Edition: Also available in print
    ISBN: 9781627052665
    Series Statement: Synthesis Lectures on Information Security, Privacy, and Trust #8
    Content: The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields
    Content: 1. Online social networks and security issues -- 1.1 Introduction -- 1.2 Social networks -- 1.2.1 The meaning of community -- 1.2.2 From offline to online communities -- 1.3 Online social networks -- 1.3.1 Evolution of online social networks -- 1.3.2 Analysis and properties -- 1.3.3 Multiple social ties and social capital -- 1.4 Security issues in online social networks -- 1.4.1 Trust management in online social networks -- 1.4.2 Controlled information sharing in online social networks -- 1.4.3 Identity management in online social networks --
    Content: 2. Trust management in online social networks -- 2.1 Introduction -- 2.2 Trust in computer science -- 2.2.1 Trust and policies -- 2.2.2 Trust and reputation systems -- 2.3 Trust in online social networks -- 2.3.1 Trust properties -- 2.3.2 Trust components -- 2.3.3 Social trust and social capital -- 2.3.4 Trust evaluation models -- 2.4 Conclusions --
    Content: 3. Controlled information sharing in online social networks -- 3.1 Introduction -- 3.2 Access control in data management systems -- 3.2.1 A brief historical perspective -- 3.2.2 Access control models -- 3.3 Access control in online social networks -- 3.3.1 Relationship-based access control -- 3.3.2 Privacy settings in commercial online social networks -- 3.3.3 Existing access control approaches -- 3.4 Conclusions --
    Content: 4. Identity management in online social networks -- 4.1 Introduction -- 4.2 Identity management -- 4.2.1 Digital identity -- 4.2.2 Identity management models: from identity 1.0 to identity 2.0 -- 4.3 Identity management in online social networks -- 4.3.1 Identity as self-presentation -- 4.3.2 Identity disclosure -- 4.3.3 Identity theft -- 4.4 Conclusions --
    Content: 5. Conclusions and further research directions -- 5.1 Open security issues in online social networks -- 5.1.1 Trust management -- 5.1.2 Controlled information sharing -- 5.1.3 Identity management -- Bibliography -- Authors' biography
    Note: Description based upon print version of record , Acknowledgments; Online Social Networks and Security Issues; Introduction; Social Networks; The Meaning of Community; From Offline to Online Communities; Online Social Networks; Evolution of Online Social Networks; Analysis and Properties; Multiple Social Ties and Social Capital; Security Issues in Online Social Networks; Trust Management in Online Social Networks; Controlled Information Sharing in Online Social Networks; Identity Management in Online Social Networks; Trust Management in Online Social Networks; Introduction; Trust in Computer Science; Trust and Policies , Trust and Reputation SystemsTrust in Online Social Networks; Trust Properties; Trust Components; Social Trust and Social Capital; Trust Evaluation Models; Conclusions; Controlled Information Sharing in Online Social Networks; Introduction; Access Control in Data Management Systems; A Brief Historical Perspective; Access Control Models; Access Control in Online Social Networks; Relationship-Based Access Control; Privacy Settings in Commercial Online Social Networks; Existing Access Control Approaches; Conclusions; Identity Management in Online Social Networks; Introduction; Identity Management , Digital IdentityIdentity Management Models: From Identity 1.0 to Identity 2.0; Identity Management in Online Social Networks; Identity as Self-Presentation; Identity Disclosure; Identity Theft; Conclusions; Conclusions and Further Research Directions; Open Security Issues in Online Social Networks; Trust Management; Controlled Information Sharing; Identity Management; Bibliography; Authors' Biography , Also available in print. , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781627052658
    Additional Edition: Print version Security and Trust in Online Social Networks
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1659490162
    Format: Online-Ressource (XVIII, 576 p. 117 illus, online resource)
    ISBN: 9783319116983
    Series Statement: Lecture Notes in Computer Science 8792
    Content: This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution
    Note: Literaturangaben , Cloud ComputingAn Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures -- Adopting Provenance-Based Access Control in OpenStack Cloud IaaS -- Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage -- A Formal Model for Isolation Management in Cloud Infrastructure-asa- Service -- Access Control -- Extending OpenStack Access Control with Domain Trust -- Hierarchical Solution for Access Control and Authentication in Software Defined Networks -- A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing -- Network Security.-psOBJ: Defending against Traffic Analysis with pseudo-Objects -- Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS -- Revisiting Node Injection of P2P Botnet -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security Analysis -- Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack -- A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock -- Cryptanalysis on the Authenticated Cipher Sablier -- A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique -- Security Analysis and Improvement of Femtocell Access Control -- Public Key Cryptography -- Identity Based Threshold Ring Signature from Lattices -- Identity-Based Transitive Signcryptio -- GO-ABE: Group-Oriented Attribute-Based Encryption -- Jhanwar-Barua’s Identity-Based Encryption Revisited -- Lightweight Universally Composable Adaptive Oblivious Transfer -- Certificate-Based Conditional Proxy Re-Encryption -- A Secure Obfuscator for Encrypted Blind Signature Functionality -- Attribute-Based Signing Right Delegation -- System Security -- Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios -- iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications -- Formal Verification of Finite State Transactional Security Policy -- Privacy-Preserving Systems and Bio-metrics -- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features -- Privacy Preserving Biometrics-Based and User Centric Authentication Protocol -- A Dynamic Matching Secret Handshake Scheme without Random Oracles -- Formal Analysis of DAA-Related APIs in TPM 2.0 -- Key Management and Distribution -- eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy -- Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks -- A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks -- Short Papers -- Rational Secure Two-party Computation in Social Cloud -- How to Evaluate Trust Using MMT -- A Proposed Approach to Compound File Fragment Identification -- Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework -- A New Approach to Executable File Fragment Detection in Network Forensics -- Tighter Security Bound of MIBS Block Cipher against Differential Attack -- A New Multivariate Based Threshold Ring Signature Scheme -- Capturing Android Malware Behaviour Using System Flow Graph -- Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD -- A New Public Key Encryption with Equality Test -- A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers -- Multi-domain Direct Anonymous Attestation Scheme from Pairings.
    Additional Edition: ISBN 9783319116976
    Additional Edition: Druckausg. ISBN 978-331-91169-7-6
    Additional Edition: Druckausg. Network and system security Cham [u.a.] : Springer, 2014 ISBN 9783319116976
    Additional Edition: ISBN 9783319116983
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit ; Sicherheitsprotokoll ; Malware ; Kryptoanalyse ; Kryptosystem ; Schlüsselverteilung ; Automatische Identifikation ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_839810202
    Edition: Edição de colecionador
    Content: A miniseries presented on TV Globo from January to April 2007; it recounts the history of Acre and its peoples through its struggles. The period covered begins in 1899 through 3 phases, ending in the decade of the 1980s, with the assassination of Chico Mendes December 22, 1988
    Note: Discs 1-3, 4-5, and disc 7 (with booklet inserted) in three separate cases , Die Bände 1 - 3 sind im Schuber zusammen gefaßt , Producer, Marcos Schechtman; directors, Roberto Carminati, Carlo Milani, Marcos Schechtman, Marcelo Travesso, Pedro Vasconcelos, Emilio Di Biasi (musical scenes); writer, Glória Perez , Disco 1, 2, 3 -- Disco 4, 5, 6 -- Disco 7: Extras, documentário e musicals. , Erschienen: 1 - 3 , In Portuguese
    Language: Portuguese
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_755403673
    Format: Online-Ressource
    ISBN: 9781467327404 , 1467327409 , 1936968363 , 9781467327404 , 9781936968367
    Note: Includes bibliographical references , IEEE Catalog Number: CFP11CNA-ART , Title from PDF title page (IEEE Xplore, viewed on April 2, 2013)
    Additional Edition: ISBN 9781936968367
    Language: English
    Keywords: Verteiltes System ; Kollaboration ; Kongress ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_844719986
    Format: Online-Ressource
    ISBN: 9781467372794 , 1467372781 , 1467372773 , 9781467372787 , 9781467372770
    Note: Co-located with the 2015 IEEE World Congress on Services (SERVICES 2015)
    Additional Edition: ISBN 9781467372787
    Additional Edition: ISBN 9781467372770
    Additional Edition: Druckausg. 2015 IEEE International Congress on Big Data (BigData Congress 2015) Piscataway, NJ : IEEE, 2015 ISBN 9781467372794
    Language: English
    Keywords: Big Data ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_772456631
    Format: Online-Ressource (1 online resource (248 pages))
    Edition: Association for Computing Machinery-Digital Library
    ISBN: 9781605585376
    Series Statement: ACM Digital Library
    Note: Title from The ACM Digital Library
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages