Atjaunināt sīkdatņu piekrišanu

Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings 1st ed. 2015 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 354 pages, height x width: 235x155 mm, weight: 5562 g, 119 Illustrations, color; XIV, 354 p. 119 illus. in color., 1 Paperback / softback
  • Sērija : Information Systems and Applications, incl. Internet/Web, and HCI 9357
  • Izdošanas datums: 02-Dec-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319243144
  • ISBN-13: 9783319243146
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 354 pages, height x width: 235x155 mm, weight: 5562 g, 119 Illustrations, color; XIV, 354 p. 119 illus. in color., 1 Paperback / softback
  • Sērija : Information Systems and Applications, incl. Internet/Web, and HCI 9357
  • Izdošanas datums: 02-Dec-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319243144
  • ISBN-13: 9783319243146
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on

Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization.
Networks and System Architecture
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol
3(10)
Kamil Burda
Martin Nagy
Ivan Kotuliak
A SDN Based Method of TCP Connection Handover
13(7)
Andrej Binder
Tomas Boros
Ivan Kotuliak
IP Data Delivery in HBB-Next Network Architecture
20(10)
Roman Bronis
Ivan Kotuliak
Tomas Kovacik
Peter Truchly
Andrej Binder
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter
30(10)
Tomas Halagan
Tomas Kovacik
Peter Truchly
Andrej Binder
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure
40(13)
Martin Nagy
Ivan Kotuliak
Jan Skalny
Martin Kalcok
Tibor Hirjak
Teaching and Education
Making Computer Science Education Relevant
53(11)
Michael Weigend
Analyzing Brain Waves for Activity Recognition of Learners
64(13)
Hiromichi Abe
Kazuya Kinoshita
Kensuke Baba
Shigeru Takano
Kazuaki Murakami
Authentication and Profiling
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
77(12)
Thi Ai Thao Nguyen
Dinh Thanh Nguyen
Tran Khanh Dang
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History
89(10)
Priagung Khusumanegara
Rischan Mafrur
Deokjai Choi
Data Management and Information Advertising
Strength of Relationship Between Multi-labeled Data and Labels
99(10)
Masahiro Kuzunishi
Tetsuya Furukawa
Online Ad-fraud in Search Engine Advertising Campaigns: Prevention, Detection and Damage Limitation
109(12)
Andreas Mladenow
Niina Maarit Novak
Christine Strauss
Applied Modeling and Simulation
Markov Chain Solution to the 3-Tower Problem
121(8)
Guido David
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem
129(10)
Yusuke Watanabe
Mayumi Takaya
Akihiro Yamamura
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons
139(12)
Hikari Kato
Szilard Zsolt Fazekas
Mayumi Takaya
Akihiro Yamamura
Network Security
Can We Securely Use CBC Mode in TLS1.0?
151(10)
Takashi Kurokawa
Ryo Nojima
Shiho Moriai
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
161(12)
N. Renugadevi
C. Mala
Secure Mobility Management for MIPv6 with Identity-Based Cryptography
173(6)
Nan Guo
Fangting Peng
Tianhan Gao
Investigation of DDoS Attacks by Hybrid Simulation
179(14)
Yana Bekeneva
Konstantin Borisenko
Andrey Shorov
Igor Kotenko
Dependable Systems and Applications
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
193(10)
Sergey Krendelev
Mikhail Yakovlev
Maria Usoltseva
An Approach for Evaluating Softgoals Using Weight
203(10)
Shuichiro Yamamoto
An Efficient Unsavory Data Detection Method for Internet Big Data
213(8)
Peige Ren
Xiaofeng Wang
Hao Sun
Fen Xu
Baokang Zhao
Chunqing Wu
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments
221(8)
Sooyeon Shin
Seungyeon Kim
Taekyoung Kwon
Multimedia Security
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device
229(6)
Mi-Young Cho
Young-Sook Jeong
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions
235(8)
Chi-Yao Weng
Sheng-Jie Wang
Shiuh-Jeng Wang
Secure Image Deduplication in Cloud Storage
243(12)
Han Gang
Hongyang Yan
Lingling Xu
Cryptography
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse
255(10)
Chunlu Chen
Hiroaki Anada
Junpei Kawamoto
Kouichi Sakurai
Differential Fault Attack on LEA
265(10)
Dirmanto Jap
Jakub Breier
A Secure Multicast Key Agreement Scheme
275(7)
Hsing-Chung Chen
Chung-Wei Chen
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution: Extended Abstract
282(7)
Bo Liu
Baokang Zhao
Chunqing Wu
Wanrong Yu
Ilsun You
Big Data and Text Mining
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics
289(11)
Yanchen Liu
Fang Cao
Masood Mortazavi
Mengmeng Chen
Ning Yan
Chi Ku
Aniket Adnaik
Stephen Morgan
Guangyu Shi
Yuhu Wang
Fan Fang
Incorporating Big Data Analytics into Enterprise Information Systems
300(10)
Zhaohao Sun
Francisca Pambel
Fangwei Wang
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment
310(13)
Martin Sarnovsky
Peter Butka
Peter Bednar
Frantisek Babic
Jan Paralic
Social Impact of EIS and Visualization
Corporate Social Responsibility in Social Media Environment
323(10)
Antonin Pavlicek
Petr Doucek
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use
333(10)
David Kiwana
Bjorn Johansson
Sven Carlsson
Software Model Creation with Multidimensional UML
343(10)
Lukas Gregorovic
Ivan Polasek
Branislav Sobota
Author Index 353