Transactions on computational science XXX : special issue on cyberworlds and cybersecurity /
Saved in:
Imprint: | Berlin, Germany : Springer, 2017. |
---|---|
Description: | 1 online resource (xiii, 111 pages) : illustrations |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 10560 Lecture notes in computer science ; 10560. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11384831 |
Varying Form of Title: | Transactions on computational science 30 |
---|---|
Other authors / contributors: | Gavrilova, Marina L., editor. Tan, C. J. Kenneth (Chih Jeng Kenneth), editor. Sourin, Alexei, editor. |
ISBN: | 9783662560068 3662560062 9783662560051 3662560054 |
Digital file characteristics: | text file PDF |
Notes: | Includes author index. Online resource; title from PDF title page (SpringerLink, viewed November 3, 2017). |
Summary: | The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This, the 30th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, held in Chongqing, China, in September 2016. The first paper is a position paper giving an outline of current research at the intersection of cybersecurity and cyberworlds, and specifically focusing on mining behavioral data from online social networks. The remaining 5 papers focus on a range of topics, including privacy assurance in online location services, human gait recognition using KINECT sensors, hand-gesture recognition for computer games, scene matching between the source image and the target image for virtual reality applications, and human identification using brain waves. |
Other form: | Printed edition: 9783662560051 |
Standard no.: | 10.1007/978-3-662-56006-8 |
Similar Items
-
Internet and intranet security management : risks and solutions /
by: Janczewski, Lech, 1943-
Published: (2000) -
Guide to computer network security /
by: Kizza, Joseph Migga
Published: (2013) -
Insider threats in cyber security /
Published: (2010) -
Security operations center guidebook : a practical guide for a successful SOC /
by: Jarpey, Gregory
Published: (2017) -
Kerberos : a network authentication system /
by: Tung, Brian, 1967-
Published: (1999)