Informatics Engineering and Information Science: International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part 1
Azizah Abd Manaf, Akram Zeki, Mazdak Zamani, Suriayati Chuprat, Eyas El-Qawasmeh
Springer Science & Business Media, Oct 28, 2011 - Computers - 625 pages
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Abd Manaf affine cipher alarm algorithm analysis application aspect attack authentication Berlin Heidelberg 2011 bilinear pairings block Boolean functions cipher ciphertext communication component Computer covert channels cryptographic database decrypt defined detection digital watermarking distributed domain e-learning Education embedded encryption Engineering environment evaluation experience factors frequency Heidelberg homomorphic encryption ICIEIS IEEE implementation input interaction International Conference Internet learning LINQ LNCS malware method mobile devices module Newfoundland and Labrador nodes optimization packet parameters peers plaintext private key problem proposed protocol proxy public key query re-encryption requirements respondents result RFID scheme sender server signature software quality software quality model sound spam speech standards Steganography Table task Tawaf techniques Technology test suite transformation trust Universiti Teknologi Malaysia virtual watermarking workflow