000 03928nam a22004935i 4500
001 978-3-642-35473-1
003 DE-He213
005 20200420220213.0
007 cr nn 008mamaa
008 121215s2013 gw | s |||| 0|eng d
020 _a9783642354731
_9978-3-642-35473-1
024 7 _a10.1007/978-3-642-35473-1
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
082 0 4 _a006.3
_223
245 1 0 _aAdvances in Intelligent Systems and Applications - Volume 2
_h[electronic resource] :
_bProceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12-14, 2012 /
_cedited by Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2013.
300 _aXXIV, 811 p. 505 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSmart Innovation, Systems and Technologies,
_x2190-3018 ;
_v21
505 0 _aAuthentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.
520 _aThe field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:  l   Authentication, Identification, and Signature l   Intrusion Detection l   Steganography, Data Hiding, and Watermarking l   Database, System, and Communication Security l   Computer Vision, Object Tracking, and Pattern Recognition l   Image Processing, Medical Image Processing, and Video Coding l   Digital Content, Digital Life, and Human Computer Interaction l   Parallel, Peer-to-peer, Distributed, and Cloud Computing l   Software Engineering and Programming Language  This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find  this book interesting.
650 0 _aEngineering.
650 0 _aArtificial intelligence.
650 0 _aComputational intelligence.
650 1 4 _aEngineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aArtificial Intelligence (incl. Robotics).
700 1 _aPan, Jeng-Shyang.
_eeditor.
700 1 _aYang, Ching-Nung.
_eeditor.
700 1 _aLin, Chia-Chen.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642354724
830 0 _aSmart Innovation, Systems and Technologies,
_x2190-3018 ;
_v21
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-35473-1
912 _aZDB-2-ENG
942 _cEBK
999 _c51433
_d51433