000 03430nam a22006735i 4500
001 978-3-642-22039-5
003 DE-He213
005 20240730180335.0
007 cr nn 008mamaa
008 110629s2011 gw | s |||| 0|eng d
020 _a9783642220395
_9978-3-642-22039-5
024 7 _a10.1007/978-3-642-22039-5
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aIntelligence and Security Informatics
_h[electronic resource] :
_bPacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings /
_cedited by Michael Chau, G. Alan Wang, Xiaolong Zheng, Hsinchun Chen, Daniel Zeng, Wenji Mao.
250 _a1st ed. 2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2011.
300 _aX, 133 p. 50 illus., 41 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6749
520 _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and the 5 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis and knowledge discovery; information access and security; and infectious disease informatics.
650 0 _aApplication software.
_9119719
650 0 _aData mining.
_93907
650 0 _aComputer networks .
_931572
650 0 _aComputers and civilization.
_921733
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 0 _aElectronic data processing
_xManagement.
_9119720
650 1 4 _aComputer and Information Systems Applications.
_9119721
650 2 4 _aData Mining and Knowledge Discovery.
_9119722
650 2 4 _aComputer Communication Networks.
_9119723
650 2 4 _aComputers and Society.
_931668
650 2 4 _aLegal Aspects of Computing.
_953952
650 2 4 _aIT Operations.
_931703
700 1 _aChau, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119724
700 1 _aWang, G. Alan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119725
700 1 _aZheng, Xiaolong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119726
700 1 _aChen, Hsinchun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119727
700 1 _aZeng, Daniel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119728
700 1 _aMao, Wenji.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9119729
710 2 _aSpringerLink (Online service)
_9119730
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642220388
776 0 8 _iPrinted edition:
_z9783642220401
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6749
_9119731
856 4 0 _uhttps://doi.org/10.1007/978-3-642-22039-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90272
_d90272