Hasil Pencarian

Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4622 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of the First European Conference on Service-Oriented and Cloud Computing, ESOCC, held in Bertinoro, Italy, in September 2012. The 12 full papers, 3 short papers and 3 poster papers were carefully reviewed and selected from 57 submissions. The volume also contains 7 papers from the industrial track. The papers cover the following topics, cloud computing, service quality and analysis, service composition and evolution, composition, security, modeling, and adaption."
Berlin: Springer-Verlag, 2012
e20409325
eBooks  Universitas Indonesia Library
cover
cover
"This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation, (blind) signatures and threshold encryption, zero-knowledge and security models, leakage-resilience, hash functions, differential privacy, pseudorandomness, dedicated encryption, security amplification, and resettable and parallel zero knowledge."
Berlin : Springer-Verlag, 2012
e20410607
eBooks  Universitas Indonesia Library
cover
"The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation."
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
Sara Foresti, editor
"This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems, formal models for cryptography and access control, security and privacy in mobile and wireless networks, counteracting man-in-the-middle attacks, network security, users privacy and anonymity, location privacy, voting protocols and anonymous communication, private computation in cloud systems, formal security models, identity based encryption and group signature, authentication, encryption key and password security, malware and phishing, and software security."
Lengkap +
Berlin: [Springer-Verlag, ], 2012
e20410002
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 9th European Conference on Wireless Sensor Networks, EWSN 2012, held in Trento, Italy, in Februar 2012. The 16 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on communication and security, system issues, reliability, localization and smart cameras, and hardware and sensing."
Berlin: Springer, 2012
e20406447
eBooks  Universitas Indonesia Library
cover
"The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices, signature schemes, encryption schemes, efficient two-party and multi-party computation, security in the UC framework, cryptanalysis; efficient constructions, and protocols and combiners."
Berlin: Springer-Verlag, 2012
e20409399
eBooks  Universitas Indonesia Library
cover
Chengfei Liu, editor
"This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.
"
Lengkap +
Berlin: Springer, 2012
e20407155
eBooks  Universitas Indonesia Library
cover
Massimo Ferri, editor
"This book constitutes the proceedings of the 4th International Workshop on Computational Topology in Image Context, CTIC 2012, held in Bertinoro, Italy, in May 2012. The 16 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They focus on the topology and computation in image context. The workshop is devoted to computational methods using topology for the analysis and comparison of images. The involved research fields comprise computational topology and geometry, discrete topology and geometry, geometrical modeling, algebraic topology for image applications, and any other field involving a geometric-topological approach to image processing."
Berlin: [Springer-Verlag, ], 2012
e20410301
eBooks  Universitas Indonesia Library
cover
Barry, Douglas K.
"Web Services, Service-Oriented Architectures, and Cloud Computing is a jargon-free, highly illustrated explanation of how to leverage the rapidly multiplying services available on the Internet. The future of business will depend on software agents, mobile devices, public and private clouds, big data, and other highly connected technology. IT professionals will need to evaluate and combine online services into service-oriented architectures (SOA), often depending on Web services and cloud computing. This can mean a fundamental shift away from custom software and towards a more nimble use of semantic vocabularies, middle-tier systems, adapters and other standardizing aspects.
This book is a guide for the savvy manager who wants to capitalize on this technological revolution. It begins with a high-level example of how an average person might interact with a service-oriented architecture, and progresses to more detail, discussing technical forces driving adoption and how to manage technology, culture and personnel issues that can arise during adoption. An extensive reference section provides quick access to commonly used terms and concepts."
Lengkap +
Amsterdam: Morgan Kaufmann, 2013
e20480364
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>