Information technology applications in industry II : selected peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI2013), July 23-24, 2013, Zhuhai, China /
Collection of selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Zhuhai, China. Volume is indexed by Thomson Reuters CPCI-S (WoS). The 642 papers are grouped as follows: Chapter 1: Information...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico Congresos, conferencias eBook |
Idioma: | Inglés |
Publicado: |
Durnten-Zurich :
Trans Tech Publications,
[2013]
|
Colección: | Applied mechanics and materials ;
v. 411-414. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Information Technology Applications in Industry II; Preface and Conference Organization; Table of Contents; Chapter 1: Information Processing and Information Security; Lattice-Based Multi-Signature Schemes; Automatic Email Configuration System Using Multimodal Authentication Interfaces for Smartphones; Implementation of RFID Middleware Based on Hash Chain; A Novel RFID Authentication Protocol Based on NTRU; The Study on the Hot Topics of Improvisation Research Based on the Co-Word Analysis; Computer Classification of Anomaly Intrusion Detection Based on Support Vector Machine
- Combination Performance-Enhancing Technology for PCM-FM Telemetry System Based on MSD and TPCRoles Generation for Applications in RBAC Model; A Trust-Aware Access Control Policy for Cloud Data Protection; Effects of e-Derivative on Algebraic Immunity, Correlation Immunity and Algebraic Degree of H Boolean Functions; Information Fusion Based on Improved D-S Evidence Theory; The Design and Realization of the Single-Block Hash Function for the Short Message; A Secure Cloud Computing Scaling Model; Algorithms of Constructing Symmetric Boolean Functions with Second-Order Correlation-Immunity
- An Evaluation Method for Information Security Level Based on OWA Operator and Bayesian NetworkMulti-Parameters Predicting Method of Geo-Pressure in Carbonate Formation; Towards a Computer-Based Information Retrieval Systems Process; Exploring the Context of Pioneer Missionary in Northern Taiwan by Analyzing George Leslie Mackay's Diary; An Analysis of the Blog-User Attitude Employing Structural Equation Modeling Combine TAM and TPB Model; Improved Collaborative Filtering Recommendation Algorithm Based on Weighted Association Rules
- Personalized Web Service Recommendation Based on User InterestResearch and Implementation on a Statistic Algorithm Based on Multidimensional Dynamic Reports; An Improved Method of Judging the Theme Relativity Based on Vector Space Model in Vertical Search Engine; The Changing Nature of Health Information Dissemination through the Role of Social Media; Towards Capturing Population-Wide Expertise via Online Professional Social Network Systems; A Low Power Design of SM4 Cipher Based on MUX S-Box Architecture
- Study of Point to Point Self-Service Travel Site Iterative Interaction Design Based on User ExperienceAn Impersonating-Resilient Key Agreement Scheme for Wireless Sensor Networks; Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme; Modeling and Simulation on Knowledge Transfer among Unofficial Groups Based on Communication Networks; A Review of Scientific Publishing Platforms; A Method for Building Geographical Conditions Ontology Attribute Library: Taking Tianjin as an Example