Cargando…

Information technology applications in industry II : selected peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI2013), July 23-24, 2013, Zhuhai, China /

Collection of selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Zhuhai, China. Volume is indexed by Thomson Reuters CPCI-S (WoS). The 642 papers are grouped as follows: Chapter 1: Information...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Conference on Information Technology and Management Innovation Zhuhai, China
Otros Autores: Yarlagadda, Prasad (Editor ), Yang, Su-Fen (Editor ), Lee, Keon Myung (Editor )
Formato: Electrónico Congresos, conferencias eBook
Idioma:Inglés
Publicado: Durnten-Zurich : Trans Tech Publications, [2013]
Colección:Applied mechanics and materials ; v. 411-414.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Information Technology Applications in Industry II; Preface and Conference Organization; Table of Contents; Chapter 1: Information Processing and Information Security; Lattice-Based Multi-Signature Schemes; Automatic Email Configuration System Using Multimodal Authentication Interfaces for Smartphones; Implementation of RFID Middleware Based on Hash Chain; A Novel RFID Authentication Protocol Based on NTRU; The Study on the Hot Topics of Improvisation Research Based on the Co-Word Analysis; Computer Classification of Anomaly Intrusion Detection Based on Support Vector Machine
  • Combination Performance-Enhancing Technology for PCM-FM Telemetry System Based on MSD and TPCRoles Generation for Applications in RBAC Model; A Trust-Aware Access Control Policy for Cloud Data Protection; Effects of e-Derivative on Algebraic Immunity, Correlation Immunity and Algebraic Degree of H Boolean Functions; Information Fusion Based on Improved D-S Evidence Theory; The Design and Realization of the Single-Block Hash Function for the Short Message; A Secure Cloud Computing Scaling Model; Algorithms of Constructing Symmetric Boolean Functions with Second-Order Correlation-Immunity
  • An Evaluation Method for Information Security Level Based on OWA Operator and Bayesian NetworkMulti-Parameters Predicting Method of Geo-Pressure in Carbonate Formation; Towards a Computer-Based Information Retrieval Systems Process; Exploring the Context of Pioneer Missionary in Northern Taiwan by Analyzing George Leslie Mackay's Diary; An Analysis of the Blog-User Attitude Employing Structural Equation Modeling Combine TAM and TPB Model; Improved Collaborative Filtering Recommendation Algorithm Based on Weighted Association Rules
  • Personalized Web Service Recommendation Based on User InterestResearch and Implementation on a Statistic Algorithm Based on Multidimensional Dynamic Reports; An Improved Method of Judging the Theme Relativity Based on Vector Space Model in Vertical Search Engine; The Changing Nature of Health Information Dissemination through the Role of Social Media; Towards Capturing Population-Wide Expertise via Online Professional Social Network Systems; A Low Power Design of SM4 Cipher Based on MUX S-Box Architecture
  • Study of Point to Point Self-Service Travel Site Iterative Interaction Design Based on User ExperienceAn Impersonating-Resilient Key Agreement Scheme for Wireless Sensor Networks; Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme; Modeling and Simulation on Knowledge Transfer among Unofficial Groups Based on Communication Networks; A Review of Scientific Publishing Platforms; A Method for Building Geographical Conditions Ontology Attribute Library: Taking Tianjin as an Example