Scientific Library of Tomsk State University

   E-catalog        

Image from Google Jackets
Normal view MARC view

International Joint Conference electronic resource CISIS’15 and ICEUTE’15 / edited by Álvaro Herrero, Bruno Baruque, Javier Sedano, Héctor Quintián, Emilio Corchado.

Contributor(s): Herrero, Álvaro [editor.] | Baruque, Bruno [editor.] | Sedano, Javier [editor.] | Quintián, Héctor [editor.] | Corchado, Emilio [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Advances in Intelligent Systems and ComputingPublication details: Cham : Springer International Publishing : Imprint: Springer, 2015Description: XXII, 641 p. 138 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319197135Subject(s): engineering | Data mining | Artificial intelligence | higher education | Computational Intelligence | Engineering | Computational Intelligence | Artificial Intelligence (incl. Robotics) | Higher Education | Data Mining and Knowledge DiscoveryDDC classification: 006.3 LOC classification: Q342Online resources: Click here to access online
Contents:
Applications of Intelligent Methods for Security -- Infrastructure and Network Security -- CISIS15-SS01: Digital Identities Management by Means of Non-Standard Digital Signatures Schemes -- CISIS15-SS02: User-Centric Security & Privacy -- Domain Applications and Case Studies -- Information Technologies for Transnational Learning -- Teaching and Evaluation Methodologies.
In: Springer eBooksSummary: This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on EUropean Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Applications of Intelligent Methods for Security -- Infrastructure and Network Security -- CISIS15-SS01: Digital Identities Management by Means of Non-Standard Digital Signatures Schemes -- CISIS15-SS02: User-Centric Security & Privacy -- Domain Applications and Case Studies -- Information Technologies for Transnational Learning -- Teaching and Evaluation Methodologies.

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on EUropean Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.

There are no comments on this title.

to post a comment.