|
|
|
|
LEADER |
03058nam a22006135i 4500 |
001 |
11339 |
003 |
DE-He213 |
005 |
20130725202557.0 |
007 |
cr nn 008mamaa |
008 |
101030s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642165764
|9 978-3-642-16576-4
|
024 |
7 |
# |
|a 10.1007/978-3-642-16576-4
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a UR
|2 bicssc
|
072 |
# |
7 |
|a UTN
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
# |
|a Xie, Bing.
|e editor.
|
245 |
1 |
0 |
|a Autonomic and Trusted Computing
|b 7th International Conference, ATC 2010, Xi an, China, October 26-29, 2010. Proceedings /
|c edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a XVII, 328p. 112 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 6407
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the 7th International Conference on Autonomic and Trusted Computing, ATC 2010, held in Xi'an, China, in October 2010. The 20 revised full papers presented together with 3 invited papers and 2 keynote abstracts were carefully reviewed and selected from 68 submissions. The papers address all current issues in autonomic, organic, and trusted computing, with special focus on theory and models, architectures and systems, components and modules, communication and services, as well as on tools and interfaces. They also feature actual research on trust models and specifications, trust-related security and privacy, trusted reliable and dependable systems, trustworthy services and applications, plus trust standards and non-technical issues.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Software engineering.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Information systems.
|
650 |
# |
0 |
|a Information Systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Information Systems Applications (incl.Internet).
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
# |
|a Branke, Juergen.
|e editor.
|
700 |
1 |
# |
|a Sadjadi, S. Masoud.
|e editor.
|
700 |
1 |
# |
|a Zhang, Daqing.
|e editor.
|
700 |
1 |
# |
|a Zhou, Xingshe.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642165757
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 6407
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-16576-4
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|