|
|
|
|
LEADER |
05938cam a22009132 4500 |
001 |
0-1652023135 |
003 |
DE-627 |
005 |
20240122104956.0 |
007 |
cr uuu---uuuuu |
008 |
130207s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642358401
|9 978-3-642-35840-1
|
024 |
7 |
|
|a 10.1007/978-3-642-35840-1
|2 doi
|
035 |
|
|
|a (DE-627)1652023135
|
035 |
|
|
|a (DE-576)378519948
|
035 |
|
|
|a (DE-599)BSZ378519948
|
035 |
|
|
|a (OCoLC)829742040
|
035 |
|
|
|a (ZBM)1278.68028
|
035 |
|
|
|a (DE-He213)978-3-642-35840-1
|
035 |
|
|
|a (EBP)040546713
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.U83
|a QA76.9.H85
|
072 |
|
7 |
|a UYZG
|2 bicssc
|
072 |
|
7 |
|a UYZ
|2 bicssc
|
072 |
|
7 |
|a COM070000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 68M12
|2 msc
|
084 |
|
|
|a 68T05
|2 msc
|
084 |
|
|
|a 00B15
|2 msc
|
100 |
1 |
|
|a Gavrilova, Marina L.
|4 aut
|
245 |
1 |
0 |
|a Transactions on Computational Science XVII
|c edited by Marina L. Gavrilova, C. J. Kenneth Tan
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XII, 199 p. 86 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7420
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation -- Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder -- Secure Congestion Adaptive Routing Using Group Signature Scheme -- Practicability of HFE Scheme for Wireless Sensor Network -- Intersection Attack on Anonymity in VANET -- Cluster Based RSU Centric Channel Access for VANETs -- Efficient Identity-Based and Authenticated Key Agreement Protocol.
|
520 |
|
|
|a The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 17th issue of the Transactions on Computational Science journal consists of two parts. The first part is comprised of four papers, spanning the areas of robotics and augmented reality, computer game evaluation strategies, cognitive perception in crowd control simulation, and reversible processor design using look-ahead. The second part consists of five papers covering the topics of secure congestion adaptive routing, cryptographic schemes for wireless sensor networks, intersection attacks on anonymity, and reliable message delivery in Vehicular Ad Hoc Networks (VANET).
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Artificial intelligence
|
650 |
|
0 |
|a Human-computer interaction.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Electronic data processing
|
700 |
1 |
|
|a Tan, C. J. Kenneth
|4 oth
|
776 |
1 |
|
|z 9783642358395
|
776 |
0 |
8 |
|i Erscheint auch als
|n Druck-Ausgabe
|t Transactions on computational science ; 17
|d Berlin : Springer, 2013
|h VI, 197 S.
|w (DE-627)1451923651
|w (DE-576)381923657
|z 9783642358395
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7420
|9 7420
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-35840-1
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz378519948cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130402155116
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1278.68028
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
951 |
|
|
|a BO
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35840-1
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3356041533
|z 2013-02-07T10:39:25Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35840-1
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3356041576
|z 2013-02-07T10:39:25Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35840-1
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3356041657
|z 2013-02-07T10:39:25Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35840-1
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3356041703
|z 2013-02-07T10:39:25Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35840-1
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3356041746
|z 2013-02-07T10:39:25Z
|
980 |
|
|
|a 1652023135
|b 0
|k 1652023135
|o 378519948
|
SOLR
_version_ |
1792258590186143744 |
access_facet |
Electronic Resources |
author |
Gavrilova, Marina L. |
author2 |
Tan, C. J. Kenneth |
author2_role |
oth |
author2_variant |
c j k t cjk cjkt |
author_facet |
Gavrilova, Marina L., Tan, C. J. Kenneth |
author_role |
aut |
author_sort |
Gavrilova, Marina L. |
author_variant |
m l g ml mlg |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.U83 QA76.9.H85 |
callnumber-search |
QA76.9.U83 QA76.9.H85 |
callnumber-sort |
QA 276.9 U83 Q A76 19. H85 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation -- Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder -- Secure Congestion Adaptive Routing Using Group Signature Scheme -- Practicability of HFE Scheme for Wireless Sensor Network -- Intersection Attack on Anonymity in VANET -- Cluster Based RSU Centric Channel Access for VANETs -- Efficient Identity-Based and Authenticated Key Agreement Protocol., The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 17th issue of the Transactions on Computational Science journal consists of two parts. The first part is comprised of four papers, spanning the areas of robotics and augmented reality, computer game evaluation strategies, cognitive perception in crowd control simulation, and reversible processor design using look-ahead. The second part consists of five papers covering the topics of secure congestion adaptive routing, cryptographic schemes for wireless sensor networks, intersection attacks on anonymity, and reliable message delivery in Vehicular Ad Hoc Networks (VANET). |
ctrlnum |
(DE-627)1652023135, (DE-576)378519948, (DE-599)BSZ378519948, (OCoLC)829742040, (ZBM)1278.68028, (DE-He213)978-3-642-35840-1, (EBP)040546713 |
de15_date |
2013-02-07T10:39:25Z |
dech1_date |
2013-02-07T10:39:25Z |
doi_str_mv |
10.1007/978-3-642-35840-1 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7420 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652023135 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652023135 |
is_hierarchy_title |
Transactions on Computational Science XVII |
isbn |
9783642358401 |
isbn_isn_mv |
9783642358395 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652023135 |
language |
English |
last_indexed |
2024-02-29T18:23:05.59Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Artificial intelligence, Human-computer interaction., Computer networks ., User interfaces (Computer systems)., Electronic data processing |
marc024a_ct_mv |
10.1007/978-3-642-35840-1 |
match_str |
gavrilova2013transactionsoncomputationalsciencexvii |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7420 |
oclc_num |
829742040 |
physical |
Online-Ressource (XII, 199 p. 86 illus, digital) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
378519948 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3198425 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7420 |
series2 |
Lecture Notes in Computer Science ; 7420, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Gavrilova, Marina L. aut, Transactions on Computational Science XVII edited by Marina L. Gavrilova, C. J. Kenneth Tan, Berlin, Heidelberg Springer 2013, Online-Ressource (XII, 199 p. 86 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7420, SpringerLink Bücher, An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation -- Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder -- Secure Congestion Adaptive Routing Using Group Signature Scheme -- Practicability of HFE Scheme for Wireless Sensor Network -- Intersection Attack on Anonymity in VANET -- Cluster Based RSU Centric Channel Access for VANETs -- Efficient Identity-Based and Authenticated Key Agreement Protocol., The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 17th issue of the Transactions on Computational Science journal consists of two parts. The first part is comprised of four papers, spanning the areas of robotics and augmented reality, computer game evaluation strategies, cognitive perception in crowd control simulation, and reversible processor design using look-ahead. The second part consists of five papers covering the topics of secure congestion adaptive routing, cryptographic schemes for wireless sensor networks, intersection attacks on anonymity, and reliable message delivery in Vehicular Ad Hoc Networks (VANET)., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Artificial intelligence, Human-computer interaction., Computer networks ., User interfaces (Computer systems)., Electronic data processing, Tan, C. J. Kenneth oth, 9783642358395, Erscheint auch als Druck-Ausgabe Transactions on computational science ; 17 Berlin : Springer, 2013 VI, 197 S. (DE-627)1451923651 (DE-576)381923657 9783642358395, Lecture notes in computer science 7420 7420 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-35840-1 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz378519948cov.jpg V:DE-576 X:springer image/jpeg 20130402155116 Cover, https://zbmath.org/?q=an:1278.68028 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-35840-1 DE-14, DE-14 epn:3356041533 2013-02-07T10:39:25Z, http://dx.doi.org/10.1007/978-3-642-35840-1 DE-15, DE-15 epn:3356041576 2013-02-07T10:39:25Z, http://dx.doi.org/10.1007/978-3-642-35840-1 DE-Ch1, DE-Ch1 epn:3356041657 2013-02-07T10:39:25Z, http://dx.doi.org/10.1007/978-3-642-35840-1 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3356041703 2013-02-07T10:39:25Z, http://dx.doi.org/10.1007/978-3-642-35840-1 DE-520, DE-520 epn:3356041746 2013-02-07T10:39:25Z |
spellingShingle |
Gavrilova, Marina L., Transactions on Computational Science XVII, Lecture notes in computer science, 7420, An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching Industrial Robots -- A Combined Position Evaluation Function in Chinese Chess Computer Game -- Modeling and Analyzing the Human Cognitive Limits for Perception in Crowd Simulation -- Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder -- Secure Congestion Adaptive Routing Using Group Signature Scheme -- Practicability of HFE Scheme for Wireless Sensor Network -- Intersection Attack on Anonymity in VANET -- Cluster Based RSU Centric Channel Access for VANETs -- Efficient Identity-Based and Authenticated Key Agreement Protocol., The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 17th issue of the Transactions on Computational Science journal consists of two parts. The first part is comprised of four papers, spanning the areas of robotics and augmented reality, computer game evaluation strategies, cognitive perception in crowd control simulation, and reversible processor design using look-ahead. The second part consists of five papers covering the topics of secure congestion adaptive routing, cryptographic schemes for wireless sensor networks, intersection attacks on anonymity, and reliable message delivery in Vehicular Ad Hoc Networks (VANET)., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Artificial intelligence, Human-computer interaction., Computer networks ., User interfaces (Computer systems)., Electronic data processing |
swb_id_str |
378519948 |
title |
Transactions on Computational Science XVII |
title_auth |
Transactions on Computational Science XVII |
title_full |
Transactions on Computational Science XVII edited by Marina L. Gavrilova, C. J. Kenneth Tan |
title_fullStr |
Transactions on Computational Science XVII edited by Marina L. Gavrilova, C. J. Kenneth Tan |
title_full_unstemmed |
Transactions on Computational Science XVII edited by Marina L. Gavrilova, C. J. Kenneth Tan |
title_in_hierarchy |
7420. Transactions on Computational Science XVII (2013) |
title_short |
Transactions on Computational Science XVII |
title_sort |
transactions on computational science xvii |
title_unstemmed |
Transactions on Computational Science XVII |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Artificial intelligence, Human-computer interaction., Computer networks ., User interfaces (Computer systems)., Electronic data processing |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Artificial intelligence, Human-computer interaction., Computer networks ., User interfaces (Computer systems)., Electronic data processing |
url |
https://doi.org/10.1007/978-3-642-35840-1, https://swbplus.bsz-bw.de/bsz378519948cov.jpg, https://zbmath.org/?q=an:1278.68028, http://dx.doi.org/10.1007/978-3-642-35840-1 |