Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)
Resource Information
The instance Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /) represents a material embodiment of a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
The Resource
Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)
Resource Information
The instance Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /) represents a material embodiment of a distinct intellectual or artistic creation found in University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
- Label
- Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)
- Title remainder
- International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I
- Medium
- electronic book /
- Statement of responsibility
- edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al
- Antecedent source
- mixed
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- pt. 1. Learning and fuzzy systems. Evolutionary computation. Intelligent agents and systems. Intelligent information retrieval. Support vector machine. Swarm intelligence. Data mining. Pattern recognition. Applications -- pt. 2. Cryptography and coding. Cryptographic protocols. Intrusion detection. Security models and architecture. Security management. Watermarking and information hiding. Web and network applications. Image and signal processing. Applications
- Dimensions
- unknown
- File format
- multiple file formats
- Isbn
- 9783540315995
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- absent
- Record ID
- b2148780
- Reformatting quality
- access
- Specific material designation
- remote
Context
Context of Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/-JOZ5XnZ3Lg/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/-JOZ5XnZ3Lg/">Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/-JOZ5XnZ3Lg/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/-JOZ5XnZ3Lg/">Computational Intelligence and Security (vol. # 3801) : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, edited by Yiu-ming Cheung, Yue Hao, Licheng Jiao, Yong-Chang Jiao et al, (electronic book /)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>