The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andse
[Communications in Computer and Information Science] Network Computing and Information Security Volume 345 || The Analysis of Influencing Factors of College Students’ Learning Effect in Face-to-Face, Online and Blended Learning
✍ Scribed by Lei, Jingsheng; Wang, Fu Lee; Li, Mo; Luo, Yuan
- Book ID
- 119949967
- Publisher
- Springer Berlin Heidelberg
- Year
- 2012
- Tongue
- English
- Weight
- 294 KB
- Edition
- 1
- Category
- Article
- ISBN
- 3642352111
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
📜 SIMILAR VOLUMES
A Cursory Glance At The Table Of Contents Of Eann 2009 Reveals The Am- Ing Range Of Neural Network And Related Applications. A Random But Revealing Sample Includes: Reducing Urban Concentration, Entropy Topography In Epil- Tic Electroencephalography, Phytoplanktonic Species Recognition, Revealing Th