Paperback. Condizione: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
Condizione: New.
Condizione: New.
Condizione: New.
Condizione: As New. Unread book in perfect condition.
Da: California Books, Miami, FL, U.S.A.
EUR 64,68
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. pp. 320.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,28
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,40
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
EUR 66,62
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 320 80 Illus.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 58,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. 1st ed. 2018 edition NO-PA16APR2015-KAP.
EUR 68,73
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 320.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 65,76
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Lingua: Inglese
Editore: Springer-Verlag New York Inc, 2018
ISBN 10: 9811329060 ISBN 13: 9789811329067
Da: Revaluation Books, Exeter, Regno Unito
EUR 76,64
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 236 pages. 9.25x6.10x0.54 inches. In Stock.
Lingua: Inglese
Editore: Springer-Verlag New York Inc, 2008
ISBN 10: 3540850732 ISBN 13: 9783540850731
Da: Revaluation Books, Exeter, Regno Unito
EUR 76,96
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 234 pages. 9.50x6.25x0.50 inches. In Stock.
Da: Revaluation Books, Exeter, Regno Unito
EUR 97,71
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2014 edition. 316 pages. 9.50x6.25x0.75 inches. In Stock.
Lingua: Inglese
Editore: Springer Nature Singapore, Springer Nature Singapore Okt 2018, 2018
ISBN 10: 9811329060 ISBN 13: 9789811329067
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 236 pp. Englisch.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, Springer Berlin Heidelberg Jul 2008, 2008
ISBN 10: 3540850732 ISBN 13: 9783540850731
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e orts of intruders, and has been widely discussed among - searchers in this eld. Contributions to the investigation of novel and e cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice,butthey alsoposeabigchallenge to protect the information transmitted over the open network frommalicious attacks.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 248 pp. Englisch.
Lingua: Inglese
Editore: Springer International Publishing, Springer International Publishing Jan 2014, 2014
ISBN 10: 3319041711 ISBN 13: 9783319041711
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 320 pp. Englisch.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2008
ISBN 10: 3540850732 ISBN 13: 9783540850731
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e orts of intruders, and has been widely discussed among - searchers in this eld. Contributions to the investigation of novel and e cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice,butthey alsoposeabigchallenge to protect the information transmitted over the open network frommalicious attacks.
Lingua: Inglese
Editore: Springer International Publishing, Springer International Publishing, 2014
ISBN 10: 3319041711 ISBN 13: 9783319041711
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.
Da: Books From California, Simi Valley, CA, U.S.A.
hardcover. Condizione: Very Good.
Lingua: Inglese
Editore: Springer Nature Singapore, Springer Nature Singapore, 2018
ISBN 10: 9811329060 ISBN 13: 9789811329067
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 56,98
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Da: Buchpark, Trebbin, Germania
EUR 35,81
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Gut. Zustand: Gut | Seiten: 320 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Da: Buchpark, Trebbin, Germania
EUR 35,81
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Seiten: 320 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 170,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 170,36
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.