Cloud Computing and Big Data: Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers
Saved in:
Other Authors: | , , |
---|---|
Format: | Electronic Conference Proceedings eBook |
Language: | English |
Published: |
[Cham]
Springer
[2015]
|
Series: | Lecture Notes in Computer Science
9106 |
Subjects: | |
Links: | https://doi.org/10.1007/978-3-319-28430-9 https://doi.org/10.1007/978-3-319-28430-9 https://doi.org/10.1007/978-3-319-28430-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Physical Description: | 1 Online-Ressource (XVII, 400 Seiten) 161 Illustrationen |
ISBN: | 9783319284309 9783319284293 |
DOI: | 10.1007/978-3-319-28430-9 |
Staff View
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408653 | ||
003 | DE-604 | ||
005 | 20200227 | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319284309 |c Online |9 978-3-319-28430-9 | ||
020 | |a 9783319284293 |c Print |9 978-3-319-28429-3 | ||
024 | 7 | |a 10.1007/978-3-319-28430-9 |2 doi | |
035 | |a (OCoLC)936806630 | ||
035 | |a (DE-599)BVBBV043408653 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-861 |a DE-860 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Cloud Computing and Big Data |b Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers |c Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu (eds.) |
264 | 1 | |a [Cham] |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (XVII, 400 Seiten) |b 161 Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9106 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer software / Reusability | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer system failures | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Database management | |
650 | 4 | |a Data mining | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Database Management | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a System Performance and Evaluation | |
650 | 4 | |a Performance and Reliability | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Big Data |0 (DE-588)4802620-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Online-Community |0 (DE-588)1071012568 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Huangshan |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 2 | |a Big Data |0 (DE-588)4802620-7 |D s |
689 | 0 | 3 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 4 | |a Online-Community |0 (DE-588)1071012568 |D s |
689 | 0 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 6 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Qiang, Weizhong |4 edt | |
700 | 1 | |a Zheng, Xianghan |4 edt | |
700 | 1 | |a Hsu, Ching-Hsien |d 1963- |0 (DE-588)141291230 |4 edt | |
711 | 2 | |a CloudCom-Asia |n 2. |d 2015 |c Huang Shan |j Sonstige |0 (DE-588)1084219816 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9106 |w (DE-604)BV014880109 |9 9106 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-28430-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028827000 | |
966 | e | |u https://doi.org/10.1007/978-3-319-28430-9 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28430-9 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-TUM_katkey | 2186079 |
---|---|
_version_ | 1821935398195036160 |
adam_text |
CLOUD COMPUTING AND BIG DATA
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE SECOND
INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA, CLOUDCOM-ASIA
2015, HELD IN HUANGSHAN, CHINA, IN JUNE 2015. THE 29 FULL PAPERS AND TWO
KEYNOTE SPEECHES WERE CAREFULLY REVIEWED AND SELECTED FROM 106
SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON CLOUD
ARCHITECTURE; APPLICATIONS; BIG DATA AND SOCIAL NETWORK; SECURITY AND
PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CLOUD COMPUTING AND BIG DATA
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CLOUD ARCHITECTURE
APPLICATIONS
BIG DATA AND SOCIAL NETWORKS; SECURITY AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Qiang, Weizhong Zheng, Xianghan Hsu, Ching-Hsien 1963- |
author2_role | edt edt edt |
author2_variant | w q wq x z xz c h h chh |
author_GND | (DE-588)141291230 |
author_facet | Qiang, Weizhong Zheng, Xianghan Hsu, Ching-Hsien 1963- |
building | Verbundindex |
bvnumber | BV043408653 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936806630 (DE-599)BVBBV043408653 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-28430-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV043408653</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200227</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319284309</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-28430-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319284293</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-28429-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-28430-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936806630</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408653</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Computing and Big Data</subfield><subfield code="b">Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers</subfield><subfield code="c">Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 400 Seiten)</subfield><subfield code="b">161 Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9106</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software / Reusability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer system failures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System Performance and Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance and Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Online-Community</subfield><subfield code="0">(DE-588)1071012568</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Huangshan</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Online-Community</subfield><subfield code="0">(DE-588)1071012568</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qiang, Weizhong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zheng, Xianghan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hsu, Ching-Hsien</subfield><subfield code="d">1963-</subfield><subfield code="0">(DE-588)141291230</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CloudCom-Asia</subfield><subfield code="n">2.</subfield><subfield code="d">2015</subfield><subfield code="c">Huang Shan</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1084219816</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9106</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9106</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-28430-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028827000</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28430-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28430-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Huangshan gnd-content |
genre_facet | Konferenzschrift 2015 Huangshan |
id | DE-604.BV043408653 |
illustrated | Illustrated |
indexdate | 2025-01-11T19:08:11Z |
institution | BVB |
institution_GND | (DE-588)1084219816 |
isbn | 9783319284309 9783319284293 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028827000 |
oclc_num | 936806630 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
physical | 1 Online-Ressource (XVII, 400 Seiten) 161 Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers Lecture Notes in Computer Science Computer science Computer software / Reusability Computer communication systems Computer system failures Software engineering Database management Data mining Computer Science Database Management Computer Communication Networks Software Engineering Data Mining and Knowledge Discovery System Performance and Evaluation Performance and Reliability Informatik Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd Cloud Computing (DE-588)7623494-0 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssoftware (DE-588)4120906-0 gnd Informatik (DE-588)4026894-9 gnd Online-Community (DE-588)1071012568 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4802620-7 (DE-588)7623494-0 (DE-588)4123980-5 (DE-588)4120906-0 (DE-588)4026894-9 (DE-588)1071012568 (DE-588)1071861417 |
title | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers |
title_auth | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers |
title_exact_search | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers |
title_full | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu (eds.) |
title_fullStr | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu (eds.) |
title_full_unstemmed | Cloud Computing and Big Data Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu (eds.) |
title_short | Cloud Computing and Big Data |
title_sort | cloud computing and big data second international conference cloudcom asia 2015 huangshan china june 17 19 2015 revised selected papers |
title_sub | Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers |
topic | Computer science Computer software / Reusability Computer communication systems Computer system failures Software engineering Database management Data mining Computer Science Database Management Computer Communication Networks Software Engineering Data Mining and Knowledge Discovery System Performance and Evaluation Performance and Reliability Informatik Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd Cloud Computing (DE-588)7623494-0 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssoftware (DE-588)4120906-0 gnd Informatik (DE-588)4026894-9 gnd Online-Community (DE-588)1071012568 gnd |
topic_facet | Computer science Computer software / Reusability Computer communication systems Computer system failures Software engineering Database management Data mining Computer Science Database Management Computer Communication Networks Software Engineering Data Mining and Knowledge Discovery System Performance and Evaluation Performance and Reliability Informatik Datensicherung Big Data Cloud Computing Privatsphäre Anwendungssoftware Online-Community Konferenzschrift 2015 Huangshan |
url | https://doi.org/10.1007/978-3-319-28430-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028827000&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT qiangweizhong cloudcomputingandbigdatasecondinternationalconferencecloudcomasia2015huangshanchinajune17192015revisedselectedpapers AT zhengxianghan cloudcomputingandbigdatasecondinternationalconferencecloudcomasia2015huangshanchinajune17192015revisedselectedpapers AT hsuchinghsien cloudcomputingandbigdatasecondinternationalconferencecloudcomasia2015huangshanchinajune17192015revisedselectedpapers AT cloudcomasiahuangshan cloudcomputingandbigdatasecondinternationalconferencecloudcomasia2015huangshanchinajune17192015revisedselectedpapers |