Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 63,46
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 66,28
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GuthrieBooks, Spring Branch, TX, Etats-Unis
EUR 62,57
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
EUR 68,24
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 320.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 58,79
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 58,79
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 72,09
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 67,19
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 320 80 Illus.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 56,85
Quantité disponible : 10 disponible(s)
Ajouter au panierPaperback. Etat : New.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 56,96
Quantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 58,78
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Langue: anglais
Edité par Rowman & Littlefield Publishers 2001-06-01, 2001
ISBN 10 : 0742509346 ISBN 13 : 9780742509344
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 59,21
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : New.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 76,76
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. 1st ed. 2018 edition NO-PA16APR2015-KAP.
EUR 67,80
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 320.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 66,71
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Langue: anglais
Edité par Springer-Verlag New York Inc, 2018
ISBN 10 : 9811329060 ISBN 13 : 9789811329067
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 78,46
Quantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 236 pages. 9.25x6.10x0.54 inches. In Stock.
Langue: anglais
Edité par Springer-Verlag New York Inc, 2008
ISBN 10 : 3540850732 ISBN 13 : 9783540850731
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 78,79
Quantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 1st edition. 234 pages. 9.50x6.25x0.50 inches. In Stock.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 85,76
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 2014 edition. 316 pages. 9.50x6.25x0.75 inches. In Stock.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 53,49
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e orts of intruders, and has been widely discussed among - searchers in this eld. Contributions to the investigation of novel and e cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice,butthey alsoposeabigchallenge to protect the information transmitted over the open network frommalicious attacks.
Langue: anglais
Edité par Springer International Publishing, Springer International Publishing, 2014
ISBN 10 : 3319041711 ISBN 13 : 9783319041711
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 53,49
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.
Langue: anglais
Edité par Springer Nature Singapore, Springer Nature Singapore Okt 2018, 2018
ISBN 10 : 9811329060 ISBN 13 : 9789811329067
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 53,49
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 236 pp. Englisch.
Langue: anglais
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Jul 2008, 2008
ISBN 10 : 3540850732 ISBN 13 : 9783540850731
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 53,49
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e orts of intruders, and has been widely discussed among - searchers in this eld. Contributions to the investigation of novel and e cient ideas and techniques have been made through some important conferences and journals, such asESORICS,CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice,butthey alsoposeabigchallenge to protect the information transmitted over the open network frommalicious attacks.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 248 pp. Englisch.
Langue: anglais
Edité par Springer International Publishing, Springer International Publishing Jan 2014, 2014
ISBN 10 : 3319041711 ISBN 13 : 9783319041711
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 53,49
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 320 pp. Englisch.
Langue: anglais
Edité par Springer Nature Singapore, Springer Nature Singapore, 2018
ISBN 10 : 9811329060 ISBN 13 : 9789811329067
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 56,98
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Vendeur : preigu, Osnabrück, Allemagne
EUR 50,25
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Applications and Techniques in Information Security | 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings | Qingfeng Chen (u. a.) | Taschenbuch | xii | Englisch | 2018 | Springer | EAN 9789811329067 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Vendeur : preigu, Osnabrück, Allemagne
EUR 50,25
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Intelligent Strategies for Pathway Mining | Model and Pattern Identification | Qingfeng Chen (u. a.) | Taschenbuch | xviii | Englisch | 2014 | Springer | EAN 9783319041711 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Vendeur : preigu, Osnabrück, Allemagne
EUR 50,25
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Secure Transaction Protocol Analysis | Models and Applications | Qingfeng Chen (u. a.) | Taschenbuch | xi | Englisch | 2008 | Springer | EAN 9783540850731 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Vendeur : Books From California, Simi Valley, CA, Etats-Unis
EUR 125,62
Quantité disponible : 1 disponible(s)
Ajouter au panierhardcover. Etat : Very Good.
Vendeur : Buchpark, Trebbin, Allemagne
EUR 35,81
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Gut. Zustand: Gut | Seiten: 320 | Sprache: Englisch | Produktart: Bücher | This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.
Vendeur : Buchpark, Trebbin, Allemagne
EUR 35,81
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Sehr gut. Zustand: Sehr gut | Seiten: 320 | Sprache: Englisch | Produktart: Bücher | This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.