Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and
- PDF / 8,212,652 Bytes
- 216 Pages / 429.442 x 659.895 pts Page_size
- 28 Downloads / 182 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany
7299
Michael Chau G. Alan Wang Wei Thoo Yue Hsinchun Chen (Eds.)
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012 Kuala Lumpur, Malaysia, May 29, 2012 Proceedings
13
Volume Editors Michael Chau The University of Hong Kong, China E-mail: [email protected] G. Alan Wang Virginia Tech, Blacksburg, VA, USA E-mail: [email protected] Wei Thoo Yue City University of Hong Kong, China E-mail: [email protected] Hsinchun Chen University of Arizona, Tucson, AZ, USA E-mail: [email protected]
ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-30427-9 e-ISBN 978-3-642-30428-6 DOI 10.1007/978-3-642-30428-6 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2012937590 CR Subject Classification (1998): H.4, H.3, C.2, H.2, D.4.6, K.4.1, K.5, K.6 LNCS Sublibrary: SL 4 – Security and Cryptology
© Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The continued prominence of online media translates to an ever-increasing amount of data and knowledge being shared online. Intelligence and security informatics (ISI) is concerned with the study of the development and the use of advanced information technologies and systems for sec
Data Loading...