Transactions on Computational Science XXX

Special Issue on Cyberworlds and Cybersecurity

  • Marina L. Gavrilova
  • C.J. Kenneth Tan
  • Alexei Sourin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10560)

Also part of the Transactions on Computational Science book sub series (TCOMPUTATSCIE, volume 10560)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Fatema Tuz Zohra, Marina Gavrilova
    Pages 12-28
  3. Masahiro Toyoura, Noriyuki Abe, Xiaoyang Mao
    Pages 29-49
  4. Xiaoyan Zhou, Zhiquan Feng, Yu Qiao, Xue Fan, Xiaohui Yang
    Pages 92-109
  5. Back Matter
    Pages 111-111

About this book

Introduction

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods.

This, the 30th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, held in Chongqing, China, in September 2016. The first paper is a position paper giving an outline of current research at the intersection of cybersecurity and cyberworlds, and specifically focusing on mining behavioral data from online social networks. The remaining 5 papers focus on a range of topics, including privacy assurance in online location services, human gait recognition using KINECT sensors, hand-gesture recognition for computer games, scene matching between the source image and the target image for virtual reality applications, and human identification using brain waves.

Keywords

image processing data security face recognition facial images biometrics artificial intelligence user interfaces social networks privacy data privacy human-computer interaction biometric security person identification

Editors and affiliations

  • Marina L. Gavrilova
    • 1
  • C.J. Kenneth Tan
    • 2
  • Alexei Sourin
    • 3
  1. 1.University of CalgaryCalgaryCanada
  2. 2.Sardina SystemsTallinnEstonia
  3. 3.Nanyang Technological UniversitySingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-56006-8
  • Copyright Information Springer-Verlag GmbH Germany 2017
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-56005-1
  • Online ISBN 978-3-662-56006-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book