• Non ci sono risultati.

Advanced computing and systems for security

N/A
N/A
Protected

Academic year: 2021

Condividi "Advanced computing and systems for security"

Copied!
3
0
0

Testo completo

(1)

Preface

The Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) took place during May 23–25, 2015 in Kolkata, India. The University of Calcutta collaborated with Ca’ Foscari University of Venice, Bialystok University of Technology, and AGH University of Science and Technology, Poland, to make ACSS 2015 a grand success.

The symposium aimed to motivate Ph.D. students to present and discuss their research works to produce innovative outcomes. ACSS 2015 invited researchers working in the domains of Computer Vision & Signal Processing, Biometrics-based Authentication, Machine Intelligence, Algorithms, Natural Language Processing, Security, Remote Healthcare, Distributed Systems, Embedded Systems, Software Engineering, Cloud Computing & Service Science, Big Data, and Data Mining to interact.

By this year, the post-conference book series are indexed by ISI Compendex. The sincere effort of the program committee members coupled with ISI indexing has drawn a large number of high-quality submissions from scholars all over India and abroad. A thorough double-blind review process was carried out by the PC members and by external reviewers. While reviewing the papers, reviewers mainly looked at the novelty of the contributions, at the technical content, at the organi-zation, and at the clarity of presentation. The entire process of paper submission, review, and acceptance process was done electronically. Due to the sincere efforts of the Technical Program Committee and the Organizing Committee members, the symposium resulted in a suite of strong technical paper presentations followed by effective discussions and suggestions for improvement of each researcher.

The Technical Program Committee for the symposium selected only 37 papers for publication out of 92 submissions. During each session, the authors of each presented paper were given a list of constructive suggestions in a bid to improve upon their work. Each author had to incorporate the changes in the final version of the paper as suggested by the reviewers and the respective session chairs. The symposium Proceedings are organized as a collection of papers, on a session-wise basis.

(2)

We take this opportunity to thank all the members of the Technical Program Committee and the external reviewers for their excellent and time-bound review works. We thank all the sponsors who have come forward toward the organization of this symposium. These include Tata Consultancy Services (TCS), Springer India, ACM India, M/s Business Brio, and M/s Enixs. We appreciate the initiative and support from Mr. Aninda Bose and his colleagues in Springer for their strong support toward publishing this post-symposium book in the series “Advances in Intelligent Systems and Computing.” Last but not least, we thank all the authors without whom the symposium would not have reached this standard.

On behalf of the editorial team of ACSS 2015, we sincerely hope that this book will be beneficial to all its readers and motivate them toward further research.

Rituparna Chaki Agostino Cortesi Khalid Saeed Nabendu Chaki

(3)

Riferimenti

Documenti correlati

[r]

Infatti questi tre tempi sono in qualche modo nell’animo, né vedo che abbiano altrove realtà: il presente del passato è la memoria, il presente del pre- sente la visione diretta,

Il trade-off tra velocità e qualità del servizio deve essere anch’esso definito, adeguando la velocità al livello di qualità richiesto oppure definendo specifiche

Tree architecture can be controlled by pruning and using size-controlling rootstocks, but natural tree forms resulting in small and narrow trees could be desirable to assure a

performed on a previously solubilized chitosan: i.e. After 4 h, the pressure was released and only a dark-brown solution was obtained with no traces of the

• The tcpd daemon wraps the services managed via inetd, so as to support access control rules. • tcpd is the actual server that is activated upon a request accepted

Questo saggio offre una occasione per tornare a essere genitori che amano e si prendono cura dei propri figli con un metodo naturale da sempre esistito. Genitori con il

La seconda parte, suddivisa in capitoli, è composta da una breve biografia commentata dell'autore, da una panoramica della sua produzione letteraria dal 1977, anno della