1.

Record Nr.

UNISA996466012303316

Titolo

Advances in Web Mining and Web Usage Analysis [[electronic resource] ] : 7th International Workshop on Knowledge Discovery on the Web, WEBKDD 2005, Chicago, IL, USA, August 21, 2005, Revised Papers / / edited by Olfa Nasraoui, Osmar Zaiane, Myra Spiliopoulou, Manshad Mobasher, Brij Masand, Philip Yu

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006

ISBN

3-540-46348-8

Edizione

[1st ed. 2006.]

Descrizione fisica

1 online resource (X, 182 p.)

Collana

Lecture Notes in Artificial Intelligence ; ; 4198

Disciplina

006.3

Soggetti

Artificial intelligence

Computer communication systems

Database management

Information storage and retrieval

Application software

Computers and civilization

Artificial Intelligence

Computer Communication Networks

Database Management

Information Storage and Retrieval

Information Systems Applications (incl. Internet)

Computers and Society

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Mining Significant Usage Patterns from Clickstream Data -- Using and Learning Semantics in Frequent Subgraph Mining -- Overcoming Incomplete User Models in Recommendation Systems Via an Ontology -- Data Sparsity Issues in the Collaborative Filtering Framework -- USER: User-Sensitive Expert Recommendations for Knowledge-Dense Environments -- Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation -- Adaptive Web Usage



Profiling -- On Clustering Techniques for Change Diagnosis in Data Streams -- Personalized Search Results with User Interest Hierarchies Learnt from Bookmarks.

Sommario/riassunto

Thisbookcontainsthepostworkshopproceedingsofthe7thInternationalWo- shop on Knowledge Discovery from the Web, WEBKDD 2005. The WEBKDD workshop series takes place as part of the ACM SIGKDD International Conf- ence on Knowledge Discovery and Data Mining (KDD) since 1999. The discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction of comprehensible and non-trivial insights from them. Web mining, a much younger discipline, concentrates on the analysisofdata pertinentto theWeb.Web mining methods areappliedonusage data and Web site content; they strive to improve our understanding of how the Web is used, to enhance usability and to promote mutual satisfaction between e-business venues and their potential customers. In the last years, the interest for the Web as medium for communication, interaction and business has led to new challenges and to intensive, dedicated research. Many of the infancy problems in Web mining have now been solved but the tremendous potential for new and improved uses, as well as misuses, of the Web are leading to new challenges.



2.

Record Nr.

UNINA9910698307703321

Autore

Kent Karen (Karen Ann)

Titolo

Guide to storage encryption technologies for end user devices (NIST special publication 800-111) : recommendations of the National Institute of Standards and Technology / / Karen Kent, Murugiah Souppaya, Matthew Sexton

Pubbl/distr/stampa

Gaithersburg, Md. : , : U.S. Dept. of Commerce, , 2007

Edizione

[Draft.]

Descrizione fisica

1 online resource (40 pages) : illustrations

Collana

NIST special publication

Disciplina

005.8

Soggetti

Computer networks - Security measures - United States

Computer security - Standards

Data encryption (Computer science)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed on July 16, 2008).

"August 2007."

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures of information, the information needs to be secured. This publication explains the basics of storage encryption, which is the process of using encryption and authentication to restrict access to and use of stored information. The appropriate storage encryption solution for a particular situation depends primarily upon the type of storage, the amount of information that needs to be protected, the environments where the storage will be located, and the threats that need to be mitigated. This publication describes three types of solutions⁰́₄full disk encryption, volume and virtual disk encryption, and file/folder encryption⁰́₄and makes recommendations for implementing and using each type. This publication also includes several use case examples, which illustrate that there are multiple ways to meet most storage encryption needs.