06309nam 22009015 450 99621364670331620201109121130.03-319-12778-010.1007/978-3-319-12778-1(CKB)3710000000269713(SSID)ssj0001372639(PQKBManifestationID)11881979(PQKBTitleCode)TC0001372639(PQKBWorkID)11310407(PQKB)10195923(DE-He213)978-3-319-12778-1(MiAaPQ)EBC6303657(MiAaPQ)EBC5595108(Au-PeEL)EBL5595108(OCoLC)1076258172(PPN)182098001(EXLCZ)99371000000026971320141021d2014 u| 0engurnn#008mamaatxtccrFuture Data and Security Engineering[electronic resource] 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings /edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XVI, 312 p. 103 illus.)Information Systems and Applications, incl. Internet/Web, and HCI ;8860Bibliographic Level Mode of Issuance: Monograph3-319-12777-2 On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model.This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.Information Systems and Applications, incl. Internet/Web, and HCI ;8860Management information systemsComputer scienceComputer securityInformation storage and retrievalData encryption (Computer science)Database managementAlgorithmsManagement of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Database Managementhttps://scigraph.springernature.com/ontologies/product-market-codes/I18024Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management information systems.Computer science.Computer security.Information storage and retrieval.Data encryption (Computer science).Database management.Algorithms.Management of Computing and Information Systems.Systems and Data Security.Information Storage and Retrieval.Cryptology.Database Management.Algorithm Analysis and Problem Complexity.005.8Dang Tran Khanhedthttp://id.loc.gov/vocabulary/relators/edtWagner Rolandedthttp://id.loc.gov/vocabulary/relators/edtNeuhold Erich Jedthttp://id.loc.gov/vocabulary/relators/edtTakizawa Makotoedthttp://id.loc.gov/vocabulary/relators/edtKüng Josefedthttp://id.loc.gov/vocabulary/relators/edtThoai Namedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996213646703316Future data and security engineering1985658UNISA