LEADER 13961nam 22009615 450 001 996466447503316 005 20201014195221.0 010 $a3-319-26135-5 024 7 $a10.1007/978-3-319-26135-5 035 $a(CKB)4340000000001195 035 $a(SSID)ssj0001585135 035 $a(PQKBManifestationID)16265556 035 $a(PQKBTitleCode)TC0001585135 035 $a(PQKBWorkID)14865272 035 $a(PQKB)11699583 035 $a(DE-He213)978-3-319-26135-5 035 $a(MiAaPQ)EBC6298634 035 $a(MiAaPQ)EBC5610431 035 $a(Au-PeEL)EBL5610431 035 $a(OCoLC)932170091 035 $a(PPN)190529393 035 $a(EXLCZ)994340000000001195 100 $a20151107d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFuture Data and Security Engineering$b[electronic resource] $eSecond International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings /$fedited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 323 p. 99 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9446 300 $aIncludes index. 311 $a3-319-26134-7 327 $aIntro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References. 327 $aEvaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work. 327 $a6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference. 327 $a4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results. 327 $a3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors. 327 $a3.6 Spatial Verification Using RANSAC. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015. The 20 revised full papers and 3 short papers presented were carefully reviewed and selected from 88 submissions. They have been organized in the following topical sections: big data analytics and massive dataset mining; security and privacy engineering; crowdsourcing and social network data analytics; sensor databases and applications in smart home and city; emerging data management systems and applications; context-based analysis and applications; and data models and advances in query processing. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9446 606 $aManagement information systems 606 $aComputer science 606 $aComputer security 606 $aInformation storage and retrieval 606 $aData encryption (Computer science) 606 $aDatabase management 606 $aAlgorithms 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aData encryption (Computer science). 615 0$aDatabase management. 615 0$aAlgorithms. 615 14$aManagement of Computing and Information Systems. 615 24$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aCryptology. 615 24$aDatabase Management. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aDang$b Tran Khanh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWagner$b Roland$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThoai$b Nam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTakizawa$b Makoto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeuhold$b Erich$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466447503316 996 $aFuture data and security engineering$91985658 997 $aUNISA LEADER 00917nam0-2200301 --450 001 9910635798103321 005 20240613095049.0 010 $a978-88-15-29287-2 100 $a20230112d2021----kmuy0itay5050 ba 101 0 $aita$cita 102 $aIT 105 $a 001yy 200 1 $a<>consenso annichilito$ela critica radicale del contratto in Siegmund Schlossmann$fTommaso Dalla Massara 210 $aBologna$cIl mulino$d2021 215 $a159 p.$d21 cm 225 1 $aAtlante della cultura giuridica europea 610 0 $aSchlossmann, Siegmund . Der Vertrag 676 $a346.022$v23$zita 700 1$aDalla Massara,$bTommaso$0291774 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910635798103321 952 $a16 AB 198$bCP 856$fDDCP 952 $aIV E 255$b2023/425$fFGBC 959 $aDDCP 959 $aFGBC 996 $aConsenso annichilito$92997651 997 $aUNINA