LEADER 00885nam0-2200301---450- 001 990009532010403321 005 20120222101900.0 035 $a000953201 035 $aFED01000953201 035 $a(Aleph)000953201FED01 035 $a000953201 100 $a20120222d1962----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa---c---001yy 200 1 $a<>history of English architecture$fpart 1. by Peter Kidson$gpart 2. by Peter Murray 210 $aLondon [etc.]$cGeorge G. Harrap & Co. Ltd$d1962 215 $a256 p.$cill.$d23 cm 610 0 $aArchitettura$aGran Bretagna 700 1$aKidson,$bPeter$0515376 701 1$aMurray,$bPeter$032497 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009532010403321 952 $a07.052$b3733$fDARST 959 $aDARST 996 $aHistory of English architecture$9855516 997 $aUNINA LEADER 08365nam 22006495 450 001 996466282303316 005 20200701105058.0 010 $a3-030-35653-1 024 7 $a10.1007/978-3-030-35653-8 035 $a(CKB)4100000009939730 035 $a(MiAaPQ)EBC5984027 035 $a(DE-He213)978-3-030-35653-8 035 $a(PPN)257357920 035 $a(EXLCZ)994100000009939730 100 $a20191122d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFuture Data and Security Engineering$b[electronic resource] $e6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27?29, 2019, Proceedings /$fedited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (749 pages) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11814 311 $a3-030-35652-3 327 $aInvited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators? Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models. 330 $aThis book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11814 606 $aApplication software 606 $aArtificial intelligence 606 $aData protection 606 $aOptical data processing 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aOptical data processing. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aArtificial Intelligence. 615 24$aSecurity. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.8 702 $aDang$b Tran Khanh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTakizawa$b Makoto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBui$b Son Ha$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466282303316 996 $aFuture data and security engineering$91985658 997 $aUNISA LEADER 00984nam a22002531i 4500 001 991002500969707536 005 20030711104941.0 008 030925s19uu be |||||||||||||||||fre 035 $ab12297501-39ule_inst 035 $aARCHE-034507$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a840.9949 100 1 $aCharlier, Gustave$0194238 245 10$aHistoire des lettres françaises en Belgique /$cGustave Charlier 260 $a[S.l.] :$b[s.n.],$c[19..] 300 $a1 v. ;$c28 cm 500 $aEstr. da: Encyclopédie belge 650 4$aLetteratura francese$xAutori belgi$xStoria 907 $a.b12297501$b02-04-14$c08-10-03 912 $a991002500969707536 945 $aLE002 Busta C 45/11$g1$i2002000784230$lle002$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12692001$z08-10-03 996 $aHistoire des lettres françaises en Belgique$9163485 997 $aUNISALENTO 998 $ale002$b08-10-03$cm$da $e-$ffre$gbe $h0$i1