Vai al contenuto principale della pagina

Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Edizione: 1st ed. 2015.
Descrizione fisica: 1 online resource (XIII, 323 p. 99 illus. in color.)
Disciplina: 005.8
Soggetto topico: Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
Persona (resp. second.): DangTran Khanh
WagnerRoland
KüngJosef
ThoaiNam
TakizawaMakoto
NeuholdErich
Note generali: Includes index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References.
Evaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work.
6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference.
4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results.
3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors.
3.6 Spatial Verification Using RANSAC.
Sommario/riassunto: This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015. The 20 revised full papers and 3 short papers presented were carefully reviewed and selected from 88 submissions. They have been organized in the following topical sections: big data analytics and massive dataset mining; security and privacy engineering; crowdsourcing and social network data analytics; sensor databases and applications in smart home and city; emerging data management systems and applications; context-based analysis and applications; and data models and advances in query processing.
Titolo autorizzato: Future data and security engineering  Visualizza cluster
ISBN: 3-319-26135-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996466447503316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Information Systems and Applications, incl. Internet/Web, and HCI ; ; 9446