top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (749 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Data protection
Optical data processing
Information Systems Applications (incl. Internet)
Artificial Intelligence
Security
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-35653-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
Record Nr. UNISA-996466282303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (749 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Data protection
Optical data processing
Information Systems Applications (incl. Internet)
Artificial Intelligence
Security
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-35653-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
Record Nr. UNINA-9910357841103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 500 p. 246 illus., 146 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data mining
Artificial intelligence
Computer communication systems
Computer security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-03192-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Security and Privacy Engineering -- Authentication and Access Control -- Big Data Analytics and Applications -- Advanced Studies in Machine Learning -- Deep Learning and Applications -- Data Analytics and Recommendation Systems -- Internet of Things and Applications -- Smart City: Data Analytics and Security -- Emerging Data Management Systems and Applications.
Record Nr. UNINA-9910349393903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 500 p. 246 illus., 146 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data mining
Artificial intelligence
Computer communication systems
Computer security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-03192-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Security and Privacy Engineering -- Authentication and Access Control -- Big Data Analytics and Applications -- Advanced Studies in Machine Learning -- Deep Learning and Applications -- Data Analytics and Recommendation Systems -- Internet of Things and Applications -- Smart City: Data Analytics and Security -- Emerging Data Management Systems and Applications.
Record Nr. UNISA-996466324403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNINA-9910484161603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNISA-996465485003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 430 p. 155 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-48057-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Analytics and Cloud Data Management -- Internet of Things and Applications -- Security and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access Control -- Access Control in NoSQL and Big Data -- Context-based Data Analysis and Applications -- Emerging Data Management Systems and Applications.
Record Nr. UNINA-9910484871603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 430 p. 155 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-48057-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Analytics and Cloud Data Management -- Internet of Things and Applications -- Security and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access Control -- Access Control in NoSQL and Big Data -- Context-based Data Analysis and Applications -- Emerging Data Management Systems and Applications.
Record Nr. UNISA-996465285903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 323 p. 99 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-26135-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References.
Evaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work.
6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference.
4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results.
3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors.
3.6 Spatial Verification Using RANSAC.
Record Nr. UNINA-9910484729203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 323 p. 99 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-26135-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References.
Evaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work.
6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference.
4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results.
3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors.
3.6 Spatial Verification Using RANSAC.
Record Nr. UNISA-996466447503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui