top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Future Data and Security Engineering [[electronic resource] ] : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 500 p. 246 illus., 146 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data mining
Artificial intelligence
Computer communication systems
Computer security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-03192-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Security and Privacy Engineering -- Authentication and Access Control -- Big Data Analytics and Applications -- Advanced Studies in Machine Learning -- Deep Learning and Applications -- Data Analytics and Recommendation Systems -- Internet of Things and Applications -- Smart City: Data Analytics and Security -- Emerging Data Management Systems and Applications.
Record Nr. UNISA-996466324403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Future Data and Security Engineering : 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 500 p. 246 illus., 146 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data mining
Artificial intelligence
Computer communication systems
Computer security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Artificial Intelligence
Computer Communication Networks
Systems and Data Security
ISBN 3-030-03192-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Security and Privacy Engineering -- Authentication and Access Control -- Big Data Analytics and Applications -- Advanced Studies in Machine Learning -- Deep Learning and Applications -- Data Analytics and Recommendation Systems -- Internet of Things and Applications -- Smart City: Data Analytics and Security -- Emerging Data Management Systems and Applications.
Record Nr. UNINA-9910349393903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNISA-996465485003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNINA-9910484161603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 430 p. 155 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-48057-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Analytics and Cloud Data Management -- Internet of Things and Applications -- Security and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access Control -- Access Control in NoSQL and Big Data -- Context-based Data Analysis and Applications -- Emerging Data Management Systems and Applications.
Record Nr. UNISA-996465285903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 430 p. 155 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-48057-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data Analytics and Cloud Data Management -- Internet of Things and Applications -- Security and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access Control -- Access Control in NoSQL and Big Data -- Context-based Data Analysis and Applications -- Emerging Data Management Systems and Applications.
Record Nr. UNINA-9910484871603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering [[electronic resource] ] : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 323 p. 99 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-26135-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References.
Evaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work.
6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference.
4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results.
3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors.
3.6 Spatial Verification Using RANSAC.
Record Nr. UNISA-996466447503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Future Data and Security Engineering : Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 323 p. 99 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-26135-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Big Data Analytics and Massive Dataset Mining -- Random Local SVMs for Classifying Large Datasets -- 1 Introduction -- 2 Support Vector Machines -- 3 Parallel Ensemble Learning Algorithm of Random Local Support Vector Machines -- 4 Evaluation -- 5 Discussion on Related Works -- 6 Conclusion and Future Works -- References -- An Efficient Document Indexing-Based Similarity Search in Large Datasets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Similarity Search -- 3.2 MapReduce Paradigm -- 4 The Proposed Methods -- 4.1 The Clustering Scheme -- 4.2 Redundancy-Free Compatibility -- 4.3 Filtering Strategies -- 4.4 Examples on the Fly -- 5 Emperical Experiments -- 5.1 Environment Settings -- 5.2 Evaluation -- 6 Summary -- Acknowledgements -- References -- Using Local Rules in Random Forests of Decision Trees -- 1 Introduction -- 2 Random Forest Algorithm Using Local Labeling Rules -- 2.1 Random Forests -- 2.2 Local Labeling Rules in Decision Forests -- 3 Evaluation -- 4 Discussion on Related Work -- 5 Conclusion and Future Works -- References -- A Term Weighting Scheme Approach for Vietnamese Text Classification -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Background -- 3 Our Proposed Term Weighting Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Evaluation Methodology -- 4.3 Results -- 5 Conclusion -- Acknowledgment -- References -- Security and Privacy Engineering -- Fault Data Analytics Using Decision Tree for Fault Detection -- 1 Introduction -- 2 Related Work -- 3 CART Approach -- 3.1 Entropy Splitting Rule -- 3.2 Tree Growing Process -- 4 Fault Data Analysis -- 4.1 Bug Data -- 4.2 Data Processing -- 4.3 Tree Construction -- 5 Evaluation -- 6 Conclusions -- References.
Evaluation of Reliability and Security of the Address Resolution Protocol -- Abstract -- 1 Introduction -- 2 Address Resolution Protocol -- 2.1 ES-ARP -- 2.2 S-ARP -- 3 Methodology -- 4 Implementation -- 5 Security Against Address Resolution Protocol Attacks -- 6 Debate -- 7 Conclusions and Recommendations -- References -- Crowdsourcing and Social Network Data Analytics -- Establishing a Decision Tool for Business Process Crowdsourcing -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of Problems -- 2.2 DSS View -- 3 Research Overview -- 4 Tool Architecture -- 5 Tool Development -- 5.1 Web-Based Prototyping -- 6 Discussion and Conclusion -- References -- Finding Similar Artists from the Web of Data: A PageRank Based Semantic Similarity Metric -- 1 Introduction -- 2 Related Work -- 3 PageRank -- 4 Personalized PageRank for Measuring Semantic Similarity -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Neighborhood Graph -- 5.3 Results -- 6 Conclusions and Future Work -- References -- Opinion Analysis in Social Networks Using Antonym Concepts on Graphs -- Abstract -- 1 Introduction -- 2 Method for Opinion Mining Using Antonym Concepts -- 2.1 Replacements -- 2.2 Text Pre-processing -- 2.3 Graph Building -- 2.4 Input Text and Concept List Comparison -- 2.4.1 Edge Count -- 2.4.2 Use of Logarithms -- 2.4.3 Logarithms with POS Change Penalization -- 2.4.4 Semantic Orientation of Words -- 2.4.5 Individual Semantic Orientation -- 3 Similarity Measures -- 3.1 Hirst-St-Onge -- 3.2 Jiang-Conrath -- 3.3 Resnik -- 4 Experiments and Results -- 4.1 Evaluation Method -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Sensor Databases and Applications in Smart Home and City -- Traffic Speed Data Investigation with Hierarchical Modeling -- 1 Introduction -- 2 Proposal -- 3 Inference -- 4 Experiment -- 5 Previous Work.
6 Conclusion -- References -- An Effective Approach to Background Traffic Detection -- 1 Introduction -- 2 Related Work -- 3 Overall Architecture and Problem Definition -- 4 The Proposed Approach -- 4.1 Periodicity of a TCP Connection Flow -- 4.2 Auto Correlation (AC) and Projection Based Approaches -- 4.3 Periodicity Detection Map (PDM) -- 4.4 BG Traffic Detection Using Machine Learning Approach -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 BG Traffic Flows Detected by the Proposed Methods -- 5.3 Complexity Analysis for the PDM Method -- 6 Conclusion -- References -- An Approach for Developing Intelligent Systems in Smart Home Environment -- Abstract -- 1 Introduction -- 2 Smart Home Environments - SHEs -- 2.1 SHEs Classification -- 2.2 Structure and Architecture -- 2.3 SHEs Techniques -- 2.4 SHE Applications -- 3 Proposed Methods -- 3.1 Method 1: Calculating Anomaly Score Using Extreme Value Theory -- 3.2 Method 2: Calculating Anomaly Score Based on Sequence Patterns -- 3.3 Method 3: Determined Abnormal Time Intervals -- 4 Experimental Results -- 5 Conclusion -- References -- Emerging Data Management Systems and Applications -- Modelling Sensible Business Processes -- Abstract -- 1 Introduction -- 2 Sensible Versus Mechanistic BPM -- 3 Eliciting and Modelling Process Stories -- 3.1 First Round (Tool Usage) -- 3.2 Second Round (Small Team, Desired Process) -- 3.3 Third Round (Large Team, Existing Process) -- 4 Discussion -- References -- Contractual Proximity of Business Services -- 1 Introduction -- 2 Business Services Representation -- 3 Service Decomposition -- 3.1 Goal -- 3.2 Precondition/Postcondition -- 3.3 Assumption -- 3.4 Input/Output -- 3.5 QoS Factor -- 3.6 Delivery -- 3.7 Penalty -- 3.8 Payment -- 4 Towards Operationalization Preference and Contractual Proximity of Business Services -- 4.1 Operationalization Preference.
4.2 Contractual Proximity -- 5 Related Work and Conclusion -- References -- Energy-Efficient VM Scheduling in IaaS Clouds -- 1 Introduction -- 2 Problem Description -- 2.1 Notations -- 2.2 Power Consumption Model -- 2.3 Problem Formulation -- 3 Heuristic Based Scheduling Algorithm -- 4 Performance Evaluation -- 4.1 Algorithms -- 4.2 Simulated Simulations -- 4.3 Results and Discussions -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Multi-diagram Representation of Enterprise Architecture: Information Visualization Meets Enterprise Information Management -- 1 Introduction -- 2 Running Example and Motivation -- 2.1 Example -- 2.2 Diagramming Hierarchical EA is Challenging -- 3 Definition and Meta-modeling -- 3.1 Building Blocks and Relations -- 3.2 Meta-model of SeamCAD -- 4 Notation and Diagramming -- 4.1 Notation -- 4.2 Layout -- 4.3 Generating Diagrams -- 5 Applications -- 5.1 A Case-Study in a Master's Course on EA and SOA -- 5.2 Enterprise Model for an ERP-Seeking Company in a Market of Watch Parts Manufacturing -- 5.3 Designing EA with SEAM and SeamCAD -- 6 Related Work -- 7 Conclusion -- References -- Enhancing the Quality of Medical Image Database Based on Kernels in Bandelet Domain -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Bandelet Basis -- 2.2 Bayesian Thresholding -- 2.3 Deblurring Images -- 3 Enhancing the Quality of Medical Image Database -- 3.1 Denoising of Medical Images in Bandelet Domain -- 3.2 Deblurring of Denoised Medical Images Based on a Novel Kernels Set -- 4 Experiments and Results -- 5 Conclusions -- Appendix -- References -- Information Systems Success: A Literature Review -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Foundation -- 2.2 IS Success Approach -- 3 Research Results -- 3.1 Conceptual/Non-empirical Article Results -- 3.2 Empirical Article Results.
3.3 Result Discussions -- 4 Conclusions and Future Work -- Acknowledgment -- References -- Context-Based Data Analysis and Applications -- Facilitating the Design/Evaluation Process of Web-Based Geographic Applications: A Case Study with WINDMash -- 1 Introduction -- 2 Motivation: A Use-Case Example -- 3 Related Work -- 4 Design/Evaluation Process -- 5 Geographic Application Model -- 6 The WINDMash Environment -- 6.1 A Pipes Editor -- 6.2 A Graphical Layout Editor -- 6.3 A ``Sequence Diagram'' Builder for Specifying End-User Interactions -- 7 Conclusion -- References -- A Context-Aware Recommendation Framework in E-Learning Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Context-Aware Recommendation Framework -- 3.1 Context Inferring -- 3.2 Ratings Acquisition -- 3.3 Modeling -- 3.4 Recommendation -- 4 Experiments and Results -- 5 Conclusion and Future Works -- Acknowledgments -- References -- Automatic Evaluation of the Computing Domain Ontology -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Automatic Evaluation of the Computing Domain Ontology -- 3.1 Overview of the Computing Domain Ontology -- 3.2 The CDO Evaluation -- 4 Experiment -- 4.1 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Data-Driven -- 4.2 Evaluating the Lexicon/Vocabulary and Consistency of CDO Based on Application -- 4.3 Evaluating the CDO's Structure and the Relations of Terms -- 5 Conclusions -- References -- Data Models and Advances in Query Processing -- Comics Instance Search with Bag of Visual Words -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Comics Instance Search System -- 3.1 Image Feature Extraction with ORB -- 3.2 Train K-means Model by RBRIEF Descriptor Vectors -- 3.3 Descriptor Vector Quantization -- 3.4 Pattern Indexing and Searching with Apache Lucene -- 3.5 Ranking the Results Using BOW Vectors.
3.6 Spatial Verification Using RANSAC.
Record Nr. UNINA-9910484729203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Future Data and Security Engineering [[electronic resource] ] : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 312 p. 103 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-12778-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model.
Record Nr. UNISA-996213646703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Future Data and Security Engineering : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 312 p. 103 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-12778-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model.
Record Nr. UNINA-9910483688703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui