top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Pro encryption in SQL Server 2022 : provide the highest level of protection for your data / / Matthew McGiffen
Pro encryption in SQL Server 2022 : provide the highest level of protection for your data / / Matthew McGiffen
Autore McGiffen Matthew
Edizione [[First edition].]
Pubbl/distr/stampa New York, New York : , : Apress L. P., , [2022]
Descrizione fisica 1 online resource (353 pages)
Disciplina 943.005
Soggetto topico Database management
Data encryption (Computer science)
ISBN 1-4842-8664-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Part I: Understanding the Landscape -- Chapter 1: Purpose of Encryption and Available Tools -- What Is the Purpose of Encryption? -- Encryption and Data Protection Regulation -- Overview of the Tools Available in SQL Server -- TDE -- Backup Encryption -- Always Encrypted -- TLS -- Hashing and Salting -- Encryption Functions -- EKM -- Recommended Approach to Encryption -- Encryption in the Cloud -- Summary -- Part II: At-Rest Encryption -- Chapter 2: Introducing Transparent Data Encryption -- What Is TDE? -- Understanding Keys and Certificates -- Database Encryption Key (DEK) -- Certificate and Associated Asymmetric Key Pair -- Database Master Key (DMK) -- Service Master Key (SMK) -- Understanding the Need for the Hierarchy -- How Secure Is TDE? -- What Are We Protected From? -- How Easy Is It to Break Down the Encryption? -- Summary -- Chapter 3: Setting Up TDE -- Creating the Keys and Certificate -- Creating the Database Master Key (DMK) -- Creating the Certificate -- Creating the Database Encryption Key (DEK) -- Encrypting the Database -- Securing the Root Keys -- Encrypting Existing Data with TDE -- Benchmarking TDE Performance on Your Server -- Monitoring for Problems -- What If You Run into Any Performance Problems During the Scan? -- What If the Encryption Scan Fails? -- Taking Backups While Encryption Is in Progress -- Summary -- Chapter 4: Managing TDE -- Migrating or Recovering a TDE-Protected Database -- Create a Database Master Key (DMK) If One Doesn't Exist -- Restore the Certificate and Private Key -- Restore the Database -- Recovering a TDE Database Without the Certificate -- Setting Up a New SQL Instance Using the Same Service Account as the Old Instance.
Restore Your Backup of Master from the Old Instance onto the New Instance -- Reboot Your New Server: The Whole Server, Not Just SQL -- Backup Your Certificate and Private Key - and Don't Lose Them This Time -- Key Rotation -- Creating a New Certificate -- Rotating the Certificate -- Impact of TDE on Performance -- Where Do We See an Overhead? -- How to Estimate the Performance Impact for Your Server? -- TDE and Backups -- Backup Performance -- Backup Compression -- Backup Compression Issues -- TDE and High Availability -- Summary -- Chapter 5: Backup Encryption -- Setting Up Backup Encryption -- Creating a Test Database -- Create the Database Master Key (DMK) -- Creating the Certificate -- Permissions -- Working with Encrypted Backups -- Taking an Encrypted Backup -- Restoring an Encrypted Backup -- Backup Encryption Performance -- Backup Encryption and Compression -- Summary -- Part III: Column Encryption using Always Encrypted -- Chapter 6: Introducing Always Encrypted -- SQL Server 2016 vs. SQL Server 2019 and Beyond -- How Does Always Encrypted Work? -- Encryption Hierarchy -- Encryption in Practice -- Summary -- Chapter 7: Setting Up Always Encrypted -- Create Keys and Certificates -- Creating the Certificate and Column Master Key -- Creating the Column Encryption Key (CEK) -- Create an Encrypted Column -- Summary -- Chapter 8: Executing Queries Using Always Encrypted -- Performing a Basic Insert and Select -- Connecting to the Database -- Inserting Data -- Reading Data -- Looking at What Happens in the Background -- What Happens with an Insert Query -- What Happens with a Select Query -- Issuing a Query with a Predicate Against an Encrypted Column -- Indexes and Statistics on Encrypted Columns -- Working with Stored Procedures -- Querying Always Encrypted Data from Your Application -- Working with Direct Queries.
Working with Stored Procedures -- Summary -- Chapter 9: Encrypting Existing Data with Always Encrypted -- Encrypting Data Using the Always Encrypted Wizard -- Encrypting Data Using PowerShell -- Encrypting Data Using the Import and Export Wizard -- Summary -- Chapter 10: Limitations with Always Encrypted -- SQL Server Only Ever Sees Encrypted Data -- Strong Encryption Isn't Predictable -- Deterministic vs. Randomized -- Data Types -- Miscellaneous -- Summary -- Chapter 11: Key Rotation with Always Encrypted -- CMK Rotation -- Rotating the CMK Using the SSMS GUI -- Rotating the CMK Using T-SQL -- Rotating the CMK Using PowerShell -- Rotating the CMK Using PowerShell with Role Separation -- Part 1: DBA -- Part 2: Security Administrator -- Part 3: DBA -- Rotating the CEK -- Summary -- Chapter 12: Considerations When Implementing Always Encrypted -- Choosing What Data to Encrypt -- Source Control and Release Management -- ETL -- Performance -- Client Drivers -- Summary -- Part IV: Column Encryption using Always Encrypted with Enclaves -- Chapter 13: Introducing Always Encrypted with Enclaves -- Attestation -- Executing Queries That Use the Enclave -- The Attestation Process -- The Query Execution Process -- Summary -- Chapter 14: Setting Up Always Encrypted with Enclaves -- Setting Up Your VMs -- Setting Up Networking -- Install and Configure Host Guardian Service (HGS) -- Install SQL Server and Configure as a Guarded Host -- Summary -- Chapter 15: In-Place Encryption with Always Encrypted Enclaves -- Setting Up Our Test Database and Keys -- In-Place Encryption and Decryption of Data -- Performance of In-Place Encryption -- CEK Rotation -- Summary -- Chapter 16: Rich Querying with Always Encrypted Enclaves -- Setting Up Your Database and Data -- Rich Querying -- Indexes on Columns with Randomized Encryption -- Reading from an Index.
Updating an Index When Data Is Modified -- Index Rebuilds -- Database Recovery After Failure or Shutdown -- Joins -- Summary -- Chapter 17: Setting Up TPM Attestation -- Prerequisites for Your SQL Server to Support TPM Attestation -- Artifacts That Are Required by Attestation -- TPM Endorsement Key Certificate -- TPM Baseline -- Code Integrity Policy -- Installing and Configuring HGS -- Configuring the SQL Server -- Install the Attestation Client Components -- Making Sure VBS Is Configured Correctly -- Configure the Attestation URL -- Configuring a Code Integrity Policy -- Collect and Register Attestation Artifacts -- Check SQL Server Can Attest Successfully -- Configure the Enclave Type in SQL Server -- Summary -- Part V: Completing the Picture -- Chapter 18: Encryption In Transit Using Transport Layer Security -- How TLS Works -- Obtaining a Certificate to Use for TLS -- Setting Up TLS on Your SQL Server -- Performance -- Summary -- Chapter 19: Hashing and Salting of Passwords -- Hashing -- Salting -- Using the HASHBYTES Function -- Storing Passwords Using HASHBYTES and a Salt Value -- Summary -- Chapter 20: Extensible Key Management (EKM) -- Creating the Required Objects in Azure -- Creating the Resource Group -- Creating the Azure Active Directory App Registration -- Creating the Key Vault -- Setting Up TDE to Use Azure Key Vault -- Creating the Key for TDE -- Setting Up the SQL Server -- Working with Always Encrypted and EKM -- Creating a CMK in Azure Key Vault -- Encrypting Columns and Working with Data -- Working with Azure Key Vault from Your Application -- Summary -- Chapter 21: Other Methods of Column Encryption -- Encryption Using a Symmetric Key -- Your Key Hierarchy -- Working with Automated Key Management -- Creating the Keys -- Encrypting and Decrypting Data -- Using an Authenticator -- Where the DMK Is Not Protected by the SMK.
Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves.
AWS RDS.
Record Nr. UNINA-9910631086203321
McGiffen Matthew  
New York, New York : , : Apress L. P., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023 [[electronic resource] /] / edited by Nabendu Chaki, Nilanjana Dutta Roy, Papiya Debnath, Khalid Saeed
Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023 [[electronic resource] /] / edited by Nabendu Chaki, Nilanjana Dutta Roy, Papiya Debnath, Khalid Saeed
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (799 pages)
Disciplina 943.005
Collana Lecture Notes in Networks and Systems
Soggetto topico Wireless communication systems
Mobile communication systems
Quantitative research
Data protection
Medical informatics
Wireless and Mobile Communication
Data Analysis and Big Data
Data and Information Security
Health Informatics
ISBN 981-9938-78-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: The Factors that Influence the Customer Demands for Automobile Battery Industry based on Market Dynamics -- Chapter 2: Iterative Refinement for Variational Quantum Linear Solver -- Chapter 3: A Q-Learning Technique for Model Free H-infinity Controller Design for PMDC Motor -- Chapter 4: SHELLCOM- IoT Based Health Monitoring Module for Mining Industry -- Chapter 5: Implementation and Design of Noise cancellation using NLMS -- Chapter 6: An Automated IoT-based Green Corridor Integrated with Smart Traffic Management System for Patients Transfer -- Chapter 7: Analysis of Routing Protocols for Underwater Wireless Sensor Networks -- Chapter 8: VARUNA: Water Quality Monitoring using Wireless Sensor Network (WSN) and IoT with Optimal Sensor Data Acquisition Algorithm -- Chapter 9: Intelligent Activity Detection System by LF SVM and Tri – axial Accelerometer -- Chapter 10: Eye Blink – A Mode of Communication. etc.
Record Nr. UNINA-9910735782003321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Similarity Search and Applications [[electronic resource] ] : 16th International Conference, SISAP 2023, A Coruña, Spain, October 9–11, 2023, Proceedings / / edited by Oscar Pedreira, Vladimir Estivill-Castro
Similarity Search and Applications [[electronic resource] ] : 16th International Conference, SISAP 2023, A Coruña, Spain, October 9–11, 2023, Proceedings / / edited by Oscar Pedreira, Vladimir Estivill-Castro
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (325 pages)
Disciplina 943.005
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 3-031-46994-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- From Intrinsic Dimensionality to Chaos and Control: Towards a Unified Theoretical View -- The Rise of HNSW: Understanding Key Factors Driving the Adoption -- Towards a Universal Similarity Function: the Information Contrast Model and its Application as Evaluation Metric in Artificial Intelligence Tasks -- Research Track -- Finding HSP Neighbors via an Exact, Hierarchical Approach -- Approximate Similarity Search for Time Series Data Enhanced by Section Min-Hash -- Mutual nearest neighbor graph for data analysis: Application to metric space clustering -- An Alternating Optimization Scheme for Binary Sketches for Cosine Similarity Search -- Unbiased Similarity Estimators using Samples -- Retrieve-and-Rank End-to-End Summarization of Biomedical Studies -- Fine-grained Categorization of Mobile Applications through Semantic Similarity Techniques for Apps Classification -- Runs of Side-Sharing Tandems in Rectangular Arrays -- Turbo Scan: Fast Sequential Nearest Neighbor Search in High Dimensions -- Class Representatives Selection in Non-Metric Spaces for Nearest Prototype Classification -- The Dataset-similarity-based Approach to Select Datasets for Evaluation in Similarity Retrieval -- Suitability of Nearest Neighbour Indexes for Multimedia Relevance Feedback -- Accelerating k-Means Clustering with Cover Trees -- Is Quantized ANN Search Cursed? Case Study of Quantifying Search and Index Quality -- Minwise-Independent Permutations with Insertion and Deletion of Features -- SDOclust: Clustering with Sparse Data Observers -- Solving k-Closest Pairs in High-Dimensional Data using Locality- Sensitive Hashing -- Vec2Doc: Transforming Dense Vectors into Sparse Representations for Efficient Information Retrieval -- Similarity Search with Multiple-Object Queries -- Diversity Similarity Join for Big Data -- Indexing Challenge -- Overview of the SISAP 2023 Indexing Challenge -- Enhancing Approximate Nearest Neighbor Search: Binary-Indexed LSH-Tries, Trie Rebuilding, And Batch Extraction -- General and Practical Tuning Method for Off-the-Shelf Graph-Based Index: SISAP Indexing Challenge Report by Team UTokyo -- SISAP 2023 Indexing Challenge – Learned Metric Index -- Computational Enhancements of HNSW Targeted to Very Large Datasets -- CRANBERRY: Memory-Effective Search in 100M High-Dimensional CLIP Vectors.
Record Nr. UNINA-9910755085903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Similarity Search and Applications [[electronic resource] ] : 16th International Conference, SISAP 2023, A Coruña, Spain, October 9–11, 2023, Proceedings / / edited by Oscar Pedreira, Vladimir Estivill-Castro
Similarity Search and Applications [[electronic resource] ] : 16th International Conference, SISAP 2023, A Coruña, Spain, October 9–11, 2023, Proceedings / / edited by Oscar Pedreira, Vladimir Estivill-Castro
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (325 pages)
Disciplina 943.005
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 3-031-46994-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- From Intrinsic Dimensionality to Chaos and Control: Towards a Unified Theoretical View -- The Rise of HNSW: Understanding Key Factors Driving the Adoption -- Towards a Universal Similarity Function: the Information Contrast Model and its Application as Evaluation Metric in Artificial Intelligence Tasks -- Research Track -- Finding HSP Neighbors via an Exact, Hierarchical Approach -- Approximate Similarity Search for Time Series Data Enhanced by Section Min-Hash -- Mutual nearest neighbor graph for data analysis: Application to metric space clustering -- An Alternating Optimization Scheme for Binary Sketches for Cosine Similarity Search -- Unbiased Similarity Estimators using Samples -- Retrieve-and-Rank End-to-End Summarization of Biomedical Studies -- Fine-grained Categorization of Mobile Applications through Semantic Similarity Techniques for Apps Classification -- Runs of Side-Sharing Tandems in Rectangular Arrays -- Turbo Scan: Fast Sequential Nearest Neighbor Search in High Dimensions -- Class Representatives Selection in Non-Metric Spaces for Nearest Prototype Classification -- The Dataset-similarity-based Approach to Select Datasets for Evaluation in Similarity Retrieval -- Suitability of Nearest Neighbour Indexes for Multimedia Relevance Feedback -- Accelerating k-Means Clustering with Cover Trees -- Is Quantized ANN Search Cursed? Case Study of Quantifying Search and Index Quality -- Minwise-Independent Permutations with Insertion and Deletion of Features -- SDOclust: Clustering with Sparse Data Observers -- Solving k-Closest Pairs in High-Dimensional Data using Locality- Sensitive Hashing -- Vec2Doc: Transforming Dense Vectors into Sparse Representations for Efficient Information Retrieval -- Similarity Search with Multiple-Object Queries -- Diversity Similarity Join for Big Data -- Indexing Challenge -- Overview of the SISAP 2023 Indexing Challenge -- Enhancing Approximate Nearest Neighbor Search: Binary-Indexed LSH-Tries, Trie Rebuilding, And Batch Extraction -- General and Practical Tuning Method for Off-the-Shelf Graph-Based Index: SISAP Indexing Challenge Report by Team UTokyo -- SISAP 2023 Indexing Challenge – Learned Metric Index -- Computational Enhancements of HNSW Targeted to Very Large Datasets -- CRANBERRY: Memory-Effective Search in 100M High-Dimensional CLIP Vectors.
Record Nr. UNISA-996558465403316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social justice in dance/movement therapy : practice, research and education / / edited by Laura Downey, Susan Kierr
Social justice in dance/movement therapy : practice, research and education / / edited by Laura Downey, Susan Kierr
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (188 pages)
Disciplina 943.005
Soggetto topico Dance therapy
ISBN 3-031-19451-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Editors' Note -- ADTA 2018 Keynote Plenary Panel: Power and Privilege Within the ADTA -- Historical Perspectives -- Angela M. Grayson, PhD, LPC, BC-DMT, NCC -- Power and Privilege in Education Settings -- Lindsay Howard, MA, BC-DMT, RYT200 -- It's Okay to be Uncomfortable -- Know Your Social Positionality -- TeacherStudent Interaction in the Classroom -- Conversations About Power and Privilege in the Classroom -- A Step in the Shoes of a POC -- Recommendations for Moving Forward -- References -- Theory and Practice -- Rosey Puloka, MA, LCPC, BC-DMT, GL-CMA, RYT​ -- Grace and Grit: A Meditation on Dance Movement Therapy's Locations and Aspirations -- Abstract -- Our Historical Roots -- DanceMovement Therapy in the 21st Century -- What This Means for Us as DanceMovement Therapists -- Conclusion -- References -- Breaking Free: One Adolescent Woman's Recovery from Dating Violence Through Creative Dance -- Abstract -- Introduction -- Conceptualizing the Gender-Based Nature of Violence Against Adolescent Women -- Methodology -- Creative Dance -- Box Dance -- Findings -- Shirley's History and Context -- Restorative Movement Psychotherapy Perspective: In the Box Observations and Responses -- RMP and Feminist Perspective: Out of the Box Observations and Responses -- Immobilized -- Understanding How Creative Dance Can Help Mobilize an Immobilized Victim of DVAAW​ -- Conclusion -- Acknowledgements -- References -- Empowerment-Focused DanceMovement Therapy for Trauma Recovery -- Abstract -- Introduction -- Background -- A Cultural Lens for Working in the Global Community -- An Approach Grounded in the Pioneering DanceMovementWord Therapy of Blanche Evan -- Healing the Negative Impacts of Trauma: An Overview -- Expanding Dance Vocabulary -- Creative Dance: The Power of Imagery and Symbolic Expression.
Dance Improvisation and Themes of Empowerment -- Healing Developmental Gaps Through Dance and A Brief Discussion About the Neurobiology of Imagery Making -- Group DanceMovement Therapy -- Expressive Voice in DanceMovement Therapy -- Rehearsal: Building Bridges Between Dance and Life Change -- Dancing Stories and Time Travel -- Music in Empowerment-Focused DanceMovement Therapy -- Self Expression Through Drumming -- DanceMovement Therapy with Visual Arts Expression -- Professional Development for Trauma Recovery -- Conclusion -- References -- Past, Present, Future: A Program Development Project Exploring Post Traumatic Slave Syndrome (PTSS) Using Experiential Education and DanceMovement Therapy Informed Approaches -- Abstract -- Introduction -- Intergenerational Trauma -- Racism and Mental Health Oppression -- PTSS -- PTSS and Segregation -- Programming for African American Youth -- Approaches to Healing -- Building BlocksHealing Domains -- Methodology -- Program Development -- Healing in Motion Program -- Theory into Application -- Repetition of Healing in Motion Program -- Beyond Healing in Motion: Scaling the Scope of the Program -- Conclusion -- References -- Applying Critical Consciousness to DanceMovement Therapy Pedagogy and the Politics of the Body -- Abstract -- The Gap Between Multicultural Education and the Systemic Embodiment-Enactment of Power -- Critical Pedagogy -- Critical and Liberatory Consciousness -- Counternarratives -- White Supremacy as the Ubiquitous Norm -- The Politics of the Body in DMT -- Embodied Dialectics -- Epistemological Struggle of DMT -- Dominant Narratives in DMT -- Applying Critical Consciousness and Decentering the DMT Curriculum -- Color Privilege -- Language Privilege -- Varieties of English Writing and Learning -- Non-verbal Communication -- International Students -- DMT Curriculum.
DMT Theories and Foundations -- Assessment -- Ethics and Cross-Cultural Communication -- Supervision -- Research -- Discussion -- Acknowledgements -- References -- DanceMovement Therapy in Cross-Cultural Practice: Fostering Assertiveness with Torture Survivors -- Abstract -- Introduction: Dilemmas of Cross-Cultural Therapy -- Case 1: Adamos -- Assertiveness in the Face of Traumatic Memories -- Case 2: Meinah -- Case 3: Fatima -- Coda: Adamos, Worldview, and the Heart of Sleep -- References -- (Re-) Defining DanceMovement Therapy Fifty Years Hence -- Abstract -- Defining a Profession -- Derrida's Declaration -- Implications for the Profession -- A Suggestion for Re-Direction -- References -- Moving Towards Wellness in Long-term Care: Considerations for Dementia-Associated Aggression -- Abstract -- Introduction -- Dementia: Beyond the Facts and Figures -- More Than Just Bingo -- DMT, Dementia, and Quality of Life -- Vignette One -- Vignette Two -- Conclusion -- References -- Ghosts in the Bedroom: Embodiment Wishes in Couple Sexuality: Qualitative Research and Practical Application -- Abstract -- Introduction -- From Childhood to Adulthood: Embodied Sexual Knowledge -- Method -- Participants -- Procedures -- Research Tools -- Data Analysis -- Ethics -- Findings -- Desire and Its Embodied Experience of Security -- A Wish for Magical Compatibility -- Discussion -- From Feeling to Emotional Experience: Knowing the Psychosomatic Secrets of Desire -- Sowing Security to Reap Desire -- A Wish for Magical Knowledge and Letting It Go -- Limitations of Research and Further Studies -- Conclusion -- References -- The Embodied Teen: A Somatic Curriculum for Teaching Body-Mind Awareness, Kinesthetic Intelligence, and Social and Emotional Skills -- References.
Record Nr. UNINA-9910631082003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on large-scale data- and knowledge-centered systems LII / / edited by Abdelkader Hameurlain, A. Min Tjoa
Transactions on large-scale data- and knowledge-centered systems LII / / edited by Abdelkader Hameurlain, A. Min Tjoa
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2022]
Descrizione fisica 1 online resource (157 pages)
Disciplina 943.005
Collana Lecture Notes in Computer Science
Soggetto topico Data mining
ISBN 3-662-66146-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Mutida: A Rights Management Protocol for Distributed Storage Systems Without Fully Trusted Nodes -- 1 Introduction -- 2 Related Work -- 3 Usage Scenarios and Assumptions -- 4 Mutida Model -- 4.1 Protocol Description -- 4.2 Storage of the Global ACL -- 4.3 ACL Management -- 5 Methodology -- 5.1 Classical Cryptography -- 5.2 The Base Comparison Method - Shamir's Secret Sharing -- 6 Results Evaluation -- 6.1 Method Calculation Performance -- 6.2 Scenario I: No Data Sharing -- 6.3 Scenario II: Sharing Data with a Single User -- 6.4 Scenario III: Real-World Use Case -- 6.5 Discussion of Results -- 7 Conclusion -- References -- OpenCEMS: An Open Solution for Easy Data Management in Connected Environments -- 1 Introduction -- 2 Related Works -- 2.1 Research/Academic Works -- 2.2 Industrial Solutions -- 3 Proposal: OpenCEMS -- 3.1 Technical Overview -- 3.2 Data Management Services -- 3.3 Services Execution Modalities -- 3.4 Ontology-Based Web Form Generation -- 3.5 Ongoing Developments -- 4 Illustration Example -- 4.1 Environment Setup and Data Acquisition -- 4.2 Services Usage -- 5 Conclusion and Future Works -- References -- Knowledge Graph Augmentation for Increased Question Answering Accuracy -- 1 Introduction -- 2 Related Works -- 2.1 Question Answering -- 2.2 Question Answering over Knowledge Graphs -- 2.3 Insufficiency of Solutions for Query Expansion -- 2.4 Data Augmentation -- 2.5 Differences Between KG Augmentation and KG Auto-Completion -- 2.6 Positioning in the State-of-the-Art -- 3 Automatic Knowledge Graph Augmentation -- 3.1 Character-Level Augmentation -- 3.2 Item-Level Augmentation -- 3.3 Component-Level Augmentation -- 3.4 An Efficient Combination of All of Them -- 4 Results -- 4.1 Datasets -- 4.2 Setup -- 4.3 Empirical Evaluation -- 4.4 Discussion -- 5 Conclusions -- References.
Online Optimized Product Quantization for ANN Queries over Dynamic Database using SVD-Updating -- 1 Introduction -- 2 Preliminaries -- 2.1 Approximate K-Nearest Neighbor Search -- 2.2 Vector Quantization (VQ) -- 2.3 Product Quantization (PQ) -- 2.4 Optimized PQ -- 2.5 Online PQ -- 3 Related Work -- 3.1 Approximate Nearest-Neighbor (ANN) Search -- 3.2 Quantization Methods -- 4 Proposed Method -- 4.1 Updating Codebook -- 4.2 Update Rotation Matrix using SVD-Updating -- 4.3 Online Optimized PQ Using SVD-Updating -- 4.4 Computational Complexity -- 4.5 Applying Sliding Window -- 5 Experiments -- 5.1 Experimental Setting -- 5.2 Effects of Low-Rank Approximation -- 5.3 Comparison with Non-online Methods -- 5.4 Comparison with Online Methods -- 5.5 Performance with Sliding Windows -- 6 Conclusion -- References -- Empirical Study of the Model Generalization for Argument Mining in Cross-Domain and Cross-Topic Settings -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Problem Statement -- 3.2 Data Description -- 3.3 Models of Our Ensemble Learning Approach -- 4 Experiments -- 4.1 Feature Analysis and Model Selection -- 4.2 Single-Dataset Learning (SDL) Vs. Multi-dataset Learning (MDL) -- 4.3 Cross-Domain Settings: Testing on a Completely Unseen Dataset -- 4.4 Cross-Topic Settings: Testing on Unseen Topics from the Same Dataset(s) -- 5 Conclusion -- References -- A Pattern Mining Framework for Improving Billboard Advertising Revenue -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Background About Coverage Patterns -- 3 Proposed Framework of the Problem -- 4 Proposed Billboard Allocation Scheme -- 4.1 Basic Idea -- 4.2 Proposed BAF -- 4.3 Illustrative Example -- 4.4 Time and Space Complexity -- 5 Performance Evaluation -- 5.1 Effect of Varying the Number of Clients -- 5.2 Effect of Varying the Number of Available Billboards.
5.3 Effect of Varying maxOR -- 5.4 Discussion on Setting the Parameters of BAF -- 6 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910616209803321
Berlin, Germany : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Transactions on large-scale data- and knowledge-centered systems LII / / edited by Abdelkader Hameurlain, A. Min Tjoa
Transactions on large-scale data- and knowledge-centered systems LII / / edited by Abdelkader Hameurlain, A. Min Tjoa
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2022]
Descrizione fisica 1 online resource (157 pages)
Disciplina 943.005
Collana Lecture Notes in Computer Science
Soggetto topico Data mining
ISBN 3-662-66146-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Mutida: A Rights Management Protocol for Distributed Storage Systems Without Fully Trusted Nodes -- 1 Introduction -- 2 Related Work -- 3 Usage Scenarios and Assumptions -- 4 Mutida Model -- 4.1 Protocol Description -- 4.2 Storage of the Global ACL -- 4.3 ACL Management -- 5 Methodology -- 5.1 Classical Cryptography -- 5.2 The Base Comparison Method - Shamir's Secret Sharing -- 6 Results Evaluation -- 6.1 Method Calculation Performance -- 6.2 Scenario I: No Data Sharing -- 6.3 Scenario II: Sharing Data with a Single User -- 6.4 Scenario III: Real-World Use Case -- 6.5 Discussion of Results -- 7 Conclusion -- References -- OpenCEMS: An Open Solution for Easy Data Management in Connected Environments -- 1 Introduction -- 2 Related Works -- 2.1 Research/Academic Works -- 2.2 Industrial Solutions -- 3 Proposal: OpenCEMS -- 3.1 Technical Overview -- 3.2 Data Management Services -- 3.3 Services Execution Modalities -- 3.4 Ontology-Based Web Form Generation -- 3.5 Ongoing Developments -- 4 Illustration Example -- 4.1 Environment Setup and Data Acquisition -- 4.2 Services Usage -- 5 Conclusion and Future Works -- References -- Knowledge Graph Augmentation for Increased Question Answering Accuracy -- 1 Introduction -- 2 Related Works -- 2.1 Question Answering -- 2.2 Question Answering over Knowledge Graphs -- 2.3 Insufficiency of Solutions for Query Expansion -- 2.4 Data Augmentation -- 2.5 Differences Between KG Augmentation and KG Auto-Completion -- 2.6 Positioning in the State-of-the-Art -- 3 Automatic Knowledge Graph Augmentation -- 3.1 Character-Level Augmentation -- 3.2 Item-Level Augmentation -- 3.3 Component-Level Augmentation -- 3.4 An Efficient Combination of All of Them -- 4 Results -- 4.1 Datasets -- 4.2 Setup -- 4.3 Empirical Evaluation -- 4.4 Discussion -- 5 Conclusions -- References.
Online Optimized Product Quantization for ANN Queries over Dynamic Database using SVD-Updating -- 1 Introduction -- 2 Preliminaries -- 2.1 Approximate K-Nearest Neighbor Search -- 2.2 Vector Quantization (VQ) -- 2.3 Product Quantization (PQ) -- 2.4 Optimized PQ -- 2.5 Online PQ -- 3 Related Work -- 3.1 Approximate Nearest-Neighbor (ANN) Search -- 3.2 Quantization Methods -- 4 Proposed Method -- 4.1 Updating Codebook -- 4.2 Update Rotation Matrix using SVD-Updating -- 4.3 Online Optimized PQ Using SVD-Updating -- 4.4 Computational Complexity -- 4.5 Applying Sliding Window -- 5 Experiments -- 5.1 Experimental Setting -- 5.2 Effects of Low-Rank Approximation -- 5.3 Comparison with Non-online Methods -- 5.4 Comparison with Online Methods -- 5.5 Performance with Sliding Windows -- 6 Conclusion -- References -- Empirical Study of the Model Generalization for Argument Mining in Cross-Domain and Cross-Topic Settings -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Problem Statement -- 3.2 Data Description -- 3.3 Models of Our Ensemble Learning Approach -- 4 Experiments -- 4.1 Feature Analysis and Model Selection -- 4.2 Single-Dataset Learning (SDL) Vs. Multi-dataset Learning (MDL) -- 4.3 Cross-Domain Settings: Testing on a Completely Unseen Dataset -- 4.4 Cross-Topic Settings: Testing on Unseen Topics from the Same Dataset(s) -- 5 Conclusion -- References -- A Pattern Mining Framework for Improving Billboard Advertising Revenue -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Background About Coverage Patterns -- 3 Proposed Framework of the Problem -- 4 Proposed Billboard Allocation Scheme -- 4.1 Basic Idea -- 4.2 Proposed BAF -- 4.3 Illustrative Example -- 4.4 Time and Space Complexity -- 5 Performance Evaluation -- 5.1 Effect of Varying the Number of Clients -- 5.2 Effect of Varying the Number of Available Billboards.
5.3 Effect of Varying maxOR -- 5.4 Discussion on Setting the Parameters of BAF -- 6 Conclusion -- References -- Author Index.
Record Nr. UNISA-996490359203316
Berlin, Germany : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui