top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor
2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor
Pubbl/distr/stampa Piscataway : , : IEEE, , 2021
Descrizione fisica 1 online resource (xxxiii, 759 pages) : illustrations (some color)
Disciplina 004.6782
Soggetto topico Cloud computing
ISBN 1-66540-060-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2021 IEEE 14th International Conference on Cloud Computing
Record Nr. UNINA-9910554094203321
Piscataway : , : IEEE, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor
2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor
Pubbl/distr/stampa Piscataway : , : IEEE, , 2021
Descrizione fisica 1 online resource (xxxiii, 759 pages) : illustrations (some color)
Disciplina 004.6782
Soggetto topico Cloud computing
ISBN 1-66540-060-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2021 IEEE 14th International Conference on Cloud Computing
Record Nr. UNISA-996574791803316
Piscataway : , : IEEE, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Business System Management and Engineering [[electronic resource] ] : From Open Issues to Applications / / edited by Claudio Agostino Ardagna, Ernesto Damiani, Leszek A. Maciaszek, Michele Missikoff, Michael Parkin
Business System Management and Engineering [[electronic resource] ] : From Open Issues to Applications / / edited by Claudio Agostino Ardagna, Ernesto Damiani, Leszek A. Maciaszek, Michele Missikoff, Michael Parkin
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 197 p. 60 illus.)
Disciplina 658.4/038011
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Management information systems
Computer science
E-commerce
Software engineering
Computer security
Computer Appl. in Administrative Data Processing
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
e-Commerce/e-business
Software Engineering
Systems and Data Security
Soggetto genere / forma Conference proceedings.
ISBN 3-642-32439-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465438103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNISA-996465314903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication [[electronic resource] ] : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings / / edited by Claudio Agostino Ardagna, Jianying Zhou
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication [[electronic resource] ] : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings / / edited by Claudio Agostino Ardagna, Jianying Zhou
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 392 p.)
Disciplina 621
Collana Security and Cryptology
Soggetto topico Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Computer security
Computers and civilization
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
ISBN 3-642-21040-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Keynote Speech -- Can Code Polymorphism Limit Information Leakage? -- Introduction -- Algorithmic Description -- Bucket Types -- Rewriting Algorithms -- Concrete Implementation -- Experimental Evaluation -- Performance -- Attacking a Standard aes Implementation -- Attacking an Unrolled aes Implementation -- Attacking a Polymorphic aes Implementation -- Can Lisp-Like Languages Help? -- Structure -- Step by Step Explanations -- Rewriter -- Results -- Possible Extensions -- Avoiding Code Growth -- Separating H From F_i -- Randomizing Compilers: A Practical Approach -- References -- Mobile Authentication and Access Control -- Mobile Electronic Identity: Securing Payment on Mobile Phones -- Introduction -- Present-Day Payment Solutions -- NFC -- Bluetooth -- SMS -- Other Solutions -- Using a HISP: Mixing Context, Human Trust and Security -- Choosing a HISP -- Tailoring a HISP -- The Human Contribution -- Demonstrating a HISP -- Reverse Authentication -- Implementation -- Implementation of Approach A -- Implementation of Approach B -- Security Analysis -- Phishing/Credential Harvesting -- Malware -- Man in the Middle -- Conclusion -- References -- Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems -- Introduction -- Relevant Work and Motivation -- The Proposed domRBAC Model for Modern Collaborative Systems -- domRBAC Elements -- domRBAC Definitions -- Use Cases -- Use Case 1: Resource Usage Management -- Use Case 2: Security Violation -- Conclusion -- References -- Lightweight Authentication -- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key -- Introduction -- Background -- Man in the Middle Attacks -- Generic Authentication Architecture -- Related Work -- TLS-SA Using a GAA Bootstrapped Key -- The Basic Scheme.
Variants -- Analysis -- Informal Security Analysis -- Security-Efficiency Trade-Offs -- Conclusions -- References -- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control -- Introduction -- Security Model -- Tools -- Protocol Description -- Properties -- Security Reductions -- Conclusions -- References -- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption -- Introduction -- Linkable vs. Unlinkable AHA -- The Challenge of Group Discovery -- Related Work -- Contributions and Organization -- Non-Interactive Key Distribution -- Definition and Security Model of NIKDS -- A Construction of NIKDS Based on Bilinear Maps (Pairings) -- Our Affiliation-Hiding Authentication Protocol -- Syntax of AHA -- Protocol Definition -- Correctness, Efficiency, and Parameter Selection -- Security Model for AHA -- Adversary Model -- Linkable Affiliation-Hiding Security -- Security Analysis of Our Protocol -- Conclusion -- References -- Algorithms -- Formal Framework for the Evaluation of Waveform Resynchronization Algorithms -- Introduction -- Resynchronization Algorithms -- Problem Statement -- AOC: Amplitude-Only Correlation -- POC: Phase-Only Correlation -- POC Flaw and Threshold-POC -- Complexity of AOC, POC and T-POC -- Evaluation of Resynchronization Algorithms -- Formal Framework -- Benchmarking of Representative Waveforms -- Conclusions and Perspectives -- References -- Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library -- Introduction -- Preliminaries -- Discrete Logarithm Problem with Auxiliary Input (DLPwAI) -- Cheon's Algorithm -- DLPwAI in Cryptographic Schemes -- Implementation -- BSGS Algorithm -- KKM Improvement -- Experimental Results -- Parameters -- Results -- Estimations -- Concluding Remarks -- References.
Information Leakage Discovery Techniques to Enhance Secure Chip Design -- Introduction -- EMA Analysis as a Design Phase -- Electromagnetic Emission Analysis -- Information Finding Algorithm -- Complexity Analysis -- Experimental Validation -- Workbench -- Experimental Results -- Conclusion -- References -- Hardware Implementation -- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines -- Introduction -- Related Work -- System Overview -- Hardware Architecture -- Arithmetic-Level Implementation -- Algorithm-Level Implementation -- The SHA-1 Algorithm -- The AES Algorithm -- ECC Scalar Multiplication -- ECDSA Implementation -- Results -- Conclusions -- References -- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture -- Introduction -- Background -- Side-Channel Attacks on Hash Functions -- The Power-Trust Platform -- Our Variant of the Power-Trust Platform -- Implementation of Hash Functions on the Power-Trust Platform -- Results -- Instruction Set Agility -- Performance -- Conclusions -- References -- A Comparison of Post-Processing Techniques for Biased Random Number Generators -- Introduction -- Known Techniques for De-Biasing -- Compression with Cryptographic Hash -- Compression Using the Von Neumann Corrector -- Compression Based on Good Linear Codes -- Comparison of Random Bias of Different Post-Processing Functions -- Comparison of Adversary Bias of Different Post-Processing Functions -- Adversary Bias after Linear Compression -- Adversary Bias after Von Neumann Compression -- Linear Compression Outperforming the Von-Neumann Compression -- The Use of Linear Codes with Large d -- Implementation -- Construction of Linear Corrector Functions Based on Cyclic Codes -- Resource Utilization -- Conclusion -- References -- Security and Cryptography.
AES Variants Secure against Related-Key Differential and Boomerang Attacks -- Introduction -- Our Contribution -- Framework for Protection against Related Key Differential and Boomerang Attacks -- Some Definitions and Notation -- Protection against Related-Key Differential Attack of [4] -- Protection against Related-Key Boomerang Attack of [3] -- Security of Improved May et al.'s AES Key Schedule against Related-key Attack -- Equivalent Keys in May et al.'s Key Schedule -- An Improved May et al.'s Key Schedule -- Improved May et al.'s Key Schedule is Secure against Related-Key Differential Attack -- Improved May et al.'s Key Schedule is Secure against Related-Key Boomerang Attack -- A New On-the-fly Key Schedule for AES Secure against Related-Key Differential and Boomerang Attacks -- Hardware Implementation -- References -- Leakage Squeezing Countermeasure against High-Order Attacks -- Introduction -- State of the Art -- First Order Masking Overview -- Vulnerability of the Masking against 1O-Attacks -- Vulnerability of the Masking against 2O-Attacks -- Proposed Masking Method for ``Leakage Squeezing'' -- Masking Principle -- Formal Security Assessment and Motivation for Some Bijections -- Experiments on Masked DES Implementations -- ROM Implementation -- USM Implementation -- Complexity and Throughput Results -- Information-Theoretic Evaluation of the Proposed Solutions -- Evaluation of the Implementations against 2O-Attacks -- Conclusion and Perspectives -- References -- Security Attacks and Measures (Short Papers) -- Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault -- Introduction -- Background -- The Advanced Encryption Standard -- The Fault Model -- The Fault Analysis -- The First Step of the Fault Attack -- Analysis of the First Step of the Fault Attack -- The Second Step of the Fault Attack.
Analysis of the Second Step of the Fault Attack -- Attacking other Bytes -- Comparison with Previous Work -- Conclusion -- References -- Entropy of Selectively Encrypted Strings -- Introduction -- Terminology and Definitions -- Languages -- Entropy -- Selective Encryption -- Confidentiality of Selective Encryption -- Zero- and First-Order Languages -- Second-Order Languages -- Third-Order Languages -- n-Order Languages -- Concluding Remarks -- References -- Practical Attacks on HB and HB+ Protocols -- Introduction -- Description of the HB and HB+ Protocols -- Passive Attacks on HB Protocol -- Simple Walker Algorithm -- k-Basis Walker Algorithm -- Algorithm Analysis -- Experimental Results -- Conclusions -- References -- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard -- Introduction -- Review SRP -- Initialization Phase -- The (i+1)th Authentication Round -- Vulnerabilities of SRP -- Reveal EPC_s -- Privacy Analysis -- Revised Protocol -- Security Analysis -- Conclusion -- References -- Security Attacks -- A SMS-Based Mobile Botnet Using Flooding Algorithm -- Introduction -- Background and Motivation -- Related Works -- Challenging Issues -- Our Works and Contributions -- The Overview of the Proposed SMS-Based Botnet -- Stealthiness Study -- Topology Study Based on Simulation -- Simulation Setup -- Simulation Results -- Botnet Construction -- Botnet Maintaining -- Defense Strategies -- Conclusion -- References -- FIRE: Fault Injection for Reverse Engineering -- Introduction -- State of the Art -- Physical Attacks on Cryptographic Systems -- Solving Linear Boolean Systems -- The Case of DES -- The Case of AES -- Fault Injection -- Translation of the FI into Equations -- Random and unknown Faults -- SCARE Conclusion of a FIRE Attack -- Results with Various Fault Models and Contexts -- Conclusion -- References.
Hardware Trojan Side-Channels Based on Physical Unclonable Functions.
Record Nr. UNISA-996465656903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXVII, 767 p. 280 illus.)
Disciplina 004.678
Collana Programming and Software Engineering
Soggetto topico Artificial intelligence
Application software
Software engineering
Computer security
Data mining
Computer communication systems
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering
Systems and Data Security
Data Mining and Knowledge Discovery
Computer Communication Networks
ISBN 3-319-69462-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part I -- Contents - Part II -- International Conference on Cooperative Information Systems (CoopIS) 2017 -- En -- Characterizing Regulatory Documents and Guidelines Based on Text Mining -- 1 Introduction -- 2 Methodology -- 3 Description of Documents -- 3.1 Description of ISO/IEC Documents -- 3.2 Description of Medical Document -- 4 Evaluation -- 4.1 Case Study 1: ISO Documents -- 4.2 Case Study 2: Medical Document -- 5 Limitations and Application Scenarios -- 6 Related Work -- 7 Conclusion and Future Work -- References -- A Scalable Smart Meter Data Generator Using Spark -- 1 Introduction -- 2 Methodology -- 2.1 Overview -- 2.2 Algorithm Description -- 2.3 Optimization -- 3 Implementation on Spark -- 4 Evaluation -- 4.1 Effectiveness -- 4.2 Scalability -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Network-Aware Stochastic Virtual Machine Placement in Geo-Distributed Data Centers -- 1 Introduction -- 2 Problem Formulation -- 2.1 Stochastic Optimization Model -- 2.2 Equivalent Optimization Formulation -- 2.3 Network-Aware Stochastic VM Placement Algorithm -- 3 Performance Evaluation -- 4 Conclusion -- References -- Finding Process Variants in Event Logs -- 1 Introduction -- 2 Preliminaries -- 3 Finding Process Variants in Event Logs -- 4 Implementation and Case Study -- 5 Related Work -- 6 Conclusions -- References -- Interactive and Incremental Business Process Model Repair -- 1 Introduction -- 2 Related Work -- 3 Behavioral Alignment -- 4 Extending Conformance Checking to Process Model Repair -- 4.1 Extension, Order and Impact of Differences -- 4.2 Visualization of Differences -- 5 Evaluation.
5.1 Experiment with Synthetic Datasets -- 5.2 Experiment with Real-Life Dataset -- 6 Conclusion -- References -- Control Flow Structure Preservation During Process Fragment Anonymization -- 1 Introduction -- 2 Control Flow Anonymization -- 3 Evaluation -- 4 Related Work -- 5 Conclusion and Discussion -- References -- Diversity-Aware Continuous Top-k Queries in Social Networks -- 1 Introduction and Related Work -- 2 Data and Processing Models -- 3 The DA-SANTA Algorithm -- 4 Experimental Evaluation -- References -- Modeling and Discovering Cancelation Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Criteria for Comparison -- 2.2 Discussion of the Related Work -- 3 Event Logs and Process Trees -- 3.1 Preliminaries -- 3.2 Event Logs -- 3.3 Process Trees -- 3.4 Cancelation Process Trees -- 4 Heuristics for Error Oracle -- 5 Model Discovery -- 5.1 Directly Follows Graph and Cuts -- 5.2 Discovery Framework -- 5.3 Cancelation Discovery -- 6 Evaluation -- 6.1 Input and Methodology for Comparative Evaluation -- 6.2 Comparative Evaluation Results and Discussion -- 7 Conclusion -- References -- Introducing Collaboration for Locating Features in Models: Approach and Industrial Evaluation -- 1 Introduction -- 2 Background -- 3 Our Approach for Introducing Collaboration in FL -- 3.1 Automatic Query Reformulation -- 3.2 IR FL CORE -- 3.3 Linguistic Rules FL CORE -- 4 Evaluation -- 4.1 Definition -- 4.2 Data Set -- 4.3 Implementation Details -- 4.4 Planning and Execution -- 4.5 Results -- 4.6 Statistical Analysis -- 5 Threats to Validity -- 6 Related Work -- 7 Concluding Remarks -- References -- Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach -- 1 Introduction -- 2 Significance of Our Research and General Requirements -- 2.1 Application Scenario -- 2.2 General Requirements.
3 Our Formal FCAAC Approach -- 3.1 Context Model -- 3.2 Policy Model -- 4 Ontology-Based FCAAC Approach -- 4.1 Modelling Contextual Conditions -- 4.2 Reasoning About Contextual Conditions -- 4.3 FCAAC Policy -- 5 Prototype and Evaluation -- 5.1 Practicality -- 5.2 Performance -- 6 Related Work and Discussion -- 7 Conclusion and Future Research -- References -- Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Patterns and Pattern Instances -- 4.1 Core-Activity, Pattern and Pattern Instance -- 4.2 Pattern Support, Confidence and Coverage -- 5 Pattern Detection and Pattern Instance Matching -- 5.1 Pattern Detection Approaches - Partially Ordered Traces to Patterns -- 5.2 Computing a Maximal Set of Pattern Instances -- 6 Evaluation and Discussion -- 7 Conclusion and Future Work -- References -- Cloud of Things Modeling for Efficient and Coordinated Resources Provisioning -- 1 Introduction -- 2 Existing Models and Standards -- 2.1 Internet of Things Environment -- 2.2 Cloud Infrastructure Management Initiatives -- 2.3 Synthesis of Existing Works on Cloud and IoT Models and Standards -- 3 Related Works -- 4 Cloud of Things Infrastructure Model -- 4.1 Network Graph Model -- 4.2 Sensor and Actuator Resources -- 4.3 Things Virtualization -- 4.4 Things Integration Patterns -- 5 Cloud of Things Platform Model -- 5.1 Cloud of Things Deployment Options -- 5.2 Data Components Sharing -- 6 Example Scenarios -- 6.1 Resources Description -- 6.2 Mapping Process -- 7 Cloud of Things Placement Problem Formulation -- 8 Simulation and Results -- 9 Conclusion and Perspectives -- References -- A Framework for Integrating Real-World Events and Business Processes in an IoT Environment -- 1 Introduction -- 2 Foundations -- 2.1 Business Process Management.
2.2 Complex Event Processing -- 3 Requirements Analysis -- 4 Related Work -- 5 Conceptual Framework -- 5.1 Event Generation and Aggregation -- 5.2 Event Binding Points -- 5.3 Event Subscription and Correlation -- 5.4 Reaction on Events -- 6 Implementation -- 6.1 Unicorn Event Processing Platform -- 6.2 Gryphon Case Modeler -- 6.3 Chimera Case Engine -- 7 Conclusion and Future Work -- References -- Methodological Support for Coordinating Tasks in Global Product Software Engineering -- 1 Introduction -- 2 Research Method: The Design Cycle -- 2.1 The Method Association Approach -- 2.2 Method Evaluation Approach -- 3 Problem Investigation -- 3.1 Literature Study -- 3.2 The Global Task Coordination Framework -- 3.3 Identifying Activity Groups -- 3.4 Identifying Method Fragments -- 4 Solution Design: Construction of a Global Task Coordination Method -- 4.1 Method Association -- 4.2 Method Assembly -- 4.3 Method Validation -- 5 Discussion -- 6 Conclusions and Future Research -- Appendix A The Global Task Coordination Method -- References -- Enhancing Process Models to Improve Business Performance: A Methodology and Case Studies -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets and Event Logs -- 2.2 Aligning Petri Nets and Event Logs and Repairing Event Logs -- 3 The Methodology -- 3.1 Deviation Analysis -- 3.2 Repair and Merge Log Clusters -- 3.3 Repair Model -- 4 Implementation and Evaluation -- 4.1 UWV Case Study -- 4.2 SAP Procurement Case Study -- 5 Related Work -- 6 Conclusion -- References -- TraDE - A Transparent Data Exchange Middleware for Service Choreographies -- 1 Introduction -- 2 Transparent Data Exchange Approach -- 2.1 Cross-Partner Data Objects and Cross-Partner Data Flows -- 2.2 Towards a TraDE Middleware -- 3 The TraDE Middleware -- 3.1 Metamodel -- 3.2 Architecture -- 3.3 Integration with Process Engines -- 4 Validation.
5 Evaluation -- 5.1 Evaluation Methodology and Experimental Setup -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions and Outlook -- References -- Building the Most Creative and Innovative Collaborative Groups Using Bayes Classifiers -- Abstract -- 1 Introduction -- 2 Related Work on Collaborative Creativity -- 3 A Bayes Classifier-Based Model and Method for Building Optimally Creative and Innovative Groups -- 3.1 Bayesian Network Classifiers -- 3.2 General Model for Building "the Best" Collaborative Groups -- 3.3 Model Instantiation for Building the Most Creative Learning Groups -- 4 Case Study - A Real-World Scenario -- 5 Discussion -- 6 Conclusions and Future Work -- References -- A New Collaborative Paradigm of Computer Science Student Contests: An Experience -- Abstract -- 1 Introduction -- 2 Computer Science Contests -- 2.1 Computer Programming Contests -- 2.2 New Paradigms -- 3 Our Experience with Computer Science Contests -- 3.1 Evolution of Our Contest -- 3.2 A New Paradigm: Three-Words-from-a-Hat -- 3.3 Experiencing the New Paradigm -- 4 Is the New Paradigm Beneficial for Computer Science Education? -- 4.1 Is Competition Beneficial to Education? -- 4.2 Reflecting on the New Paradigm -- 5 Conclusions -- References -- Ranking-Based Evaluation of Process Model Matching -- 1 Introduction -- 2 Problem Statement -- 3 Probabilistic Evaluation of Process Model Matching -- 4 Evaluation Experiments -- 4.1 Setup -- 4.2 Results -- 5 Related Work -- 6 Conclusion -- References -- Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) -- 1 Introduction -- 2 Challenges for Decision Logic Re-configuration: A Loan Approval Motivation Scenario -- 3 Supporting Decision Propagation in Business Processes -- 3.1 Feature-Oriented Representation of Decision Logic.
3.2 Constraint-Based Analysis of Decision Logic.
Record Nr. UNISA-996465634603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXVII, 515 p. 152 illus.)
Disciplina 004.678
Collana Programming and Software Engineering
Soggetto topico Artificial intelligence
Software engineering
Application software
Database management
Data mining
Mathematical logic
Artificial Intelligence
Software Engineering
Information Systems Applications (incl. Internet)
Database Management
Data Mining and Knowledge Discovery
Mathematical Logic and Formal Languages
ISBN 3-319-69459-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part II -- Contents - Part I -- Cloud and Trusted Computing (C&TC) 2017 -- En -- Property Preserving Encryption in NoSQL Wide Column Stores -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 The Data Model of Wide Column Stores -- 3.2 Property-Preserving Encryption -- 4 Selecting Practical PPE Schemes -- 4.1 Deterministic Encryption -- 4.2 Order-Preserving Encryption -- 4.3 Searchable Encryption -- 5 Data Management on Server Side -- 5.1 An Onion Layer Model for WCSs -- 5.2 Querying the Encrypted Data -- 6 Evaluation -- 6.1 Implementation -- 6.2 Performance -- 7 Security -- 8 Extensions and Future Work -- 9 Conclusion -- References -- Towards a JSON-Based Fast Policy Evaluation Framework -- 1 Introduction -- 2 Fundamentals of JACPoL -- 3 Performance Evaluation -- 4 Conclusion -- References -- Gibbon: An Availability Evaluation Framework for Distributed Databases -- 1 Introduction -- 2 Background -- 2.1 Distributed Database Systems -- 2.2 Availability for DDBMSs -- 2.3 Cloud Infrastructure -- 3 Failure Impact Analysis -- 3.1 Replication for Availability -- 3.2 Failures and Recovery -- 4 Availability Metrics -- 4.1 Input Parameters -- 4.2 Output Metrics -- 5 Availability Evaluation -- 5.1 Evaluation Process -- 5.2 DB Gibbon Algorithm -- 6 Architecture -- 7 Discussion -- 7.1 Evaluation Scenario: MongoDB -- 7.2 Evaluation Results -- 8 Related Work -- 9 Conclusion and Future Work -- References -- Locality-Aware GC Optimisations for Big Data Workloads -- 1 Introduction -- 2 Background -- 2.1 NoSQL Databases and Object Locality -- 2.2 Garbage Collection Algorithms and Heap Layouts.
3 Gang Promotion in Heap Management -- 3.1 Identifying Relevant Object-Graphs -- 3.2 Gang GC on a Large Heap -- 4 Deployment of Gang Promotion on Hotspot JVM -- 4.1 Java Runtime Instrumentation -- 4.2 LAG1 --- Locality-Aware Extension of G1 -- 5 Evaluation -- 5.1 Evaluation Setup -- 5.2 Program Locality in System -- 5.3 Application Behaviour -- 6 Related Work -- 7 Conclusion -- References -- FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Architecture Design Requirements -- 3.2 Bid Representation Language -- 3.3 Entities and Events -- 3.4 Auctioneer Algorithms -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context -- 1 Introduction -- 2 The MAGNIFIER WebGIS-Based Situational Awareness Platform -- 3 The MAGNIFIER Technological Architecture -- 4 PRACTIONIST DSS -- 5 Conclusion and Future Works -- References -- On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 Conclusion, Discussion, and Future Work -- References -- International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE) 2017 -- En -- Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems -- 1 Introduction -- 2 Goal of Semantics Usage -- 3 Semantic Reference Model -- 3.1 Semantifying Relational Data -- 3.2 Consistent Model -- 4 Geo Political Ontology -- 5 Relevant Work -- 6 Evaluation Through Competency Questions -- 6.1 Use Case -- 6.2 Competency Questions -- References -- PFSgeo: Preference-Enriched Faceted Search for Geographical Data -- 1 Introduction -- 2 Related Work and Novelty.
3 The PFSgeo Approach -- 3.1 Extensions of the Language of PFS -- 3.2 Extensions of the System Hippalus -- 3.3 Algorithmic Perspective -- 4 Performance Evaluation -- 4.1 Testing Scalability -- 4.2 Analysis of the Performance -- 4.3 Comparative Experimental Results -- 5 Evaluation with Users -- 5.1 Preparation -- 6 Concluding Remarks -- References -- Speeding up Publication of Linked Data Using Data Chunking in LinkedPipes ETL -- 1 Introduction -- 2 Data Chunking -- 3 Data Chunking in LinkedPipes ETL -- 3.1 SPARQL Endpoint Extractor -- 3.2 Tabular Extractor and Files to RDF -- 3.3 SPARQL Transformers -- 3.4 Merger Component and Loaders -- 4 Datasets and Pipelines for Experiments -- 4.1 LISTID - List of Czech Business Entity IDs -- 4.2 ARES - Czech Business Registry -- 4.3 MONITOR - Budget Information of All Levels of Czech State Administration -- 4.4 RÚIAN - Registry of Territorial Identification, Addresses and Real Estate -- 5 Experiments -- 5.1 LISTID -- 5.2 ARES -- 5.3 MONITOR -- 5.4 RÚIAN -- 6 Related Work -- 7 Conclusions and Future Work -- References -- A Particle Swarm-Based Approach for Semantic Similarity Computation -- 1 Introduction -- 2 Background -- 2.1 Ontology-Based Similarity Measures -- 2.2 Ontology-Based Similarity Computation Scenarios -- 3 The Proposed Approach -- 3.1 Finding LCS as a Particle Swarm Optimization Problem -- 3.2 Fitness Scores of the LCS Evaluation -- 4 Experimental Evaluation -- 4.1 Benchmarks and Ontologies -- 4.2 Implementation -- 4.3 Experimental Results -- 5 Conclusion -- References -- Agent-Based Assistance in Ambient Assisted Living Through Reinforcement Learning and Semantic Technologies -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Reinforcement Learning -- 3.2 Agent Semantics -- 3.3 Automated ``Semantification'' and Retrieval of Agent Policies -- 4 First Results and Conclusion -- References.
On the Need for Applications Aware Adaptive Middleware in Real-Time RDF Data Analysis (Short Paper) -- 1 Introduction -- 2 Formalization of RSP Features -- 3 Evaluation of RSP Engines Based on Formalized RSP Features -- 3.1 Latency and Breaking Points -- 3.2 Memory Consumption -- 4 Adaptive Middleware for RSP -- 4.1 Adaptive Layer -- 5 Conclusion -- References -- Learning Probabilistic Relational Models Using an Ontology of Transformation Processes -- 1 Introduction -- 2 Backgrounds -- 2.1 The Ontology of Transformation Processes -- 2.2 Probabilistic Relational Models -- 2.3 Learning PRMs -- 3 Learning a PRM Using an Ontology -- 3.1 Relational Schema Mapping -- 3.2 Our ON2PRM Algorithm -- 4 Experiments -- 4.1 Databases Generation -- 4.2 Results -- 5 Conclusion -- References -- ORDAIN: An Ontology for Trust Management in the Internet of Things -- Abstract -- 1 Introduction -- 2 Defining Trust and Reputation -- 3 ORDAIN Ontology -- 3.1 Ontology Contents -- 3.2 Ontology Implementation -- 4 Related Work -- 5 Conclusions -- Acknowledgments -- References -- APOPSIS: A Web-Based Platform for the Analysis of Structured Dialogues -- 1 Introduction -- 2 Background and Related Work -- 2.1 Computational Argumentation -- 2.2 Machine Learning -- 2.3 Existing Tools for Online Debates -- 3 A Methodology and Platform for Opinion Analysis -- 3.1 A Platform Methodology -- 3.2 Knowledge Map Representation -- 3.3 The MACE - Ontology Domain -- 3.4 Evaluating Opinions -- 4 Methodology: Analysing User-Generated Opinions -- 4.1 Clustering Analysis -- 5 Apopsis Implementation and Architecture Details -- 5.1 Debating Functionality -- 5.2 Debating on Different Levels of Discussions -- 5.3 Voting Mechanism -- 5.4 Searching Mechanism -- 5.5 General Features -- 5.6 Technical Information and Architecture -- 6 Conclusion and Future Work -- References.
Identifying Opinion Drivers on Social Media -- 1 Introduction -- 2 Related Literature -- 3 Driver Identification: Formal Model -- 4 Results and Evaluation -- 5 Conclusions -- References -- Representing Fashion Product Data with Schema.org: Approach and Use Cases -- Abstract -- 1 Introduction -- 2 Overview of Clothing-Related Information -- 2.1 Garment Sizes -- 2.2 Colors -- 2.3 Product Variants -- 2.4 Materials Information -- 2.5 Textile Care Recommendations -- 2.6 Certifications -- 3 Clothing Product Information with Schema.org -- 3.1 Method -- 3.2 Representation of Basic Product Information -- 3.3 Representation of Clothing-Related Information -- 3.4 Representation of Textile Care Recommendations -- 3.5 Representation of Certifications -- 3.6 Other Information -- 3.7 Formalization and Results -- 4 Evaluation -- 5 Discussion and Conclusion -- 5.1 Related Work -- 5.2 Our Approach -- 5.3 Future Work -- References -- Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces -- 1 Introduction -- 2 Related Work -- 3 A Conceptual Model for Entities and Atomic Actions -- 4 Conceptual Model for scripts -- 5 Recognizing Script Instances from Documents -- 6 Summary -- References -- Linked Open Data for Linguists: Publishing the Hartmann von Aue-Portal in RDF -- Abstract -- 1 Introduction -- 1.1 Context -- 1.2 Problem Statement -- 1.3 Relevance -- 1.4 Organization of the Paper -- 2 Linked Open Data -- 3 The Hartmann von Aue-Portal -- 3.1 Purpose and Current Status -- 3.2 Data Model -- 3.3 Text Corpus Statistics -- 4 Approach -- 4.1 Challenges -- 4.2 Method -- 4.3 Implementation -- 4.4 Results -- 5 Evaluation -- 5.1 Formal Validation -- 5.2 Usage for Data-Driven Research -- 5.3 Interlinking of Hartmann von Aue Datasets with DBPedia -- 5.4 Reverse-Engineering -- 6 Discussion and Conclusion -- 6.1 Related Work.
6.2 Our Contribution.
Record Nr. UNISA-996465636403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXVII, 515 p. 152 illus.)
Disciplina 004.678
Collana Programming and Software Engineering
Soggetto topico Artificial intelligence
Software engineering
Application software
Database management
Data mining
Mathematical logic
Artificial Intelligence
Software Engineering
Information Systems Applications (incl. Internet)
Database Management
Data Mining and Knowledge Discovery
Mathematical Logic and Formal Languages
ISBN 3-319-69459-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part II -- Contents - Part I -- Cloud and Trusted Computing (C&TC) 2017 -- En -- Property Preserving Encryption in NoSQL Wide Column Stores -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 The Data Model of Wide Column Stores -- 3.2 Property-Preserving Encryption -- 4 Selecting Practical PPE Schemes -- 4.1 Deterministic Encryption -- 4.2 Order-Preserving Encryption -- 4.3 Searchable Encryption -- 5 Data Management on Server Side -- 5.1 An Onion Layer Model for WCSs -- 5.2 Querying the Encrypted Data -- 6 Evaluation -- 6.1 Implementation -- 6.2 Performance -- 7 Security -- 8 Extensions and Future Work -- 9 Conclusion -- References -- Towards a JSON-Based Fast Policy Evaluation Framework -- 1 Introduction -- 2 Fundamentals of JACPoL -- 3 Performance Evaluation -- 4 Conclusion -- References -- Gibbon: An Availability Evaluation Framework for Distributed Databases -- 1 Introduction -- 2 Background -- 2.1 Distributed Database Systems -- 2.2 Availability for DDBMSs -- 2.3 Cloud Infrastructure -- 3 Failure Impact Analysis -- 3.1 Replication for Availability -- 3.2 Failures and Recovery -- 4 Availability Metrics -- 4.1 Input Parameters -- 4.2 Output Metrics -- 5 Availability Evaluation -- 5.1 Evaluation Process -- 5.2 DB Gibbon Algorithm -- 6 Architecture -- 7 Discussion -- 7.1 Evaluation Scenario: MongoDB -- 7.2 Evaluation Results -- 8 Related Work -- 9 Conclusion and Future Work -- References -- Locality-Aware GC Optimisations for Big Data Workloads -- 1 Introduction -- 2 Background -- 2.1 NoSQL Databases and Object Locality -- 2.2 Garbage Collection Algorithms and Heap Layouts.
3 Gang Promotion in Heap Management -- 3.1 Identifying Relevant Object-Graphs -- 3.2 Gang GC on a Large Heap -- 4 Deployment of Gang Promotion on Hotspot JVM -- 4.1 Java Runtime Instrumentation -- 4.2 LAG1 --- Locality-Aware Extension of G1 -- 5 Evaluation -- 5.1 Evaluation Setup -- 5.2 Program Locality in System -- 5.3 Application Behaviour -- 6 Related Work -- 7 Conclusion -- References -- FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Architecture Design Requirements -- 3.2 Bid Representation Language -- 3.3 Entities and Events -- 3.4 Auctioneer Algorithms -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context -- 1 Introduction -- 2 The MAGNIFIER WebGIS-Based Situational Awareness Platform -- 3 The MAGNIFIER Technological Architecture -- 4 PRACTIONIST DSS -- 5 Conclusion and Future Works -- References -- On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 Conclusion, Discussion, and Future Work -- References -- International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE) 2017 -- En -- Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems -- 1 Introduction -- 2 Goal of Semantics Usage -- 3 Semantic Reference Model -- 3.1 Semantifying Relational Data -- 3.2 Consistent Model -- 4 Geo Political Ontology -- 5 Relevant Work -- 6 Evaluation Through Competency Questions -- 6.1 Use Case -- 6.2 Competency Questions -- References -- PFSgeo: Preference-Enriched Faceted Search for Geographical Data -- 1 Introduction -- 2 Related Work and Novelty.
3 The PFSgeo Approach -- 3.1 Extensions of the Language of PFS -- 3.2 Extensions of the System Hippalus -- 3.3 Algorithmic Perspective -- 4 Performance Evaluation -- 4.1 Testing Scalability -- 4.2 Analysis of the Performance -- 4.3 Comparative Experimental Results -- 5 Evaluation with Users -- 5.1 Preparation -- 6 Concluding Remarks -- References -- Speeding up Publication of Linked Data Using Data Chunking in LinkedPipes ETL -- 1 Introduction -- 2 Data Chunking -- 3 Data Chunking in LinkedPipes ETL -- 3.1 SPARQL Endpoint Extractor -- 3.2 Tabular Extractor and Files to RDF -- 3.3 SPARQL Transformers -- 3.4 Merger Component and Loaders -- 4 Datasets and Pipelines for Experiments -- 4.1 LISTID - List of Czech Business Entity IDs -- 4.2 ARES - Czech Business Registry -- 4.3 MONITOR - Budget Information of All Levels of Czech State Administration -- 4.4 RÚIAN - Registry of Territorial Identification, Addresses and Real Estate -- 5 Experiments -- 5.1 LISTID -- 5.2 ARES -- 5.3 MONITOR -- 5.4 RÚIAN -- 6 Related Work -- 7 Conclusions and Future Work -- References -- A Particle Swarm-Based Approach for Semantic Similarity Computation -- 1 Introduction -- 2 Background -- 2.1 Ontology-Based Similarity Measures -- 2.2 Ontology-Based Similarity Computation Scenarios -- 3 The Proposed Approach -- 3.1 Finding LCS as a Particle Swarm Optimization Problem -- 3.2 Fitness Scores of the LCS Evaluation -- 4 Experimental Evaluation -- 4.1 Benchmarks and Ontologies -- 4.2 Implementation -- 4.3 Experimental Results -- 5 Conclusion -- References -- Agent-Based Assistance in Ambient Assisted Living Through Reinforcement Learning and Semantic Technologies -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Reinforcement Learning -- 3.2 Agent Semantics -- 3.3 Automated ``Semantification'' and Retrieval of Agent Policies -- 4 First Results and Conclusion -- References.
On the Need for Applications Aware Adaptive Middleware in Real-Time RDF Data Analysis (Short Paper) -- 1 Introduction -- 2 Formalization of RSP Features -- 3 Evaluation of RSP Engines Based on Formalized RSP Features -- 3.1 Latency and Breaking Points -- 3.2 Memory Consumption -- 4 Adaptive Middleware for RSP -- 4.1 Adaptive Layer -- 5 Conclusion -- References -- Learning Probabilistic Relational Models Using an Ontology of Transformation Processes -- 1 Introduction -- 2 Backgrounds -- 2.1 The Ontology of Transformation Processes -- 2.2 Probabilistic Relational Models -- 2.3 Learning PRMs -- 3 Learning a PRM Using an Ontology -- 3.1 Relational Schema Mapping -- 3.2 Our ON2PRM Algorithm -- 4 Experiments -- 4.1 Databases Generation -- 4.2 Results -- 5 Conclusion -- References -- ORDAIN: An Ontology for Trust Management in the Internet of Things -- Abstract -- 1 Introduction -- 2 Defining Trust and Reputation -- 3 ORDAIN Ontology -- 3.1 Ontology Contents -- 3.2 Ontology Implementation -- 4 Related Work -- 5 Conclusions -- Acknowledgments -- References -- APOPSIS: A Web-Based Platform for the Analysis of Structured Dialogues -- 1 Introduction -- 2 Background and Related Work -- 2.1 Computational Argumentation -- 2.2 Machine Learning -- 2.3 Existing Tools for Online Debates -- 3 A Methodology and Platform for Opinion Analysis -- 3.1 A Platform Methodology -- 3.2 Knowledge Map Representation -- 3.3 The MACE - Ontology Domain -- 3.4 Evaluating Opinions -- 4 Methodology: Analysing User-Generated Opinions -- 4.1 Clustering Analysis -- 5 Apopsis Implementation and Architecture Details -- 5.1 Debating Functionality -- 5.2 Debating on Different Levels of Discussions -- 5.3 Voting Mechanism -- 5.4 Searching Mechanism -- 5.5 General Features -- 5.6 Technical Information and Architecture -- 6 Conclusion and Future Work -- References.
Identifying Opinion Drivers on Social Media -- 1 Introduction -- 2 Related Literature -- 3 Driver Identification: Formal Model -- 4 Results and Evaluation -- 5 Conclusions -- References -- Representing Fashion Product Data with Schema.org: Approach and Use Cases -- Abstract -- 1 Introduction -- 2 Overview of Clothing-Related Information -- 2.1 Garment Sizes -- 2.2 Colors -- 2.3 Product Variants -- 2.4 Materials Information -- 2.5 Textile Care Recommendations -- 2.6 Certifications -- 3 Clothing Product Information with Schema.org -- 3.1 Method -- 3.2 Representation of Basic Product Information -- 3.3 Representation of Clothing-Related Information -- 3.4 Representation of Textile Care Recommendations -- 3.5 Representation of Certifications -- 3.6 Other Information -- 3.7 Formalization and Results -- 4 Evaluation -- 5 Discussion and Conclusion -- 5.1 Related Work -- 5.2 Our Approach -- 5.3 Future Work -- References -- Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces -- 1 Introduction -- 2 Related Work -- 3 A Conceptual Model for Entities and Atomic Actions -- 4 Conceptual Model for scripts -- 5 Recognizing Script Instances from Documents -- 6 Summary -- References -- Linked Open Data for Linguists: Publishing the Hartmann von Aue-Portal in RDF -- Abstract -- 1 Introduction -- 1.1 Context -- 1.2 Problem Statement -- 1.3 Relevance -- 1.4 Organization of the Paper -- 2 Linked Open Data -- 3 The Hartmann von Aue-Portal -- 3.1 Purpose and Current Status -- 3.2 Data Model -- 3.3 Text Corpus Statistics -- 4 Approach -- 4.1 Challenges -- 4.2 Method -- 4.3 Implementation -- 4.4 Results -- 5 Evaluation -- 5.1 Formal Validation -- 5.2 Usage for Data-Driven Research -- 5.3 Interlinking of Hartmann von Aue Datasets with DBPedia -- 5.4 Reverse-Engineering -- 6 Discussion and Conclusion -- 6.1 Related Work.
6.2 Our Contribution.
Record Nr. UNINA-9910484246603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXVII, 767 p. 280 illus.)
Disciplina 004.678
Collana Programming and Software Engineering
Soggetto topico Artificial intelligence
Application software
Software engineering
Computer security
Data mining
Computer communication systems
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering
Systems and Data Security
Data Mining and Knowledge Discovery
Computer Communication Networks
ISBN 3-319-69462-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part I -- Contents - Part II -- International Conference on Cooperative Information Systems (CoopIS) 2017 -- En -- Characterizing Regulatory Documents and Guidelines Based on Text Mining -- 1 Introduction -- 2 Methodology -- 3 Description of Documents -- 3.1 Description of ISO/IEC Documents -- 3.2 Description of Medical Document -- 4 Evaluation -- 4.1 Case Study 1: ISO Documents -- 4.2 Case Study 2: Medical Document -- 5 Limitations and Application Scenarios -- 6 Related Work -- 7 Conclusion and Future Work -- References -- A Scalable Smart Meter Data Generator Using Spark -- 1 Introduction -- 2 Methodology -- 2.1 Overview -- 2.2 Algorithm Description -- 2.3 Optimization -- 3 Implementation on Spark -- 4 Evaluation -- 4.1 Effectiveness -- 4.2 Scalability -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Network-Aware Stochastic Virtual Machine Placement in Geo-Distributed Data Centers -- 1 Introduction -- 2 Problem Formulation -- 2.1 Stochastic Optimization Model -- 2.2 Equivalent Optimization Formulation -- 2.3 Network-Aware Stochastic VM Placement Algorithm -- 3 Performance Evaluation -- 4 Conclusion -- References -- Finding Process Variants in Event Logs -- 1 Introduction -- 2 Preliminaries -- 3 Finding Process Variants in Event Logs -- 4 Implementation and Case Study -- 5 Related Work -- 6 Conclusions -- References -- Interactive and Incremental Business Process Model Repair -- 1 Introduction -- 2 Related Work -- 3 Behavioral Alignment -- 4 Extending Conformance Checking to Process Model Repair -- 4.1 Extension, Order and Impact of Differences -- 4.2 Visualization of Differences -- 5 Evaluation.
5.1 Experiment with Synthetic Datasets -- 5.2 Experiment with Real-Life Dataset -- 6 Conclusion -- References -- Control Flow Structure Preservation During Process Fragment Anonymization -- 1 Introduction -- 2 Control Flow Anonymization -- 3 Evaluation -- 4 Related Work -- 5 Conclusion and Discussion -- References -- Diversity-Aware Continuous Top-k Queries in Social Networks -- 1 Introduction and Related Work -- 2 Data and Processing Models -- 3 The DA-SANTA Algorithm -- 4 Experimental Evaluation -- References -- Modeling and Discovering Cancelation Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Criteria for Comparison -- 2.2 Discussion of the Related Work -- 3 Event Logs and Process Trees -- 3.1 Preliminaries -- 3.2 Event Logs -- 3.3 Process Trees -- 3.4 Cancelation Process Trees -- 4 Heuristics for Error Oracle -- 5 Model Discovery -- 5.1 Directly Follows Graph and Cuts -- 5.2 Discovery Framework -- 5.3 Cancelation Discovery -- 6 Evaluation -- 6.1 Input and Methodology for Comparative Evaluation -- 6.2 Comparative Evaluation Results and Discussion -- 7 Conclusion -- References -- Introducing Collaboration for Locating Features in Models: Approach and Industrial Evaluation -- 1 Introduction -- 2 Background -- 3 Our Approach for Introducing Collaboration in FL -- 3.1 Automatic Query Reformulation -- 3.2 IR FL CORE -- 3.3 Linguistic Rules FL CORE -- 4 Evaluation -- 4.1 Definition -- 4.2 Data Set -- 4.3 Implementation Details -- 4.4 Planning and Execution -- 4.5 Results -- 4.6 Statistical Analysis -- 5 Threats to Validity -- 6 Related Work -- 7 Concluding Remarks -- References -- Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach -- 1 Introduction -- 2 Significance of Our Research and General Requirements -- 2.1 Application Scenario -- 2.2 General Requirements.
3 Our Formal FCAAC Approach -- 3.1 Context Model -- 3.2 Policy Model -- 4 Ontology-Based FCAAC Approach -- 4.1 Modelling Contextual Conditions -- 4.2 Reasoning About Contextual Conditions -- 4.3 FCAAC Policy -- 5 Prototype and Evaluation -- 5.1 Practicality -- 5.2 Performance -- 6 Related Work and Discussion -- 7 Conclusion and Future Research -- References -- Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Patterns and Pattern Instances -- 4.1 Core-Activity, Pattern and Pattern Instance -- 4.2 Pattern Support, Confidence and Coverage -- 5 Pattern Detection and Pattern Instance Matching -- 5.1 Pattern Detection Approaches - Partially Ordered Traces to Patterns -- 5.2 Computing a Maximal Set of Pattern Instances -- 6 Evaluation and Discussion -- 7 Conclusion and Future Work -- References -- Cloud of Things Modeling for Efficient and Coordinated Resources Provisioning -- 1 Introduction -- 2 Existing Models and Standards -- 2.1 Internet of Things Environment -- 2.2 Cloud Infrastructure Management Initiatives -- 2.3 Synthesis of Existing Works on Cloud and IoT Models and Standards -- 3 Related Works -- 4 Cloud of Things Infrastructure Model -- 4.1 Network Graph Model -- 4.2 Sensor and Actuator Resources -- 4.3 Things Virtualization -- 4.4 Things Integration Patterns -- 5 Cloud of Things Platform Model -- 5.1 Cloud of Things Deployment Options -- 5.2 Data Components Sharing -- 6 Example Scenarios -- 6.1 Resources Description -- 6.2 Mapping Process -- 7 Cloud of Things Placement Problem Formulation -- 8 Simulation and Results -- 9 Conclusion and Perspectives -- References -- A Framework for Integrating Real-World Events and Business Processes in an IoT Environment -- 1 Introduction -- 2 Foundations -- 2.1 Business Process Management.
2.2 Complex Event Processing -- 3 Requirements Analysis -- 4 Related Work -- 5 Conceptual Framework -- 5.1 Event Generation and Aggregation -- 5.2 Event Binding Points -- 5.3 Event Subscription and Correlation -- 5.4 Reaction on Events -- 6 Implementation -- 6.1 Unicorn Event Processing Platform -- 6.2 Gryphon Case Modeler -- 6.3 Chimera Case Engine -- 7 Conclusion and Future Work -- References -- Methodological Support for Coordinating Tasks in Global Product Software Engineering -- 1 Introduction -- 2 Research Method: The Design Cycle -- 2.1 The Method Association Approach -- 2.2 Method Evaluation Approach -- 3 Problem Investigation -- 3.1 Literature Study -- 3.2 The Global Task Coordination Framework -- 3.3 Identifying Activity Groups -- 3.4 Identifying Method Fragments -- 4 Solution Design: Construction of a Global Task Coordination Method -- 4.1 Method Association -- 4.2 Method Assembly -- 4.3 Method Validation -- 5 Discussion -- 6 Conclusions and Future Research -- Appendix A The Global Task Coordination Method -- References -- Enhancing Process Models to Improve Business Performance: A Methodology and Case Studies -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets and Event Logs -- 2.2 Aligning Petri Nets and Event Logs and Repairing Event Logs -- 3 The Methodology -- 3.1 Deviation Analysis -- 3.2 Repair and Merge Log Clusters -- 3.3 Repair Model -- 4 Implementation and Evaluation -- 4.1 UWV Case Study -- 4.2 SAP Procurement Case Study -- 5 Related Work -- 6 Conclusion -- References -- TraDE - A Transparent Data Exchange Middleware for Service Choreographies -- 1 Introduction -- 2 Transparent Data Exchange Approach -- 2.1 Cross-Partner Data Objects and Cross-Partner Data Flows -- 2.2 Towards a TraDE Middleware -- 3 The TraDE Middleware -- 3.1 Metamodel -- 3.2 Architecture -- 3.3 Integration with Process Engines -- 4 Validation.
5 Evaluation -- 5.1 Evaluation Methodology and Experimental Setup -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions and Outlook -- References -- Building the Most Creative and Innovative Collaborative Groups Using Bayes Classifiers -- Abstract -- 1 Introduction -- 2 Related Work on Collaborative Creativity -- 3 A Bayes Classifier-Based Model and Method for Building Optimally Creative and Innovative Groups -- 3.1 Bayesian Network Classifiers -- 3.2 General Model for Building "the Best" Collaborative Groups -- 3.3 Model Instantiation for Building the Most Creative Learning Groups -- 4 Case Study - A Real-World Scenario -- 5 Discussion -- 6 Conclusions and Future Work -- References -- A New Collaborative Paradigm of Computer Science Student Contests: An Experience -- Abstract -- 1 Introduction -- 2 Computer Science Contests -- 2.1 Computer Programming Contests -- 2.2 New Paradigms -- 3 Our Experience with Computer Science Contests -- 3.1 Evolution of Our Contest -- 3.2 A New Paradigm: Three-Words-from-a-Hat -- 3.3 Experiencing the New Paradigm -- 4 Is the New Paradigm Beneficial for Computer Science Education? -- 4.1 Is Competition Beneficial to Education? -- 4.2 Reflecting on the New Paradigm -- 5 Conclusions -- References -- Ranking-Based Evaluation of Process Model Matching -- 1 Introduction -- 2 Problem Statement -- 3 Probabilistic Evaluation of Process Model Matching -- 4 Evaluation Experiments -- 4.1 Setup -- 4.2 Results -- 5 Related Work -- 6 Conclusion -- References -- Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) -- 1 Introduction -- 2 Challenges for Decision Logic Re-configuration: A Loan Approval Motivation Scenario -- 3 Supporting Decision Propagation in Business Processes -- 3.1 Feature-Oriented Representation of Decision Logic.
3.2 Constraint-Based Analysis of Decision Logic.
Record Nr. UNINA-9910484365003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
On the Move to Meaningful Internet Systems. OTM 2018 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, Robert Meersman
On the Move to Meaningful Internet Systems. OTM 2018 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, Robert Meersman
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXX, 683 p. 204 illus.)
Disciplina 004.678
Collana Programming and Software Engineering
Soggetto topico Application software
Data mining
Artificial intelligence
Computer security
Computer system failures
Computer communication systems
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Artificial Intelligence
Systems and Data Security
System Performance and Evaluation
Computer Communication Networks
ISBN 3-030-02610-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Systems Applications (incl. Internet) -- Information Storage and Retrieval -- Software Engineering Artificial Intelligence (incl. Robotics) -- Systems and Data Security -- Computer Appl. in Administrative Data Processing Ontologies -- Databases -- Semantics.-Cooperative Information Systems -- Cloud Computing -- Trust, Security, Privacy And Risk Management.
Record Nr. UNISA-996466457503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui