top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Future Data and Security Engineering [[electronic resource] ] : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (749 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Data protection
Optical data processing
Information Systems Applications (incl. Internet)
Artificial Intelligence
Security
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-35653-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
Record Nr. UNISA-996466282303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Future Data and Security Engineering : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings / / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (749 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Data protection
Optical data processing
Information Systems Applications (incl. Internet)
Artificial Intelligence
Security
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-35653-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
Record Nr. UNINA-9910357841103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui