top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi
Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXV, 360 p. 149 illus.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Database management
Data mining
Application software
Artificial intelligence
Computer communication systems
Database Management
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computer Appl. in Social and Behavioral Sciences
Computer Communication Networks
ISBN 3-319-92013-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database and Applications -- Data mining and Applications -- Theories and Methodologies.
Record Nr. UNINA-9910349428103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi
Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXV, 360 p. 149 illus.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Database management
Data mining
Application software
Artificial intelligence
Computer communication systems
Database Management
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computer Appl. in Social and Behavioral Sciences
Computer Communication Networks
ISBN 3-319-92013-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database and Applications -- Data mining and Applications -- Theories and Methodologies.
Record Nr. UNISA-996465823403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIII, 366 p.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Data structures (Computer science)
Information theory
Computer science
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Computer Engineering and Networks
Data Structures and Information Theory
Models of Computation
Cryptology
ISBN 3-540-88140-9
Classificazione 54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies’ Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments.
Record Nr. UNINA-9910483800403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIII, 366 p.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Data structures (Computer science)
Information theory
Computer science
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Computer Engineering and Networks
Data Structures and Information Theory
Models of Computation
Cryptology
ISBN 3-540-88140-9
Classificazione 54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies’ Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments.
Record Nr. UNISA-996465639103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 534 p. 208 illus., 154 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data protection
Computer organization
Computers
Artificial intelligence
Security
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-05345-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks.
Record Nr. UNINA-9910349387203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 534 p. 208 illus., 154 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data protection
Computer organization
Computers
Artificial intelligence
Security
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-05345-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks.
Record Nr. UNISA-996466301503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui