Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XXV, 360 p. 149 illus.) |
Disciplina | 005.74 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database management
Data mining Application software Artificial intelligence Computer communication systems Database Management Data Mining and Knowledge Discovery Information Systems Applications (incl. Internet) Artificial Intelligence Computer Appl. in Social and Behavioral Sciences Computer Communication Networks |
ISBN | 3-319-92013-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database and Applications -- Data mining and Applications -- Theories and Methodologies. |
Record Nr. | UNINA-9910349428103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Databases Theory and Applications [[electronic resource] ] : 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, Proceedings / / edited by Junhu Wang, Gao Cong, Jinjun Chen, Jianzhong Qi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XXV, 360 p. 149 illus.) |
Disciplina | 005.74 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database management
Data mining Application software Artificial intelligence Computer communication systems Database Management Data Mining and Knowledge Discovery Information Systems Applications (incl. Internet) Artificial Intelligence Computer Appl. in Social and Behavioral Sciences Computer Communication Networks |
ISBN | 3-319-92013-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database and Applications -- Data mining and Applications -- Theories and Methodologies. |
Record Nr. | UNISA-996465823403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XIII, 366 p.) |
Disciplina | 004.35 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computer engineering Data structures (Computer science) Information theory Computer science Cryptography Data encryption (Computer science) Computer Communication Networks Computer Engineering and Networks Data Structures and Information Theory Models of Computation Cryptology |
ISBN | 3-540-88140-9 |
Classificazione | 54.32 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies’ Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. |
Record Nr. | UNINA-9910483800403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and Parallel Computing [[electronic resource] ] : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / / edited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XIII, 366 p.) |
Disciplina | 004.35 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computer engineering Data structures (Computer science) Information theory Computer science Cryptography Data encryption (Computer science) Computer Communication Networks Computer Engineering and Networks Data Structures and Information Theory Models of Computation Cryptology |
ISBN | 3-540-88140-9 |
Classificazione | 54.32 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies’ Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. |
Record Nr. | UNISA-996465639103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 534 p. 208 illus., 154 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Artificial Intelligence |
ISBN | 3-030-05345-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. |
Record Nr. | UNINA-9910349387203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings / / edited by Guojun Wang, Jinjun Chen, Laurence T. Yang |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 534 p. 208 illus., 154 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Artificial Intelligence |
ISBN | 3-030-05345-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. |
Record Nr. | UNISA-996466301503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|