Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
| Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Systems and Data Security Artificial Intelligence Computer Communication Networks |
| ISBN | 3-030-33432-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software. |
| Record Nr. | UNISA-996465351503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
| Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (X, 289 p. 68 illus., 59 illus. in color.) |
| Disciplina | 005.8 |
| Soggetto topico |
Data protection
Artificial intelligence Computer networks Data and Information Security Artificial Intelligence Computer Communication Networks |
| ISBN | 3-030-33432-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. AnEmpirical Study of Secret Security Patch in Open Source Software. |
| Record Nr. | UNINA-9910380755503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
| Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer crimes
Computer organization Computers Mathematical statistics Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science |
| ISBN | 3-030-30719-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
| Record Nr. | UNISA-996466448203316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
| Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer crimes
Computer engineering Computer networks Computers Computer science - Mathematics Mathematical statistics Computer Crime Computer Engineering and Networks Computing Milieux Computer Communication Networks Probability and Statistics in Computer Science |
| ISBN | 3-030-30719-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
| Record Nr. | UNINA-9910349301503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
| Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XIV, 602 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Seguridad informática Computer communication systems Computer software—Reusability E-commerce Management information systems Computer science Cryptology Theory of Computation Computer Communication Networks Performance and Reliability e-Commerce/e-business Management of Computing and Information Systems |
| ISBN | 3-540-88313-4 |
| Classificazione | 54.30 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security. |
| Record Nr. | UNISA-996466104103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
| Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XIV, 602 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer science Computer networks Computers Electronic commerce Electronic data processing - Management Cryptology Theory of Computation Computer Communication Networks Hardware Performance and Reliability e-Commerce and e-Business IT Operations |
| ISBN | 3-540-88313-4 |
| Classificazione | 54.30 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security. |
| Record Nr. | UNINA-9910482961603321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security -- ESORICS 2013 [[electronic resource] ] : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
| Computer Security -- ESORICS 2013 [[electronic resource] ] : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XVIII, 794 p. 158 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science E-commerce Computer communication systems Systems and Data Security Cryptology Management of Computing and Information Systems e-Commerce/e-business Computer Communication Networks |
| ISBN | 3-642-40203-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography and Computation -- Measurement and Evaluation -- Applications of Cryptography -- Code Analysis -- Network Security -- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models and Technologies -- E-voting and Privacy -- Malware Detection -- Access Control.- Language-Based Protection. |
| Record Nr. | UNISA-996465691203316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security -- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
| Computer Security -- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XVIII, 794 p. 158 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Electronic data processing - Management Electronic commerce Computer networks Data and Information Security Cryptology IT Operations e-Commerce and e-Business Computer Communication Networks |
| ISBN | 3-642-40203-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography and Computation -- Measurement and Evaluation -- Applications of Cryptography -- Code Analysis -- Network Security -- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models and Technologies -- E-voting and Privacy -- Malware Detection -- Access Control.- Language-Based Protection. |
| Record Nr. | UNINA-9910483633803321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Conceptual Modeling - ER 2001 [[electronic resource] ] : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
| Conceptual Modeling - ER 2001 [[electronic resource] ] : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg |
| Edizione | [1st ed. 2001.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
| Descrizione fisica | 1 online resource (XX, 620 p.) |
| Disciplina | 005.74 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Computer simulation Database management Application software Computers Software engineering Data Structures and Information Theory Simulation and Modeling Database Management Information Systems Applications (incl. Internet) Models and Principles Software Engineering |
| ISBN | 3-540-45581-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Keynote -- Conceptual Modeling for Collaborative E-business Processes -- “i-mode”, Now & Future -- The Role of Research in the New Economy -- Panel -- Semantic B2B Integration: Is Modeling the Superior Approach over Programming? -- Spatial Database -- Modeling Topological Constraints in Spatial Part-Whole Relationships -- Source Description-Based Approach for the Modeling of Spatial Information Integration -- Topological Relationships of Complex Points and Complex Regions -- Spatial and Temporal Databases -- DISTIL: A Design Support Environment for Conceptual Modeling of Spatio-temporal Requirements -- Tripod: A Comprehensive Model for Spatial and Aspatial Historical Objects -- A Design of Topological Predicates for Complex Crisp and Fuzzy Regions -- XML -- A Semantic Approach to XML-based Data Integration -- A Rule-Based Conversion of a DTD to a Conceptual Schema -- Semantic Data Modeling Using XML Schemas -- Information Modeling -- Modelling Strategic Actor Relationships to Support Intellectual Property Management -- SiteLang: Conceptual Modeling of Internet Sites -- A Frame Work for Modeling Electronic Contracts -- Database Design -- CASE Tool Support for Temporal Database Design -- Domain-Specific Metadata a Key for Building Semantically-Rich Schema Models -- Coping with Inconsistent Constraint Specifications -- Data Integration -- Integration of Biological Data and Quality-Driven Source Negotiation -- Accessing Data Integration Systems through Conceptual Schemas -- Resolving Conflicts and Handling Replication during Integration of Multiple Databases by Object Deputy Model -- Data Warehouse -- Efficient Execution of Range-Aggregate Queries in Data Warehouse Environments -- A Pragmatic Approach to Conceptual Modeling of OLAP Security -- A Randomized Approach for the Incremental Design of an Evolving Data Warehouse -- UML -- Semantics of Stereotypes for Type Specification in UML: Theory and Practice -- Towards Ontologically Based Semantics for UML Constructs -- Developing Sequence Diagrams in UML -- Conceptual Models -- Translation of a High-Level Temporal Model into Lower Level Models: Impact of Modelling at Different Description Levels -- Relationship Type Refinement in Conceptual Models with Multiple Classification -- A Metamodel for Part ñ Whole Relationships for Reasoning on Missing Parts and Reconstruction -- System Design -- Developing XML Documents with Guaranteed “Good” Properties -- Dimension Hierarchies Design from UML Generalizations and Aggregations -- Minimize Mark-Up! Natural Writing Should Guide the Design of Textual Modeling Frontends -- Method Reengineering and Video Databases -- An Approach for Method Reengineering -- Modeling and Structuring Multiple Perspective Video for Browsing -- Modeling Dynamic Objects in Video Databases: A Logic Based Approach -- Workflows -- Pockets of Flexibility in Workflow Specification -- Agent-Oriented Enterprise Modeling Based on Business Rules -- A Three-Layer Model for Workflow Semantic Recovery in an Object-Oriented Environment -- Web Information System -- Recognizing Ontology-Applicable Multiple-Record Web Documents -- Querying Web Information Systems -- A Conceptual Modelling Framework for Standards-Driven Web-Based Distance Learning -- Applications -- XML-schema Dynamic Mapped Multimedia Content Description Tool -- Constructing a Data Map of Korea Telecom -- Competency of Set Analysis in CRM Closed Loop Marketing -- Software Engineering -- XML-based E2E Test Report Management -- A Framework for Reusing Business Objects by Multilevel Object Patterns -- A Mediation System Based on Universal Relation Modeling. |
| Record Nr. | UNISA-996465907103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Conceptual Modeling - ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
| Conceptual Modeling - ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg |
| Edizione | [1st ed. 2001.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
| Descrizione fisica | 1 online resource (XX, 620 p.) |
| Disciplina | 005.74 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Computer simulation Database management Application software Computer science Software engineering Data Structures and Information Theory Computer Modelling Database Management Computer and Information Systems Applications Models of Computation Software Engineering |
| ISBN | 3-540-45581-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Keynote -- Conceptual Modeling for Collaborative E-business Processes -- “i-mode”, Now & Future -- The Role of Research in the New Economy -- Panel -- Semantic B2B Integration: Is Modeling the Superior Approach over Programming? -- Spatial Database -- Modeling Topological Constraints in Spatial Part-Whole Relationships -- Source Description-Based Approach for the Modeling of Spatial Information Integration -- Topological Relationships of Complex Points and Complex Regions -- Spatial and Temporal Databases -- DISTIL: A Design Support Environment for Conceptual Modeling of Spatio-temporal Requirements -- Tripod: A Comprehensive Model for Spatial and Aspatial Historical Objects -- A Design of Topological Predicates for Complex Crisp and Fuzzy Regions -- XML -- A Semantic Approach to XML-based Data Integration -- A Rule-Based Conversion of a DTD to a Conceptual Schema -- Semantic Data Modeling Using XML Schemas -- Information Modeling -- Modelling Strategic Actor Relationships to Support Intellectual Property Management -- SiteLang: Conceptual Modeling of Internet Sites -- A Frame Work for Modeling Electronic Contracts -- Database Design -- CASE Tool Support for Temporal Database Design -- Domain-Specific Metadata a Key for Building Semantically-Rich Schema Models -- Coping with Inconsistent Constraint Specifications -- Data Integration -- Integration of Biological Data and Quality-Driven Source Negotiation -- Accessing Data Integration Systems through Conceptual Schemas -- Resolving Conflicts and Handling Replication during Integration of Multiple Databases by Object Deputy Model -- Data Warehouse -- Efficient Execution of Range-Aggregate Queries in Data Warehouse Environments -- A Pragmatic Approach to Conceptual Modeling of OLAP Security -- A Randomized Approach for the Incremental Design of anEvolving Data Warehouse -- UML -- Semantics of Stereotypes for Type Specification in UML: Theory and Practice -- Towards Ontologically Based Semantics for UML Constructs -- Developing Sequence Diagrams in UML -- Conceptual Models -- Translation of a High-Level Temporal Model into Lower Level Models: Impact of Modelling at Different Description Levels -- Relationship Type Refinement in Conceptual Models with Multiple Classification -- A Metamodel for Part ñ Whole Relationships for Reasoning on Missing Parts and Reconstruction -- System Design -- Developing XML Documents with Guaranteed “Good” Properties -- Dimension Hierarchies Design from UML Generalizations and Aggregations -- Minimize Mark-Up! Natural Writing Should Guide the Design of Textual Modeling Frontends -- Method Reengineering and Video Databases -- An Approach for Method Reengineering -- Modeling and Structuring Multiple Perspective Video for Browsing -- Modeling Dynamic Objects in Video Databases: A Logic Based Approach -- Workflows -- Pockets of Flexibility in Workflow Specification -- Agent-Oriented Enterprise Modeling Based on Business Rules -- A Three-Layer Model for Workflow Semantic Recovery in an Object-Oriented Environment -- Web Information System -- Recognizing Ontology-Applicable Multiple-Record Web Documents -- Querying Web Information Systems -- A Conceptual Modelling Framework for Standards-Driven Web-Based Distance Learning -- Applications -- XML-schema Dynamic Mapped Multimedia Content Description Tool -- Constructing a Data Map of Korea Telecom -- Competency of Set Analysis in CRM Closed Loop Marketing -- Software Engineering -- XML-based E2E Test Report Management -- A Framework for Reusing Business Objects by Multilevel Object Patterns -- A Mediation System Based on Universal Relation Modeling. |
| Record Nr. | UNINA-9910767574703321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||