top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems [[electronic resource] /] / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. An Empirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNISA-996465351503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Artificial intelligence
Computer networks
Data and Information Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. AnEmpirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNINA-9910380755503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer crimes
Computer organization
Computers
Mathematical statistics
Computer Crime
Computer Systems Organization and Communication Networks
Computing Milieux
Information Systems and Communication Service
Probability and Statistics in Computer Science
ISBN 3-030-30719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense.
Record Nr. UNISA-996466448203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer crimes
Computer engineering
Computer networks
Computers
Computer science - Mathematics
Mathematical statistics
Computer Crime
Computer Engineering and Networks
Computing Milieux
Computer Communication Networks
Probability and Statistics in Computer Science
ISBN 3-030-30719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense.
Record Nr. UNINA-9910349301503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Seguridad informática
Computer communication systems
Computer software—Reusability
E-commerce
Management information systems
Computer science
Cryptology
Theory of Computation
Computer Communication Networks
Performance and Reliability
e-Commerce/e-business
Management of Computing and Information Systems
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNISA-996466104103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer science
Computer networks
Computers
Electronic commerce
Electronic data processing - Management
Cryptology
Theory of Computation
Computer Communication Networks
Hardware Performance and Reliability
e-Commerce and e-Business
IT Operations
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNINA-9910482961603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2013 [[electronic resource] ] : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
Computer Security -- ESORICS 2013 [[electronic resource] ] : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 794 p. 158 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
E-commerce
Computer communication systems
Systems and Data Security
Cryptology
Management of Computing and Information Systems
e-Commerce/e-business
Computer Communication Networks
ISBN 3-642-40203-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Computation -- Measurement and Evaluation -- Applications of Cryptography -- Code Analysis -- Network Security -- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models and Technologies -- E-voting and Privacy -- Malware Detection -- Access Control.- Language-Based Protection.
Record Nr. UNISA-996465691203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
Computer Security -- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings / / edited by Jason Crampton, Sushil Jajodia, Keith Mayes
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 794 p. 158 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing - Management
Electronic commerce
Computer networks
Data and Information Security
Cryptology
IT Operations
e-Commerce and e-Business
Computer Communication Networks
ISBN 3-642-40203-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Computation -- Measurement and Evaluation -- Applications of Cryptography -- Code Analysis -- Network Security -- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models and Technologies -- E-voting and Privacy -- Malware Detection -- Access Control.- Language-Based Protection.
Record Nr. UNINA-9910483633803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conceptual Modeling - ER 2001 [[electronic resource] ] : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
Conceptual Modeling - ER 2001 [[electronic resource] ] : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XX, 620 p.)
Disciplina 005.74
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Computer simulation
Database management
Application software
Computers
Software engineering
Data Structures and Information Theory
Simulation and Modeling
Database Management
Information Systems Applications (incl. Internet)
Models and Principles
Software Engineering
ISBN 3-540-45581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Conceptual Modeling for Collaborative E-business Processes -- “i-mode”, Now & Future -- The Role of Research in the New Economy -- Panel -- Semantic B2B Integration: Is Modeling the Superior Approach over Programming? -- Spatial Database -- Modeling Topological Constraints in Spatial Part-Whole Relationships -- Source Description-Based Approach for the Modeling of Spatial Information Integration -- Topological Relationships of Complex Points and Complex Regions -- Spatial and Temporal Databases -- DISTIL: A Design Support Environment for Conceptual Modeling of Spatio-temporal Requirements -- Tripod: A Comprehensive Model for Spatial and Aspatial Historical Objects -- A Design of Topological Predicates for Complex Crisp and Fuzzy Regions -- XML -- A Semantic Approach to XML-based Data Integration -- A Rule-Based Conversion of a DTD to a Conceptual Schema -- Semantic Data Modeling Using XML Schemas -- Information Modeling -- Modelling Strategic Actor Relationships to Support Intellectual Property Management -- SiteLang: Conceptual Modeling of Internet Sites -- A Frame Work for Modeling Electronic Contracts -- Database Design -- CASE Tool Support for Temporal Database Design -- Domain-Specific Metadata a Key for Building Semantically-Rich Schema Models -- Coping with Inconsistent Constraint Specifications -- Data Integration -- Integration of Biological Data and Quality-Driven Source Negotiation -- Accessing Data Integration Systems through Conceptual Schemas -- Resolving Conflicts and Handling Replication during Integration of Multiple Databases by Object Deputy Model -- Data Warehouse -- Efficient Execution of Range-Aggregate Queries in Data Warehouse Environments -- A Pragmatic Approach to Conceptual Modeling of OLAP Security -- A Randomized Approach for the Incremental Design of an Evolving Data Warehouse -- UML -- Semantics of Stereotypes for Type Specification in UML: Theory and Practice -- Towards Ontologically Based Semantics for UML Constructs -- Developing Sequence Diagrams in UML -- Conceptual Models -- Translation of a High-Level Temporal Model into Lower Level Models: Impact of Modelling at Different Description Levels -- Relationship Type Refinement in Conceptual Models with Multiple Classification -- A Metamodel for Part ñ Whole Relationships for Reasoning on Missing Parts and Reconstruction -- System Design -- Developing XML Documents with Guaranteed “Good” Properties -- Dimension Hierarchies Design from UML Generalizations and Aggregations -- Minimize Mark-Up! Natural Writing Should Guide the Design of Textual Modeling Frontends -- Method Reengineering and Video Databases -- An Approach for Method Reengineering -- Modeling and Structuring Multiple Perspective Video for Browsing -- Modeling Dynamic Objects in Video Databases: A Logic Based Approach -- Workflows -- Pockets of Flexibility in Workflow Specification -- Agent-Oriented Enterprise Modeling Based on Business Rules -- A Three-Layer Model for Workflow Semantic Recovery in an Object-Oriented Environment -- Web Information System -- Recognizing Ontology-Applicable Multiple-Record Web Documents -- Querying Web Information Systems -- A Conceptual Modelling Framework for Standards-Driven Web-Based Distance Learning -- Applications -- XML-schema Dynamic Mapped Multimedia Content Description Tool -- Constructing a Data Map of Korea Telecom -- Competency of Set Analysis in CRM Closed Loop Marketing -- Software Engineering -- XML-based E2E Test Report Management -- A Framework for Reusing Business Objects by Multilevel Object Patterns -- A Mediation System Based on Universal Relation Modeling.
Record Nr. UNISA-996465907103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Conceptual Modeling - ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
Conceptual Modeling - ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings / / edited by Hideko S. Kunii, Sushil Jajodia, Arne Soelvberg
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XX, 620 p.)
Disciplina 005.74
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Information theory
Computer simulation
Database management
Application software
Computer science
Software engineering
Data Structures and Information Theory
Computer Modelling
Database Management
Computer and Information Systems Applications
Models of Computation
Software Engineering
ISBN 3-540-45581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Conceptual Modeling for Collaborative E-business Processes -- “i-mode”, Now & Future -- The Role of Research in the New Economy -- Panel -- Semantic B2B Integration: Is Modeling the Superior Approach over Programming? -- Spatial Database -- Modeling Topological Constraints in Spatial Part-Whole Relationships -- Source Description-Based Approach for the Modeling of Spatial Information Integration -- Topological Relationships of Complex Points and Complex Regions -- Spatial and Temporal Databases -- DISTIL: A Design Support Environment for Conceptual Modeling of Spatio-temporal Requirements -- Tripod: A Comprehensive Model for Spatial and Aspatial Historical Objects -- A Design of Topological Predicates for Complex Crisp and Fuzzy Regions -- XML -- A Semantic Approach to XML-based Data Integration -- A Rule-Based Conversion of a DTD to a Conceptual Schema -- Semantic Data Modeling Using XML Schemas -- Information Modeling -- Modelling Strategic Actor Relationships to Support Intellectual Property Management -- SiteLang: Conceptual Modeling of Internet Sites -- A Frame Work for Modeling Electronic Contracts -- Database Design -- CASE Tool Support for Temporal Database Design -- Domain-Specific Metadata a Key for Building Semantically-Rich Schema Models -- Coping with Inconsistent Constraint Specifications -- Data Integration -- Integration of Biological Data and Quality-Driven Source Negotiation -- Accessing Data Integration Systems through Conceptual Schemas -- Resolving Conflicts and Handling Replication during Integration of Multiple Databases by Object Deputy Model -- Data Warehouse -- Efficient Execution of Range-Aggregate Queries in Data Warehouse Environments -- A Pragmatic Approach to Conceptual Modeling of OLAP Security -- A Randomized Approach for the Incremental Design of anEvolving Data Warehouse -- UML -- Semantics of Stereotypes for Type Specification in UML: Theory and Practice -- Towards Ontologically Based Semantics for UML Constructs -- Developing Sequence Diagrams in UML -- Conceptual Models -- Translation of a High-Level Temporal Model into Lower Level Models: Impact of Modelling at Different Description Levels -- Relationship Type Refinement in Conceptual Models with Multiple Classification -- A Metamodel for Part ñ Whole Relationships for Reasoning on Missing Parts and Reconstruction -- System Design -- Developing XML Documents with Guaranteed “Good” Properties -- Dimension Hierarchies Design from UML Generalizations and Aggregations -- Minimize Mark-Up! Natural Writing Should Guide the Design of Textual Modeling Frontends -- Method Reengineering and Video Databases -- An Approach for Method Reengineering -- Modeling and Structuring Multiple Perspective Video for Browsing -- Modeling Dynamic Objects in Video Databases: A Logic Based Approach -- Workflows -- Pockets of Flexibility in Workflow Specification -- Agent-Oriented Enterprise Modeling Based on Business Rules -- A Three-Layer Model for Workflow Semantic Recovery in an Object-Oriented Environment -- Web Information System -- Recognizing Ontology-Applicable Multiple-Record Web Documents -- Querying Web Information Systems -- A Conceptual Modelling Framework for Standards-Driven Web-Based Distance Learning -- Applications -- XML-schema Dynamic Mapped Multimedia Content Description Tool -- Constructing a Data Map of Korea Telecom -- Competency of Set Analysis in CRM Closed Loop Marketing -- Software Engineering -- XML-based E2E Test Report Management -- A Framework for Reusing Business Objects by Multilevel Object Patterns -- A Mediation System Based on Universal Relation Modeling.
Record Nr. UNINA-9910767574703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui