Content Computing [[electronic resource] ] : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
| Content Computing [[electronic resource] ] : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam |
| Edizione | [1st ed. 2004.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
| Descrizione fisica | 1 online resource (XII, 516 p.) |
| Disciplina | 006.13/2 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Computers Application software Computer communication systems Information storage and retrieval Database management Data Structures and Information Theory Theory of Computation Information Systems Applications (incl. Internet) Computer Communication Networks Information Storage and Retrieval Database Management |
| ISBN | 3-540-30483-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Session 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance -- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations -- Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men’s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA -- Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM – XML Based on Fuzzy Clustering and Merging – Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery -- Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping -- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary. |
| Record Nr. | UNISA-996466347903316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Content Computing : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
| Content Computing : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam |
| Edizione | [1st ed. 2004.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
| Descrizione fisica | 1 online resource (XII, 516 p.) |
| Disciplina | 006.13/2 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Computers Application software Computer networks Information storage and retrieval Database management Data Structures and Information Theory Theory of Computation Information Systems Applications (incl. Internet) Computer Communication Networks Information Storage and Retrieval Database Management |
| ISBN | 3-540-30483-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Session 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance -- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations -- Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men’s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA -- Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM – XML Based on Fuzzy Clustering and Merging – Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery -- Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping -- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary. |
| Record Nr. | UNINA-9910144334903321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information and Communications Security [[electronic resource] ] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
| Information and Communications Security [[electronic resource] ] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XII, 478 p. 83 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Data protection Algorithms Computer communication systems Management information systems Computer science Cryptology Data Structures Security Algorithm Analysis and Problem Complexity Computer Communication Networks Management of Computing and Information Systems |
| ISBN | 3-319-50011-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management and language-based security -- Network security. |
| Record Nr. | UNISA-996465518503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
| Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XII, 478 p. 83 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Data protection Algorithms Computer networks Management information systems Computer science Cryptology Data Structures Security Algorithm Analysis and Problem Complexity Computer Communication Networks Management of Computing and Information Systems |
| ISBN | 3-319-50011-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management and language-based security -- Network security. |
| Record Nr. | UNINA-9910483012803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
| Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino |
| Autore | Yi Xun |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (367 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
YangXuechao
LiuXiaoning KelarevAndrei LamKwok-Yan YangMengmeng WangXiangning BertinoElisa |
| Soggetto topico |
Data protection - Law and legislation
Data mining Machine learning Privacy Data Mining and Knowledge Discovery Machine Learning |
| ISBN | 3-031-95140-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion. |
| Record Nr. | UNINA-9911015687303321 |
Yi Xun
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||