top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Content Computing [[electronic resource] ] : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
Content Computing [[electronic resource] ] : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 006.13/2
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Computers
Application software
Computer communication systems
Information storage and retrieval
Database management
Data Structures and Information Theory
Theory of Computation
Information Systems Applications (incl. Internet)
Computer Communication Networks
Information Storage and Retrieval
Database Management
ISBN 3-540-30483-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance -- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations -- Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men’s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA -- Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM – XML Based on Fuzzy Clustering and Merging – Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery -- Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping -- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary.
Record Nr. UNISA-996466347903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Content Computing : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
Content Computing : Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings / / edited by Chi-Hung Chi, Kwok-Yan Lam
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 006.13/2
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Computers
Application software
Computer networks
Information storage and retrieval
Database management
Data Structures and Information Theory
Theory of Computation
Information Systems Applications (incl. Internet)
Computer Communication Networks
Information Storage and Retrieval
Database Management
ISBN 3-540-30483-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance -- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations -- Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men’s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA -- Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM – XML Based on Fuzzy Clustering and Merging – Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery -- Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping -- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary.
Record Nr. UNINA-9910144334903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
Information and Communications Security [[electronic resource] ] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 478 p. 83 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Data protection
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Data Structures
Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-50011-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management and language-based security -- Network security.
Record Nr. UNISA-996465518503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 478 p. 83 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Data protection
Algorithms
Computer networks
Management information systems
Computer science
Cryptology
Data Structures
Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-50011-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management and language-based security -- Network security.
Record Nr. UNINA-9910483012803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
Privacy Enhancing Techniques : Practices and Applications / / by Xun Yi, Xuechao Yang, Xiaoning Liu, Andrei Kelarev, Kwok-Yan Lam, Mengmeng Yang, Xiangning Wang, Elisa Bertino
Autore Yi Xun
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (367 pages)
Disciplina 005.8
323.448
Altri autori (Persone) YangXuechao
LiuXiaoning
KelarevAndrei
LamKwok-Yan
YangMengmeng
WangXiangning
BertinoElisa
Soggetto topico Data protection - Law and legislation
Data mining
Machine learning
Privacy
Data Mining and Knowledge Discovery
Machine Learning
ISBN 3-031-95140-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction -- Chapter 2: Homomorphic Encryption -- Chapter 3: Multiparty Computation -- Chapter 4: Differential Privacy -- Chapter 5: Privacy-Preserving Data Mining -- Chapter 6: Privacy-Preserving Machine Learning -- Chapter 7: Privacy-Preserving Social Networks -- Chapter 8: Privacy-Preserving Location-Based Services -- Chapter 9: Privacy and Digital Trust -- Chapter 10: Conclusion.
Record Nr. UNINA-9911015687303321
Yi Xun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui