top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data [[electronic resource] ] : A Primer / / edited by Hrushikesha Mohanty, Prachet Bhuyan, Deepak Chenthati
Big Data [[electronic resource] ] : A Primer / / edited by Hrushikesha Mohanty, Prachet Bhuyan, Deepak Chenthati
Edizione [1st ed. 2015.]
Pubbl/distr/stampa New Delhi : , : Springer India : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (195 p.)
Disciplina 005.74023
Collana Studies in Big Data
Soggetto topico Data mining
Data structures (Computer science)
Computational intelligence
Data Mining and Knowledge Discovery
Data Storage Representation
Computational Intelligence
ISBN 81-322-2494-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data: An Introduction -- Big Data Architecture -- Big Data Processing Algorithms -- Big Data Search and Mining -- Security and Privacy of Big Data -- Big Data Service Agreement -- Applications of Big Data.
Record Nr. UNINA-9910741152203321
New Delhi : , : Springer India : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed Computing and Internet Technology [[electronic resource] ] : 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings / / edited by Tomasz Janowski, Hrushikesha Mohanty
Distributed Computing and Internet Technology [[electronic resource] ] : 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings / / edited by Tomasz Janowski, Hrushikesha Mohanty
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XV, 283 p. 80 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Multimedia information systems
Application software
Software engineering
Information storage and retrieval
Computer logic
Computer Communication Networks
Multimedia Information Systems
Information Systems Applications (incl. Internet)
Software Engineering
Information Storage and Retrieval
Logics and Meanings of Programs
Soggetto genere / forma Bhubaneswar (2010)
Kongress.
ISBN 1-280-38561-8
9786613563538
3-642-11659-0
Classificazione SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1 – Invited Papers -- Transactional Memory Today -- Maintaining Coherent Views over Dynamic Distributed Data -- Malware: From Modelling to Practical Detection -- Semantic Frameworks—Meanings in the Architecture -- Section 2 – Networking -- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks -- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks -- Seamless Handoff between IEEE 802.11 and GPRS Networks -- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network -- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks -- Section 3 – Grid Computing and Web Services -- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains -- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems -- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture -- Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System -- A Framework for Web-Based Negotiation -- Section 4 – Internet Technology and Distributed Computing -- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches -- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass -- Gathering Asynchronous Transparent Fat Robots -- Development of Generalized HPC Simulator -- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers -- Finite Buffer Controllable Single and Batch Service Queues -- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic -- Section 5 – Software Engineering: Secured Systems -- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams -- Evolution of Hyperelliptic Curve Cryptosystems -- Reliability Improvement Based on Prioritization of Source Code -- Secure Dynamic Identity-Based Remote User Authentication Scheme -- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design -- Formal Approaches to Location Management in Mobile Communications -- Automated Test Scenario Selection Based on Levenshtein Distance -- Section 6 – Societal Applications -- Study of Diffusion Models in an Academic Social Network -- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology.
Record Nr. UNISA-996465634803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed computing and internet technology : 6th international conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010 : proceedings / / Tomasz Janowski, Hrushikesha Mohanty (eds.)
Distributed computing and internet technology : 6th international conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010 : proceedings / / Tomasz Janowski, Hrushikesha Mohanty (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2010
Descrizione fisica 1 online resource (XV, 283 p. 80 illus.)
Disciplina 004
Altri autori (Persone) JanowskiTomasz
MohantyHrushikesha
Collana Lecture notes in computer science
Soggetto topico Application software
Computer networks - Management
Electronic data processing - Distributed processing
Internet
ISBN 1-280-38561-8
9786613563538
3-642-11659-0
Classificazione SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1 – Invited Papers -- Transactional Memory Today -- Maintaining Coherent Views over Dynamic Distributed Data -- Malware: From Modelling to Practical Detection -- Semantic Frameworks—Meanings in the Architecture -- Section 2 – Networking -- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks -- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks -- Seamless Handoff between IEEE 802.11 and GPRS Networks -- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network -- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks -- Section 3 – Grid Computing and Web Services -- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains -- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems -- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture -- Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System -- A Framework for Web-Based Negotiation -- Section 4 – Internet Technology and Distributed Computing -- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches -- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass -- Gathering Asynchronous Transparent Fat Robots -- Development of Generalized HPC Simulator -- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers -- Finite Buffer Controllable Single and Batch Service Queues -- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic -- Section 5 – Software Engineering: Secured Systems -- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams -- Evolution of Hyperelliptic Curve Cryptosystems -- Reliability Improvement Based on Prioritization of Source Code -- Secure Dynamic Identity-Based Remote User Authentication Scheme -- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design -- Formal Approaches to Location Management in Mobile Communications -- Automated Test Scenario Selection Based on Levenshtein Distance -- Section 6 – Societal Applications -- Study of Diffusion Models in an Academic Social Network -- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology.
Altri titoli varianti ICDCIT 2010
Record Nr. UNINA-9910483071403321
Berlin ; ; New York, : Springer, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed Computing and Internet Technology [[electronic resource] ] : 4th International Conference, ICDCIT 2007, Bangalore, India, December, 17-20, 2007, Proceedings / / edited by T. Janowski, Hrushikesha Mohanty
Distributed Computing and Internet Technology [[electronic resource] ] : 4th International Conference, ICDCIT 2007, Bangalore, India, December, 17-20, 2007, Proceedings / / edited by T. Janowski, Hrushikesha Mohanty
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 346 p.)
Disciplina 005.3
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer science
Computers
Computer programming
Computer communication systems
Software engineering
Algorithms
Popular Computer Science
Theory of Computation
Programming Techniques
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
ISBN 3-540-77115-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1 - Network Protocols -- Time-Efficient Broadcasting in Radio Networks: A Review -- An Efficient and Optimized Bluetooth Scheduling Algorithm for Piconets -- EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks -- On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks -- Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks -- A Structured Mesh Overlay Network for P2P Applications on Mobile Ad Hoc Networks -- A Scalable and Adaptive Clustering Scheme for MANETs -- Section 2 - Security and Privacy -- A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks -- Monitoring Information Leakage During Query Aggregation -- An Efficient Certificate Authority for Ad Hoc Networks -- Design and Analysis of a Game Theoretic Model for P2P Trust Management -- Hasslefree: Simplified Access Control Management for XML Documents -- LISA: LIghtweight Security Algorithm for Wireless Sensor Networks -- Section 3 - Network Management -- An Optimal Weighted-Average Congestion Based Pricing Scheme for Enhanced QoS -- Distributed Resource Adaptation for Virtual Network Operators -- Maximum Lifetime Tree Construction for Wireless Sensor Networks -- Overlay Network Management for Scheduling Tasks on the Grid -- Section 4 - Network Services -- An End-Systems Supported Highly Distributed Content Delivery Network -- An Analytical Estimation of Durability in DHTs -- A Multiple Tree Approach for Fault Tolerance in MPLS Networks -- Selective Querying and Other Proposals for a Less Congested Gnutella Network -- Section 5 - e-Application Engineering -- Language Support and Compiler Optimizations for STM and Transactional Boosting -- Unifying Denotational Semantics with Operational Semantics for Web Services -- PHAC: An Environment for Distributed Collaborative Applications on P2P Networks -- Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications -- Section 6 - e-Application Services -- Continuous Adaptive Mining the Thin Skylines over Evolving Data Stream -- Service Recommendation with Adaptive User Interests Modeling -- An Approach to Aggregating Web Services for End-User-Doable Construction of GridDoc Application -- An Adaptive Metadata Model for Domain-Specific Service Registry -- Section 7 - e-Applications -- Globalization from the Information and Communication Perspective -- WAND: A Robust P2P File System Tree Interface -- A Tsunami Warning System Employing Level Controlled Gossiping in Wireless Sensor Networks -- Relation Extraction and Validation Algorithm -- A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions -- A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols -- Augmentation to GT4 Framework for B2B Collaboration over Grid.
Record Nr. UNISA-996466122803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed Computing and Internet Technology : 4th International Conference, ICDCIT 2007, Bangalore, India, December, 17-20, 2007, Proceedings / / edited by T. Janowski, Hrushikesha Mohanty
Distributed Computing and Internet Technology : 4th International Conference, ICDCIT 2007, Bangalore, India, December, 17-20, 2007, Proceedings / / edited by T. Janowski, Hrushikesha Mohanty
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 346 p.)
Disciplina 005.3
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer science
Computers
Computer programming
Computer communication systems
Software engineering
Algorithms
Popular Computer Science
Theory of Computation
Programming Techniques
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
ISBN 3-540-77115-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1 - Network Protocols -- Time-Efficient Broadcasting in Radio Networks: A Review -- An Efficient and Optimized Bluetooth Scheduling Algorithm for Piconets -- EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks -- On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks -- Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks -- A Structured Mesh Overlay Network for P2P Applications on Mobile Ad Hoc Networks -- A Scalable and Adaptive Clustering Scheme for MANETs -- Section 2 - Security and Privacy -- A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks -- Monitoring Information Leakage During Query Aggregation -- An Efficient Certificate Authority for Ad Hoc Networks -- Design and Analysis of a Game Theoretic Model for P2P Trust Management -- Hasslefree: Simplified Access Control Management for XML Documents -- LISA: LIghtweight Security Algorithm for Wireless Sensor Networks -- Section 3 - Network Management -- An Optimal Weighted-Average Congestion Based Pricing Scheme for Enhanced QoS -- Distributed Resource Adaptation for Virtual Network Operators -- Maximum Lifetime Tree Construction for Wireless Sensor Networks -- Overlay Network Management for Scheduling Tasks on the Grid -- Section 4 - Network Services -- An End-Systems Supported Highly Distributed Content Delivery Network -- An Analytical Estimation of Durability in DHTs -- A Multiple Tree Approach for Fault Tolerance in MPLS Networks -- Selective Querying and Other Proposals for a Less Congested Gnutella Network -- Section 5 - e-Application Engineering -- Language Support and Compiler Optimizations for STM and Transactional Boosting -- Unifying Denotational Semantics with Operational Semantics for Web Services -- PHAC: An Environment for Distributed Collaborative Applications on P2P Networks -- Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications -- Section 6 - e-Application Services -- Continuous Adaptive Mining the Thin Skylines over Evolving Data Stream -- Service Recommendation with Adaptive User Interests Modeling -- An Approach to Aggregating Web Services for End-User-Doable Construction of GridDoc Application -- An Adaptive Metadata Model for Domain-Specific Service Registry -- Section 7 - e-Applications -- Globalization from the Information and Communication Perspective -- WAND: A Robust P2P File System Tree Interface -- A Tsunami Warning System Employing Level Controlled Gossiping in Wireless Sensor Networks -- Relation Extraction and Validation Algorithm -- A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions -- A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols -- Augmentation to GT4 Framework for B2B Collaboration over Grid.
Record Nr. UNINA-9910484191003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed Computing and Internet Technology [[electronic resource] ] : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings / / edited by R.K. Ghosh, Hrushikesha Mohanty
Distributed Computing and Internet Technology [[electronic resource] ] : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings / / edited by R.K. Ghosh, Hrushikesha Mohanty
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XX, 474 p.)
Disciplina 004.6/78
Collana Lecture Notes in Computer Science
Soggetto topico Computer programming
Computer communication systems
Software engineering
Algorithms
Application software
Information storage and retrieval
Programming Techniques
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-540-30555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plenary Talk – I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots.
Record Nr. UNISA-996466074303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed computing and internet technology : first International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings / / R.K. Ghosh, Hrushikesha Mohanty (eds.)
Distributed computing and internet technology : first International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings / / R.K. Ghosh, Hrushikesha Mohanty (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, : Springer, 2004
Descrizione fisica 1 online resource (XX, 474 p.)
Disciplina 004.6/78
Altri autori (Persone) GhoshR. K
MohantyHrushikesha
Collana Lecture notes in computer science
Soggetto topico Electronic data processing - Distributed processing
Internet
ISBN 3-540-30555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plenary Talk – I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots.
Altri titoli varianti ICDCIT 2004
Record Nr. UNINA-9910483416703321
Berlin, : Springer, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trends in Software Testing / / edited by Hrushikesha Mohanty, J. R. Mohanty, Arunkumar Balakrishnan
Trends in Software Testing / / edited by Hrushikesha Mohanty, J. R. Mohanty, Arunkumar Balakrishnan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 176 p. 65 illus., 60 illus. in color.)
Disciplina 006.3
Soggetto topico Computational intelligence
Software engineering
Management information systems
Computational Intelligence
Software Engineering
Software Management
ISBN 981-10-1415-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Understanding Test Debt -- Agile Testing -- Security Testing -- Uncertainty in Software Testing -- Separation Logic to Meliorate Software Testing and Validation -- mDSM: A Transformative Approach to Enterprise Software Systems Evolution -- Testing as a Service.
Record Nr. UNINA-9910254349403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trends of data science and applications : theory and practices / / Siddharth Swarup Rautaray, Phani Pemmaraju, Hrushikesha Mohanty, editors
Trends of data science and applications : theory and practices / / Siddharth Swarup Rautaray, Phani Pemmaraju, Hrushikesha Mohanty, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (xiii, 341 pages) : illustrations
Disciplina 006.312
Collana Studies in computational intelligence
Soggetto topico Data mining
Artificial intelligence
Machine learning
ISBN 981-336-815-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- About This Book -- Contents -- About the Editors -- NLP for Sentiment Computation -- 1 Introduction -- 2 Natural Language and Sentiments -- 3 Lexical Based -- 4 Corpora Based -- 5 Aspect Based -- 6 Trends -- 6.1 Social Semantic -- 6.2 Multi Domain -- 7 Conclusion -- References -- Productizing an Artificial Intelligence Solution for Intelligent Detail Extraction-Synergy of Symbolic and Sub-Symbolic Artificial Intelligence Techniques -- 1 Introduction -- 2 Problem Description of Intelligent Detail Extraction -- 3 Components of an IDE -- 4 Survey of Work on Extraction of Characters -- 5 Case Study: Invoice Processing -- 5.1 Details -- 5.2 Architecture -- 5.3 Challenges -- 5.4 Insight -- 5.5 Discovery and Productizing -- 6 Results and Conclusion -- References -- Digital Consumption Pattern and Impacts of Social Media: Descriptive Statistical Analysis -- 1 Introduction -- 2 Review of Literature -- 3 Access of Internet Across Generations -- 4 Impact of Internet on Business-Management -- 5 Impact of Internet on Kids, Adolescents and Adults -- 6 Internet Service Providers (ISP) in India During This COVID-19 Lockdown -- 7 Objective and Methodology of Primary Data Collection -- 8 Data Analysis -- 9 Bi-variate Analysis -- 10 Conclusion -- References -- Applicational Statistics in Data Science and Machine Learning -- 1 Introduction -- 1.1 Statistics and Exploratory Data Analysis -- 1.2 Statistical Tools and Techniques -- 2 Sampling Techniques -- 2.1 Population Versus Sample -- 2.2 Sampling Methods -- 3 Types of Variables -- 3.1 Random Variable -- 3.2 Categorical Data -- 3.3 Numerical Data -- 3.4 Qualitative Data -- 3.5 Quantitative Data -- 4 Visualizing Data -- 4.1 Categorical Data -- 4.2 Numerical Data -- 5 Measures of Central Tendency -- 5.1 Mean -- 5.2 Median -- 5.3 Mode -- 5.4 Variance -- 5.5 Standard Deviation.
6 Distributions in Statistics -- 6.1 Probability Distributions -- 6.2 PMF Versus PDF -- 6.3 Common Probability Distributions -- 6.4 Kurtosis -- 6.5 Skewness in Distributions -- 6.6 Scaling and Transformations -- 7 Outlier Treatment -- 7.1 Understanding Outliers -- 7.2 Detecting Outliers -- 8 Correlation Analysis -- 8.1 Steps for Correlation Analysis -- 8.2 Autocorrelation Versus Partial Correlation -- 9 Variance and Covariance Analysis -- 9.1 Analysis of Variance (ANOVA) -- 9.2 Analysis of Covariance (ANCOVA) -- 9.3 Multiple Analysis of Variance (MANOVA) -- 9.4 Multiple Analysis of Covariance (MANCOVA) -- 10 Chi-Square Analysis -- 11 Z-Score -- 12 Bias Versus Variance -- 12.1 Bias-Variance Trade-Off -- 12.2 Overfitting and Underfitting -- 13 Hypothesis Testing -- 13.1 Errors in Hypothesis Testing -- 14 Conclusion -- References -- Evolutionary Algorithms-Based Machine Learning Models -- 1 Introduction -- 2 Application Domains -- 2.1 Engineering Applications -- 2.2 Applied Sciences -- 2.3 Disaster Management -- 2.4 Finance and Economy -- 2.5 Health -- 3 Analysis and Discussion -- 3.1 Issues -- 3.2 Gap Analysis -- 4 Conclusion -- References -- Application to Predict the Impact of COVID-19 in India Using Deep Learning -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Modules -- 4 Deep Learning -- 4.1 CNN Model -- 5 System Implementation -- 5.1 Decomposition of the COVID-19 Data -- 6 Results and Analysis -- 7 Conclusion and Future Direction -- References -- Role of Data Analytics in Bio Cyber Physical Systems -- 1 Introduction -- 2 Cyber Physical Systems -- 2.1 CPS and IoT -- 2.2 Concept Map of Cyber Physical Systems -- 2.3 Bio Cyber Physical Systems -- 3 Health Wearables -- 3.1 Fitness Trackers/Smart Watches -- 3.2 Types of Sensors -- 3.3 Activity Log -- 3.4 Advanced Sensors -- 3.5 Data Gathering -- 4 Diabetes -- 4.1 Complications of Diabetes.
5 Case Studies of Diabetic Complications -- 5.1 Heart-Attack -- 5.2 Seizures and Strokes -- 6 Role of Neural Networks in the Case Scenarios -- 6.1 Convolutional Neural Network -- 7 Multi-channel CNN -- 8 Complication Prediction Through LSTM -- 9 Conclusion -- References -- Evolution of Sentiment Analysis: Methodologies and Paradigms -- 1 Introduction -- 2 Foundational Methods -- 2.1 Supervised -- 2.2 Unsupervised and Semi-supervised -- 3 Applications -- 4 Comparative Study -- 4.1 Convolutional and Recurrent Neural Network (with LSTMs) -- 4.2 Word Embeddings/Representations -- 4.3 Deep Belief Networks -- 4.4 Rule-Based and Other Classifiers -- 5 Latest Developments and State-of-the-Art -- 5.1 Transfer Learning and Language Models -- 5.2 Attention and the Transformer -- 5.3 Transformers-Based Architectures -- 5.4 Limits of Transfer Learning -- 6 Conclusions -- References -- Healthcare Analytics: An Advent to Mitigate the Risks and Impacts of a Pandemic -- 1 Introduction -- 1.1 Healthcare Sector -- 1.2 Analytics Domain -- 1.3 Application of Analytics in Healthcare Domain -- 2 Background -- 3 Research on Pandemics and Their Impacts -- 4 Development of Healthcare Information System and Healthcare Analytics -- 5 Results -- 6 Illustration -- 7 Conclusion -- References -- Image Classification for Binary Classes Using Deep Convolutional Neural Network: An Experimental Study -- 1 Introduction -- 2 The Dataset -- 3 Literature Review -- 4 Architecture, Methodology, and Results -- 5 Conclusion -- References -- Leveraging Analytics for Supply Chain Optimization in Freight Industry -- 1 Introduction -- 2 Literature Survey -- 3 Data Storage and Big Data Ecosystem -- 4 Data Processing and Manipulation -- 5 Analytics and Insights -- 6 Machine Learning Implementation -- 6.1 Demand-Supply Matchmaking -- 6.2 Pricing and Incentives.
6.3 User Segmentations to Understand User Activities -- 7 Comparative Study of Different Techniques -- 8 Chapter Takeaways and Significance -- 9 Conclusion and Future Scope -- References -- Trends and Application of Data Science in Bioinformatics -- 1 Introduction -- 2 Data Science -- 3 Application of Data Science in Bioinformatics -- 3.1 Genomics -- 3.2 Transcriptomics -- 3.3 Proteomics -- 3.4 Metabolomics -- 3.5 Epigenetics -- 4 Techniques in Data Science that Can Be Used for Bioinformatics -- 4.1 Machine Learning and Deep Learning -- 4.2 Parallel Computing -- 4.3 Cloud Computing -- 5 Future Perspectives -- 6 Conclusion -- References -- Mathematical and Algorithmic Aspects of Scalable Machine Learning -- 1 Introduction -- 1.1 Challenges in Scalable Machine Learning -- 1.2 Reasons for Scaling up Machine Learning -- 2 The Infrastructure of Scalable Machine Learning -- 2.1 Distributed File System -- 2.2 Distributed Topology for Machine Learning -- 3 MapReduce -- 3.1 Benefits of MapReduce -- 4 Linear Regression -- 4.1 Parallel Version of Linear Regression -- 5 Clustering -- 5.1 K-Mean Clustering -- 5.2 Parallel K-mean for a Scalable Environment -- 5.3 DBSCAN -- 5.4 Parallel DBSCAN -- 6 Parallelization of Support Vector Machine -- 7 Decision Tree -- 8 Conclusion -- References -- An Implementation of Text Mining Decision Feedback Model Using Hadoop MapReduce -- 1 Introduction -- 1.1 Conventional Process Flow of Text Mining -- 1.2 Applications of Text Mining -- 2 Literature Survey -- 3 Proposed Decision Feedback-Based Text Mining Model -- 4 Big Data Technologies -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 4.3 Pig -- 4.4 Hive -- 4.5 Sqoop -- 4.6 Oozie -- 4.7 Flume -- 4.8 ZooKeeper -- 5 Word Stemming -- 5.1 Pre-requisites for Stemming -- 5.2 Classification of Stemming -- 6 Proposed Porter Stemmer with Partitioner Algorithm (PSP).
7 Hadoop Cluster Operation Modes -- 8 Environment Setup -- 9 Implementation -- 9.1 Data Collection -- 9.2 Text Parsing -- 9.3 Text Filtering -- 9.4 Text Transformation -- 9.5 Feature Selection -- 9.6 Evaluate -- 10 Result and Discussion -- 11 Conclusion and Future Work -- References -- Business Analytics: Process and Practical Applications -- 1 Introduction -- 1.1 Definition -- 1.2 Goal -- 2 Process -- 2.1 CRISP-DM (Cross-Industry Standard Process for Data Mining) -- 2.2 SEMMA (Sample, Explore, Modify, Model, Assess) -- 2.3 Comparative Study -- 2.4 Others Approaches -- 3 Types of Analytics -- 3.1 Descriptive Analytics -- 3.2 Diagnostic Analytics -- 3.3 Predictive Analytics -- 3.4 Prescriptive Analytics -- 3.5 Comparative Study -- 4 Domain and Applications -- 5 Recommendation System(s)-An approach -- 5.1 Types of Recommendation Systems -- 5.2 Benefits of Recommendation System -- 5.3 An Example -- 5.4 Challenges of Recommendation Systems -- 5.5 Comparative Study -- 6 Tools -- 7 Conclusion -- References -- Challenges and Issues of Recommender System for Big Data Applications -- 1 Introduction -- 1.1 Recommendation System Architecture -- 1.2 Big Data -- 2 The Cold Start Problem in Recommendation -- 2.1 New User Cold Start Problem -- 2.2 New Item Cold Start Problem -- 3 Scalability -- 3.1 Scalable Neighborhood Algorithm -- 4 Proactive Recommender System -- 4.1 Proactive Recommendation -- 4.2 Intelligent Proactive Recommender System -- 5 Conclusion -- References.
Record Nr. UNINA-9910485004303321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Webservices [[electronic resource] ] : Theory and Practice / / edited by Hrushikesha Mohanty, Prasant Kumar Pattnaik
Webservices [[electronic resource] ] : Theory and Practice / / edited by Hrushikesha Mohanty, Prasant Kumar Pattnaik
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xv, 196 pages)
Disciplina 006.76
Soggetto topico Telecommunication
Computer programming
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Web Development
ISBN 981-13-3224-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Service Modelling and Verification: A Formal Approach -- Webservice Specification and Discovery -- Non-functional Properties of a Webservice -- Service Composition -- Handling Faults in Composite Webservices -- Webservice Security -- Webservice Development Life Cycle.
Record Nr. UNINA-9910350308703321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui