top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in information systems : 4th international conference, ADVIS 2006, Izmir, Turkey, October 18-20, 2006 : proceedings / / Tatyana Yakhno, Erich J. Neuhold (eds.)
Advances in information systems : 4th international conference, ADVIS 2006, Izmir, Turkey, October 18-20, 2006 : proceedings / / Tatyana Yakhno, Erich J. Neuhold (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (XIII, 420 p.)
Disciplina 004
Altri autori (Persone) YakhnoTatyana <1953->
NeuholdErich J
Collana Lecture notes in computer science
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
Soggetto topico Information technology
ISBN 3-540-46292-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Processing Preference Queries in Standard Database Systems -- Turkish Information Retrieval: Past Changes Future -- From On-Campus Project Organised Problem Based Learning to Facilitated Work Based Learning in Industry -- Innovative Information and Knowledge Infrastructures – How Do I Find What I Need? -- Information Representation and Exchange -- XMask: An Enabled XML Management System -- Validation of XML Documents: From UML Models to XML Schemas and XSLT Stylesheets -- A Novel Clustering-Based Approach to Schema Matching -- BFPkNN: An Efficient k-Nearest-Neighbor Search Algorithm for Historical Moving Object Trajectories -- Three-Level Object-Oriented Database Architecture Based on Virtual Updateable Views -- AEC Algorithm: A Heuristic Approach to Calculating Density-Based Clustering Eps Parameter -- Databases and Datawarehouses -- GeoCube, a Multidimensional Model and Navigation Operators Handling Complex Measures: Application in Spatial OLAP -- Hybrid Index for Spatio-temporal OLAP Operations -- Managing Evolution of Data Warehouses by Means of Nested Transactions -- Optimization of Queries Invoking Views by Query Tail Absorption -- Checking Violation Tolerance of Approaches to Database Integrity -- A Metadata Repository Model to Integrate Heterogeneous Databases of Hardware Dependent Legacy Systems -- Semantic Web and Ontologies -- Semantic Information Retrieval on the Web -- Contextual Ontologies -- Matchmaking of Semantic Web Services Using Semantic-Distance Information -- Ontology-Based Information Systems Development: The Problem of Automation of Information Processing Rules -- Data Mining and Knowledge Discovery -- Data Mining with Parallel Support Vector Machines for Classification -- Association-Rules Mining Based Broadcasting Approach for XML Data -- CSDTM A Cost Sensitive Decision Tree Based Method -- Comparative Analysis of Classification Methods for Protein Interaction Verification System -- Distributed Architecture for Association Rule Mining -- Information Retrieval and Knowledge Representation -- Automatic Lung Nodule Detection Using Template Matching -- MIGP: Medical Image Grid Platform Based on HL7 Grid Middleware -- Structural and Event Based Multimodal Video Data Modeling -- Chat Mining for Gender Prediction -- Integrated Expert Management Knowledge on OSI Network Management Objects -- Knowledge Integration in Information Systems Education Through an (Inter)active Platform of Analysis and Modelling Case Studies -- Knowledge Management in Different Software Development Approaches -- Architecture of Information Systems -- PMAP: Framework to Predicting Method Access Patterns for Materialized Methods -- An Architecture Design Process Using a Supportable Meta-architecture and Roundtrip Engineering -- Knowledge-Based Enterprise Modelling Framework -- A Network-Based Indexing Method for Trajectories of Moving Objects -- Adaptive Enumeration Strategies and Metabacktracks for Constraint Solving -- FORBAC: A Flexible Organisation and Role-Based Access Control Model for Secure Information Systems -- Distributed and Wireless Information Systems -- An Anycasting Protocol for Anonymous Access to a Group of Contents-Equivalent Servers in a Distributed System -- A Wireless Broadcast Generation Scheme Considering Data Access Frequencies -- Spreading Activation Model for Connectivity Based Clustering -- Personalized Fair Reputation Based Resource Allocation in Grid.
Altri titoli varianti ADVIS 2006
Record Nr. UNINA-9910483279603321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Science and Its Applications : 5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings / / edited by Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel
Computer Science and Its Applications : 5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings / / edited by Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXVI, 638 p. 238 illus.)
Disciplina 005.365
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Application software
Software engineering
Artificial intelligence
Computers
Computational intelligence
Computer Applications
Software Engineering/Programming and Operating Systems
Artificial Intelligence
Information Systems and Communication Service
Computational Intelligence
ISBN 3-319-19578-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-Variable-Based Metaheuristics -- Relative Timed Model for Coordinated Multi Agent Systems -- A Novel Technique for Human Face Recognition Using Fractal Code and Bi-dimensional Subspace -- A New Rotation-Invariant Approach for Texture Analysis -- Multi-CPU/Multi-GPU Based Framework for Multimedia Processing -- Full-Reference Image Quality Assessment Measure Based on Color Distortion -- Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce -- Social Validation of Solutions in the Context of Online Communities: An Expertise-Based Learning Approach -- Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index -- Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique -- IHBA: An Improved Homogeneity-Based Algorithm for Data Classification -- Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem -- Noise Robust Features Based on MVA Post-Processing -- Arabic Texts Categorization: Features Selection Based on the Extraction of Words’ Roots -- Restoration of Arabic Diacritics Using a Multilevel Statistical Model -- A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders -- Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus -- Improved Cuckoo Search Algorithm for Document Clustering -- Supporting Legal Requirements in the Design of Public Processes -- Requirement Analysis in Data Warehouses to Support External Information -- Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches -- Research and Analysis of the Stream Materialized Aggregate List -- SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures -- QoS-Aware Web Services Selection Based on Fuzzy Dominance -- A Hybrid Model to Improve Filtering Systems -- Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment -- Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering -- A New Approach for Combining the Similarity Values in Ontology Alignment -- Defining Semantic Relationships to Capitalize Content of Multimedia Resources -- A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques -- On Copulas-Based Classification Method for Intrusion Detection -- On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks -- A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features -- Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks -- Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks -- Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks -- A Version of LEACH Adapted to the Lognormal Shadowing Model -- High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks -- An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation -- Genetic Centralized Dynamic Clustering in Wireless Sensor Networks -- Region-Edge Cooperation for Image Segmentation Using Game Theory -- Improved Parameters Updating Algorithm for the Detection of Moving Objects -- Towards Real-Time Co-authoring of Linked-Data on the Web -- A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems -- Hybrid Approach for Metamodel and Model Co-evolution -- Extracting and Modeling Design Defects Using Gradual Rules and UML Profile -- An Approach to Integrating Aspects in Agile Development -- On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps -- Monitoring Checklist for Ceph Object Storage Infrastructure -- Towards a Formalization of Real-Time Patterns-Based Designs.
Record Nr. UNINA-9910299234203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From integrated publication and information systems to virtual information and knowledge environments : essays dedicated to Erich J. Neuhold on the occasion of his 65th birthday / / Matthias Hemmje, Claudia Niederee, Thomas Risse (eds.)
From integrated publication and information systems to virtual information and knowledge environments : essays dedicated to Erich J. Neuhold on the occasion of his 65th birthday / / Matthias Hemmje, Claudia Niederee, Thomas Risse (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, : Springer, c2005
Descrizione fisica 1 online resource (XXIV, 328 p.)
Disciplina 006
Altri autori (Persone) NeuholdErich J
HemmjeMatthias
NiedereeClaudia
RisseThomas <1969->
Collana Lecture notes in computer science
Soggetto topico Information visualization
Knowledge management
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Technologies for Adaptive Information Management Systems -- An Overview on Automatic Capacity Planning -- Overview on Decentralized Establishment of Multi-lateral Collaborations -- Dynamic Maintenance of an Integrated Schema -- Efficient Evaluation of Nearest-Neighbor Queries in Content-Addressable Networks -- Semantic Web Drivers for Advanced Information Management -- Ontology-Based Query Refinement for Semantic Portals -- Towards Supporting Annotation for Existing Web Pages Enabling Hyperstructure-Based Searching -- Maintaining Dublin Core as a Semantic Web Vocabulary -- Securing Dynamic Media Content Integration and Communication -- A Peer-to-Peer Content Distribution Network -- Secure Production of Digital Media -- Data Communication Between the German NBC Reconnaissance Vehicle and Its Control Center Unit -- From Digital Libraries to Intelligent Knowledge Environments -- The Role of Digital Libraries in Moving Toward Knowledge Environments -- Scientific Work and the Usage of Digital Scientific Information – Some Notes on Structures, Discrepancies, Tendencies, and Strategies -- Queries in Context: Access to Digitized Historic Documents in a Collaboratory for the Humanities -- Separation of Concerns in Hypertext: Articulation Points That Increase Flexibility -- Towards a Common Framework for Peer-to-Peer Web Retrieval -- Comparative Evaluation of Cross-language Information Retrieval Systems -- Personalization for the Web: Learning User Preferences from Text -- Collaborative Machine Learning -- Visualization – Key to External Cognition in Virtual Information Environments -- Visualization in Digital Libraries -- Modelling Interactive, Three-Dimensional Information Visualizations -- A Knowledge Integration Framework for Information Visualization -- Visualizing Association Rules in a Framework for Visual Data Mining -- From Human Computer Interaction to Human Artifact Interaction -- From Human-Computer Interaction to Human-Artefact Interaction: Interaction Design for Smart Environments -- Cooperation in Ubiquitous Computing: An Extended View on Sharing -- A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems -- Ambient Intelligence: Towards Smart Appliance Ensembles -- Application Domains for Virtual Information and Knowledge Environments -- Enterprise Information Integration – A Semantic Approach -- Ontology-Based Project Management for Acceleration of Innovation Projects -- Understanding and Tailoring Your Scientific Information Environment: A Context-Oriented View on E-Science Support -- TV Scout: Lowering the Entry Barrier to Personalized TV Program Recommendation -- Intelligent Home-Enjoying Computing Anywhere.
Record Nr. UNINA-9910483163903321
Berlin, : Springer, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering [[electronic resource] ] : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNISA-996465485003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Future Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 492 p. 154 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Data encryption (Computer science)
Computer security
Software engineering
Programming languages (Electronic computers)
Artificial intelligence
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Software Engineering
Programming Languages, Compilers, Interpreters
Artificial Intelligence
ISBN 3-319-70004-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Invited Keynotes -- Eco Models of Distributed Systems -- 1 Introduction -- 2 System Model -- 3 Power Consumption and Computation Models -- 3.1 Power Consumption Models -- 3.2 Computation Models -- 3.3 Estimation Model -- 4 Server Selection Algorithm -- 5 Static Migration of Virtual Machines -- 6 Dynamic Migration of Virtual Machines -- 7 Evaluation -- 7.1 SGEA Algorithm -- 7.2 ISEAM Algorithm -- 7.3 DVMM Algorithm -- 8 Concluding Remarks -- References -- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment -- 1 Introduction -- 2 Background on CVSS -- 3 Research Design -- 4 Study Realization -- 5 Our Results -- 6 Threats to Validity -- 7 Discussion and Conclusions -- References -- Advances in Query Processing and Optimization -- Fast Top-Q and Top-K Query Answering -- 1 Introduction -- 2 Related Work -- 3 Top-Q Query Answering -- 3.1 Query Formulation -- 3.2 Processing TQQA Queries -- 4 Prototype and Experiments -- 4.1 Similarity Function(s) -- 4.2 Objective Function -- 4.3 Prototype -- 4.4 Experimental Setup -- 4.5 Discussion of Results -- 5 Conclusion -- References -- Low-Latency Radix-4 Multiplication Algorithm over Finite Fields -- 1 Introduction -- 2 Multiplication Based on Shifted Polynomial Basis over Finite Fields -- 3 Proposed Radix-4 Multiplication Algorithm Based on SPB -- 4 Conclusion -- References -- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D -- 1 Introduction -- 2 Preliminaries -- 3 Our Method -- 4 Experiments -- 5 Concluding Remarks -- References -- On Transformation-Based Spatial Access Methods with Monotone Norms -- 1 Preliminaries -- 1.1 Transformation of Multidimensional Spatial Data Space via Space-Filling Curves -- 1.2 Dedicated Spatial Data and Index Structures: Point and Spatial Access Methods.
2 Transformation Techniques in Spatial Access Methods -- 2.1 Efficient Support of Complex Spatial Operations -- 2.2 Distance Metrics on Multidimensional Spatially Extended Objects -- 3 Hausdorff Distance Metric for Multidimensional Spatially Extended Objects -- 3.1 Distance Metric on Closed and Bounded Subsets of Rk -- 3.2 Computation of the Distance Metric on C(k, d) -- 3.3 Effective Computation of the Distance Metric on P(k, d) -- 4 Relating the Distance Metrics on Original and Transform Spaces via Monotone Norms -- 5 Conclusion -- References -- Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process -- Abstract -- 1 Introduction -- 2 Incomplete Information System -- 3 Query Processing Based on Collaboration Between Information Systems -- 4 Searching the Closest Information System -- 5 Conclusions -- References -- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations -- Abstract -- 1 Introduction - Multilateration Surveillance System (MSS) -- 2 Multilateration (MLAT) -- 2.1 The Calculation of Target Location in 2D -- 2.2 Accuracy -- 3 Research -- 3.1 Formalizing the Optimization Task -- 4 Deployment of Radio Stations in a Specific Area -- 4.1 The Optimization Process -- 4.2 Evaluation of Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- Big Data Analytics and Applications -- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment -- Abstract -- 1 Introduction -- 2 Related Works -- 3 IPPC Tree Construction -- 4 Preliminaries -- 5 Algorithm IFIN+ -- 6 Experiments -- 7 Conclusions -- References -- Parallel Algorithm of Local Support Vector Regression for Large Datasets -- 1 Introduction -- 2 Support Vector Regression -- 3 Parallel Algorithm of Local Support Vector Regression -- 4 Evaluation -- 5 Discussion on Related Works.
6 Conclusion and Future Works -- References -- On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification -- Abstract -- 1 Introduction -- 2 An Educational Data Classification Task at the Program Level -- 3 The Proposed Educational Data Classification Method with Semi-supervised Learning and Sparse Data Handling -- 3.1 The Proposed Robust Semi-supervised Learning Framework -- 3.2 Realization of the Proposed Framework for a Robust Random Forest-Based Self-training Algorithm -- 4 Evaluation -- 5 Conclusions -- Acknowledgments -- References -- Logistic Regression Methods in Selected Medical Information Systems -- Abstract -- 1 Introduction -- 2 Main Assumptions -- 3 Logistic Regression -- 4 Experiments -- 5 Conclusion and Future Work -- References -- Blockchains and Emerging Authentication Techniques -- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance -- 1 Introduction -- 2 Authcoin -- 3 Modeling the Authcoin Protocol -- 3.1 Modeling Strategy -- 3.2 Mapping the Agent-Oriented Model to CPN Models -- 4 Protocol Semantics -- 5 Refined CPN Models of Authcoin -- 5.1 KeyGenerationEstablishBinding Module -- 5.2 V& -- A-Processing Module -- 5.3 Mining Module -- 5.4 Revocation Module -- 6 Evaluation -- 6.1 State-Space Analysis -- 6.2 Related Work -- 7 Conclusion and Future Work -- A Appendix -- A.1 CPN Model -- A.2 Goal Model -- A.3 Behavior Interfaces of Activities -- A.4 Protocol Semantics -- A.5 State-Space Analysis -- References -- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors -- 1 Introduction -- 2 Background and Related Work -- 2.1 Vision-Based Gait Recognition -- 2.2 Achievement of Sensor-Based Gait Recognition -- 2.3 Deep Learning Approaches -- 3 Proposed Method.
3.1 Overview -- 3.2 Data Acquisition -- 3.3 Preprocessing -- 3.4 Main Processing -- 3.5 Post Processing -- 3.6 Support Vector Machine Classifier -- 4 Experiments and Results -- 4.1 Experiment Set 1: Optimum Parameters for CNN Models -- 4.2 Experiment Set 2: Pre-trained CNN Model Evaluation -- 5 Conclusion -- References -- Data Engineering Tools in Software Development -- Agile Software Engineering Methodology for Information Systems' Integration Projects -- Abstract -- 1 Introduction -- 2 The Viewpoint Framework -- 3 The Methodology -- 3.1 The Iteration Cycle and Agility -- 3.2 Describing Motivational Scenarios -- 3.3 Modelling Goals -- 3.4 Modelling Roles -- 3.5 Mapping Roles to Information Systems and Registries -- 3.6 Modelling Business Processes -- 3.7 Defining User Requirements -- 3.8 Elaborating User Stories into Tasks for Implementing Building Blocks and Integration and Managing Tasks -- 4 Conclusions -- Acknowledgements -- References -- Effectiveness of Object Oriented Inheritance Metrics in Software Reusability -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Inheritance Metrics -- 4 Examples for Illustration -- 5 Results of Existing and Proposed Metrics -- 6 Analysis of Results -- 7 Conclusion and Future Works -- References -- Data Protection, Data Hiding, and Access Control -- Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information -- Abstract -- 1 Introduction -- 2 Background -- 3 Administrative Spatial Temporal RBAC -- 4 Implementation and Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Malware Detection Method -- 3.1 The Portable Executable Format Structure -- 3.2 Feature Extraction -- 3.3 Feature Selection.
3.4 Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Steganography Technique for Images Based on Wavelet Transform -- 1 Introduction -- 2 Proposed Approach -- 2.1 Embedding Stage -- 2.2 Extraction Stage -- 3 Experiment and Results -- 4 Related Work -- 5 Conclusion -- References -- Internet of Things and Applications -- Activity Recognition from Inertial Sensors with Convolutional Neural Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Method -- 3.1 Human Activity Recognition with 2D Convolutional Neural Networks -- 3.2 Human Activity Recognition with 3D Convolutional Neural Networks -- 3.3 Human Activity Recognition with 3D Convolutional Neural Network and Extra 561-Element Feature -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiments with 2D Convolutional Neural Network Models -- 4.3 Experiments with 3D Convolutional Neural Network Models -- 5 Conclusion and Future Work -- References -- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks -- Abstract -- 1 Introduction -- 2 Materials and Proposed Methods -- 2.1 The Effect of HCT on Glucose Measurement -- 2.2 The Proposed Method for Glucose Value Correction -- 3 Experimental Results -- 4 Conclusions -- Acknowledgements -- References -- Towards a Domain Specific Framework for Wearable Applications in Internet of Things -- 1 Introduction -- 2 Background -- 2.1 Domain Specific Languages -- 2.2 Internet of Things -- 2.3 Wearable Applications -- 3 Motivation and Research Problems -- 3.1 Example Descriptions -- 3.2 Hardware Design -- 3.3 Research Problems -- 4 Framework -- 4.1 Software Abstraction -- 4.2 Generating Source Code for Wearable Applications -- 4.3 Domain Modeling -- 5 Experiments -- 6 Related Work -- 6.1 FXU Framework -- 6.2 IoTSuite Framework.
6.3 M3 Framework.
Record Nr. UNINA-9910484161603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Future Data and Security Engineering [[electronic resource] ] : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Future Data and Security Engineering [[electronic resource] ] : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 312 p. 103 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-12778-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model.
Record Nr. UNISA-996213646703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Future Data and Security Engineering : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Future Data and Security Engineering : 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / / edited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 312 p. 103 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computer security
Information storage and retrieval
Data encryption (Computer science)
Database management
Algorithms
Management of Computing and Information Systems
Systems and Data Security
Information Storage and Retrieval
Cryptology
Database Management
Algorithm Analysis and Problem Complexity
ISBN 3-319-12778-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model.
Record Nr. UNINA-9910483688703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXII, 699 p. 238 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data structures (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Data Structures and Information Theory
Computer Communication Networks
ISBN 3-642-55032-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
Record Nr. UNISA-996203269003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technology : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Information and Communication Technology : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXII, 699 p. 238 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data structures (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Data Structures and Information Theory
Computer Communication Networks
ISBN 3-642-55032-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
Record Nr. UNINA-9910484485403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui