top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Bias and Fairness in Information Retrieval [[electronic resource] ] : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Advances in Bias and Fairness in Information Retrieval [[electronic resource] ] : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Autore Boratto Ludovico
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (187 pages)
Disciplina 025.524
Altri autori (Persone) FaralliStefano
MarrasMirko
StiloGiovanni
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Electronic commerce
Computer Engineering and Networks
Artificial Intelligence
e-Commerce and e-Business
ISBN 3-031-37249-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks.
Record Nr. UNISA-996546825403316
Boratto Ludovico  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Bias and Fairness in Information Retrieval : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Advances in Bias and Fairness in Information Retrieval : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Autore Boratto Ludovico
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (187 pages)
Disciplina 025.524
Altri autori (Persone) FaralliStefano
MarrasMirko
StiloGiovanni
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Electronic commerce
Computer Engineering and Networks
Artificial Intelligence
e-Commerce and e-Business
ISBN 3-031-37249-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks.
Record Nr. UNINA-9910734876903321
Boratto Ludovico  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 335 p. 67 illus.)
Disciplina 364.168
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-662-44952-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals.
Record Nr. UNINA-9910298995803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 357 p. 74 illus. in color.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-24123-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY.
1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point.
4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction.
2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References.
Record Nr. UNINA-9910299205603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 396 p. 99 illus.)
Disciplina 363.25
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-46279-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254985803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910780042403321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910825744303321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC/TADA 2015, Istanbul, Turkey, May 4, 2015, and AMEC/TADA 2016, New York, NY, USA, July 10, 2016, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Chen Hajaj, Valentin Robu, Ioannis A. Vetsikas
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC/TADA 2015, Istanbul, Turkey, May 4, 2015, and AMEC/TADA 2016, New York, NY, USA, July 10, 2016, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Chen Hajaj, Valentin Robu, Ioannis A. Vetsikas
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (IX, 157 p. 49 illus.)
Disciplina 658.84
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic commerce
Artificial intelligence
Information technology - Management
Application software
e-Commerce and e-Business
E-Business
Artificial Intelligence
Computer Application in Administrative Data Processing
Computer and Information Systems Applications
ISBN 3-319-54229-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategic Free Information Disclosure for a Vickrey Auction -- On Revenue-Maximizing Walrasian Equilibria for Multi-Minded Bidders -- Extending Parking Lots with Electricity Trading Agent Functionalities -- Auction Based Mechanisms for Dynamic Task Assignments in Expert Crowdsourcing -- An Effective Broker for the Power TAC 2014 -- Now, Later, or Both: a Closed-Form Optimal Decision for a Risk-Averse Buyer -- Investigation of Learning Strategies for the SPOT Broker in Power TAC -- On the Use of Off-the-Shelf Machine Learning Techniques to Predict Energy Demands of Power TAC Consumers -- A Genetic Algorithmic Approach to Automated Auction Mechanism Design -- AgentUDE: The Success Story of the Power TAC 2014’s Champion. .
Record Nr. UNINA-9910254838803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC 2013, Saint Paul, MN, USA, May 6, 2013, TADA 2013, Bellevue, WA, USA, July 15, 2013, and AMEC and TADA 2014, Paris, France, May 5, 2014, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Vedran Podobnik, Valentin Robu, Onn Shehory, Sebastian Stein, Ioannis A. Vetsikas
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC 2013, Saint Paul, MN, USA, May 6, 2013, TADA 2013, Bellevue, WA, USA, July 15, 2013, and AMEC and TADA 2014, Paris, France, May 5, 2014, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Vedran Podobnik, Valentin Robu, Onn Shehory, Sebastian Stein, Ioannis A. Vetsikas
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (IX, 171 p. 37 illus.)
Disciplina 658.84
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic commerce
Business information services
Artificial intelligence
Information technology - Management
Application software
e-Commerce and e-Business
IT in Business
Artificial Intelligence
Computer Application in Administrative Data Processing
Computer and Information Systems Applications
ISBN 3-319-13218-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Analysis of Power Trading Agent Competition 2014 -- Towards Modeling Securities Markets as a Society of Heterogeneous Trading Agents -- A Market-Based Coordinated Negotiation for QoS-Aware Service Selection -- Optimal Agendas for Sequential Negotiations -- An Empirical Analysis of QuiBids’ Penny Auctions -- Analysis of Fairness and Incentives of Profit Sharing Schemes in Group Buying -- Distributed Prediction Markets Modeled by Weighted Bayesian Graphical Games -- A Successful Broker Agent for Power TAC -- Online Double Auction for Perishable Goods -- Designing Tariffs in a Competitive Energy Market Using Particle Swarm Optimization Techniques -- Classification Driven Detection of Opportunistic Bids in TAC SCM -- An Intelligent Learning Mechanism for Trading Strategies for Local Energy Distribution.
Record Nr. UNINA-9910298967403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers / / edited by Esther David, Christopher Kiekintveld, Valentin Robu, Onn Shehory, Sebastian Stein
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers / / edited by Esther David, Christopher Kiekintveld, Valentin Robu, Onn Shehory, Sebastian Stein
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 161 p. 44 illus.)
Disciplina 658.84
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic commerce
Business information services
Artificial intelligence
Information technology - Management
Application software
e-Commerce and e-Business
IT in Business
Artificial Intelligence
Computer Application in Administrative Data Processing
Computer and Information Systems Applications
ISBN 3-642-40864-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social Networking and Information Diffusion in Automated Markets -- Policy Search through Adaptive Function Approximation for Bidding in TAC SCM -- Designing Robust Strategies for Continuous Trading in Contemporary Power Markets -- JACK: A Java Auction Configuration Kit -- A Decision Framework for Broker Selection in Smart Grids -- Prediction Market-Based Information Aggregation for Multi-sensor Information Processing -- Agent Adaptation across Non-ideal Markets and Societies -- Incentives in Multi-dimensional Auctions under Information Asymmetry for Costs and Qualities -- A Model-Free Approach for a TAC-AA Trading Agent -- Ad Exchange – Proposal for a New Trading Agent Competition Game -- Competing Intermediaries in Online Display Advertising.
Record Nr. UNINA-9910437600803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui