Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Choose an application
This book constitutes the proceedings of the 13th International Conference on Web Information Systems Engineering, WISE 2012, held in Paphos, Cyprus, in November 2012. The 44 full papers, 13 short papers, 9 demonstrations papers and 9 “challenge” papers were carefully reviewed and selected from 194 submissions. The papers cover various topics in the field of Web Information Systems Engineering.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Software engineering. --- Computers. --- Data mining. --- Information storage and retrieval. --- User interfaces (Computer systems). --- Computer Science. --- Information Systems Applications (incl. Internet). --- Information Systems and Communication Service. --- Information Storage and Retrieval. --- User Interfaces and Human Computer Interaction. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer software engineering --- Engineering --- Informatics --- Science --- Information systems. --- Information storage and retrieva. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbesturingssystemen --- informatica management
Choose an application
Choose an application
This two volume set LNCS 9642 and LNCS 9643 constitutes the refereed proceedings of the 21st International Conference on Database Systems for Advanced Applications, DASFAA 2016, held in Dallas, TX, USA, in April 2016. The 61 full papers presented were carefully reviewed and selected from a total of 183 submissions. The papers cover the following topics: crowdsourcing, data quality, entity identification, data mining and machine learning, recommendation, semantics computing and knowledge base, textual data, social networks, complex queries, similarity computing, graph databases, and miscellaneous, advanced applications.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Database management. --- Data mining. --- Information storage and retrieval. --- Computer engineering. --- Computer Science. --- Database Management. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computer Engineering. --- Computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Informatics --- Science --- Design and construction --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Databases --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the proceedings of the 13th International Conference on Web Information Systems Engineering, WISE 2012, held in Paphos, Cyprus, in November 2012. The 44 full papers, 13 short papers, 9 demonstrations papers and 9 challenge papers were carefully reviewed and selected from 194 submissions. The papers cover various topics in the field of Web Information Systems Engineering.
Choose an application
Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain. This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services. The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.
Choose an application
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbesturingssystemen --- informatica management
Choose an application
Listing 1 - 10 of 11 | << page >> |
Sort by
|