000 | 05417nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-319-12778-1 | ||
003 | DE-He213 | ||
005 | 20240730192415.0 | ||
007 | cr nn 008mamaa | ||
008 | 141021s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319127781 _9978-3-319-12778-1 |
||
024 | 7 |
_a10.1007/978-3-319-12778-1 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aKJQ _2bicssc |
|
072 | 7 |
_aCOM039000 _2bisacsh |
|
072 | 7 |
_aKJQ _2thema |
|
082 | 0 | 4 |
_a004.068 _223 |
245 | 1 | 0 |
_aFuture Data and Security Engineering _h[electronic resource] : _b1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / _cedited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVI, 312 p. 103 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v8860 |
|
505 | 0 | _aOn Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model. | |
520 | _aThis book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization. | ||
650 | 0 |
_aElectronic data processing _xManagement. _9149855 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aDang, Tran Khanh. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149856 |
|
700 | 1 |
_aWagner, Roland. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149857 |
|
700 | 1 |
_aNeuhold, Erich J. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149858 |
|
700 | 1 |
_aTakizawa, Makoto. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149859 |
|
700 | 1 |
_aKüng, Josef. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149860 |
|
700 | 1 |
_aThoai, Nam. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9149861 |
|
710 | 2 |
_aSpringerLink (Online service) _9149862 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319127774 |
776 | 0 | 8 |
_iPrinted edition: _z9783319127798 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v8860 _9149863 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-12778-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94240 _d94240 |