000 | 04339nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-662-49175-1 | ||
003 | DE-He213 | ||
005 | 20200421111651.0 | ||
007 | cr nn 008mamaa | ||
008 | 151231s2016 gw | s |||| 0|eng d | ||
020 |
_a9783662491751 _9978-3-662-49175-1 |
||
024 | 7 |
_a10.1007/978-3-662-49175-1 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUNH _2bicssc |
|
072 | 7 |
_aUND _2bicssc |
|
072 | 7 |
_aCOM030000 _2bisacsh |
|
082 | 0 | 4 |
_a025.04 _223 |
245 | 1 | 0 |
_aTransactions on Large-Scale Data- and Knowledge-Centered Systems XXIII _h[electronic resource] : _bSelected Papers from FDSE 2014 / _cedited by Abdelkader Hameurlain, Josef K�ung, Roland Wagner, Tran Khanh Dang, Nam Thoai. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2016. |
|
300 |
_aIX, 125 p. 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9480 |
|
505 | 0 | _aA Natural Language Processing Tool for White Collar Crime Investigation -- Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain -- An Adaptive Similarity Search in Massive Datasets -- Semantic Attack on Anonymised Transactions -- Private Indexes for Mixed Encrypted Databases. | |
520 | _aThe LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This volume, the 23rd issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems,focuses on information and security engineering. It contains five revised and extended papers selected from the proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, November 19-21, 2014. The titles of the five papers are as follows: A Natural Language Processing Tool for White Collar Crime Investigation; Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain; An Adaptive Similarity Search in Massive Datasets; Semantic Attack on anonymized Transactions; and Private Indexes for Mixed Encrypted Databases. . | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aMathematical logic. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aInformation storage and retrieval. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aMathematical Logic and Formal Languages. |
700 | 1 |
_aHameurlain, Abdelkader. _eeditor. |
|
700 | 1 |
_aK�ung, Josef. _eeditor. |
|
700 | 1 |
_aWagner, Roland. _eeditor. |
|
700 | 1 |
_aDang, Tran Khanh. _eeditor. |
|
700 | 1 |
_aThoai, Nam. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662491744 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9480 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-49175-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c54415 _d54415 |