000 | 04867nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-319-12778-1 | ||
003 | DE-He213 | ||
005 | 20200421112050.0 | ||
007 | cr nn 008mamaa | ||
008 | 141021s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319127781 _9978-3-319-12778-1 |
||
024 | 7 |
_a10.1007/978-3-319-12778-1 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aUYZM _2bicssc |
|
072 | 7 |
_aUKR _2bicssc |
|
072 | 7 |
_aBUS083000 _2bisacsh |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aFuture Data and Security Engineering _h[electronic resource] : _bFirst International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings / _cedited by Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef K�ung, Nam Thoai. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVI, 312 p. 103 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8860 |
|
505 | 0 | _aOn Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model. | |
520 | _aThis book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aInformation storage and retrieval. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
700 | 1 |
_aDang, Tran Khanh. _eeditor. |
|
700 | 1 |
_aWagner, Roland. _eeditor. |
|
700 | 1 |
_aNeuhold, Erich. _eeditor. |
|
700 | 1 |
_aTakizawa, Makoto. _eeditor. |
|
700 | 1 |
_aK�ung, Josef. _eeditor. |
|
700 | 1 |
_aThoai, Nam. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319127774 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8860 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-12778-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57154 _d57154 |