1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings Herausgegeben:Dang, Tran Khanh; Wagner, Roland; Neuhold, Erich J.; Takizawa, Makoto; Küng, Josef; Thoai, Nam
1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings Herausgegeben:Dang, Tran Khanh; Wagner, Roland; Neuhold, Erich J.; Takizawa, Makoto; Küng, Josef; Thoai, Nam
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.
On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations.- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets.- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.- An Efficient Similarity Search in Large Data Collections with MapReduce.- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus.- Constructing Private Indexes on Encrypted Data for Outsourced Databases.- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis.- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection.- De-anonymising Set-Generalised Transactions Based on Semantic Relationships.- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System.- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing.- Link Prediction in Social Networks Based on Local Weighted Paths.- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base.- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices.- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA.- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator.- Smart Card Based User Authentication Scheme with Anonymity.- Cloud-Based ERP Solution for Modern Education in Vietnam.- Heuristics for Energy-Aware VM Allocation in HPC Clouds.- Information-Flow Analysis of Hibernate Query Language.- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface.- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases.- Towards a Semantic Linked Data Retrieval Model.
On Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations.- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets.- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.- An Efficient Similarity Search in Large Data Collections with MapReduce.- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus.- Constructing Private Indexes on Encrypted Data for Outsourced Databases.- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis.- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection.- De-anonymising Set-Generalised Transactions Based on Semantic Relationships.- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System.- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing.- Link Prediction in Social Networks Based on Local Weighted Paths.- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base.- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices.- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA.- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator.- Smart Card Based User Authentication Scheme with Anonymity.- Cloud-Based ERP Solution for Modern Education in Vietnam.- Heuristics for Energy-Aware VM Allocation in HPC Clouds.- Information-Flow Analysis of Hibernate Query Language.- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface.- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases.- Towards a Semantic Linked Data Retrieval Model.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497