|
|
|
|
LEADER |
08258nam a2200577 4500 |
001 |
978-3-030-35653-8 |
003 |
DE-He213 |
005 |
20191122132103.0 |
007 |
cr nn 008mamaa |
008 |
191122s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030356538
|9 978-3-030-35653-8
|
024 |
7 |
|
|a 10.1007/978-3-030-35653-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UNH
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UNH
|2 thema
|
072 |
|
7 |
|a UDBD
|2 thema
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Future Data and Security Engineering
|h [electronic resource] :
|b 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27-29, 2019, Proceedings /
|c edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XVI, 748 p. 416 illus., 186 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 11814
|
505 |
0 |
|
|a Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators' Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
|
520 |
|
|
|a This book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
1 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|0 http://scigraph.springernature.com/things/product-market-codes/I22005
|
700 |
1 |
|
|a Dang, Tran Khanh.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Küng, Josef.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Takizawa, Makoto.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bui, Son Ha.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030356521
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030356545
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 11814
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-35653-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|