Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18659 dokumen yang sesuai dengan query
cover
Lachlan M. MacKinnon, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 PhD forum best papers were carefully reviewed and selected from 42 submissions. Special focus of the conference has been "Data Security and Security Data" and so the papers cover a wide range of topics such as data security, privacy and trust, security data, data integration and interoperability, data management for ubiquitous and mobile computing, data mining and information extraction, data modelling and architectures, data provenance, dataspaces, data streaming, databases and the grid, distributed information systems, electronic commerce, enterprise systems, heterogeneous databases, industrial applications, infrastructures and systems, intermittently connected data, file access methods and index structures, managing legacy data, new applications and processes, parallel and distributed databases, peer-to-peer data management, performance modelling of ubiquitous data use, personal data management, query and manipulation languages, query processing and optimisation, scientific applications, semantic Web and ontologies, semi-structured data, metadata and xml, user interfaces and data visualisation, web data management and deep Web, Web services, and workflow support systems.
"
Berlin: Springer-Verlag, 2012
e20408156
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed proceedings of the First International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June/July 2011. The 11 revised full papers were carefully selected from 31 submissions. In addition to the thorough review process, the lively discussions at the event itself also helped the authors to improve their papers and to foster interesting extensions. The selected papers cover a wide range of topics spanning from theoretical issues related to process representation to practical experience in process discovery and analysis."
Heidelberg: Springer-Verlag, 2012
e20408515
eBooks  Universitas Indonesia Library
cover
"This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection, anonymity and privacy, wireless security, system security, DNS and routing security, and key management."
Heidelberg: Springer, 2012
e20410251
eBooks  Universitas Indonesia Library
cover
Pascal Bouvry, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing."
Berlin: Springer-Verlag, 2012
e20408078
eBooks  Universitas Indonesia Library
cover
George Danezis, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts."
Berlin: Springer-Verlag, 2012
e20408181
eBooks  Universitas Indonesia Library
cover
Angelos D. Keromytis, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27–March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20410043
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications."
Heidelberg: Springer, 2012
e20410397
eBooks  Universitas Indonesia Library
cover
"The 21 revised full papers presented were carefully reviewed and selected from numerous contributions. The papers are organized in topical sections on mobile systems in education, SOC for mobile Apps (SOC), networking platforms (NW), mobile execution frameworks (MFW), mobile cloud (MC) and distributed execution, and mobile sensor networks."
Heidelberg: Springer, 2012
e20409180
eBooks  Universitas Indonesia Library
cover
Stephen H. Muggleton, editor
"This book constitutes the thoroughly refereed post-proceedings of the 21st International Conference on Inductive Logic Programming, ILP 2011, held in Windsor Great Park, UK, in July/August 2011. The 24 revised full papers were carefully reviewed and selected from 66 submissions. Also included are five extended abstracts and three invited talks. The papers represent the diversity and vitality in present ILP research including ILP theory, implementations, probabilistic ILP, biological applications, sub-group discovery, grammatical inference, relational kernels, learning of Petri nets, spatial learning, graph-based learning, and learning of action models."
Berlin: [, Springer-Verlag], 2012
e20410170
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies."
Berlin: Springer-Verlag, 2012
e20409034
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>