Description |
1 online resource (xii, 267 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 9817 |
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
|
Lecture notes in computer science ; 9817. 0302-9743
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
Intro; Preface; Organization; Contents; The International Cross Domain Conference (CD-ARES 2016); Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-Store; 1 Introduction; 2 Related Work; 3 Algebra of RDF Graphs; 3.1 Ground Graphs and Graph Patterns; 3.2 Definition of Algebra; 3.3 Physical Algebra of RDF Graphs; 4 Distributed Query Execution System; 4.1 Architecture of Query Execution System; 4.2 Query-Tree Process; 4.3 Triple-Pattern Query Node; 4.4 Join Query Node Process; 4.5 Fault Tolerance; 5 Experimental Results; 6 Conclusions; References |
|
Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews1 Introduction; 2 Related Work; 3 Our Approach; 4 Experimental Evaluation; 4.1 Intrinsic Evaluation; 4.2 Extrinsic Evaluation; 5 Conclusions; References; Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything; 1 Introduction; 2 Motivation and Background; 2.1 The Application Context; 2.2 Overall Objectives; 3 Proposed Solution; 3.1 Overview -- Generic UIs for Complex Product Requests; 3.2 Functional View -- Processing Complex Product Demands |
|
3.3 Information View -- Ontologies in Detail4 Demonstrator; 5 Related Work; 6 Conclusion and Future Work; References; Diagnosis of Complex Active Systems with Uncertain Temporal Observations; 1 Introduction; 2 Active Systems; 3 Complex Active Systems; 4 Uncertain Temporal Observations; 5 Problem Formulation; 6 Preprocessing; 7 Problem Solving; 8 Conclusion; References; A Cloud-Based Prediction Framework for Analyzing Business Process Performances; 1 Introduction; 2 Preliminaries; 3 Reference Architecture for Distributed Data Mining; 4 Formal Framework for Process Performance Prediction |
|
5 Solution Approach to the Discovery of a PCB-PPM6 Experimental Results; 7 Conclusions; References; Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach; 1 Introduction and Motivation for Research; 2 Background; 2.1 Problem Solving: Human Versus Computer; 2.2 Traveling Salesman Problem (TSP); 3 Ant Algorithms; 3.1 Ant Behaviour and Pheromone Trails; 3.2 Inner Ant System for TSP; 4 Experimental Method, Setting and Results; 4.1 Experimental Method; 4.2 Implementation Details |
|
4.3 Experimental Results5 Discussion and Future Research; 6 Conclusion; References; A Threat to Friendship Privacy in Facebook; 1 Introduction; 2 Approach Formalization; 2.1 Finding Alter Accounts; 2.2 Selecting Candidates; 2.3 Finding Common Friends; 3 Preliminary Evaluation; 4 Related Work; 5 Conclusion; References; A Blockcipher Based Authentication Encryption; 1 Introduction; 1.1 Motivation; 1.2 Contribution; 1.3 Organization; 2 Preliminaries Including Security Notions; 2.1 Fundamental Notations; 2.2 Blockcipher; 2.3 Authentication Encryption; 2.4 PRF Security; 2.5 PRP Security |
Summary |
This volume constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security in Information Systems, CD-ARES 2016, and the Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, co-located with the International Conference on Availability, Reliability and Security, ARES 2016, held in Salzburg, Austria, in September 2016. The 13 revised full papers and 4 short papers presented were carefully reviewed and selected from 23 submissions. They are organized in the following topical sections: Web and semantics; diagnosis, prediction and machine learning; security and privacy; visualization and risk management; and privacy aware machine learning for health data science |
Notes |
International conference proceedings |
|
Online resource; title from PDF title page (SpringerLink, viewed August 29, 2016) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Management -- Congresses
|
|
Electronic data processing -- Distributed processing -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer security.
|
|
Information retrieval.
|
|
Coding theory & cryptology.
|
|
Business applications.
|
|
Business mathematics & systems.
|
|
Computers -- Security -- General.
|
|
Computers -- System Administration -- Storage & Retrieval.
|
|
Computers -- Electronic Commerce.
|
|
Business & Economics -- Information Management.
|
|
Computers -- Information Technology.
|
|
Computer networks -- Management
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Electronic data processing -- Distributed processing
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Buccafurri, Francesco, editor.
|
|
Holzinger, Andreas, editor.
|
|
Kieseberg, Peter, editor
|
|
Tjoa, A. Min, editor
|
|
Weippl, Edgar R., editor.
|
|
Workshop on Privacy Aware Machine Learning for Health Data Science (2016 : Salzburg, Austria), jointly held conference.
|
ISBN |
9783319455075 |
|
3319455079 |
|