HOME > 상세정보

상세정보

Transactions on large-scale data- and knowledge-centered systems. 31, Special issue on data and security engineering [electronic resource]

Transactions on large-scale data- and knowledge-centered systems. 31, Special issue on data and security engineering [electronic resource]

자료유형
E-Book(소장)
개인저자
Hameurlain, Abdelkader.
서명 / 저자사항
Transactions on large-scale data- and knowledge-centered systems. 31, Special issue on data and security engineering [electronic resource] / edited by Abdelkader Hameurlain ... [et al.].
발행사항
Berlin, Heidelberg :   Springer,   2017.  
형태사항
1 online resource (ix, 147 p.) : ill.
총서사항
Lecture notes in computer science ;10140
ISBN
9783662541739
요약
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 31st issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains six revised selected papers from the 2nd International Conference on Future Data and Security Engineering, FDSE 2015, and the 9th International Conference on Advanced Computing and Applications, ACOMP 2015, which were held in Ho Chi Minh City, Vietnam, in November 2015. Topics covered include big data analytics, data models and languages, security and privacy, complex business services, and cloud data management.
일반주기
Title from e-Book title page.  
내용주기
User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications -- Applying Data Analytic Techniques for Fault Detection -- Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol -- Parallel Learning of Local SVM Algorithms for Classifying Large Datasets -- Contractual Specifications of Business Services: Modeling, Formalization, and Proximity -- Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Issued also as a book.  
일반주제명
Data mining. Computer software. Information Systems. Data encryption (Computer science). Computer security.
바로가기
URL
000 00000cam u2200205 a 4500
001 000045995305
005 20190830134009
006 m d
007 cr
008 190820s2017 sz a ob 001 0 eng d
020 ▼a 9783662541739
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a QA76.9.D343
082 0 0 ▼a 003.71 ▼2 23
084 ▼a 003.71 ▼2 DDCK
090 ▼a 003.71
245 0 0 ▼a Transactions on large-scale data- and knowledge-centered systems. ▼n 31, ▼p Special issue on data and security engineering ▼h [electronic resource] / ▼c edited by Abdelkader Hameurlain ... [et al.].
260 ▼a Berlin, Heidelberg : ▼b Springer, ▼c 2017.
300 ▼a 1 online resource (ix, 147 p.) : ▼b ill.
490 1 ▼a Lecture notes in computer science ; ▼v 10140
490 1 ▼a Transactions on Large-Scale Data- and Knowledge-Centered Systems, ▼x 1869-1994 ; ▼v 10140
500 ▼a Title from e-Book title page.
504 ▼a Includes bibliographical references and index.
505 0 ▼a User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications -- Applying Data Analytic Techniques for Fault Detection -- Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol -- Parallel Learning of Local SVM Algorithms for Classifying Large Datasets -- Contractual Specifications of Business Services: Modeling, Formalization, and Proximity -- Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.
520 ▼a The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 31st issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains six revised selected papers from the 2nd International Conference on Future Data and Security Engineering, FDSE 2015, and the 9th International Conference on Advanced Computing and Applications, ACOMP 2015, which were held in Ho Chi Minh City, Vietnam, in November 2015. Topics covered include big data analytics, data models and languages, security and privacy, complex business services, and cloud data management.
530 ▼a Issued also as a book.
538 ▼a Mode of access: World Wide Web.
650 0 ▼a Data mining.
650 0 ▼a Computer software.
650 0 ▼a Information Systems.
650 0 ▼a Data encryption (Computer science).
650 0 ▼a Computer security.
700 1 ▼a Hameurlain, Abdelkader.
830 0 ▼a Lecture notes in computer science ; ▼v 10140.
856 4 0 ▼u https://oca.korea.ac.kr/link.n2s?url=https://doi.org/10.1007/978-3-662-54173-9
945 ▼a KLPA
991 ▼a E-Book(소장)

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/e-Book 컬렉션/ 청구기호 CR 003.71 등록번호 E14017645 도서상태 대출불가(열람가능) 반납예정일 예약 서비스 M

관련분야 신착자료