Søkt på: Søkeresultat
totalt 34 treff
XML Databases and the Semantic Web
Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent needs for today's corporations. With so much data on …
Knowledge Management
This book provides an introduction to the field of knowledge management. Taking a learning-centric rather than information-centric approach, it emphasizes the continuous …
Security Management, Integrity, and Internal Control in Information Systems
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on …
Secure Data Provenance and Inference Control with Semantic Web
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the …
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to …
Security and Privacy in Communication Networks
Thisvolume constitutes the thoroughly refereed post-conference proceedings of the11th International Conference on Security and Privacy in CommunicationNetworks, SecureComm 2015, …
Data Mining
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future …
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, …
Analyzing and Securing Social Networks
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing …
Big Data Analytics with Applications in Insider Threat Detection
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same …
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book …
Security Management, Integrity, and Internal Control in Information Systems
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on …