Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings /: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. (2016)
- Record Type:
- Book
- Title:
- Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings /: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. (2016)
- Main Title:
- Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings
- Other Titles:
- CD-ARES 2016
PAML 2016 - Further Information:
- Note: Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar Weippl (eds.).
- Editors:
- Buccafurri, Francesco
Holzinger, Andreas
Kieseberg, Peter
Tjoa, A Min
Weippl, Edgar R - Other Names:
- IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference
Workshop on Privacy Aware Machine Learning for Health Data Science - Contents:
- Intro; Preface; Organization; Contents; The International Cross Domain Conference (CD-ARES 2016); Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-Store; 1 Introduction; 2 Related Work; 3 Algebra of RDF Graphs; 3.1 Ground Graphs and Graph Patterns; 3.2 Definition of Algebra; 3.3 Physical Algebra of RDF Graphs; 4 Distributed Query Execution System; 4.1 Architecture of Query Execution System; 4.2 Query-Tree Process; 4.3 Triple-Pattern Query Node; 4.4 Join Query Node Process; 4.5 Fault Tolerance; 5 Experimental Results; 6 Conclusions; References Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews1 Introduction; 2 Related Work; 3 Our Approach; 4 Experimental Evaluation; 4.1 Intrinsic Evaluation; 4.2 Extrinsic Evaluation; 5 Conclusions; References; Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything; 1 Introduction; 2 Motivation and Background; 2.1 The Application Context; 2.2 Overall Objectives; 3 Proposed Solution; 3.1 Overview -- Generic UIs for Complex Product Requests; 3.2 Functional View -- Processing Complex Product Demands 3.3 Information View -- Ontologies in Detail4 Demonstrator; 5 Related Work; 6 Conclusion and Future Work; References; Diagnosis of Complex Active Systems with Uncertain Temporal Observations; 1 Introduction; 2 Active Systems; 3 Complex Active Systems; 4 Uncertain Temporal Observations; 5 Problem Formulation; 6 Preprocessing; 7Intro; Preface; Organization; Contents; The International Cross Domain Conference (CD-ARES 2016); Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-Store; 1 Introduction; 2 Related Work; 3 Algebra of RDF Graphs; 3.1 Ground Graphs and Graph Patterns; 3.2 Definition of Algebra; 3.3 Physical Algebra of RDF Graphs; 4 Distributed Query Execution System; 4.1 Architecture of Query Execution System; 4.2 Query-Tree Process; 4.3 Triple-Pattern Query Node; 4.4 Join Query Node Process; 4.5 Fault Tolerance; 5 Experimental Results; 6 Conclusions; References Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews1 Introduction; 2 Related Work; 3 Our Approach; 4 Experimental Evaluation; 4.1 Intrinsic Evaluation; 4.2 Extrinsic Evaluation; 5 Conclusions; References; Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything; 1 Introduction; 2 Motivation and Background; 2.1 The Application Context; 2.2 Overall Objectives; 3 Proposed Solution; 3.1 Overview -- Generic UIs for Complex Product Requests; 3.2 Functional View -- Processing Complex Product Demands 3.3 Information View -- Ontologies in Detail4 Demonstrator; 5 Related Work; 6 Conclusion and Future Work; References; Diagnosis of Complex Active Systems with Uncertain Temporal Observations; 1 Introduction; 2 Active Systems; 3 Complex Active Systems; 4 Uncertain Temporal Observations; 5 Problem Formulation; 6 Preprocessing; 7 Problem Solving; 8 Conclusion; References; A Cloud-Based Prediction Framework for Analyzing Business Process Performances; 1 Introduction; 2 Preliminaries; 3 Reference Architecture for Distributed Data Mining; 4 Formal Framework for Process Performance Prediction 5 Solution Approach to the Discovery of a PCB-PPM6 Experimental Results; 7 Conclusions; References; Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach; 1 Introduction and Motivation for Research; 2 Background; 2.1 Problem Solving: Human Versus Computer; 2.2 Traveling Salesman Problem (TSP); 3 Ant Algorithms; 3.1 Ant Behaviour and Pheromone Trails; 3.2 Inner Ant System for TSP; 4 Experimental Method, Setting and Results; 4.1 Experimental Method; 4.2 Implementation Details 4.3 Experimental Results5 Discussion and Future Research; 6 Conclusion; References; A Threat to Friendship Privacy in Facebook; 1 Introduction; 2 Approach Formalization; 2.1 Finding Alter Accounts; 2.2 Selecting Candidates; 2.3 Finding Common Friends; 3 Preliminary Evaluation; 4 Related Work; 5 Conclusion; References; A Blockcipher Based Authentication Encryption; 1 Introduction; 1.1 Motivation; 1.2 Contribution; 1.3 Organization; 2 Preliminaries Including Security Notions; 2.1 Fundamental Notations; 2.2 Blockcipher; 2.3 Authentication Encryption; 2.4 PRF Security; 2.5 PRP Security … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xii, 267 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Computer security -- Congresses
Computer networks -- Management -- Congresses
Electronic data processing -- Distributed processing -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Management
Computer networks -- Security measures
Computer security
Electronic data processing -- Distributed processing
Computers -- Security -- General
Computers -- System Administration -- Storage & Retrieval
Computers -- Electronic Commerce
Business & Economics -- Information Management
Computer security
Information retrieval
Coding theory & cryptology
Business applications
Business mathematics & systems
Computer security
Information storage and retrieva
Data encryption (Computer science)
Information technology
Computers -- Information Technology
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319455075
3319455079 - Related ISBNs:
- 9783319455068
3319455060 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed August 29, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373248
- Ingest File:
- 02_353.xml