Muutke küpsiste eelistusi

E-raamat: Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI: Special Issue on Data and Security Engineering

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 10140
  • Ilmumisaeg: 21-Dec-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662541739
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 10140
  • Ilmumisaeg: 21-Dec-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662541739

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments.This, the

31st issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains six revised selected papers from the 2nd International Conference on Future Data and Security Engineering, FDSE 2015, and the 9th International Conference on Advanced Computing and Applications, ACOMP 2015, which were held in Ho Chi Minh City, Vietnam, in November 2015. Topics covered include big data analytics, data models and languages, security and privacy, complex business services, and cloud data management.

User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications.- Applying Data Analytic Techniques for Fault Detection.- Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.- Parallel Learning of Local SVM Algorithms for Classifying Large Datasets.- Contractual Specifications of Business Services: Modeling, Formalization, and Proximity.- Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.

User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications.- Applying Data Analytic Techniques for Fault Detection.- Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.- Parallel Learning of Local SVM Algorithms for Classifying Large Datasets.- Contractual Specifications of Business Services: Modeling, Formalization, and Proximity.- Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.