st We welcome you to the proceedings of the 21 International Conference on Database and Expert systems Applications held in Bilbao. With information and database s- tems being a central topic of computerscience, it w...
详细信息
ISBN:
(数字)9783642152511
ISBN:
(纸本)9783642152504
st We welcome you to the proceedings of the 21 International Conference on Database and Expert systems Applications held in Bilbao. With information and database s- tems being a central topic of computerscience, it was to be expected that the integ- tion of knowledge, information and data is today contributing to the again rapidly increasing attractiveness of this field for researchers and practitioners. Since its foundation in 1990, DEXA has been an annual international conference, located in Europe, which showcases state-of-the-art research activities in these areas. DEXA 2010 continued this tradition and provided a forum for presenting and discu- ing research results in the area of database and intelligent systems and advanced - search topics, applications and practically relevant issues related to these areas. It offered attendees the opportunity to extensively discuss requirements, problems, and solutions in the field in the pleasant atmosphere of the city of Bilbao, which is known for its driving industriousness, its top cultural venues and its rich and inspiring he- tage and lifestyle. The University of Deusto with its great educational and research traditions, and the hospitality which the university and the city are so famous for, set the stage for this year’s DEXA conference. This volume contains the papers selected for presentation at the DEXA conference.
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which ...
详细信息
ISBN:
(数字)9783642312021
ISBN:
(纸本)9783642312014
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.
This book constitutes the thoroughly refereed papers presented at five international workshops held in conjunction with the 6th International Conference on Service-Oriented Computing, ICSOC 2008, in Sydney, Australia,...
详细信息
ISBN:
(数字)9783642012471
ISBN:
(纸本)9783642012464
This book constitutes the thoroughly refereed papers presented at five international workshops held in conjunction with the 6th International Conference on Service-Oriented Computing, ICSOC 2008, in Sydney, Australia, in December 2008. The volume contains 41 reviewed and improved papers presented at the 4th International Workshop on Engineering Service-Oriented Applications (WESOA 2008), the Second International Workshop on Web APIs and Services Mashups (Mashups 2008), the First International Workshop on Quality-of-Service Concerns in Service Oriented Architectures (QoSCSOA 2008), the First Workshop on Enabling Service Business Ecosystems (ESBE 2008), and the Third International Workshop on Trends in Enterprise Architecture Research (TEAR 2008). The papers offer a wide range of hot topics in service-oriented computing: management and analysis of SOA processes; development of mashups; QoS and trust models in service-oriented multi-agent systems; service ecosystems, service standardization, and evolutionary changes of Web services; governance aspects of SOA, enterprise models and architectures.
Smart grids have become an emerging topic due to net-zero emissions and the rapid development of artificial intelligence (AI) technology focused on achieving targeted energy distribution and maintaining operating rese...
详细信息
Smart grids have become an emerging topic due to net-zero emissions and the rapid development of artificial intelligence (AI) technology focused on achieving targeted energy distribution and maintaining operating reserves. In order to prevent cyber-physical attacks, issues related to the security and privacy of grid systems are receiving much attention from researchers. In this paper, privacy-aware energy grid management systems with anomaly detection networks and distributed learning mechanisms are proposed. The anomaly detection network consists of a server and a client learning network, which collaboratively learn patterns without sharing data, and periodically train and exchange knowledge. We also develop learning mechanisms with federated, distributed, and split learning to improve privacy and use Q-learning for decision-making to facilitate interpretability. To demonstrate the effectiveness and robustness of the proposed schemes, extensive simulations are conducted in different energy grid environments with different target distributions, ORRs, and attack scenarios. The experimental results show that the proposed schemes not only improve management performance but also enhance privacy and security levels. We also compare the management performance and privacy level of the different learning machines and provide usage recommendations.
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were careful...
详细信息
ISBN:
(数字)9783319083261
ISBN:
(纸本)9783319083254
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on complex networks and data stream mining; data mining methods; intelligent systems applications; knowledge representation in databases and systems; textual data analysis and mining; special session: challenges in text mining and semantic information retrieval; special session: warehousing and OLAPing complex, spatial and spatio-temporal data; ISMIS posters.
The Transactions on Pattern Languages of programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cyc...
详细信息
ISBN:
(数字)9783642194320
ISBN:
(纸本)9783642194313
The Transactions on Pattern Languages of programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions subline is on patterns, pattern collections, and pattern languages themselves. The journal also includes reviews, survey articles, criticisms of patterns and pattern languages, as well as other research on patterns and pattern languages.
This book, the second volume in the Transactions on Pattern Languages of programming series, presents five papers that have been through a careful peer review process involving both pattern experts and domain experts. The papers demonstrate techniques for applying patterns in an industrial or research setting. Some have confronted the topic within software engineering; others offer approaches in other pattern domains, which is an indication of the diverse fields where patterns are applied.
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhängigkeiten komplex und schwer erfassbar sind. In diesem Buch wird das Thema Sicherheit da...
详细信息
ISBN:
(数字)9783642558344
ISBN:
(纸本)9783540411642;9783642625060
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhängigkeiten komplex und schwer erfassbar sind. In diesem Buch wird das Thema Sicherheit daher systematisch betrachtet: Lösungen für immer wiederkehrende Sicherheitsprobleme werden erstmals in Form von "Security Patterns" dargestellt. Die Grundlage hierfür bilden langjährige Erfahrungen, die im Rahmen des "Hacker Contest" gesammelt wurden. Die Grundsätze des Hackens bzw. Crackens sowie prinzipieller Angriffs- und Schutzkonzepte werden vermittelt. Um Sicherheitslücken erkennen und effizient schliessen zu können, muss ein Sicherheitsexperte in der Lage sein, Netze und Systeme aus der Sicht eines Angreifers zu verstehen. Hierbei hilft ihm die konsequent praxisbezogene Darstellung der Autoren.
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing systems and Dependability and Fault Tolerance, MMB & DFT 2012, held i...
详细信息
ISBN:
(数字)9783642285400
ISBN:
(纸本)9783642285394
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.;The 16 revised full papers presented together with 5 tool papers and 5 selected workshop papers were carefully reviewed and selected from 54 submissions. MMB & DFT 2012 covers diverse aspects of performance and dependability evaluation of systems including networks, computer architectures, distributedsystems, software, fault-tolerant and secure systems.
暂无评论