Future Data and Security Engineering
- Length: 492 pages
- Edition: 1st ed. 2017
- Language: English
- Publisher: Springer
- Publication Date: 2017-12-06
- ISBN-10: 3319700030
- ISBN-13: 9783319700038
Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.
The 28 revised full papers and 7 short papers presented were carefully reviewed and selected from 128 submissions.
The accepted papers were grouped into the following sessions:
- Advances in query processing and optimization
- Big data analytics and applications
- Blockchains and emerging authentication techniques
- Data engineering tools in software development
- Data protection, data hiding, and access control
- Internet of Things and applications
- Security and privacy engineering
- Social network data analytics and recommendation systems
Table of Contents
Chapter 1. Eco Models of Distributed Systems
Chapter 2. Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment
Chapter 3. Fast Top-Q and Top-K Query Answering
Chapter 4. Low-Latency Radix-4 Multiplication Algorithm over Finite Fields
Chapter 5. An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D
Chapter 6. On Transformation-Based Spatial Access Methods with Monotone Norms
Chapter 7. Query Answering System as a Tool in Incomplete Distributed Information System Optimization Process
Chapter 8. Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio Stations
Chapter 9. IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment
Chapter 10. Parallel Algorithm of Local Support Vector Regression for Large Datasets
Chapter 11. On Semi-supervised Learning with Sparse Data Handling for Educational Data Classification
Chapter 12. Logistic Regression Methods in Selected Medical Information Systems
Chapter 13. Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance
Chapter 14. Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors
Chapter 15. Agile Software Engineering Methodology for Information Systems’ Integration Projects
Chapter 16. Effectiveness of Object Oriented Inheritance Metrics in Software Reusability
Chapter 17. Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
Chapter 18. Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence
Chapter 19. A Steganography Technique for Images Based on Wavelet Transform
Chapter 20. Activity Recognition from Inertial Sensors with Convolutional Neural Networks
Chapter 21. Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural Networks
Chapter 22. Towards a Domain Specific Framework for Wearable Applications in Internet of Things
Chapter 23. Development and Implementation of a Web Application for the Management of Data Recorded by a Carbon Monoxide Sensor
Chapter 24. Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems
Chapter 25. An Exact Consensus-Based Network Intrusion Detection System
Chapter 26. Binary Tree Based Deterministic Positive Selection Approach to Network Security
Chapter 27. Application of Rough Sets to Negative Selection Algorithms
Chapter 28. Focusing on Precision- and Trust-Propagation in Knowledge Processing Systems
Chapter 29. MITIS – An Insider Threats Mitigation Framework for Information Systems
Chapter 30. Integrating Knowledge-Based Reasoning Algorithms and Collaborative Filtering into E-Learning Material Recommendation System
Chapter 31. A Semantic-Based Recommendation Approach for Cold-Start Problem
Chapter 32. Identifying Key Player Using Sum of Influence Probabilities in a Social Network
Chapter 33. Key Success Factors in Introducing National e-Identification Systems
Chapter 34. The Digital Archiving Process in Estonia – Assessment and Future Perspectives
Chapter 35. Is There a Need for a New Generation of Congestion Control Algorithms in Point-to-Point Networks?