top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Contemporary research on E-business technology and strategy : International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised selected papers / edited by Vasil Khachidze [and others] (eds.).
Contemporary research on E-business technology and strategy : International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised selected papers / edited by Vasil Khachidze [and others] (eds.).
Creatore [iCETS (Conference) (2012 : Tianjin, China)]
Estensione 1 online resource.
Disciplina 650.0285
Accesso persona Khachidze, Vasil
Genere/Forma Electronic books
Soggetto non controllato Computer science
Database management
Information storage and retrieval systems
Information Systems
Management of Computing and Information Systems
e-Commerce/e-business
Information Systems Applications (incl. Internet)
Computers and Society
Information Storage and Retrieval
ISBN 9783642344473
364234447X
9783642344466
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto E-commerce: Consumer Online Shopping in Canada / Ayoub Yousefi and Jie Tang -- Integrating Spatial Decision Support System with Graph Mining Technique / Abdul Halim Omar and Mohd Najib Mohd Salleh -- Engaging Social Customers -- Influencing New Marketing Strategies for Social Media Information Sources / Barbara Gligorijevic and Edwina Luck -- Concept Based Orchestration of Web Services Using XOT / Ho-Sang Jo, Jae-Dong Yang and Wan Choi -- Intellectual Property Rights in E-business Environment: Paradigm Shifts of Legal and Political Measures / Seyed Reza Eftekhari -- A Multi-objective Programming for Web Services Composition / Shanshan Hao, Fuzan Chen, Minqiang Li and Jisong Kou -- The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting / Yuanyuan Kou, Hongfei Cui and Linying Xu -- Semi-automatic Acquisition and Formal Representation of OpenAPI / Xiaocao Hu, Shizhan Chen and Zhiyong Feng -- A Novel Subspace Classification Method for Large Datasets Based on Kernel-Based Fisher Discriminant Analysis / Yanlan Wang, Fuzan Chen, Minqiang Li and Jisong Kou.
Eliciting Security Requirements Method Based on Safety Knowledge Base / Xiaofei Yu, Xiaohong Li and Qianqian Zhang -- Sale Channel Selection of Information Products in the Presence of Network Externality / Zhiyong Liu, Minqiang Li and Jisong Kou -- Impact of IT Service Provider's Expertise and Customer's Sociability on Continuous Intention to Use / Jungwoo Lee, Yongki Park and Junbeom Jang -- ASF: Improving Android Security with Layered Structure Instrumentation / Qianqian Zhang, Xiaohong Li, Xiaofei Yu and Zhiyong Feng -- A Threat Model-Driven Security Testing Approach for Web Application / Bobo Yan, Xiaohong Li and Zhijie Du -- A Novel Architecture on FPGA for Face Detection Using Jumping Scanning Mechanism / Chao Qin, Ming Che and Weichao Li -- On the Generalization of PAC-Bayes Bound for SVM Linear Classifier / Li Tang, Zheng Zhao, Xiujun Gong and Huapeng Zeng -- Optimality of Versioning for Information Products Using Niching SSGA / Haiyang Feng, Minqiang Li and Fuzan Chen -- Incorporating Risk Attitude into the Iterated Prisoner's Dilemma: Application to E-business / Weijun Zeng, Minqiang Li and Guofang Nan.
Dynamic Neural Network Ensemble Construction for Classification / Jin Tian, Minqiang Li and Fuzan Chen -- A Secure Data Exchange Protocol for the Internet of Things / Yaping Zhang, Lina Bo and Qian Ma -- Enhancing Security of Online Payments: A Conceptual Model for a Robust E-Payment Protocol for E-Commerce / Augustine Takyi and Patrick Ohemeng Gyaase -- An Improved Secure Communications Protocol / Yaping Zhang, Chunyan Li, Jingyuan Zhang and Bing Sun -- An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p) / Yanhua Liu, Wei Guo, Ya Tan, Jizeng Wei and Dazhi Sun -- A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis / Qin Wang, Xiaohong Li and Bobo Yan -- Research on Location Selection Based on Genetic and Simulated Annealing Algorithm / Wenyuan Tao and Jiayue Liu -- Design and Implementation of Special Equipment Major Hazard Identification System / Jiang Liu, Manliang Chen and Wenyi Xu -- A Screening Method of Security Functional Components Based on Fuzzy / Yizhen Liu, Zhijie Du, Hong Shi and Xiaohong Li -- An Assessment of the Use of Information Technology Tools and E-business by Informal Sector Entrepreneurs in Mauritius / Asrani Gopaul.
Secure Operation, Control, and Maintenance in Smart Grid Communications over Wireless Networks / Vincent Y. Liu and Xiaobing Wang -- Eliminating False Matches Using Geometric Context / Muhua Zhang, Yuxiong Zhang and Jianrong Wang -- Online Service Quality in Social Commerce Websites / Jungwoo Lee, Myung Suk Cha and Cheulhyun Cho -- An Improved Algorithm for K-anonymity / Jing Zhang, Xiujun Gong, Zhipeng Han and Siling Feng -- Factors Affecting Emerging ICT Adoption in SMEs: An Actor Network Theory Analysis / Sunday Eze, Yanqing Duan and Hsin Chen -- A Probability Based Similarity Scoring for DNA Motifs Comparison / Bin Tian, Xiujun Gong, Wenjun Wu and Siling Feng -- Security Software Formal Modeling and Verification Method Based on UML and Z / Kunyu Cao, Xiaohong Li and Jinliang Xing -- Research and Application of Warning and Intelligent Control System to Prevent Hollow Fiber Membrane Fouling / Tong Yun, Qu Ri, Xu Dan-yu and Zheng Xian-qiang -- Sharing and Building Management System Based on Handheld Mobile Devices / Yubao Li, Qing Xie, Guodong Liu, Zhenghua Shu and Dengji Zhao, et al.
Social CRM for SMEs: Current Tools and Strategy / Sergio Cappuccio, Sagar Kulkarni, Muhammad Sohail, Mustafa Haider and Xiaobing Wang -- Research on Contingency Plan Simulation System Based on CAS Theory / Fei Chen, Wenjun Wang, Jieru Cheng and Fei Wang -- MapCombine: A Lightweight Solution to Improve the Efficiency of Iterative MapReduce / Wei Xu, Xiujun Gong and Xiaoyu Li -- Centralization vs. Decentralization of Purchasing in the Public Sector: The Role of e-Procurement in the Italian Case / Renata Paola Dameri, Clara Benevolo, Cecilia Rossignoli, Francesca Ricciardi and Marco De Marco -- Consistent View Mapping of Large-Scale Ontology / Ruiguang Liu, Qingyi Meng, Zhiyong Feng and Guozheng Rao -- A Multi-objective Optimization Model for Information System Design / Yi Liu, Fuzan Chen, Minqiang Li and Jisong Kou -- An Improved Method for the Feature Extraction of Chinese Text by Combining Rough Set Theory with Automatic Abstracting Technology / Min Shen, Baosen Dong and Linying Xu -- Neighborhood Covering Based Rule Learning Algorithms / Xiaoyun Zhang, Hong Shi, Xiaofei Yu and TongChun Ni -- Facial Expression Pervasive Analysis Based on Haar-Like Features and SVM / Chao Xu, Caichao Dong, Zhiyong Feng and Tianyi Cao.
Program Package for Decision Making / Kartlos J. Kachiashvili and David I. Melikdzhanjan -- Multi-Modal Fusion Emotion Recognition Based on HMM and ANN / Chao Xu, Tianyi Cao, Zhiyong Feng and Caichao Dong -- Visual Modeling for Multi-level Parallel Computing Environment Based on DSL / Mengmeng Wang, Ce Yu, Jizhou Sun, Chao Sun and Zhou Jin, et al. -- A Framework for Multi-agent-Based Stock Market Simulation on Parallel Environment / Wang Chun-yu, Wu Hu-tong, Sun Chao, Sun Ji-zhou and Li Yue-lei, et al. -- Research on Police Performance Appraisal Early Warning Methods Based on Improved Decision Tree Algorithm / Yumei Cui, Jinduo Xu and Linying Xu -- A GPU-Based Face Detection Algorithm for Low-Bandwidth Implementation / Feifei Li, Ming Che and Chao Qin -- Gaze Estimation Research with Single Camera / Weichao Li, Ming Che and Feifei Li -- An Improved Text Feature Selection Method for Transfer Learning / Jiang Liu, Hao Wang and Jun Liu -- Three-Dimensional Visual Simulation for Concrete Dam Construction Process / Jiang Liu, Chao Chang and Ying Wei -- Three-Dimensional Tongue Modeling Based on PCA for Visualized Pronunciation Feedback / Dian Huang, Hongcui Wang, Jianguo Wei and Jianwu Dang.
Comprehensive Mining on Medical Homepage Records Using Bayesian Network Approach / Zhipeng Han, Xiujun Gong and Jing Zhang -- A Hybrid Recommendation Model for HTML5 Mobile Web Applications / Bo Chen, Hui He and Ying Zhang -- A Distributed Ontology Repository Management Approach Based on Semantic Wiki / Guozheng Rao, Zhiyong Feng, Xin Wang and Ruiguang Liu -- Thai Immigrant Entrepreneurs in New Zealand / Pusanisa Thechatakerng -- Application-Aware Storage Strategy for Scientific Data / Runtao Wang, Jian Xiao, Jizhou Sun, Ce Yu and Chao Sun, et al. -- CMMI Based Multi-agent Software Process Control and Improvement Model / Jing Cao, Zijian Zhang, Li Zhang, Guozheng Rao and Ruiguang Liu -- The Design and Realization of 3G-Based Vehicular Video Surveillance System / Weimin Ge, Yang Liu, Heng Lv and Zhan Jin -- Mobile Clerk Integral System Based on Distributed Performance Evaluation Systems / Qing Xie, Guodong Liu, Zhenghua Shu, Dengji Zhao and Bingxin Wang -- A Dynamic Scanning Approach Based on Trie Matching for Clustering XML Data in E-business / Jing Zhang, Hanqi Zhu and Gang Sun.
Record Nr. NYU-004625173
[iCETS (Conference) (2012 : Tianjin, China)]  
Materiale a stampa
Lo trovi qui: New York University
System analysis and modeling : theory and practice : 7th International Workshop, SAM 2012, Innsbruck, Austria, October 1-2, 2012. Revised selected papers / Øystein Haugen, Rick Reed, Reinhard Gotzhein (eds.).
System analysis and modeling : theory and practice : 7th International Workshop, SAM 2012, Innsbruck, Austria, October 1-2, 2012. Revised selected papers / Øystein Haugen, Rick Reed, Reinhard Gotzhein (eds.).
Creatore [SAM (Workshop : System analysis) (7th : 2012 : Innsbruck, Austria)]
Estensione 1 online resource.
Disciplina 004.2/1
Accesso persona Haugen, Øystein
Reed, Rick
Gotzhein, Reinhard
Genere/Forma Llibres electrònics
Congressos
Conference papers and proceedings
Congresses
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Information Systems
Programming Languages, Compilers, Interpreters
Management of Computing and Information Systems
ISBN 9783642367571
3642367577
3642367569
9783642367564
Classificazione 54.61
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote 1. Models '67 Revisited / Birger Møller-Pedersen -- Test and Analysis I -- Identification and Selection of Interaction Test Scenarios for Integration Testing / Mohamed Mussa, Ferhat Khendek -- An Approach to Specify and Analyze Goal Model Families / Azalia Shamsaei, Daniel Amyot, Alireza Pourshahid, Edna Braun, Eric Yu -- Language Enhancements -- Real-Time Tasks in SDL / Dennis Christmann, Reinhard Gotzhein -- Prototyping Domain Specific Languages as Extensions of a General Purpose Language / Andreas Blunk, Joachim Fischer -- Fuzzy Subjects -- Behavioral Fuzzing Operators for UML Sequence Diagrams / Martin Schneider, Jürgen Großmann, Nikolay Tcholtchev, Ina Schieferdecker -- Relativity and Abstract State Machines / Edel Sherratt -- Keynote 2. From Earthquake Detection to Traffic Surveillance -- About Information and Communication Infrastructures for Smart Cities / Joachim Fischer, Jens-Peter Redlich, Björn Scheuermann, Jochen Schiller, Mesut Günes -- Components and Composition -- On Deriving Detailed Component Design from High-Level Service Specification / Urooj Fatima, Rolv Bræk -- Type-Safe Symmetric Composition of Metamodels Using Templates / Henning Berg, Birger Møller-Pedersen -- Configuring and Product Lines -- Towards Correct Product Derivation in Model-Driven Product Lines / Xiaorui Zhang, Birger Møller-Pedersen -- Simulation Configuration Modeling of Distributed Communication Systems / Mihal Brumbulli, Joachim Fischer -- Analysis II -- GRL Model Validation: A Statistical Approach / Jameleddine Hassine, Daniel Amyot -- Configuration-Based Service Availability Analysis for Middleware Managed Applications / Ali Kanso, Maria Toeroe, Ferhat Khendek.
Record Nr. NYU-004626889
[SAM (Workshop : System analysis) (7th : 2012 : Innsbruck, Austria)]  
Materiale a stampa
Lo trovi qui: New York University
The future internet : Future Internet Assembly 2013 : validated results and new horizons / Alex Galis, Anastasius Gavras (eds.).
The future internet : Future Internet Assembly 2013 : validated results and new horizons / Alex Galis, Anastasius Gavras (eds.).
Creatore [Future Internet Assembly (Conference) (10th : 2013 : Dublin, Ireland)]
Estensione 1 online resource (xliv, 369 pages) : illustrations.
Disciplina 004.67/8
Accesso persona Galis, Alex
Gavras, Anastasius
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Information storage and retrieval systems
Multimedia systems
Information Systems
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Multimedia Information Systems
Information Storage and Retrieval
Computers and Society
ISBN 9783642380822
3642380824
9783642380815
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Driven Networks, Virtualisation, Programmability and Autonomic Management. Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) / Burkhard Stiller, David Hausheer, Tobias Hoßfeld -- The NEBULA Future Internet Architecture / Tom Anderson [and others] -- Open the Way to Future Networks -- A Viewpoint Framework from ITU-T / Daisuke Matsubara [and others] -- Towards a Minimal Core for Information-Centric Networking / Kari Visala, Dmitrij Lagutin, Sasu Tarkoma -- Managing QoS for Future Internet Applications over Virtual Sensor Networks / Panagiotis Trakadas [and others] -- High Availability in the Future Internet / Levente Csikor, Gábor Rétvári, János Tapolcai -- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Researchand Experimentation / Christos Tranoris [and others].
Computing and Networking Clouds. Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds / Roberto G. Cascella [and others] -- Cloud-Based Evaluation Framework for Big Data / Allan Hanbury [and others] -- Optimizing Service Ecosystems in the Cloud / Usman Wajid, César A. Marín, Nikolay Mehandjiev -- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles / Martin Serrano [and others] -- Towards a Secure Network Virtualization Architecture for the Future Internet / Pedro Martinez-Julia, Antonio F. Skarmeta, Alex Galis -- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures / Stéphane Betgé-Brezetz [and others].
Internet of Things. IoT6 -- Moving to an IPv6-Based Future IoT / Sébastien Ziegler [and others] -- SmartSantander: Internet of Things Research and Innovation through Citizen Participation / Verónica Gutiérrez [and others] -- A Cognitive Management Framework for Empowering the Internet of Things / Vassilis Foteinos [and others] -- Building Modular Middlewares for the Internet of Things with OSGi / Jakub Flotyński, Kamil Krysztofiak, Daniel Wilusz -- Towards an Architecture for Future Internet Applications / Jacek Chmielewski -- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability / Angelika Salmen [and others] -- Test-Enabled Architecture for IoT Service Creation and Provisioning / Suparna De [and others].
Enabling Technologies and Economic Incentives. Sustainable Wireless Broadband Access to the Future Internet -- The EARTH Project / Dietrich Zeller [and others] -- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces / Heiko Desruelle [and others] -- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices / Firooz B. Saghezchi [and others] -- Counting the Cost of FIRE / Michael Boniface, Philip Inglesant, Juri Papay -- User Involvement in Future Internet Projects / Anne-Marie Oostveen, Eric T. Meyer, Brian Pickering -- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play / Raffaele Bolla [and others].
Book Sponsoring Projects Overview. 3DLife -- Bringing the Media Internet to Life / Qianni Zhang, Noel E. O'Connor, Ebroul Izquierdo -- CONCORD Project Management of the Future Internet / Ilkka Lakaniemi -- FLAMINGO NoE Project Management of the Future Internet / Sebastian Seeber -- The GEYSERS Concept and Major Outcomes / Anna Tzanakaki [and others] -- iCore: A Cognitive Management Framework for the Internet of Things / Raffaele Giaffreda -- IoT6 Project in a Nutshell / Sébastien Ziegler, Cedric Crettaz -- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand / Almerima Jamakovic, Thomas Michael Bohnert, Georgios Karagiannis -- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet / Burkhard Stiller -- The SmartSantander Projec / José M. Hernández-Muñoz, Luis Muñoz -- UniverSelf, Realizing Autonomics for Future Networks / Laurent Ciavaglia.
Record Nr. NYU-004637180
[Future Internet Assembly (Conference) (10th : 2013 : Dublin, Ireland)]  
Materiale a stampa
Lo trovi qui: New York University
Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday / David Naccache (ed.).
Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday / David Naccache (ed.).
Estensione 1 online resource (xiii, 502 pages) : illustrations, color portraits.
Disciplina 005.8/2
Accesso persona Naccache, David, 1967-
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Systems and Data Security
Discrete Mathematics in Computer Science
ISBN 9783642283680
3642283683
3642283675
9783642283673
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The hidden side of Jean-Jacques Quisquater / Michaël Quisquater -- On Quisquater's multiplication algorithm / Marc Joye -- A brief survey of research jointly with Jean-Jacques Cascaded / Yvo Desmedt -- DES collisions revisited / Sebastiaan Indesteege and Bart Preneel -- Line directed hypergraphs / Jean-Claude Bermond, Fahir Ergincan, and Michel Syska -- Random permutation statistics and an improved slide-determine attack on KeeLoq / Nicolas T. Courtois and Gregory V. Bard -- Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas T. Courtois -- Increasing block sizes using Feistel networks: the example of the AES / Jacques Patarin, Benjamin Gittins, and Joana Treger -- Authenticated-encryption with padding: a formal security treatment / Kenneth G. Paterson and Gaven J. Watson -- Traceable signature with stepping capabilities / Olivier Blazy and David Pointcheval -- Deniable RSA signature: the raise and fall of Ali Baba / Serge Vaudenay -- Autotomic signatures / David Naccache and David Pointecheval -- Fully forward-secure group signatures / Benoît Libert and Moti Yung -- Public key encryption for the forgetful / Pu wen Wei, Yulang Zheng, and Xiaoyn Wang -- Supplemental access control (PACE v2): security analysis of PACE integrated mapping / Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier -- Secret key leakage from public key perturbation of DLP-based cryptosystems / Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin -- EM probes characterisation for security analysis / Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria -- An updated survey on secure ECC implementations: attacks, countermeasures and cost / Junfeng Fan and Ingrid Verbauwhede -- Masking with randomized look up tables: towards preventing side-channel attacks of all orders / Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon -- Efficient implementation of true random number generator based on SRAM PUFs / Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh -- Operand folding hardware multipliers / Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg -- SIMPL systems as a keyless cryptographic and security primitive / Ulrich Rührmair -- Cryptography with asynchronous logic automata / Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld -- A qualitative security analysis of a new class of 3-D integrated crypto co-processors / Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood -- The challenges raised by the privacy-preserving identity card / Yves Deswarte and Sébastien Gambs -- The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things / Guillaume Bouffard and Jean-Louis Lanet -- Localization privacy / Mike Burmester -- Dynamic secure cloud storage with provenance / Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng -- Efficient encryption and storage of close distance messages with applications to cloud storage / George Davida and Yair Frankel -- A Nagell algorithm in any characteristic / Mehdi Tibouchi -- How to read a signature? / Vanessa Gratzer and David Naccache -- Fooling a liveness-detecting capacitive fingerprint scanner / Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish -- Physical simulation of inarticulate robots / Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin.
Record Nr. NYU-004621863
Materiale a stampa
Lo trovi qui: New York University
Mathematical and engineering methods in computer science : 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised selected papers / edited by Antonín Kučera [and others]
Mathematical and engineering methods in computer science : 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised selected papers / edited by Antonín Kučera [and others]
Creatore [MEMICS (Workshop) (8th : 2012 : Znojmo, Czech Republic)]
Estensione 1 online resource.
Disciplina 004
Accesso persona Kučera, Antonín, 1971-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 9783642360466
3642360467
9783642360442
3642360440
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto BDD-Based Software Model Checking with CPAchecker / Dirk Beyer, Andreas Stahlbauer -- Security for Cyber-Physical Systems / Dieter Gollmann -- Quantum Secret Sharing with Graph States / Sylvain Gravier, Jérôme Javelle -- Testing Embedded Memories: A Survey / Said Hamdioui -- Quicksort and Large Deviations / Colin McDiarmid -- Recent Results on Howard's Algorithm / Peter Bro Miltersen -- Advantage of Quantum Strategies in Random Symmetric XOR Games / Andris Ambainis, Jānis Iraids -- Verification of Liveness Properties on Closed Timed-Arc Petri Nets / Mathias Andersen, Heine Gatten Larsen -- Fast Algorithm for Rank-Width / Martin Beyß -- Determinacy in Stochastic Games with Unbounded Payoff Functions / Tomáš Brázdil, Antonín Kučera, Petr Novotný -- Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games / Krishnendu Chatterjee, Rasmus Ibsen-Jensen -- Controllable-Choice Message Sequence Graphs / Martin Chmelík, Vojtěch Řehák -- A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks / Filip Jurnečka, Vashek Matyáš -- Parameterized Algorithms for Stochastic Steiner Tree Problems / Denis Kurz, Petra Mutzel, Bernd Zey -- Action Investment Energy Games / Kim G. Larsen, Simon Laursen, Jiří Srba -- Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme / Michal Mikuš, Marek Sýs -- Grover's Algorithm with Errors / Andris Ambainis, Artūrs Bačkurs -- On WQO Property for Different Quasi Orderings of the Set of Permutations / Sandra Ose, Juris Viksna -- Towards User-Aware Multi-touch Interaction Layer for Group Collaborative Systems / Vít Rusňák, Lukáš Ručka, Petr Holub.
Record Nr. NYU-004626986
[MEMICS (Workshop) (8th : 2012 : Znojmo, Czech Republic)]  
Materiale a stampa
Lo trovi qui: New York University
Post-quantum cryptography [electronic resource] : 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings / Philippe Gaborit (eds.).
Post-quantum cryptography [electronic resource] : 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings / Philippe Gaborit (eds.).
Creatore [PQCrypto (Conference) (5th : 2013 : Limoges, France)]
Estensione 1 online resource.
Disciplina 005.8/2
Accesso persona Gaborit, Philippe
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Quantum Computing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 9783642386169 (electronic bk.)
3642386164 (electronic bk.)
9783642386152
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960107393503681
[PQCrypto (Conference) (5th : 2013 : Limoges, France)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Data privacy management and autonomous spontaneus [sic] security [electronic resource] : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers / Joaquin Garcia-Alfaro...[et al.] (eds.).
Data privacy management and autonomous spontaneus [sic] security [electronic resource] : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers / Joaquin Garcia-Alfaro...[et al.] (eds.).
Creatore [DPM (Workshop) (6th : 2011 : Louvain, Belgium)]
Estensione 1 online resource (xv, 318 p.)
Disciplina 005.8
Accesso persona Garcia-Alfaro, Joaquin
Accesso convegno SETOP (Workshop) (4th : 2011 : Louvain, Belgium)
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Operating systems (Computers)
Data encryption (Computer science)
Information Systems
Management of Computing and Information Systems
Computers and Society
Operating Systems
ISBN 9783642288791 (electronic bk.)
3642288790 (electronic bk.)
9783642288784
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros -- Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme / Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg.
Record Nr. UPENN-9960093073503681
[DPM (Workshop) (6th : 2011 : Louvain, Belgium)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Software cost estimation, benchmarking, and risk assessment [electronic resource] : the software decision-makers' guide to predictable software development / Adam Trendowicz
Software cost estimation, benchmarking, and risk assessment [electronic resource] : the software decision-makers' guide to predictable software development / Adam Trendowicz
Creatore [Trendowicz, Adam]
Estensione 1 online resource.
Disciplina 005.1068
Genere/Forma Electronic books
Soggetto non controllato Computer science
Software engineering
Information Systems
Management of Computing and Information Systems
Project Management
ISBN 9783642307645 (electronic bk.)
3642307647 (electronic bk.)
9783642307638
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Predictable Software Development -- Why Software Effort Estimation? -- What Is a Good Estimate? -- Get Access -- Why the CoBRA Method? -- The CoBRA Method -- Principles of the CoBRA Method -- Model Development and Validation -- Model Application -- Usage Scenarios of a CoBRA Model -- Industrial Applications -- Software Design and Management, Germany -- Allette Systems, Australia -- Oki Electric, Japan -- Siemens Information Systems, India -- Japan Manned Space Systems, Japan.
Record Nr. UCHICAGO-9849556
[Trendowicz, Adam]  
Materiale a stampa
Lo trovi qui: University of Chicago
Fundamental approaches to software engineering : 15th International Conference, FASE 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24-April 1, 2012. Proceedings / Juan de Lara, Andrea Zisman (eds.).
Fundamental approaches to software engineering : 15th International Conference, FASE 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24-April 1, 2012. Proceedings / Juan de Lara, Andrea Zisman (eds.).
Creatore [FASE (Conference) (15th : 2012 : Tallinn, Estonia)]
Estensione 1 online resource (xvi, 518 pages).
Disciplina 005.1
Accesso persona Lara, Juan de (Lara Jaramillo)
Zisman, Andrea
Accesso convegno ETAPS (Conference) (2012 : Tallinn, Estonia)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Software engineering
Logic design
Information Systems
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
Programming Techniques
ISBN 9783642288722
3642288723
9783642288715
3642288715
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Process Discovery and Conformance Checking / Wil M.P. van der Aalst -- Model-Driven Techniques to Enhance Architectural Languages Interoperability / Davide Di Ruscio, Ivano Malavolta, Henry Muccini, Patrizio Pelliccione and Alfonso Pierantonio -- Moving from Specifications to Contracts in Component-Based Design / Sebastian S. Bauer, Alexandre David, Rolf Hennicker, Kim Guldstrand Larsen and Axel Legay, et al. -- The SynchAADL2Maude Tool / Kyungmin Bae, Peter Csaba Ölveczky, José Meseguer and Abdullah Al-Nayeem -- Consistency of Service Composition / José Luiz Fiadeiro and Antónia Lopes -- Stable Availability under Denial of Service Attacks through Formal Patterns / Jonas Eckhardt, Tobias Mühlbauer, Musab AlTurki, José Meseguer and Martin Wirsing -- Loose Programming with PROPHETS / Stefan Naujokat, Anna-Lena Lamprecht and Bernhard Steffen -- Schedule Insensitivity Reduction / Vineet Kahlon -- Adaptive Task Automata: A Framework for Verifying Adaptive Embedded Systems / Leo Hatvani, Paul Pettersson and Cristina Seceleanu -- Verified Resource Guarantees for Heap Manipulating Programs / Elvira Albert, Richard Bubel, Samir Genaim, Reiner Hähnle and Guillermo Román-Díez -- An Operational Decision Support Framework for Monitoring Business Constraints / Fabrizio Maria Maggi, Marco Montali and Wil M.P. van der Aalst.
Intermodeling, Queries, and Kleisli Categories / Zinovy Diskin, Tom Maibaum and Krzysztof Czarnecki -- Concurrent Model Synchronization with Conflict Resolution Based on Triple Graph Grammars / Frank Hermann, Hartmut Ehrig, Claudia Ermel and Fernando Orejas -- Recursive Checkonly QVT-R Transformations with General when and where Clauses via the Modal Mu Calculus / Julian Bradfield and Perdita Stevens -- Graph Transforming Java Data / Maarten de Mol, Arend Rensink and James J. Hunt -- Language Independent Refinement Using Partial Modeling / Rick Salay, Michalis Famelis and Marsha Chechik -- A Conceptual Framework for Adaptation / Roberto Bruni, Andrea Corradini, Fabio Gadducci, Alberto Lluch Lafuente and Andrea Vandin -- Applying Design by Contract to Feature-Oriented Programming / Thomas Thüm, Ina Schaefer, Martin Kuhlemann, Sven Apel and Gunter Saake -- Integration Testing of Software Product Lines Using Compositional Symbolic Execution / Jiangfan Shi, Myra B. Cohen and Matthew B. Dwyer -- Combining Related Products into Product Lines / Julia Rubin and Marsha Chechik -- Tracing Your Maintenance Work -- A Cross-Project Validation of an Automated Classification Dictionary for Commit Messages / Andreas Mauczka, Markus Huber, Christian Schanes, Wolfgang Schramm and Mario Bernhart, et al. -- Cohesive and Isolated Development with Branches / Earl T. Barr, Christian Bird, Peter C. Rigby, Abram Hindle and Daniel M. German, et al.
Making Software Integration Really Continuous / Mário Luís Guimarães and António Rito Silva -- Extracting Widget Descriptions from GUIs / Giovanni Becce, Leonardo Mariani, Oliviero Riganelli and Mauro Santoro -- Language-Theoretic Abstraction Refinement / Zhenyue Long, Georgel Calin, Rupak Majumdar and Roland Meyer -- Learning from Vacuously Satisfiable Scenario-Based Specifications / Dalal Alrajeh, Jeff Kramer, Alessandra Russo and Sebastian Uchitel -- Explanations for Regular Expressions / Martin Erwig and Rahul Gopinath -- On the Danger of Coverage Directed Test Case Generation / Matt Staats, Gregory Gay, Michael Whalen and Mats Heimdahl -- Reduction of Test Suites Using Mutation / Macario Polo Usaola, Pedro Reales Mateo and Beatriz Pérez Lamancha -- Model-Based Filtering of Combinatorial Test Suites / Taha Triki, Yves Ledru, Lydie du Bousquet, Frédéric Dadeau and Julien Botella -- A New Design Defects Classification: Marrying Detection and Correction / Rim Mahouachi, Marouane Kessentini and Khaled Ghedira -- Fine Slicing / Theory and Applications for Computation Extraction / Aharon Abadi, Ran Ettinger and Yishai A. Feldman -- System Dependence Graphs in Sequential Erlang / Josep Silva, Salvador Tamarit and César Tomás -- A Domain-Specific Language for Scripting Refactorings in Erlang / Huiqing Li and Simon Thompson.
Record Nr. NYU-005713373
[FASE (Conference) (15th : 2012 : Tallinn, Estonia)]  
Materiale a stampa
Lo trovi qui: New York University
Principles of security and trust : first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings / Pierpaolo Degano, Joshua D. Guttman (eds.).
Principles of security and trust : first international conference, POST 2012, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings / Pierpaolo Degano, Joshua D. Guttman (eds.).
Creatore [POST 2012 (2012 : Tallinn, Estonia)]
Estensione 1 online resource (xiv, 429 pages).
Disciplina 005.8
Accesso persona Degano, Pierpaolo, 1950-
Guttman, Joshua D.
Accesso convegno ETAPS (Conference) (2012 : Tallinn, Estonia)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 9783642286414
3642286410
3642286402
9783642286407
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential Privacy and the Power of (Formalizing) Negative Thinking (Extended Abstract) / Cynthia Dwork -- Security Protocol Verification: Symbolic and Computational Models / Bruno Blanchet -- Analysing Routing Protocols: Four Nodes Topologies Are Sufficient / Véronique Cortier, Jan Degrieck and Stéphanie Delaune -- Parametric Verification of Address Space Separation / Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune and Amit Vasudevan -- Verification of Security Protocols with Lists: From Length One to Unbounded Length / Miriam Paiola and Bruno Blanchet -- Privacy Supporting Cloud Computing: ConfiChair, a Case Study / Myrto Arapinis, Sergiu Bursuc and Mark Ryan -- A Formal Analysis of the Norwegian E-voting Protocol / Véronique Cortier and Cyrille Wiedling -- Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication / David Basin, Cas Cremers and Simon Meier -- Security Proof with Dishonest Keys / Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri -- Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity / Myrto Arapinis, Sergiu Bursuc and Mark D. Ryan -- Towards Unconditional Soundness: Computationally Complete Symbolic Attacker / Gergei Bana and Hubert Comon-Lundh -- Verified Indifferentiable Hashing into Elliptic Curves / Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo and Santiago Zanella Béguelin -- Provable De-anonymization of Large Datasets with Sparse Dimensions / Anupam Datta, Divya Sharma and Arunesh Sinha -- Revisiting Botnet Models and Their Implications for Takedown Strategies / Ting-Fang Yen and Michael K. Reiter -- A Game-Theoretic Analysis of Cooperation in Anonymity Networks / Mu Yang, Vladimiro Sassone and Sardaouna Hamadou -- Deciding Selective Declassification of Petri Nets / Eike Best and Philippe Darondeau -- Enforceable Security Policies Revisited / David Basin, Vincent Jugé, Felix Klaedtke and Eugen Zălinescu -- Towards Incrementalization of Holistic Hyperproperties / Dimiter Milushev and Dave Clarke -- Type-Based Analysis of PKCS#11 Key Management / Matteo Centenaro, Riccardo Focardi and Flaminia L. Luccio -- A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow / Torben Amtoft, Josiah Dodds, Zhi Zhang, Andrew Appel and Lennart Beringer, et al. -- PTaCL: A Language for Attribute-Based Access Control in Open Systems / Jason Crampton and Charles Morisset -- A Core Calculus for Provenance / Umut A. Acar, Amal Ahmed, James Cheney and Roly Perera.
Record Nr. NYU-004374691
[POST 2012 (2012 : Tallinn, Estonia)]  
Materiale a stampa
Lo trovi qui: New York University