![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. The contributed papers explore technology design and use in organizations, and consider the processes that engender social exclusion along with the issues that derive from it. The conference, sponsored by the International Federation for Information Processing Working Group 8.2, was held in Limerick, Ireland, in July, 2006.
The technique of data fusion has been used extensively in information retrieval due to the complexity and diversity of tasks involved such as web and social networks, legal, enterprise, and many others. This book presents both a theoretical and empirical approach to data fusion. Several typical data fusion algorithms are discussed, analyzed and evaluated. A reader will find answers to the following questions, among others: What are the key factors that affect the performance of data fusion algorithms significantly? What conditions are favorable to data fusion algorithms? CombSum and CombMNZ, which one is better? and why? What is the rationale of using the linear combination method? How can the best fusion option be found under any given circumstances?"
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and
algorithms which are the basis for applications of artificial
intelligence environments.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic. The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing. Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation. Understand the basics of third-party risk management Conduct due diligence on third parties connected to your network Keep your data and sensitive information current and reliable Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax The time to talk cybersecurity with your data partners is now. Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.
This book includes extended versions of selected works presented at the 52nd Annual Convention of Computer Society of India (CSI 2017), held at Science City, Kolkata on 19-21 January 2018. It features a collection of chapters focusing on recent trends in computational intelligence, covering topics such as ANN, neuro-fuzzy based clustering, edge detection, data mining, mobile cloud computing, intelligent scheduling, processing and authentication. It also discusses societal applications of these methods. As such it is useful for students, researchers and industry professionals working in the area of computational intelligence.
Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.
Linking Government Data provides a practical approach to addressing common information management issues. The approaches taken are based on international standards of the World Wide Web Consortium. Linking Government Data gives both the costs and benefits of using linked data techniques with government data; describes how agencies can fulfill their missions with less cost; and recommends how intra-agency culture must change to allow public presentation of linked data. Case studies from early adopters of linked data approaches in international governments are presented in the last section of the book. Linking Government Data is designed as a professional book for those working in Semantic Web research and standards development, and for early adopters of Semantic Web standards and techniques. Enterprise architects, project managers and application developers in commercial, not-for-profit and government organizations concerned with scalability, flexibility and robustness of information management systems will also find this book valuable. Students focused on computer science and business management will also find value in this book.
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book is essential for professionals, students, and researchers interested in cloud library management and development in different types of information environments.
Motivation for the Book This book aims to describe a comprehensive methodology for service-oriented inf- mation systems planning, considered in particular, in eGovernment initiatives. The methodology is based on the research results produced by the Italian project "eG- ernment for Mediterranean Countries (eG4M)," granted by the Italian Ministry of University and Research from 2005 to 2008. The concept of service is at the center of the book. The methodology is focused on quality of services as a key factor for eGovernment initiatives. Since its grou- ing is in a project whose goal has been to develop a methodology for eGove- ment in Mediterranean countries it is called eG4M. Furthermore, eG4M aims at encompassing the relationships existing between ICT technologies and social c- texts of service provision, organizational issues, and juridical framework, looking at ICT technologies more as a means than an end. eG4M satis es a real need of constituencies and stakeholders involved in eGovernment projects, con rmed in the eG4M experimentations and in previous preliminary experiences in the Italian P- lic Administrations. A structured process is needed that provides a clear perspective on the different facets that eGovernment initiatives usually have to challenge and disciplines the complex set of decisions to be taken. The available approaches to eGovernment usually provide only one perspective to public managers and local authorities on the domain of intervention, either te- nological, organizational, legal, economic, or social.
This book includes 23 papers dealing with the impact of modern information and communication technologies that support a wide variety of communities: local communities, virtual communities, and communities of practice, such as knowledge communities and scientific communities. The volume is the result of the second multidisciplinary "Communities and Technologies Conference," a major event in this emerging research field. The various chapters discuss how communities are affected by technologies, and how understanding of the way that communities function can be used in improving information systems design. This state of the art overview will be of interest to computer and information scientists, social scientists and practitioners alike.
This book proposes a novel approach to classification, discusses its myriad advantages, and outlines how such an approach to classification can best be pursued. It encourages a collaborative effort toward the detailed development of such a classification. This book is motivated by the increased importance of interdisciplinary scholarship in the academy, and the widely perceived shortcomings of existing knowledge organization schemes in serving interdisciplinary scholarship. It is designed for scholars of classification research, knowledge organization, the digital environment, and interdisciplinarity itself. The approach recommended blends a general classification with domain-specific classification practices. The book reaches a set of very strong conclusions: -Existing classification systems serve interdisciplinary research and teaching poorly. -A novel approach to classification, grounded in the phenomena studied rather than disciplines, would serve interdisciplinary scholarship much better. It would also have advantages for disciplinary scholarship. The productivity of scholarship would thus be increased. -This novel approach is entirely feasible. Various concerns that might be raised can each be addressed. The broad outlines of what a new classification would look like are developed. -This new approach might serve as a complement to or a substitute for existing classification systems. -Domain analysis can and should be employed in the pursuit of a general classification. This will be particularly important with respect to interdisciplinary domains. -Though the impetus for this novel approach comes from interdisciplinarity, it is also better suited to the needs of the Semantic Web, and a digital environment more generally. Though the primary focus of the book is on classification systems, most chapters also address how the analysis could be extended to thesauri and ontologies. The possibility of a universal thesaurus is explored. The classification proposed has many of the advantages sought in ontologies for the Semantic Web. The book is therefore of interest to scholars working in these areas as well.
There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled DATA MINING: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification we wish to introduce some of the latest developments to a broad audience of both specialists and non-specialists in this field. "
This book addresses the complex issue of global Internet governance by focusing on its implementation in Malaysia and Singapore. The authors draw insights, identify, revisit and flesh out the discourses circulating since the 1990s and pitch them against global internet governance concerns. Internet governance, thought managed domestically/nationally, is a global issue. It is at the heart of how the internet works yet remains hidden within the 'black box' of governance language. While several scholars have entered the fray in recent years, especially in the past decade, very few of them are aware that the Malaysian and Singaporean governments have in fact been at the forefront of Internet regulatory strategies from the early 1990s. The book identifies, revisits and gives flesh to some of the discourses circulating in Southeast Asia at the time and pitches it against current governance concerns. Readers of this book will understand how and why Malaysia and Singapore are important contributors to the issue of internet governance. This knowledge will inform a depth of understanding of why China is keenly seeking to stake its demands on internet governance and sovereignty, and likely American and global responses. Readers will also appreciate how and why the regulation of the Internet has been and will remain a site of contestation and control.
The Internet of Things (IoT) is the next big challenge for the research community. The IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is considered a key part of the IoT. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects. This book presents a concrete, solid and logically ordered work on congestion control for 6LoWPAN networks as a step toward successful implementation of the IoT and supporting the IoT application requirements. The book addresses the congestion control issue in 6LoWPAN networks and presents a comprehensive literature review on congestion control for WSNs and 6LoWPAN networks. An extensive congestion analysis and assessment for 6LoWPAN networks is explored through analytical modelling, simulations and real experiments. A number of congestion control mechanisms and algorithms are proposed to mitigate and solve the congestion problem in 6LoWPAN networks by using and utilizing the non-cooperative game theory, multi-attribute decision making and network utility maximization framework. The proposed algorithms are aware of node priorities and application priorities to support the IoT application requirements and improve network performance in terms of throughput, end-to-end delay, energy consumption, number of lost packets and weighted fairness index.
The proper exploitation of Web-based technologies towards building responsive environments that motivate, engage, and inspire learners, and which are embedded in the business processes and human resources management systems of organizations, is highly critical. Accordingly, the research field of technology-enhanced learning continues to receive increasing attention. ""Solutions and Innovations in Web-Based Technologies for Augmented Learning: Improved Platforms, Tools, and Applications"" provides cutting-edge research on a series of related topics and discusses implications in the modern era's broad learning concept. Addressing diverse conceptual, social, and technical issues, this book provides professionals, researchers, and practitioners in the field with up-to-date research in developing innovative and more effective learning systems by using Web-based technologies.
The book proposes techniques, with an emphasis on the financial sector, which will make recommendation systems both accurate and explainable. The vast majority of AI models work like black box models. However, in many applications, e.g., medical diagnosis or venture capital investment recommendations, it is essential to explain the rationale behind AI systems decisions or recommendations. Therefore, the development of artificial intelligence cannot ignore the need for interpretable, transparent, and explainable models. First, the main idea of the explainable recommenders is outlined within the background of neuro-fuzzy systems. In turn, various novel recommenders are proposed, each characterized by achieving high accuracy with a reasonable number of interpretable fuzzy rules. The main part of the book is devoted to a very challenging problem of stock market recommendations. An original concept of the explainable recommender, based on patterns from previous transactions, is developed; it recommends stocks that fit the strategy of investors, and its recommendations are explainable for investment advisers.
The Handbook of Service Description introduces an in-depth overview of service description efforts. The book also highlights the recent Unified Service Description Language (USDL) in detail and discusses its methods. The Handbook of Service Description is the normative scientific reference for the upcoming standardization of the Unified Service Description Language (USDL). Complete documentation is included. The Handbook of Service Description is designed for those working in the service science industry as a reference book. Advanced-level students focused on computer science, engineering and business will also find this book a valuable asset.
This book compares four parameters of problems in arbitrary information systems: complexity of problem representation and complexity of deterministic, nondeterministic, and strongly nondeterministic decision trees for problem solving. Deterministic decision trees are widely used as classifiers, as a means of knowledge representation, and as algorithms. Nondeterministic (strongly nondeterministic) decision trees can be interpreted as systems of true decision rules that cover all objects (objects from one decision class). This book develops tools for the study of decision trees, including bounds on complexity and algorithms for construction of decision trees for decision tables with many-valued decisions. It considers two approaches to the investigation of decision trees for problems in information systems: local, when decision trees can use only attributes from the problem representation; and global, when decision trees can use arbitrary attributes from the information system. For both approaches, it describes all possible types of relationships among the four parameters considered and discusses the algorithmic problems related to decision tree optimization. The results presented are useful for researchers who apply decision trees and rules to algorithm design and to data analysis, especially those working in rough set theory, test theory and logical analysis of data. This book can also be used as the basis for graduate courses.
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today's IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.
Maintaining SQL Server 2005 high availability in a global information environment is the database administrators greatest practical challenge. Availability is as much about people and processes as it is about technology. Microsoft SQL Server 2005 High Availability covers the technology, people, processes, and real-world best practices for planning, deploying, administering, and maintaining highly available SQL Server 2005 instances. With years of experience as a database consultant and production DBA, Allan Hirt provides in-depth, detailed advice on what it takes to ensure SQL Server high availability for businesses of any size. This is not an academic text; its not based on lab experiments, but on real-world experience. This book is a dramatic update and revision of the authors previous best-seller on SQL Server 2000. It gives sound guidance to DBAs and system administrators on how to really get the job done.
User Engagement (UE) is a complex concept to investigate. The purpose of this book is not to constrain UE to one perspective, but to offer a well-rounded appreciation for UE across various domains and disciplines. The text begins with two foundational chapters that describe theoretical and methodological approaches to user engagement; the remaining contributions examine UE from different disciplinary perspectives and across a range of computer-mediated environments, including social and communications media, online search, eLearning, games, and eHealth. The book concludes by bringing together the cross-disciplinary perspectives presented in each chapter and proposing an agenda for future research in this area. The book will appeal to established and emerging academic and industry researchers looking to pursue research and its challenges. This includes scholars at all levels with an interest in user engagement with digital media, from students to experienced researchers, and professionals in the fields of computer science, web technology, information science, museum studies, learning and health sciences, human-computer interaction, information architecture and design, and creative arts.
The Handbook provides practitioners, scientists and graduate students with a good overview of basic notions, methods and techniques, as well as important issues and trends across the broad spectrum of data management. In particular, the book covers fundamental topics in the field such as distributed databases, parallel databases, advanced databases, object-oriented databases, advanced transaction management, workflow management, data warehousing, data mining, mobile computing, data integration and the Web. Summing up, the Handbook is a valuable source of information for academics and practitioners who are interested in learning the key ideas in the considered area.
This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies. |
![]() ![]() You may like...
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Database Solutions - A step by step…
Thomas Connolly, Carolyn Begg
Paperback
R2,256
Discovery Miles 22 560
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
R2,849
Discovery Miles 28 490
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,539
Discovery Miles 15 390
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
|