0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Secure Data Management - 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings (Paperback, Edition.): Willem... Secure Data Management - 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings (Paperback, Edition.)
Willem Jonker, Milan Petkovic
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains an important area of research especially due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based services, and health-related services. Con?dentiality is the main driving force behind the - search that covers topics such as privacy enhancing technologies, access control, and search in encrypted data. We received 20 submissions from which the program committee selected 10 papers to be presented at the workshop and included in the proceedings (50% acceptancerate). In addition, we areproud that Elisa Bertino accepted our in- tation to give a keynote for which she selected the topic of data trustworthiness. We hope the papers collected in this volume will stimulate your research in this area. The regular papers in the proceeding have been grouped into two sections. The?rstsectionfocusesonprivacy.Thepapersinthissectionpresentabalanced mix of theoretical work on anonymity and application-oriented work. Thesecondsectionfocusesondatasecurityinopenenvironments.Thepapers address issues related to the management of con?dential data that is stored in or released to open environments, such as, for example, in cloud computing. We wish to thank all the authors of submitted papers for their high-quality submissions. We would also like to thank the program committee members as well as additional referees for doing an excellent review job. Finally, let us - knowledge the work of Luan Ibraimi, who helped in the technical preparation of the proceedings.

Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.):... Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.)
Willem Jonker, Milan Petkovic
R1,972 Discovery Miles 19 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.

Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.):... Secure Data Managment - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings (Paperback, 2011 ed.)
Willem Jonker, Milan Petkovic
R1,902 Discovery Miles 19 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.

Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings (Paperback, 2012 ed.):... Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings (Paperback, 2012 ed.)
Willem Jonker, Milan Petkovic
R1,990 Discovery Miles 19 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.

Content-Based Video Retrieval - A Database Perspective (Paperback, 1st ed. Softcover of orig. ed. 2003): Milan Petkovic, Willem... Content-Based Video Retrieval - A Database Perspective (Paperback, 1st ed. Softcover of orig. ed. 2003)
Milan Petkovic, Willem Jonker
R2,973 Discovery Miles 29 730 Ships in 10 - 15 working days

The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In this book, Dr. Milan Petkovi6 and Prof. Dr. Willem Jonker have addressed this issue by developing and describing several innovative techniques to bridge the semantic gap. The main contribution of their research, which is the core of the book, is the development of three techniques for bridging the semantic gap: (1) a technique that uses the spatio-temporal extension of the Cobra framework, (2) a technique based on hidden Markov models, and (3) a technique based on Bayesian belief networks. To evaluate performance of these techniques, the authors have conducted a number of experiments using real video data. The book also discusses domains solutions versus general solution of the problem. Petkovi6 and Jonker proposed a solution that allows a system to be applied in multiple domains with minimal adjustments. They also designed and described a prototype video database management system, which is based on techniques they proposed in the book.

Security, Privacy, and Trust in Modern Data Management (Paperback, Softcover reprint of hardcover 1st ed. 2007): Milan... Security, Privacy, and Trust in Modern Data Management (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Milan Petkovic, Willem Jonker
R3,530 Discovery Miles 35 300 Ships in 10 - 15 working days

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to attacks and unauthorized data access.

In the context of this threat, this book provides a comprehensive guide to security and privacy and trust in data management.

Secure Data Management - 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings (Paperback, 2009 ed.): Willem... Secure Data Management - 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings (Paperback, 2009 ed.)
Willem Jonker, Milan Petkovic
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere,itbecomesmucheasiertoget unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The interesting pr- lems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptogra- ically enforced access control and encrypted databases. This year, the call for papers attracted 24 papers both from universities and industry. For presentation at the workshop,the ProgramCommittee selected 10 full papers (41% acceptance rate). These papers are collected in this volume, which we hope will serve as a useful research and reference material. The papers in the proceeding are grouped into three sections. The ?rst s- tion focuses on database security which remains an important research area. The papers in this section address several interesting topics including query optimization in encrypted databases, database provenance, database intrusion detection, and con?dence policy compliant query evaluation. The second section changes the focal point to the topic of access control. The papers in this s- tion deal with provenance access control, access control model for collaborative editors, self-modifying access control policies, and enforcing access control on XML documents. The third section focuses on privacy protection addressing the privacy issues around location-based services and anonymity/diversity for the micro-data release problem.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007... Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007 ed.)
Willem Jonker, Milan Petkovic
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007.

The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.

Security, Privacy, and Trust in Modern Data Management (Hardcover, 2007 ed.): Milan Petkovic, Willem Jonker Security, Privacy, and Trust in Modern Data Management (Hardcover, 2007 ed.)
Milan Petkovic, Willem Jonker
R4,835 Discovery Miles 48 350 Ships in 10 - 15 working days

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to attacks and unauthorized data access.

In the context of this threat, this book provides a comprehensive guide to security and privacy and trust in data management.

Secure Data Management - Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings (Paperback, 2006 ed.):... Secure Data Management - Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings (Paperback, 2006 ed.)
Willem Jonker, Milan Petkovic
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third VLDB 2006 International Workshop on Secure Data Management, SDM 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006.

The 13 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on privacy protection, privacy preserving data management, access control, and database security.

Secure Data Management - Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings... Secure Data Management - Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings (Paperback, 2005 ed.)
Willem Jonker, Milan Petkovic
R1,634 Discovery Miles 16 340 Ships in 10 - 15 working days

Althoughcryptographyandsecuritytechniqueshavebeenaroundfor quitesome time, emerging technologies such as ubiquitous computing and ambient intel- gence that exploit increasingly interconnected networks, mobility and pers- alization put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it - comes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. Therefore, researchin the area of secure data management is of growing importance, attracting the attention of both the data management and security researchcommunities.Theinterestingproblemsrangefromtraditionalones, such as access control (with all variations, like dynamic, context-aware, role-based), database security (e.g., e?cient database encryption schemes, search over - crypted data, etc.), and privacy-preserving data mining to controlled sharing of data. In addition to the aforementioned subject, this year we also called for - pers devoted to secure data management in healthcare as a domain where data security and privacy issues are traditionally important. The call for papers - tracted 38 papers both from universities and industry. The ProgramCommittee selected 16 research papers for presentation at the workshop. These papers are also collected in this volume which we hope will serve you as a useful research and reference material.

Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.):... Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.)
Willem Jonker, Milan Petkovic
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people's privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope, willserveasavaluableresearchandreferencebookinyourprofessional life.

Content-Based Video Retrieval - A Database Perspective (Hardcover, 2004 ed.): Milan Petkovic, Willem Jonker Content-Based Video Retrieval - A Database Perspective (Hardcover, 2004 ed.)
Milan Petkovic, Willem Jonker
R3,058 Discovery Miles 30 580 Ships in 10 - 15 working days

Recent advances in computing, communication, and data storage have led to an increasing number of large digital libraries publicly available on the Internet. In addition to alphanumeric data, other modalities, including video play an important role in these libraries. Ordinary techniques will not retrieve required information from the enormous mass of data stored in digital video libraries. Instead of words, a video retrieval system deals with collections of video records. Therefore, the system is confronted with the problem of video understanding. The system gathers key information from a video in order to allow users to query semantics instead of raw video data or video features. Users expect tools that automatically understand and manipulate the video content in the same structured way as a traditional database manages numeric and textual data. Consequently, content-based search and retrieval of video data becomes a challenging and important problem.
This book focuses particularly on content-based video retrieval. After addressing basic concepts and techniques in the field, Content-Based Video Retrieval: A Database Perspective concentrates on the semantic gap problem, i.e., the problem of inferring semantics from raw video data, as the main problem of content-based video retrieval. This book identifies and proposes the integrated use of three different techniques to bridge the semantic gap, namely, spatio-temporal formalization methods, hidden Markov models, and dynamic Bayesian networks. As the problem is approached from a database perspective, the emphasis evolves from a database management system into a video database management system. This system allows a user to retrievethe desired video sequence among voluminous amounts of video data in an efficient and semantically meaningful way. This book also presents a modeling framework and a prototype of a content-based video management system that integrates the three methods and provides efficient, flexible, and scalable content-based video retrieval. The proposed approach is validated in the domain of sport videos for which some experimental results are presented.
Content-Based Video Retrieval: A Database Perspective is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and electrical engineering.

Data Science for Healthcare - Methodologies and Applications (Hardcover, 1st ed. 2019): Sergio Consoli, Diego Reforgiato... Data Science for Healthcare - Methodologies and Applications (Hardcover, 1st ed. 2019)
Sergio Consoli, Diego Reforgiato Recupero, Milan Petkovic
R4,544 Discovery Miles 45 440 Ships in 10 - 15 working days

This book seeks to promote the exploitation of data science in healthcare systems. The focus is on advancing the automated analytical methods used to extract new knowledge from data for healthcare applications. To do so, the book draws on several interrelated disciplines, including machine learning, big data analytics, statistics, pattern recognition, computer vision, and Semantic Web technologies, and focuses on their direct application to healthcare. Building on three tutorial-like chapters on data science in healthcare, the following eleven chapters highlight success stories on the application of data science in healthcare, where data science and artificial intelligence technologies have proven to be very promising. This book is primarily intended for data scientists involved in the healthcare or medical sector. By reading this book, they will gain essential insights into the modern data science technologies needed to advance innovation for both healthcare businesses and patients. A basic grasp of data science is recommended in order to fully benefit from this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shield Auto Cleaning Kit
R65 Discovery Miles 650
Carbon City Zero - A Collaborative Board…
Rami Niemi Game R656 Discovery Miles 6 560
Bestway Spider-Man Beach Ball (51cm)
R50 R45 Discovery Miles 450
Shield Air Conditioner Treatment Fogger…
R39 R35 Discovery Miles 350
Management And Cost Accounting
Colin Drury, Mike Tayles Paperback R1,304 R1,176 Discovery Miles 11 760
Cricut Joy Machine
 (6)
R3,429 Discovery Miles 34 290
Complete Snack-A-Chew Iced Dog Biscuits…
R110 R104 Discovery Miles 1 040
Metalix Square Non Stick Pan
R159 R49 Discovery Miles 490
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Goyeah Dog Snuffle Feeding Mat
R899 R729 Discovery Miles 7 290

 

Partners