Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 22 of 22 matches in All Departments
In this book, the authors first address the research issues by providing a motivating scenario, followed by the exploration of the principles and techniques of the challenging topics. Then they solve the raised research issues by developing a series of methodologies. More specifically, the authors study the query optimization and tackle the query performance prediction for knowledge retrieval. They also handle unstructured data processing, data clustering for knowledge extraction. To optimize the queries issued through interfaces against knowledge bases, the authors propose a cache-based optimization layer between consumers and the querying interface to facilitate the querying and solve the latency issue. The cache depends on a novel learning method that considers the querying patterns from individual's historical queries without having knowledge of the backing systems of the knowledge base. To predict the query performance for appropriate query scheduling, the authors examine the queries' structural and syntactical features and apply multiple widely adopted prediction models. Their feature modelling approach eschews the knowledge requirement on both the querying languages and system. To extract knowledge from unstructured Web sources, the authors examine two kinds of Web sources containing unstructured data: the source code from Web repositories and the posts in programming question-answering communities. They use natural language processing techniques to pre-process the source codes and obtain the natural language elements. Then they apply traditional knowledge extraction techniques to extract knowledge. For the data from programming question-answering communities, the authors make the attempt towards building programming knowledge base by starting with paraphrase identification problems and develop novel features to accurately identify duplicate posts. For domain specific knowledge extraction, the authors propose to use a clustering technique to separate knowledge into different groups. They focus on developing a new clustering algorithm that uses manifold constraints in the optimization task and achieves fast and accurate performance. For each model and approach presented in this dissertation, the authors have conducted extensive experiments to evaluate it using either public dataset or synthetic data they generated.
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. This book is the second installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research and deployments. Advanced Web Services specifically focuses on advanced topics of Web services and SOC and covers topics including Web services transactions, security and trust, Web service management, real-world case studies, and novel perspectives and future directions. The editors present foundational topics in the first book of the collection, Web Services Foundations (Springer, 2013). Together, both books comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. "Web Services Foundations" is the first installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research. This book specifically focuses on the foundations of Web services and SOC and covers - among others - Web service composition, non-functional aspects of Web services, Web service selection and recommendation, and assisted Web service composition. The editors collect advanced topics in the second book of the collection, "Advanced Web Services," (Springer, 2013). Both books together comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data management, RFID data processing and integration, Real-Time Locating Systems (RTLS) and sensors. The book considers the challenges of and solutions to building and exploiting global networks to guarantee one of the most important business drivers for modern RFID technology: traceability. The authors have drawn together RFID applications from the retail supply chain, asset and product lifecycle management, anti-counterfeiting and cold chain management to explore how global traceability networks can be created using RFID and sensor technologies. They present insights from world's leading research laboratories.
With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services. Such a Web will support an ultimately interactive environment where everyday physical objects such as buildings, sidewalks, and commodities become recognizable, addressable, and even controllable via a mostly ubiquitous Web. This integration of the physical and virtual worlds will fundamentally impact the way we live and in doing so afford tremendous new business opportunities with great human benefit, such as support services to keep the elderly independent, and intelligent traffic management that will cut wasted hours from every day. More efficient supply chains, improved environmental monitoring, better access to health services ... the list is endless. Enabling Context-Aware Web Services: Methods, Architectures, and Technologies compiles the newest developments and advances driving this new age forward. With contributions from leading researchers across the world this pioneering work bridges the gap between context-awareness and Web services. A comprehensive presentation of what's already accomplished and what is possible, the chapters of this book are systematically organized into three major sections: Methods focuses on the principle of context awareness in Web services and various ways to model those services at the specification level. Architectures details the infrastructures, frameworks, and standards needed to build context-aware Web services. Technologies presents a cornucopia of techniques adapted from once isolated research areas including semantic Web, database, and artificial intelligence development, as well as formal methods being employed to improve the development of context-aware Web services. Researchers, engineers, entrepreneurs, and educators across any number of fields will find new ideas worth considering, jumping-off points for developing improved software and applications, and seeds for business ventures that efficiently deliver needed products, information, or services. The possibilities are as limitless as we dare to imagine.
In this book, the authors first address the research issues by providing a motivating scenario, followed by the exploration of the principles and techniques of the challenging topics. Then they solve the raised research issues by developing a series of methodologies. More specifically, the authors study the query optimization and tackle the query performance prediction for knowledge retrieval. They also handle unstructured data processing, data clustering for knowledge extraction. To optimize the queries issued through interfaces against knowledge bases, the authors propose a cache-based optimization layer between consumers and the querying interface to facilitate the querying and solve the latency issue. The cache depends on a novel learning method that considers the querying patterns from individual's historical queries without having knowledge of the backing systems of the knowledge base. To predict the query performance for appropriate query scheduling, the authors examine the queries' structural and syntactical features and apply multiple widely adopted prediction models. Their feature modelling approach eschews the knowledge requirement on both the querying languages and system. To extract knowledge from unstructured Web sources, the authors examine two kinds of Web sources containing unstructured data: the source code from Web repositories and the posts in programming question-answering communities. They use natural language processing techniques to pre-process the source codes and obtain the natural language elements. Then they apply traditional knowledge extraction techniques to extract knowledge. For the data from programming question-answering communities, the authors make the attempt towards building programming knowledge base by starting with paraphrase identification problems and develop novel features to accurately identify duplicate posts. For domain specific knowledge extraction, the authors propose to use a clustering technique to separate knowledge into different groups. They focus on developing a new clustering algorithm that uses manifold constraints in the optimization task and achieves fast and accurate performance. For each model and approach presented in this dissertation, the authors have conducted extensive experiments to evaluate it using either public dataset or synthetic data they generated.
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. Web Services Foundations is the first installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research. This book specifically focuses on the foundations of Web services and SOC and covers - among others - Web service composition, non-functional aspects of Web services, Web service selection and recommendation, and assisted Web service composition. The editors collect advanced topics in the second book of the collection, Advanced Web Services, (Springer, 2013). Both books together comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.
Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data management, RFID data processing and integration, Real-Time Locating Systems (RTLS) and sensors. The book considers the challenges of and solutions to building and exploiting global networks to guarantee one of the most important business drivers for modern RFID technology: traceability. The authors have drawn together RFID applications from the retail supply chain, asset and product lifecycle management, anti-counterfeiting and cold chain management to explore how global traceability networks can be created using RFID and sensor technologies. They present insights from world's leading research laboratories.
This book constitutes the thoroughly refereed post-proceedings of the seven workshops and the PhD Symposium that were co-located with the 13th International Conference on Web Engineering, ICWE 2013, held in Aalborg, Denmark, in July 2013. The papers cover research in topics such as social data management; cloud service engineering; agile web development and quality management in web engineering.
This book constitutes the revised selected papers of the combined workshops on Web Information Systems Engineering, WISE 2011 and WISE 2012, held in Sydney, Australia, in October 2011 and in Paphos, Cyprus, in November 2012. The seven workshops of WISE 2011-2012 have reported the recent developments and advances in the contemporary topics in the related fields of: Advanced Reasoning Technology for e-Science (ART 2012), Cloud-Enabled Business Process Management (CeBPM 2012), Engineering in the Semantic Enterprise (ESE 2012), Social Web Analysis for Trend Detection (SoWeTrend 2012), Big Data and Cloud (BDC 2012), Personalization in Cloud and Service Computing (PC-S 2011), and User-Focused Service Engineering, Consumption and Aggregation (USECA 2011).
This book constitutes the thoroughly refereed proceedings of the 2012 ICSOC Workshops consisting of 6 scientific satellite events, organized in 3 main tracks including workshop track (ASC, DISA. PAASC, SCEB, SeMaPS and WESOA 2012), PhD symposium track, demonstration track; held in conjunction with the 10th International Conference on Service-Oriented Computing (ICSOC), in Shanghai, China, November 2012. The 53 revised papers presents a wide range of topics that fall into the general area of service computing such as business process management, distributed systems, computer networks, wireless and mobile computing, grid computing, networking, service science, management science, and software engineering.
This book constitutes the refereed proceedings of the 14th Asia-Pacific Conference APWeb 2012 held in Kunming, China, in April 2012. The 39 full papers presented together with 34 short papers, 2 keynote talks, and 5 demo papers were carefully reviewed and selected from 167 initial submissions. The papers cover contemporary topics in the fields of Web management and World Wide Web related research and applications, such as advanced application of databases, cloud computing, content management, data mining and knowledge discovery, distributed and parallel processing, grid computing, internet of things, semantic Web and Web ontology, security, privacy and trust, sensor networks, service-oriented computing, Web community analysis, Web mining and social networks.
This book constitutes the joint refereed proceedings of the three workshops held in conjunction with the 6th International Conference on Web Information Systems Engineering, WISE 2005, in New York, NY, USA, in November 2005. A total of 47 papers were submitted to the three workshops, and 28 revised full papers were carefully selected for presentation. The workshop on Web Information Systems Quality (WISQ 2005) - discussing and disseminating research on the quality of WIS and Web services from a holistic point of view - included 7 papers out of 12 submissions. The workshop on Web-based Learning (WBL 2005) accounted for 10 papers from 14 papers submitted - organized in topical sections on tools, models, and innovative applications. The workshop on Scalable Semantic Web Knowledge Base Systems (SSWS 2005) included 11 presentations selected from 21 submissions. Topics addressed are scalable repository and reasoning services, practical Semantic Web applications, query handling and optimization techniques.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
This book constitutes revised selected papers from the International Workshop on Data Quality and Trust in Big Data, QUAT 2018, which was held in conjunction with the International Conference on Web Information Systems Engineering, WISE 2018, in Dubai, UAE, in November 2018. The 9 papers presented in this volume were carefully reviewed and selected from 15 submissions. They deal with novel ideas and solutions related to the problems of exploring, assessing, monitoring, improving, and maintaining the quality of data and trust for Big Data.
This book constitutes the proceedings of the 12th International Conference on Advanced Data Mining and Applications, ADMA 2016, held in Gold Coast, Australia, in December 2016. The 70 papers presented in this volume were carefully reviewed and selected from 105 submissions. The selected papers covered a wide variety of important topics in the area of data mining, including parallel and distributed data mining algorithms, mining on data streams, graph mining, spatial data mining, multimedia data mining, Web mining, the Internet of Things, health informatics, and biomedical data mining.
This book constitutes the proceedings of the 14th International Conference on Service-Oriented Computing, ICSOC 2016, held in Banff, AB, Canada, in October 2016. The 30 full papers presented together with 18 short papers and 8 industrial papers in this volume were carefully reviewed and selected from 137 submissions. The selected papers covered important topics in the area of service-oriented computing, including foundational issues on service discovery and service-systems design, business process modelling and management, economics of service-systems engineering, as well as services on the cloud, social networks, the Internet of Things (IoT), and data analytics.
This book constitutes revised papers from the eight International Workshops held at the 16th International Conference on Business Process Management, BPM 2018, in Sydney, Australia, in September 2018: BPI 2018: 14th International Workshop on Business Process Intelligence; BPMS2 2018: 11th Workshop on Social and Human Aspects of Business Process Management;- PODS4H 2018: 1st International Workshop on Process-Oriented Data Science for Healthcare; AI4BPM 2018: 1st International Workshop on Artificial Intelligence for Business Process Management; CCBPM 2018: 1st International Workshop on Emerging Computing Paradigms and Context in Business Process Management; BP-Meet-IoT / PQ 2018: Joint Business Processes Meet the Internet-of-Things and Process Querying Workshop; DeHMiMoP 2018: 1st Declarative/Decision/Hybrid Mining and Modelling for Business Processes Workshop; REBM /EdForum 2018: Joint Requirements Engineering and Business Process Management Workshop and Education Forum The 45 full papers presented in this volume were carefully reviewed and selected from 90 submissions.
With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services. Such a Web will support an ultimately interactive environment where everyday physical objects such as buildings, sidewalks, and commodities become recognizable, addressable, and even controllable via a mostly ubiquitous Web. This integration of the physical and virtual worlds will fundamentally impact the way we live and in doing so afford tremendous new business opportunities with great human benefit, such as support services to keep the elderly independent, and intelligent traffic management that will cut wasted hours from every day. More efficient supply chains, improved environmental monitoring, better access to health services the list is endless. Enabling Context-Aware Web Services: Methods, Architectures, and Technologies compiles the newest developments and advances driving this new age forward. With contributions from leading researchers across the world this pioneering work bridges the gap between context-awareness and Web services. A comprehensive presentation of what s already accomplished and what is possible, the chapters of this book are systematically organized into three major sections:
Researchers, engineers, entrepreneurs, and educators across any number of fields will find new ideas worth considering, jumping-off points for developing improved software and applications, and seeds for business ventures that efficiently deliver needed products, information, or services. The possibilities are as limitless as we dare to imagine.
|
You may like...
|