GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Electronic books.  (9)
  • Information networks-Congresses.
  • 2010-2014  (9)
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book covers the combination of technologies which enables the transformation of everyday objects into smart objects, creating a paradigm that connects the real world with the digital world. Discusses progress made thus far, and emerging innovations.
    Type of Medium: Online Resource
    Pages: 1 online resource (444 pages)
    Edition: 1st ed.
    ISBN: 9783642350160
    Series Statement: Studies in Computational Intelligence Series ; v.495
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Contributors -- 1 Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks -- Abstract -- 1…Introduction -- 1.1 Internet of Things Challenges -- 2…Artificial Intelligence for Intelligent Sensing -- 3…Social Networks and the Internet of Intelligent Things -- 4…Pervasive Intelligent Robots -- 4.1 IoT and Urban Technologies -- 4.2 IoT Platforms for Home Automation/Ambient Intelligence -- 4.3 Smart Devices -- 5…Intelligent Large Scale Sensing -- 5.1 People-Centric Sensing -- 5.2 Ubiquitous Sensing -- 5.3 Location-Aware Sensing -- 5.4 OpportunisticOpportunistic Sensing and Participatory Sensing -- 5.5 Contextual Sensing -- 5.6 Machine Learning for Large-Scale Sensing -- 5.7 Sensing Architectures -- 6…The Cloud and the Internet of Intelligent Things -- 6.1 Wireless Sensor Networks Backend Infrastructures -- 6.2 Wireless Sensor Networks and Health Care -- 6.3 Machine-to-Machine (M2M) CommunicationsMachine-to-Machine Communications in the Cloud -- 6.4 Cloud Robotics -- 7…Conclusions -- References -- 2 Cloud Computing: Paradigms and Technologies -- Abstract -- 1…Introduction -- 2…Anatomy of Cloud Computing -- 2.1 Definition -- 2.2 Characteristics -- 2.3 Affects -- 2.4 Architecture -- 2.5 Technologies behind Cloud Computing -- 2.6 Advantages of the Use of Cloud Technology -- 3…Classifying Clouds and Vendors -- 3.1 Deployment Models -- 3.2 Service Models -- 3.2.1 Infrastructure-as-a-Service -- 3.2.2 Platform-as-a-Service -- 3.2.3 Software-as-a-Service -- 3.2.4 Data-as-a-Service -- 3.3 Cloud Vendors -- 4…Cloud Computing Aspects -- 4.1 Cost and Pricing -- 4.2 Service Level Agreement -- 4.3 Security -- 5…Cloud Computing and Distributed Computing Paradigms -- 5.1 Utility Computing Utility Computing Versus Cloud Computing. , 5.2 Volunteer Computing Volunteer Computing Versus Cloud Computing -- 5.3 Grid Computing Grid Computing Versus Cloud Computing -- 6…The Road Ahead -- 6.1 Lessons Learned in Cloud Adoption -- 6.2 Challenges and Future Research Directions -- 7…Conclusion -- References -- 3 A Comparison of Two Different Approaches to Cloud Monitoring -- Abstract -- 1…Introduction -- 2…Monitoring IaaS Cloud!IaaS Clouds -- 3…Related Work -- 4…Cloud Experience in European Research Projects -- 4.1 VISION VISIONCloud -- 4.2 mOSAIC -- 5…Monitoring in the VISION VISIONCloud platform -- 5.1 Overall Architecture and Requirements -- 5.2 Monitoring Architecture -- 5.3 Implementation Details -- 5.4 Event and Rulemonitoring!rules Format -- 6…Cloud AgencyCloud Agency -- 6.1 Monitoring Architecture -- 6.2 MeteringCloud Agency!metering the Cloud -- 6.3 Monitoring the Cloud -- 6.4 Implementation Details -- 7…Critical Analysis -- 8…Conclusion -- Acknowledgments -- References -- 4 Intuitive User Interfaces to Help Boost Adoption of Internet-of-Things and Internet-of-Content Services for All Disaster Management -- Abstract -- 1…Introduction -- 2…The Technology Supply Quest -- 3…Accessibility Matters: Opening Service Access to All -- 4…Setting up a Solution -- 4.1 The IOTC4ALL Service Model -- 4.2 Enhancing Services Components to Enrich Their Accessibility -- 4.3 The IOTC4ALL Marketplace -- 4.4 Smart Devices UI -- 4.4.1 Intelligent and Adaptive HCI -- 4.4.2 Ubiquitous Computing and Ambient Intelligence -- 4.4.3 From Unimodal to Multimodal Interfaces -- 4.4.4 Smart Devices Today -- 5…Conclusions and Future Work -- References -- 5 Intelligent Context: The Realization of Decision Support Under Uncertainty -- Abstract -- 1…Introduction -- 2…The Complexity of Context -- 3…Intelligent Context ProcessingContext!Intelligent context processing -- 3.1 The Context-Processing Algorithm. , 3.2 The Extended Context Processing AlgorithmContext!Extended context processing algorithm -- 3.2.1 Implementation -- 4…The Distribution Function -- 4.1 The Design of the Distribution Function -- 4.2 The Decision Boundary Proximity Issue -- 4.3 Partitioning and the Euclidean Distance Adjustment Analysis -- 4.3.1 An Analysis -- 4.4 Analysis Conclusions and Observations -- 5…Context Processing under UncertaintyContext!Uncertainty -- 6…Results and Discussion -- 6.1 Situational AwarenessContext!Situational awareness -- 7…Concluding Observations -- References -- 6 Autonomous Evolution of Access to Information in Institutional Decision-Support Systems Using Agent and Semantic Web Technologies -- Abstract -- 1…Introduction -- 2…Agent-Oriented Semantic Access -- 2.1 The generic system -- 2.2 The Legacy RDB System -- 2.3 The Semantic Query Access System -- 2.4 Decomposition of SQAS Use Cases -- 3…The SQAS Architecture -- 3.1 The High-Level Architecture of SQAS -- 3.2 The Roles of User Interface Agent -- 3.3 The Roles of Database Interface Agent -- 4…Agent-Oriented Middleware for Server Subsystems -- 4.1 The Database Interface Environment -- 4.2 A Note on Implementation Strategy -- 4.3 A Scenario for Agent-Assisted Ontology Development -- 5…Agent-Oriented Middleware for Client Subsystems -- 5.1 The User Interface Environment -- 5.2 A Scenario for Agent-Assisted Semantic Access -- 6…Closing Remarks -- 7…Conclusions -- References -- 7 A Research Survey on Large XML Data: Streaming, Selectivity Estimation and Parallelism -- Abstract -- 1…Introduction -- 1.1 Preliminaries -- 2…Selectivity Estimation -- 2.1 Properties of Selectivity Estimation Techniques -- 2.2 Path/Twig Selectivity Estimation Techniques -- 2.2.1 Synopsis-Based Estimation Techniques -- 2.2.2 Histogram-Based Estimation Techniques -- 3…Stream-Processing Approaches -- 3.1 Stream-Filtering Algorithms. , 3.2 Stream-Querying Algorithms -- 4…Parallel Query Processing -- 4.1 General Research on Decidability and Complexity -- 4.2 Data Distribution -- 4.3 Distribution and Parallel XPath Query Processing -- 4.4 Low-Level Implementation Techniques -- 4.5 DBMS and Join-Based Implementations -- 4.6 Map-Reduce, Hadoop Implementations -- 5…Conclusion -- References -- 8 Techniques and Applications to Analyze Mobility Data -- Abstract -- 1…Introduction -- 2…Collectingtrace collection Inter-cooperative Mobilitymobility Data -- 2.1 The HaggleHaggle Project -- 2.2 CRAWDADCRAWDAD -- 2.3 Socialsocial Tracer and HYCCUPS -- 2.3.1 Socialsocial Tracer -- 2.3.2 HYCCUPS -- 2.4 Benefits and Limitations -- 3…Techniques for Data Analysisdata analysis -- 3.1 Contact Timescontact time Distribution and Time of Day Dependence -- 3.2 Contact Predictabilitypredictability -- 3.3 Predictabilitypredictability of Interacting with Wirelesswireless Access Pointsaccess point -- 4…Experimental Results -- 4.1 Contact Timescontact time Distribution and Time of Day Dependence -- 4.1.1 UPB 2011 -- 4.1.2 UPB 2012 -- 4.2 Contact Predictabilitypredictability -- 4.3 Predictabilitypredictability of Interacting with Wireless Access Pointsaccess point -- 4.3.1 Rice -- 4.3.2 Nodobo -- 5…Conclusions and Future Work -- References -- 9 Memory Support Through Pervasive and Mobile Systems -- Abstract -- 1…Introduction -- 1.1 Evolution of Memory Prosthetics Devices -- 2…Context Aware Systems -- 3…Application Contextualization in Memory Support Systems -- 3.1 The Introduction of Time Context -- 3.2 The Introduction of Location Context -- 3.3 Web IntegrationWeb Integration -- 3.4 Integration of Time and Location ContextIntegration of Time and Location Context -- 3.5 Toward a New Generation of Memory Prosthetic DevicesMemory Prosthetic Devices -- 4…The Architecture of Our System -- 4.1 Server Side. , 4.1.1 A Three Tier ArchitectureThree Tier Architecture -- 4.1.2 Reasoning Engine -- 4.2 Client Side -- 5…ExperimentsExperiments and Users' FeedbacksUsers' Feedbacks -- 6…Ontology Management and Enrichment -- 7…Conclusions -- References -- 10 Viable Service Business Models Towards Inter-cooperative Strategies: Conceptual Evolutionary Considerations -- Abstract -- 1…Chronological Development of S-D Logic Model -- 2…The Role of Intangibility-Heterogeneity-Inseparability-Perishability Framework in the Separation of G-D and S-D Logics -- 2.1 IHIP Characteristics and Its Critics -- 2.2 Implications for the Definition of Services -- 3…Service Science Perspectives: Service-Dominant versus Goods-Dominant logic -- 3.1 Resource-Based Definition of Service Logic -- 3.2 S-D Logic and General Theory -- 4…Case Studies of Empirical Applications of S-D Logic -- 4.1 S-D Logic, Branding and Networks -- 4.2 S-D Logic and Discontinuous Innovations -- 4.3 S-D Logic and Co-Produced Knowledge -- 4.4 S-D Logic and Social Construction TheoriesSocial Construction Theories -- 4.5 S-D Logic and Logistics Service ValueLogistics Service Value -- 4.6 S-D Logic and ProcurementProcurement -- 4.7 S-D Logic and Service Experience -- 4.8 S-D Logic and Competitive AdvantageCompetitive Advantage -- 4.9 Cloud ComputingCloud computing as an Illustrative Example of S-D Logic -- 5…Conclusions and Future Work -- References -- 11 Discovering the Hidden Semantics in Enterprise Resource Planning Data Through Formal Concept Analysis -- Abstract -- 1…Introduction -- 1.1 Enterprise Resource Planning Systems -- 1.2 Rationale -- 2…Overview of Analysis -- 2.1 Data Preparation -- 2.2 Analysing Transactional ActivityAnalysis!Transactional Activity -- 2.3 Analysing Transactional Activity with DescriptionsAnalysis!Transactional Activity with Descriptions. , 2.4 Analysing Transactional Activity with Multiple AttributesAnalysis!Multiple Attributes.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book discusses the theories, practices and concepts of utilising inter-operable and inter-cooperative next generation computational technologies. Coverage includes mobile and the emerging e-infrastructures of Web 2.0, SOA, P2P, Grids and Clouds.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783642349522
    Series Statement: Studies in Computational Intelligence Series
    DDC: 006
    Language: English
    Note: Title -- Foreword -- Preface -- Acknowledgements -- Contents -- The Web of Things - Challenges and Enabling Technologies -- The Web - An Application Platform for Real-World Things -- Towards the Web of Things -- Technologies Driving the Web of Things -- Web of Things Architecture -- Integrating Things on the Web -- Frameworks for the Web of Things -- Building 'Web of Things Applications -- The AJAX Technique -- Mashups - Composing Things on the Web -- Event Driven Approach -- Case Studies of Ambient Spaces -- Ambient Classrooms -- Ambient Meter -- Research Directions -- Conclusion -- References -- Context-Aware Environments for the Internet of Things -- Introduction to Internet of Things Infrastructure and Services -- Context Aware Internet of Things Infrastructure -- Situational Awareness -- Other Representation Approaches -- Architectural Issues -- CAPIM Infrastructure -- CAPIM Context Model -- Use Case -- Future Trends and Research Directions in Internet of Things Infrastructure and Services -- Conclusions and Remarks -- References -- Service Interoperability in the Internet of Things -- Introduction -- Background -- An Interoperability Framework -- Assessing Current Interoperability Technologies -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Rethinking Interoperability -- An IoT Case Study Scenario -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Assessing the New Approach -- Contrasting SIL and Related Technologies -- Implementation -- Migration Path -- Conclusions and Future Work -- References -- The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments -- Introduction -- Classification of Ad Hoc Networks -- Mobile Ad Hoc Networks (MANETs) -- Vehicular Ad Hoc Networks (VANETs). , Wireless Sensor Networks (WSNs) -- Radio Frequency Identification (RFID) -- Near Field Communications (NFC) -- Routing Protocols for the IoT -- Towards an IoT Smart Environment -- The "thereuGO" Case Scenario -- A "thereuGO" IoT Model Architecture -- Conclusions -- References -- Challenges in Efficient Realtime Mobile Sharing -- Heterogeneous Networks -- IP Networks -- Wireless Sensor and Actuator Networks -- Multimedia Sessions -- Session Control -- Multimedia Session Mobility -- Multimedia Session Mobility versus MobileIP -- Federated Service Platforms -- Functionalities -- Mobility Management -- Pervasive Service Platforms -- Service Concept -- Session Concept -- Mobility -- Sharing of Content and Context -- Research Challenges and Progress -- Mobility and Sharing in Heterogeneous Networks -- Mobility and Sharing of WSANs -- Mobility and Sharing of Multimedia Sessions -- Service Platforms -- Pervasive Service Platforms -- Conclusion -- References -- Malware Detection and Prevention in RFID Systems -- Introduction -- SQL Injection Attacks -- Malware in RFID Systems -- Differences in Web Based and RFID SQLIA -- Related Work -- Policy Based RFID Malware Detection and Prevention -- Approach Overview -- Static Analysis -- Runtime Monitoring -- Query Structure Creation and Comparison -- Query Tokenization -- Query Structure Policy Generation -- Runtime Query Matching -- Security Evaluations -- RFID Tag Data Cleaning -- Query Structure Matching -- Conclusions and Future Work -- References -- Conceptual Model of Business Services Availability vs. Interoperability on Collaborative IoT-enabled eBusiness Platforms -- Introduction -- Contemporary Concepts, Architectures and Technologies to Support Effective IoT-enabled Business Services Delivery -- Enabling High Services Availability on SDP. , Hypothetical Model to Increase Service Availability on Distributed SDPs -- Numerical Patterns of the Model -- Literature Case Studies - Business Services Availability in the Collaborative Mobile Environment -- Conclusions -- References -- Organizational Control Reconfigurations for a Robust Smart Power Grid -- Introduction -- Dynamic I/O Binding Reconfigurations -- Application Scenarios -- Dynamic Load-Balancing of Power Lines -- Dynamic Switching of Power Flow -- Dynamic Allocation of Operating Reserves -- Dynamic Restoration After Blackout -- Discussion -- Conclusions and Future Work -- References -- Homesick L\'{e}vy Walk and Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters -- Introduction -- Existing Mobility Models and Homesick L´evy Walk -- Random Walk -- Random Waypoint -- L´evy Flight and L´evy Walk -- Homesick L´evy Walk -- Routing Protocols in Delay Tolerant Networks -- Epidemic Routing -- Spray and Wait -- PRoPHET -- MaxProp -- Optimal Forwarding Criterion for Utility-Based Routing under Sequential Encounters -- Optimal Stopping Theory -- Proposed Routing Method -- Performance Evaluation -- Evaluation Measures -- Simulation Setup -- Simulation Results -- Conclusion -- Open Issues -- References -- Hybrid Cloud Architecture for VANET Simulations -- Introduction -- The Internet of Things and Cloud Computing -- Simulation of Ubiquitous Networks Over Cloud: Topicality in the IoT Paradigm -- VANET Networks: Characteristics and Scalability Issues -- Scalability of Simulations -- Cloud Computing: Elasticity Model -- Design of Scalable Cloud Architectures -- Elasticity and Scalability -- VANET Simulations Over Cloud -- Learning Phase -- Proposed Architecture -- Overview of the Cloud Infrastructure -- Public Cloud Platform with Amazon EC2 -- Scheduling Algorithms -- Performance Analysis. , Effectiveness of the Scheduling Algorithm -- Scheduling Algorithm Optimization - Resource Usage -- Scheduling Algorithm Optimization - Memory Usage -- Conclusions -- References -- Constructing Large Scale CooperativeMulti-Agent Systems from Semantic P2PNetworks -- Introduction -- Large Scale Multi Agent System Architecture Based on Semantic P2P Network -- Formal Definitions -- Theorems Related to VIRGO -- Construction and Maintenance of VIRGO Agent -- Formal Definition of Large Scale Cooperative Multi-Agent Systems Based on Semantic P2P Networks -- Distributed Action for Large Scale Cooperative Multi-Agent Systems -- Case Applications -- Simulation of Social Society Based on Semantic P2P Network -- Semantic P2P Network for e-Business -- Conclusion -- References -- An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks -- Introduction -- Related Work -- General Searching Schemes in P2P Networks -- Secure Searching Schemes in P2P Networks -- Privacy-Preserving Searching Schemes in P2PNetworks -- The Secure and Privacy-Aware Searching Protocol -- The Network Environment -- The Proposed Search Protocol -- Privacy-Preservation in Searching -- Performance Metrics for the Proposed Protocol -- Performance Evaluation of the Proposed Protocol -- Conclusion -- References -- The Tailored Fabric of Intelligent Environments -- Introduction -- State of the Art -- Internet of Things -- Intelligent Environments -- TheWorldView -- Enabling Technology for IoT and IE convergence -- Middleware -- Agents, Applications and Virtual Appliances -- Case Study: The Essex iSpace -- FollowMe -- HotSpot -- Conclusions and Future Challenges -- References -- Generalized World Entities as an Unifying IoT Framework: A Case for the GENIUS Project -- Introduction -- The GWE Paradigm -- General Context -- A First Example. , The GENIUS' Procedures Implementing the GWE Paradigm -- Identification and Low-Level Description of the GWEs -- Conceptual Representation of the World -- Full Recognition and Categorization of the GWEs -- Reasoning Based on the Full Recognition of an Existing Situation -- An "Assisted Living" Real-Life Scenario -- Conclusion -- References -- Plugging Text Processing and Mining in a Cloud Computing Framework -- Introduction -- Cloud Computing -- Service Delivery Models -- Deployment Models -- Information Retrieval and Text Mining -- Information Retrieval -- Albanian Language Processing and Stemming -- Apache Hadoop -- General Framework -- Analysis, Design and Implementation of the Plugin -- Analysis -- Design and Implementation -- Running the Plugin in the Hadoop Cluster -- Evaluation -- Experimental Setting and Cluster Creation -- Dataset -- Evaluation Setting and Experimental Results -- Analysis and Interpretation of Results -- Conclusion and Future Work -- References -- A Recommendation System for Browsing of Multimedia Collections in the Internet of Things -- Introduction -- Related Work -- System Overview -- The Recommendation Model -- Modelling the Context -- The Recommendation Process -- System Customization in the Cultural Heritage Domain -- Preliminary Experimental Results -- User Satisfaction -- Conclusions and Future Work -- References -- From Patient Information Services to Patient Guidance Services-The iCare Approach -- Introduction -- Semantic Interoperability for e-Health -- Healthcare System Integration issues and State of the Art -- Current State-of-the-Art in Integration with Personal Care Devices -- Current State-of-the-Art in Security and Privacy of Citizen Context and Electronic Health Records (EHRs) -- Semantic Web Technologies -- Semantic Web Services -- The iCare PGS Model -- The iCare PGS Semantic Service Platform. , PGS and Data Collection as Interoperability Components.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer networks. ; Electronic books.
    Description / Table of Contents: Social network analysis investigates the structure and dynamics of intelligent Web-based networking and collaborative systems. This volume covers the latest advances in the field that lead to competitive advantages in business and academia.
    Type of Medium: Online Resource
    Pages: 1 online resource (311 pages)
    Edition: 1st ed.
    ISBN: 9783642167935
    Series Statement: Studies in Computational Intelligence Series ; v.329
    Language: English
    Note: Intro -- Contents -- Wikipedia as a Source of Ontological Knowledge: State of the Art and Application -- Toward a Methodology of Collaborative Modeling and Simulation of Complex Systems -- Evolving Schedules of Independent Tasks by Differential Evolution -- A Multi-lane Double Auction for Economic- Based Service Management in the Cloud -- Monitoring and Performance Analysis of Workflow Applications in Large Scale Distributed Systems -- Scaling Relations of Data Gathering Times in an Epidemically Data Sharing System with Opportunistically Communicating Mobile Sensors -- Multilaterally Secure Ubiquitous Auditing -- A Round-Based Cover Traffic Algorithm for Anonymity Systems -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Data structures (Computer science). ; Electronic books.
    Description / Table of Contents: This book covers the latest advances in structure inference in heterogeneous collections of documents and data, offering a comprehensive view of the state of the art, and identifying challenges and opportunities for further research agenda and developments.
    Type of Medium: Online Resource
    Pages: 1 online resource (448 pages)
    Edition: 1st ed.
    ISBN: 9783642229138
    Series Statement: Studies in Computational Intelligence Series ; v.375
    DDC: 006.3
    Language: English
    Note: Title Page -- Foreword -- Preface by Editors -- Contents -- List of Contributors -- Learning Structure and Schemas from Heterogeneous Domains in Networked Systems Surveyed -- Introduction -- Learning Patterns in Sensor Networks -- Learning Structures in Biological Domains -- Learning in Distributed Automation and Control Systems -- Learning Structures in Social Networks -- Learning Structures in Peer-to-Peer Networks -- Learning and Privacy-Preserving in Distributed Environments -- Conclusion -- References -- Handling Hierarchically Structured Resources Addressing Interoperability Issues in Digital Libraries -- Introduction and Motivation -- Objectives and Contributions -- The Background Context and Technologies -- Archives and Archival Descriptions -- EAD: Encoded Archival Description -- OAI-PMH and Dublin Core -- The NESTOR Model -- The NESTOR Algebra -- The NESTOR Prototype: Addressing Interoperability for Digital Archives -- How to Represent an Archive through the NESTOR Model -- Analysis of the Requirements -- Retaining Archival Hierarchy and Context throughout an XML Tree -- Encoding, Accessing and Sharing an Archive through Sets -- Conclusions and Future Work -- References -- Administrative Document Analysis and Structure -- Introduction -- Case-Based Reasoning -- CBR Terminology -- Problem Elaboration -- Similar Case Search -- Adaptation -- Learning -- CBR for Document Image Analysis: CBRDIA -- The Proposed Approach -- Document Structures -- Problem Representation -- Problem Solving -- Experiments -- Experiments on CBRDIA -- Experiments on Administrative Documents -- Conclusion -- References -- Automatic Document Layout Analysis through Relational Machine Learning -- Introduction -- Related Work -- Preliminaries -- Learning Layout Correction Theories -- From Manual to Automatic Improvement of the Layout Correction -- Tool Architecture. , The Learning System -- Description Language -- Experiments -- Conclusions -- References -- Dataspaces: Where Structure and Schema Meet -- Introduction -- Data Structuring -- Data Integration: The Story so Far -- Schema Mapping -- Keyword-Driven Queries -- The Web of Data -- Dataspaces -- Dataspace Dimensions -- Dataspace Profiling -- Querying and Searching -- Application Domain -- A Roundup of Existing Projects on Managing Structured Data -- Google BigTable -- Apache Cassandra -- Apache Hadoop -- Apache CouchDB -- DHT-Based Data Management Systems -- Google Fusion Tables -- WebTables -- Yahoo! SearchMonkey -- iMeMex -- Conclusions and Future Work -- References -- Transductive Learning of Logical Structures from Document Images -- Introduction -- Motivation and Problem Definition -- Related Work -- Extracting Emerging Patterns with SPADA -- Document Description -- The Mining Step -- Transductive Classification -- Experiments -- Conclusions -- References -- Progressive Filtering on the Web: The Press Reviews Case Study -- Introduction and Motivation -- Mission -- Related Work -- Hierarchical Text Categorization -- The Input Imbalance Problem -- Agents and Information Retrieval -- Progressive Filtering in Text Categorization -- The Approach -- The Threshold Selection Algorithm -- A Case Study: NEWS.MAS -- The Implemented System -- Experimental Results -- Conclusions -- References -- A Hybrid Binarization Technique for Document Images -- Introduction -- Related Work -- Algorithm Description -- Application of Iterative Global Thresholding -- Noisy Area Detection -- Re-application of IGT (Local Thresholding) -- Experimental Results -- Discussion - Future work -- Conclusion -- References -- Digital Libraries and Document Image Retrieval Techniques: A Survey -- Introduction -- Retrieval Paradigms -- Features -- Pixel Level -- Column Level -- Sliding Window. , Stroke and Primitive Level -- Connected-Component Level -- Word Level -- Line and Page Level -- Shape Descriptor -- Representation -- Similarity Measure -- Clustering -- Matching -- Conclusions -- References -- Mining Biomedical Text towards Building a Quantitative Food-Disease-Gene Network -- Introduction and Motivation -- Related Work -- Named Entity Recognition (NER) in Biomedical Text -- Relationship Extraction -- Polarity and Strength Analysis -- Relationship Integration and Visualization -- Named Entity Recognition -- Improving the Performance of Food Recognition -- Abbreviations and Co-reference Recognition -- Verb-Centric Relationship Extraction -- Relationship Polarity and Strength Analysis -- Feature Space Design -- Feature Selection -- Relationship Integration and Visualization -- Evaluation -- Evaluation of the Named Entity Recognition Module -- Evaluation of the Relationship Extraction Algorithm -- Evaluation of Relationship Polarity and Strength Analysis -- Discussions and Conclusion -- References -- Mining Tinnitus Data Based on Clustering and New Temporal Features -- Introduction -- TRT Background -- TRT Data Collection -- Information Retrieval -- Mining Text Data -- Temporal Feature Design for Continuous Data -- Temporal Feature Design or Categorical Data -- System Overview -- Experiments and Results -- Experiment Type I -- Two-Bin Clustering -- Experiment Type II -- Experiment Type III -- Conclusion -- References -- DTW-GO Based Microarray Time Series DataAnalysis for Gene-Gene Regulation Prediction -- Introduction -- What Is Microarray? -- Importance of Microarray Technology -- Microarray Data Processing -- Microarray and Gene Ontology -- Research Issues in Microarray Time-Series Data -- Missing Value Imputation -- Gene Regulation Prediction -- Gene Clustering and Statistical Operations -- DTW-GO Based Microarray Data Analysis. , Dynamic Time Warping -- Gene Ontology -- DTW-GO Based Microarray Data Analysis -- Datasets and Performance Assessment -- Real Microarray Dataset -- Assessment of Imputation Accuracy -- Accuracy of Gene Regulation Prediction -- Experimental Results and Discussion -- Design of Experiments -- Results and Discussion -- Conclusions -- References -- Integrating Content and Structure into a Comprehensive Framework for XML Document Similarity Represented in 3D Space -- Introduction -- Problem Statement -- XML Background -- Problem Definition -- Similarity Metric Overview -- Similarity Metric -- Structural Encoding -- Content Encoding -- Nested Content Encoding -- Difference Operator -- Visual Representation and Experiments -- MS Word Incremental Saves -- Random News Documents -- Conclusions and Future Work -- References -- Modelling User Behaviour on Page Content and Layout in Recommender Systems -- Introduction -- Personalization and Browsing Behaviour -- Motivation and Objectives -- Literature Review and Survey -- Browsing Behaviour: Action -- Browsing Behaviour: Visual -- A Recommender System Based on Browsing Behaviour -- Recommender System Architecture -- Recommender Implementation -- Structure, Layout, and Schema Learning -- Profiling Layout and Design -- Formalizing Layout and Design -- Layout and Design Learning -- Layout and Design Matching -- Conclusions -- References -- MANENT: An Infrastructure for Integrating, Structuring and Searching Digital Libraries -- Motivation -- Background -- Standards for Digital Library Access and Description -- Ontologies and Related Languages and Tools -- WordNet Domains and the WordNet Domains Ontology -- Text Semantic Similarity -- MANENT -- The MANENT Architecture -- Metadata Classification According to the WordNet Domains Ontology -- Experiments and Results -- Related Work. , Related Work on Digital Libraries Infrastructures -- Related Work on WordNet Domains -- Conclusions and Future Work -- References -- Low-Level Document Image Analysis and Description: From Appearance to Structure -- Introduction -- Motivation, Objectives and Contributions -- Background -- Modeling the Appearance of an Ancient Document -- Extracting Pattern Information from Low-Level Processing -- Linear Instantaneous Case -- Linear Convolutional Case -- A Metadata Schema to Describe Data, Procedures, and Results -- Experimental Evaluation -- Conclusions and Future Work -- References -- Model Learning from Published Aggregated Data -- Introduction -- Mission, Objectives, and Contributions -- Related Work -- Aggregated Data -- Attributional Rules as Knowledge Representation -- Rule Induction -- AQ Algorithm -- Rule Induction from Aggregated Data -- Calculating Coverage -- Evaluation -- Discussion -- Conclusion -- References -- Data De-duplication: A Review -- Introduction -- Problem Description -- Supervised Approaches to De-duplication -- Relational Data De-duplication Approaches -- Multidimensional Data De-duplication Approaches -- Data-Mining Data/Results De-duplication Approaches -- Linked and XML Data De-duplication Approaches -- Streaming Data De-duplication Approaches -- Unsupervised Approaches to De-duplication -- De-duplication Based on Clustering -- De-duplication Based on (dis)Similarity-Search in Metric Spaces -- De-duplication Based on Locality-Sensitive Hashing -- Conclusions and Further Research -- Efficiency and Scalability -- Systematic Assessment of De-duplication Performance -- Ethical, Legal and Anonymity Aspects -- Uncertainty -- References -- A Survey on Integrating Data in Bioinformatics -- Introduction -- Mission -- Background -- Linked-Based Integration -- Data Warehousing Integration -- Mediator-Based Integration. , Federated Databases.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Electronic data processing--Distributed processing. ; Electronic books.
    Description / Table of Contents: Event-based distributed systems are playing an increasingly important role in a broad range of application domains. This book presents a thorough review of reasoning in event-based distributed systems. It also contains new research and extensive references.
    Type of Medium: Online Resource
    Pages: 1 online resource (317 pages)
    Edition: 1st ed.
    ISBN: 9783642197246
    Series Statement: Studies in Computational Intelligence Series ; v.347
    Language: English
    Note: Title -- Preface -- Contents -- Introduction to Reasoning in Event-Based Distributed Systems -- Event-Based Distributed Systems -- Reasoning in Event-Based Distributed Systems -- Overview of the Book -- Concluding Remarks -- References -- Distributed Architectures for Event-Based Systems -- Introduction and Motivation -- Background -- Event-Driven Distributed System Architectures -- Complex Events Detection -- Classes of Event-Driven Distributed Architectures -- Event-Driven SOA -- Event-Driven Collaboration -- Event-Driven Grids -- P2P Systems -- Agent Systems -- Conclusions and Future Work -- References -- A CEP Babelfish: Languages for Complex Event Processing and Querying Surveyed -- Introduction -- Terminology -- Identification of Language Styles -- Composition Operators -- General Idea -- Sensor Network Use Case -- Summary -- Data Stream Query Languages -- General Idea -- Sensor Network Use Case -- Summary -- Production Rules -- General Idea -- Sensor Network Use Case -- Summary -- Timed State Machines -- General Idea -- Sensor Network Use Case -- Summary -- Logic Languages -- General Idea -- Sensor Network Use Case -- Summary -- Application Areas of the Language Styles -- Combination of Different Language Styles -- Conclusion -- References -- Two Semantics for CEP, no Double Talk: Complex Event Relational Algebra (CERA) and Its Application to XChange^EQ -- Introduction -- CEP Examples -- CERA: An Operational Semantics for Event Query Languages -- Purpose and Desiderata -- CERA: Complex Event Relational Algebra -- Translation into CERA -- Incremental Evaluation -- A Declarative Semantics for Event Query La -- Purpose, Necessity and Desiderata -- Model Theory and Fixpoint Theory -- Two Semantics, no Double Talk -- Conclusion and Outlook -- References -- ETALIS: Rule-Based Reasoning in Event Processing -- Introduction -- Problem Statement. , Syntax -- Declarative Semantics -- Operational Semantics -- Event Consumption Policies -- Consumption Policies Defined on Time Points -- Consumption Policies Defined on Time Intervals -- Implementation and Experimental Results -- Related Work -- Conclusions and Future Work -- References -- GINSENG Data Processing Framework -- Introduction and Motivation -- System Architecture -- Core Components -- Core Technology -- Data Processing Framework -- Business Rules Engine -- BRM and Publish/Subscribe -- BRE and ESP -- Domain Specific Languages for Rule Definitions -- Performance Control in Data Processing Framework -- Performance Monitoring Infrastructure -- Performance and Data Quality Algebra -- Performance Improvement -- Related Work -- Middleware Technology -- Publish/Subscribe Communication -- Event Stream Processing -- Business Rules Engines -- Summary -- References -- Security Policy and Information Sharing in Distributed Event-Based Systems -- Introduction -- Integrating Access Control into Event-Based Systems -- Event Type Specification and Ownership in a Single Domain -- Event Communication: Advertise, Publish and Subscribe -- Role-Based Access Control -- OASIS Role-Based Access Control -- Access Control Policy for Publish/Subscribe Clients -- Multi-domain Security Architecture -- Management of Event Names, Types and Policies -- Inter-domain Communication Control -- End-to-End Security with Information Flow Control -- Distributed Information Flow Control -- Event Security with DIFC -- Enforcing OASIS Security with DIFC -- Reasoning about Event Security -- Policy-Based Reasoning -- Event Security Reasoning with DIFC Labels -- Conclusions -- References -- Generalization of Events and Rules to Support Advanced Applications -- Introduction -- Alternative Actions -- Event Generalization -- Interval-Based Semantics -- Generalization of Events. , Potentialvs.ActualEvents -- Event Detection Modes -- Binary Event Operator Semantics -- Ternary Event Operator Semantics -- ECAA Rule Specification -- Event Detection Graph Extensions -- Extended Event Detection Graph -- Distributed Event Processing and Reasoning -- Distributed Event Processing -- Reasoning -- Conclusions -- References -- Pattern Detection in Extremely Resource-Constrained Devices -- Introduction -- Objectives, Motivation and Contributions -- Review ofWork in Pattern Detection inWSAN Data -- Spacecraft and Telemetry Data -- Environmental Pattern Detection -- Spatial Structure Pattern Detection -- Data Centre Monitoring and Context-Aware Computing -- Network Monitoring and Intrusion Detection -- Symbolic and Stochastic Pattern Detection -- Temporal Pattern Detection Using a Symbolic Representation -- Spatial Pattern Detection and Source Location Estimation -- Conclusions -- References -- Smart Patient Care -- Introduction -- Contributions -- Chapter Outline -- The Technology -- Oracle Database -- Other Technologies -- Architecture -- Implementation -- Event Triggering -- Rules Evaluation -- Rules Customization -- Rules Composability -- Data Mining Integration -- Alternatives -- State ofWork -- Conclusions and Future Work -- References -- The Principle of Immanence in Event-Based Distributed Systems -- Introduction -- The Principle of Immanence -- Immanence on the Web -- Background -- Virtual Collaborative Environments on GRID -- VO Management Models -- GRID and MAS Convergence -- Discussion -- About AGORA -- AGORA Conceptual Model -- Persistent Core Services -- Four Interaction Mechanisms -- Experimentation on AGORA -- Conclusion -- References -- Context-Based Event Processing Systems -- Introduction: Context in Event Processing Modeling -- Temporal Context -- Fixed Temporal Interval -- Event Interval -- Sliding Fixed Interval. , Sliding Event Interval -- Spatial Context -- Fixed Location -- Entity Distance Location -- Event Distance Location -- Segmentation Oriented Context -- State-Oriented Context -- Context Composition -- Context Realization within Current Event Processing Products -- Stream Base StreamSQL -- Oracle EPL -- RuleCore Reakt -- Sybase Aleri -Coral8 and CCL -- IBM Websphere Business Events -- Conclusion -- References -- Event Processing over Uncertain Data -- Introduction -- Preliminaries -- Event Processing -- Uncertainty Management Mechanisms -- Taxonomy of Event Uncertainty -- Dimensions of Event Uncertainty -- Causes of Event Uncertainty -- Handling Uncertainty at the Source -- Probability Theory-Based Representation -- Fuzzy Set Theory-Based Representation -- Handling Inference Uncertainty -- Event Inferencing Using Probability Theory -- Event Inferencing Using Fuzzy Set Theory -- Algorithms for Uncertain Inferencing -- Inference Example -- Conclusions -- References -- Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Adaptive computing systems. ; Computer-assisted instruction. ; Artificial intelligence. ; Electronic books.
    Description / Table of Contents: This book reviews and analyzes new implementation perspectives for intelligent adaptive learning and collaborative systems, enabled by advances in scripting languages, IMS LD, educational modeling languages and learning activity management systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (343 pages)
    Edition: 1st ed.
    ISBN: 9783642285868
    Series Statement: Studies in Computational Intelligence Series ; v.408
    DDC: 371.360285
    Language: English
    Note: Title Page -- Preface -- Introduction -- Contents -- Part I: Design of Adaptive Learning Systems -- Reuse of Data Flow Designs in Complex and Adaptive CSCL Scripts: A Case Study -- Introduction -- Background -- The Data Flow Problem in Learning Design and the Composition-Based Approach -- Data Flow Approaches and the Reuse Dimension -- The LeadFlow4LD Design Methodology -- MOSAIC Case Study -- A LeadFlow4LD Implementation of MOSAIC Scenario -- Discussion -- An Abstract Workflow Template-Based Approach -- Conclusions and Future Work -- References -- System Orchestration Support for a Collaborative Blended Learning Flow -- Introduction -- Description of a Previous Experimental Study -- Description of the Experiment: Meeting the Campus Together -- Overview of the Results of the Experiment -- Limitations on the Orchestration Tasks -- System for the Scripted Orchestration -- Course Flow Management Technologies -- The Scripted Course Flow -- Technical Details of the Scripted Flow -- Results Analysis of the Solution: A Simulation -- Conclusions -- References -- Adaptive Collaboration Scripting with IMS LD -- Introduction -- CSCL Scripts - Theory and Adaptation -- Related Work -- Proposed Extensions to IMS LD -- Examples -- Modelling Group Work -- Groups -- Artefacts -- Sequencing- and Execution Flow- Specification -- Environments and Collaboration Contexts -- Services -- Service Selection -- Functions -- Permissions -- Monitoring Execution and Reacting to State Changes -- Run-Time Model -- Event Handling -- Exception Handling -- Adaptive Interventions -- Basic Adaptation Actions -- Advanced Adaptation Mechanisms -- Summary and Outlook -- References -- Extending IMS-LD Capabilities: A Review, a Proposed Framework and Implementation Cases -- Introduction -- Background -- AICLS Systems and Adaptation Patterns. , A Review of IMS-LD Based Adaptation Attempts -- AICLS Reference Framework: IRMO and MAPIS -- Requirements from an AICLS Framework -- MAPIS: Architecture for Implementing Adaptations with IMS-LD -- MAPIS Case Studies: Adaptations Expressed in IMS-LD -- Trigger Peer Interactions -- Discussion and Future Work -- References -- Prototype Tools for the Flexible Design of CSCL Activities Based on the Adaptation Pattern Perspective -- Introduction -- Supporting Collaboration -- Collaboration Scripts and the Need for Flexibility -- Adaptive Collaboration Support -- Research Motivation -- Adaptation Patterns -- The Nature of Adaptation Patterns -- The DeACS Methodology -- Adaptation Pattern Analysis -- The FlexCoLAB System -- Authoring Environment -- Student Environment -- PPR (Pyramid Peer Review) -- The Core Idea -- Design Analysis- The Design Axes -- System Architecture -- The Case Study -- Conclusions and Future Work -- References -- Adapting the Collaborative Strategy 'Students Team Achievement Divisions' in an Information Technology Work Place -- Introduction -- Background -- LAMS -- Student - Teams - Achievement - Divisions (STAD) -- Adaptation -- Design of an Adaptive STAD Online Learning Activity in LAMS -- Phase 1: Introduction to the Learning Activity -- Phase 2: Personal Assessment -- Phase 3: Adaptive Group Formation -- Phase 4: Adaptive Individual Learning and Group Collaboration -- Phase 5: Adaptive Collaborative Group Report Preparation -- Phase 6: Group Report Presentation -- Phase 7: Team Assessment -- Phase 8: Adaptive Individual Assessment -- Phase 9: Praise for Best Group Reports -- Implementing the 2nd Phase of the Adaptive Collaborative Method STAD: Determining Learners-Employees' Learning Styles within the Context of an IT Work Place -- Aims of the Approach -- The Framework of the Legal Council of the Hellenic State. , Research Tools and Methodology -- Presentation-Annotation of the Aggregate Results of the Survey -- Summary and Future Work -- References -- Part II: Interactive and IntelligentLearning Systems -- Examining the Interrelation between the Interaction Analysis and Adaptation Research Fields within Communication-Based Collaborative Learning Activities: Convergence, Divergence or Complementarity? -- Introduction -- Computer-Based Interaction Analysis (IA) -- State of the Art -- Adaptation in CSCL -- Flexibility and Interoperability of IA Tools -- Discussion -- References -- Making Adaptations of CSCL Scripts by Analyzing Learners' Online Behavior -- Introduction -- Interaction Analysis -- Interaction Analysis Indicators -- Interaction Analysis Tools -- An Example: Adapting a Learning Script Based on a TPS Strategy Using IA Techniques -- Concluding Remarks -- References -- Behavioural Prototyping©: Making Interactive and Intelligent Systems Meaningful for the User -- Background -- Psychological Perspectives -- Interactivity and Intelligence -- Problem Solving and Learning -- Affordances and the Nature of Perceived Use -- Shortcomings of Designs: The Importance of Behavioural Profiles -- Prototypes and Archetypes -- Inclusive Design -- Formalized Behavioural Prototyping© -- Conclusion: Strengths of the Framework -- References -- The Design of a Teacher-Driven Intelligent Agent System for Supervising Lessons in LAMS -- Introduction -- Monitoring and Supervising the Learning Process and the Collaboration in LMSs -- Related Work -- Supporting the Supervisor of a Lesson in LAMS -- An Agent-Based Architecture for Intelligent Monitoring and Supervising of Lessons in LAMS -- The Scheduler Agent -- The Monitoring Agent -- The User Notification Agent -- Examples of Rules Producing Feedback Messages -- Feedback Messages Taxonomy -- Alert Messages. , Awareness Messages -- Evaluation Reports and Messages for Learners and Activities -- Response of the Messaging System to a Learning Scenario -- An Evaluation Scenario -- Conclusions and Future Work -- References -- The Text-Based Computer-Mediated Communication in Distance Education Fora: A Modelling Approach Based on Formal Languages -- Introduction -- Theoretical Framework -- Generally -- The Complexity of Text Based Computer-Mediated Communication (CMC) -- Theoretical Approaches -- Methodological Framework -- HOU Fora and Choices Justification -- Modelling of HOU Distance Education Forum -- System Development -- Data Filtering -- Roots Files Storage -- String Output -- System Integration -- Exemplary Operation -- Input -- Output -- Experiments -- Phase A -- Phase B -- Discussion -- References -- Part III: Collaborative Learning Systems -- Antecedents of Collaborative Learning in Massively Multiplayer Online Games -- Introduction -- Theoretical Background: MMOGs and Collaborative Learning -- Research Methodology -- Data Collection -- Data Analysis -- Tasks, Groups and the Player Community -- Tasks and Activities -- Team Practices -- Community Practices and the Social Environment -- Discussion and Conclusions -- References -- Validating Empirically a Rating Approach for Quantifying the Quality of Collaboration -- Introduction -- Collaborative Setting -- Determining Relations between Dimensions of Collaboration Quality -- The Rating Approach -- Rating Scheme -- Rating Process -- Reliability of Ratings -- Relations between Dimensions of Collaboration Quality -- Multidimensional Scaling of Dimensions of Collaboration Quality -- Results and Internal Validation of the MDS Algorithm -- Interpretation of the MDS Results -- Conclusions and Further Research -- References. , Internet-Mediated Communities of Practice: Identifying a Typology of Critical Elements -- Introduction -- Conceptual Foundations -- Historical Overview and Theory of Communities of Practice -- Internet-Mediated Communities of Practice -- Research Framework -- Methodology -- Results -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer-assisted instruction. ; Electronic books.
    Description / Table of Contents: Technology-enhanced systems and computer-aided tools that support scaffolding in collaborative learning are key goals in the education research sector. This book covers a number of approaches to fostering functional collaborative learning and working online.
    Type of Medium: Online Resource
    Pages: 1 online resource (319 pages)
    Edition: 1st ed.
    ISBN: 9783642198144
    Series Statement: Studies in Computational Intelligence Series ; v.350
    DDC: 371.360285
    Language: English
    Note: Title Page -- Preface -- Acknowledgements -- Contents -- User-Centred Evaluation and Organisational Acceptability of a Distributed Repository to Support Communities of Learners -- Introduction -- Background -- Context -- Related Work -- Introduction to EERN and DELTA -- Methodological Background -- EERN/DELTA Goals -- DELTA/EERN Architecture -- DELTA's User Interface -- Methods Used in Phase 1 and Phase 2 -- Phase 1: EERN Evaluation and Analysis -- Phase 2: UBERN Evaluation and Analysis -- Results and Discussion -- Phase 1: EERN -- Phase 2: UBERN -- Towards a Fully Decentralized Learning Repository -- Summative Evaluation and Conclusions -- Future Work -- References -- Facebook as a Collaborative Platform in Higher Education: The Case Study of the Universitat Oberta de Catalunya -- Introduction -- State of the Art -- Open Social Learning and 2.0 Social Networks -- Uses of Facebook in Higher Education: Background -- Objectives -- The Learning Methodology -- Assessment Methodologies -- Analysis of the Experience at a Quantitative Level -- Qualitative Approach: A Virtual Ethnography in the Facebook Context -- Results -- Conclusions -- References -- Development and Implementation of an Enterprise Learning Architecture for Collaborative Learning -- Introduction -- E-Warehouse: A Framework For Learning -- Implementation of Collaborative Environment -- Curriculum Development -- Pedagogical Materials and Data Warehouse -- Assessment of Student Learning -- Sample Learning Context -- Learning Pillars -- Description of the SCM Pillar -- Description of the PLM Pillar -- Integration with Other Learning Pillars: E-Warehouse Roof: SCM / PLM Integration -- Management Environment for E-Warehouse -- Design -- Creating a Learning Pillar Using AdminTool -- Future Work -- Conclusions -- References. , A Rational Framework for Student Interactions with Collaborative Educational Systems -- Introduction -- A Rational Model of Procrastination -- The Impact of Procrastination on Collaboration -- Data -- Measurement -- Results -- Increased Activity -- Diminished Performance -- Efforts to Overcome Low Performance -- A Few Illustrative Cases -- Discussion and Conclusions -- References -- Interaction Analysis as a Tool for Supporting Collaboration: An Overview -- Introduction -- Analysis and Evaluation for the Support of Collaborative Learning Activities -- A Framework for Interaction Analysis and Evaluation Techniques -- Top-Down Automatic Interaction Analysis Techniques -- Automated Interaction Analysis Based on Event Logs -- Automated Interaction Analysis Based on Event Logs and a Priori Annotations of Verbal Content -- Interaction Analysis Techniques with the Aid of Human Evaluators -- Coding schemes -- Rating schemes -- Trained Automatic Interaction Analysis Based on Human Evaluations -- Automated Interaction Analysis Trained on Coded Data -- Automated Interaction Analysis Trained on Rated Data -- Conclusions -- References -- CLFP Intrinsic Constraints-Based Group Management of Blended Learning Situations -- Introduction -- Flexible Solutions for Supporting CSCL Scripts -- Flexibility as Disjunction of Intrinsic and Extrinsic Constraints -- Limitations in Supporting Group Management in Collaborative Blended Learning Scenarios -- Considering the Intrinsic Constraints of Two IMS LD CLFPs -- Flexibility Constraints for TAPPS and Jigsaw -- Jigsaw and TAPPS CLFPs -- Representing the Intrinsic Constraints with IMS LD -- Supporting Flexibility for Group Management: A Web-Based Tool -- A Web-Based Application -- The Architecture -- Preliminary User Study Evaluation -- Description of the User Study -- Results -- Future Developments. , Conclusion and Future Work -- References -- A Pedagogical Approach for Collaborative Ontologies Building -- Introduction to Collaborative Learning Ontology -- About Collaborative Building of Ontologies -- Collaborative Ontology Authoring Tools -- Social Space for Ontology Maturing and Nurturing -- A CSCL Driven Model for Collaborative Ontology Construction and Maturing -- Top Down Approach for the Collaborative Ontology Construction: To Increase the Value of Teachers' Contribution -- Collaborative Ontology Construction Scenarios -- A Tool for the Collaborative Building of Ontologies -- Bottom Up Collaborative Ontologies Building: To Increase the Value of Students' Contribution -- Ontology Extraction and Validation from a Semantic Space -- Assessment of the Contribution Derived by Group Activities over Terms and Concepts Defined in Educational Ontology -- Text Analysis, Network Text Analysis and Ontology Comparison -- Conclusions -- References -- A Model-Based Approach to Designing Educational Multiplayer Video Games -- Introduction -- The VGSCL System -- Goals -- Tasks -- Interaction -- Modeling the VGSCL System -- Models of Educational Content -- Models for Recreational Content -- Model to Relate Educational and Recreational Contents: The General Tasks and Goals Model -- User Modeling -- Recording Information in the Models -- Conclusions and Further Work -- References -- A Framework to Foster Collaboration between Students through a Computer Supported Collaborative Learning Environment -- Introduction -- On Adapting Collaborative Frameworks -- Component-Based Adaptive Framework -- Adaptation to Foreseeable Situations -- Adaptation for Unforeseen Situations -- From the Framework to a Prototype -- Framework Components Mapping -- Implementation Details for the Prototype -- Formative Evaluation of the Prototype -- Experience Description. , Information Obtained from the Questionnaires -- Conclusions and Future Work -- References -- Apt to Adapt: Micro- and Macro-Level Adaptation in Educational Games -- Introduction -- Around an Inspiring Virtual Learning World -- Micro Level Assessment -- Micro Level Interventions -- Meta-cognitive Interventions -- Cognitive Interventions -- Motivational Interventions -- Adaptation by Interactive Storytelling -- Collaborative Learning -- Conclusions and Outlook -- References -- A Collaborative and Adaptive Design Pattern of the Jigsaw Method within Learning Design-Based E-Learning Systems -- Introduction -- The Rationale -- LAMS -- The Jigsaw Collaborative Method -- Adaptation -- Design of the Jigsaw Adaptive Online Learning Activity -- Summary and Future Research Plans -- References -- Recommendation of Learning Material through Students´ Collaboration and User Modeling in an Adaptive E-Learning Environment -- Introduction -- Related Works -- AdaptWeb® Environment -- Integrating Recommendation Mechanism to AdaptWeb® -- Multi-Criteria Ontology for Learning Materials -- The Collaboration Process -- Scenario of Use -- Conclusions -- References -- Modeling Adaptation Patterns in the Context of Collaborative Learning: Case Studies of IMS-LD Based Implementation -- Introduction -- Background -- Adaptation Patterns: Adaptivity in Systems for Collaborative Learning -- Modeling Adaptation Patterns -- The Basics of LD: Adaptivity Capabilities and Limitations -- IMS-LD and APs Case Studies: APs Expressed in IMS-LD -- Advance the Advanced -- Lack of Confidence -- Group Heterogeneity Based on Prior Domain Knowledge -- Discussion and Future Work -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computational intelligence. ; Electronic books.
    Description / Table of Contents: Blending theory with practice, this book brings together a variety of next-generation data technologies used to capture, integrate, analyze, mine, annotate and visualize distributed data in a manner that is meaningful and collaborative for the organization.
    Type of Medium: Online Resource
    Pages: 1 online resource (636 pages)
    Edition: 1st ed.
    ISBN: 9783642203442
    Series Statement: Studies in Computational Intelligence Series ; v.352
    Language: English
    Note: Title -- Preface -- Contents -- Part I Foundations and Principles -- Coordination Mechanisms in Complex Software Systems -- Introduction -- Related Work -- Coordination Theory -- Coordination Models -- Linda Coordination Frameworks -- Use Case Description -- Space-Based Computing -- Evaluation -- Java Message Service -- Linda Tuple Space -- Discussion -- Conclusion -- References -- Ant Colony Optimization and Data Mining -- Introduction -- State-of-the-Art -- Ant Colony Optimization State-of-the-Art -- Data Mining State-of-the-Art Elements -- ACO and DM State-of-the-Art -- Ant Colony Optimization -- Data Mining -- Classification -- Clustering -- Ant Colony Optimization and Data Mining Techniques -- Data Classification and Ant Colony Optimization -- Data Clustering and Ant Colony Optimization -- Applications and Examples -- Conclusions -- Future Trends -- Key Terms -- References -- OpenSEA: A Framework for Semantic Interoperation between Enterprises -- Introduction -- OpenSEA -- TOGAF - The Upper Ontology for OpenSEA -- ISO 24707:2007 - The Meta-ontology for OpenSEA -- OpenSEA - Developing an Upper Ontology with CL -- Interlinked Domains -- Developing an Upper Ontology from TOGAF -- Sowa's Conceptual Catalogue -- Modelling Relationships within TOGAF9 -- Nested Graphs -- Contextualisation of Information -- OpenSEA and the Cloud -- OpenSEA and Web3.0 -- OpenSEA and the Software Engineer -- Further Investigations -- Integration of OpenSEA and GoodRelations -- Knowledge, Inference and Information Generation through OpenSEA -- Conclusion -- www.Open-SEA.org -- References -- Building Collective Tag Intelligence through Folksonomy Coordination -- Introduction -- From Folksonomies to Collective Tag Intelligence -- Tag Classification Approaches -- Similarity-Based Search Approaches -- Contributions of the Chapter. , Normalization Techniques for Collective Tag Intelligence Extraction -- Tag Equivalence Clusters -- Semantic Relations -- Linguistic Relations -- Terminological Relations -- Normalization Techniques -- Similarity-Based Techniques for Tag Matching -- Syntactic Similarity Function -- Semantic Similarity Function -- Terminological Similarity Function -- Linguistic Similarity Function -- Evaluation and Application to a Real Scenario -- Evaluation Issues -- An Example of Similarity-Based Resource Retrieval -- Conclusions -- References -- Trust-Based Techniques for Collective Intelligence in Social Search Systems -- Introduction -- State-of-the-Art: Distributed Decision-Making and Collaboration -- Computational Trust -- Computational Models of Trust -- Social Search -- Computational Trust to Enhance Social Search Ranking: A Practical Study-Case -- The Functioning -- Computational Trust to Enhance the Social Search Engine -- Leveraging Users' Features to Rank Pages -- Performance Criteria -- The Experimental Results -- Navigational Queries -- Enhancement of Past Performance -- Baseline Results without Trust Function -- Experiment 1 - with Past Performance -- Experiment 2 - No Past Performance -- Future Direction and Open Issues -- References -- Part II Advanced Models and Practices -- Visualising Computational Intelligence through Converting Data into Formal Concepts -- Introduction -- Formal Concept Analysis -- Formal Concept Analysis Scaling -- Formal Context Formats -- Large Data Sets -- Interpreting Data for FCA -- Data Discretisation -- Data Booleanisation -- FcaBedrock -- Concept and Lattice Generation -- Dealing with Concept Simplification and Complexity -- An Overall Process -- Performance Considerations -- CUBIST -- Semantic Web, RDF and OWL -- Conclusion -- References -- Constructing Ensemble Classifiers from GEP-Induced Expression Trees. , Introduction -- Using Gene Expression Programming to Induce Classifiers -- Ensemble Classifiers -- AdaBoost-Based Ensemble Classifier with GEP Learning (AB-GEP) -- AdaBoost-Based Ensemble Classifiers with Cellular GEP Learning (AB-cGEP) -- Majority-Voting-Based Ensemble Classifier with GEP Learning (MV-GEP and MVC-GEP) -- Majority-Voting-Based Ensemble Classifier with Cellular GEP Learning (MV-cGEP) -- Triplet Mass Function-Based Ensemble Classifier with GEP Learning (TMF-GEP) -- Computational Experiment Results -- Conclusions -- References -- Self-Organized Load Balancing through Swarm Intelligence -- Introduction -- Related Approaches -- SILBA Framework -- Basic SILBA -- Extended SILBA -- Swarm Based Algorithms -- Bee Algorithm -- Ant Algorithms -- Benchmarks -- Basic SILBA Benchmarks -- Extended SILBA Benchmarks -- Conclusion -- References -- Computational Intelligence in Future Wireless and Mobile Communications by Employing Channel Prediction Technology -- Introduction -- Spread Spectrum Communications -- Direct Sequencing Spread Spectrum -- Frequency Hopping Spread Spectrum (FHSS) -- Channel Coding -- Representations for LDPC Codes -- Proposed Channel Prediction Scheme -- The Algorithm -- Spectrum Analysis of the Proposed MCFH-SS System -- Complementary Cumulative Distribution Function (CCDF) -- Adjacent Channel Power -- Interference Analysis of the Proposed MCFH-SS System -- Interference Analyzer -- Spectrogram and Received Signal Strength -- Conclusions -- References -- Decision Making under Synchronous Time Stress among Bilateral Decision Makers -- Introduction -- Motivations -- Definitions -- Contributions and Limitations -- Structure -- Formulas -- Cost of Time -- Strategic Points -- Case Study -- Case -- Participant Record -- Entire Duration of a Certain Process for Decision Making -- Elapsed Time Record -- Prices of Individual Items. , Discussions -- Results -- Elements -- Conclusions and Future Work -- References -- Augmenting Human Intelligence in Goal Oriented Tasks -- Introduction -- Theoretical Foundation -- Knowledge Representation Ontology -- Knowledge Acquisition -- Agents -- AGUIA: An Intelligence Amplification Model Based on Agents Active on Demand -- AGUIA for Amplifying Human Intelligence -- ADD: AGUIA for Exploration of Options Guided by Models -- AGUIA for Script-Based Ontology Sensemaking -- AGUIA for Keeping User Awareness of Changes in Context -- AGUIA for Knowledge Amplification -- HYRIWYG: How You Rate Influences What You Get -- KA-CAPTCHA for Implicit Knowledge Acquisition -- Related Work -- Conclusion -- References -- Part IIIAdvanced Applications -- Clouds and Continuous Analytics Enabling Social Networks for Massively Multiplayer Online Games -- Introduction -- Mission: Continuous Analytics for MMOGs -- Goal -- Challenges -- Other Applications -- Related Work -- General Data Collection and Mining -- Data Collection and Mining Using On-Demand Resources -- The CAMEO Architecture -- Overview -- Workflow -- Addressing the Challenges of Continuous MMOG Analytics -- Experimental Setup -- CAMEO Implementation -- MMOG Case Study: RuneScape -- Cloud Infrastructure -- Experimental Results -- Understanding User Community Needs -- Enabling and Using Distributed and Collaborative Technology -- Conclusion and Future Work -- References -- Adaptive Fuzzy Inference Neural Network System for EEG and Stabilometry Signals Classification -- Introduction and Background -- EEG -- Stabilometry -- Objectives and Contributions -- Data Selection and Recording -- EEG -- Stabilometry -- Architecture of AFINN -- Training Procedure for AFINN -- Evaluation -- Evaluation of the Model Generation Method -- Evaluation of AFINN -- Discussion of Results -- Conclusions -- References. , Demand on Computational Intelligence Paradigms Synergy -- Introduction -- Challenges and Current Position of SOA in Mobile World -- Components and Integrated Technology Stack for the Next Generation Mobility Architecture -- The Architecture Planning and Design -- SOA for Mobile Applications - Practical Handling Use Cases -- Mobile SOA Implemented in University e-Learning Environment -- SOA-Based Service "Customer Search" -- "Applications - End-Devices" Connection Models -- First Scenario - Connecting via Servlets -- Second Scenario - SOA-Based -- SOA Approach to Write Mobile Clients Using Remote Services -- Mathematical Model of Logical Architecture for the Mobile Connectivity Services -- Structural Design and Implementation -- General Definitions of Queuing Systems Used -- Conclusions -- References -- Evolutionary Algorithms towards Generating Entertaining Games -- Introduction -- Our Contribution -- Background Work -- Board Based Games -- Video Games -- Theories on Entertainment -- Search Space -- Board Based Games -- Predator/Prey Games -- Structure of the Chromosome -- Board Based Games -- Predator/Prey Games -- Fitness Function -- Board Based Games -- Predator/Prey Games -- Software Agents -- Random Agent -- Agent Using Min-Max with Rule Based Evaluation Function -- Agents for Predator/Prey Games -- Experiments -- Board Based Games -- Predator Prey Games -- Conclusion -- References -- Leveraging Massive User Contributions for Knowledge Extraction -- Introduction -- Related Work -- Tag Clustering and Community Detection -- Temporal Tag Analysis -- Image Analysis Using Collaborative Data -- Tag Clustering through Community Detection in Tag Networks -- Description of MultiSCAN -- Evaluation of Tag Clustering -- Time-Aware Tag/User Co-clustering -- The Proposed Framework -- Evaluation of Time-Aware User/Tag Co-clustering. , Enhancing Image Analysis Using Collaborative Data.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Big data. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (524 pages)
    Edition: 1st ed.
    ISBN: 9783319091778
    Series Statement: Modeling and Optimization in Science and Technologies Series ; v.4
    DDC: 5.7
    Language: English
    Note: Intro -- Preface by Editors -- Contents -- List of Contributors -- Exploring the Hamming Distance in Distributed Infrastructures for Similarity Search -- 1 Introduction -- 2 Background -- 2.1 Vector Space Model -- 2.2 Random Hyperplane Hashing and Hamming Similarity -- 3 Literature Review -- 4 Similarity Search Based on Hamming Distance -- 4.1 Hamming DHT -- 4.2 HCube -- 5 Evaluations -- 5.1 Hamming Similarity -- 5.2 Hamming DHT -- 5.3 HCube -- 6 Conclusions and Further Research Issues -- References -- Data Modeling for Socially Based Routing in Opportunistic Networks -- 1 Introduction -- 2 Opportunistic Networks -- 2.1 Definition -- 2.2 Challenges -- 2.3 Use Cases -- 3 Data Routing and Dissemination -- 3.1 Basic Algorithms -- 3.2 Socially Based Algorithms -- 3.3 History-and Prediction-Based Algorithms -- 4 Potential Solutions -- 4.1 SPRINT -- 4.2 SENSE -- 5 Future Trends -- 6 Conclusions -- Decision Tree Induction Methods and Their Application to Big Data -- 1 Introduction -- 2 Preliminary Concepts and Background -- 3 Subtasks and Design Criteria for Decision Tree Induction -- 4 Attribute Selection Criteria -- 4.1 Information Gain Criterion and Gain Ratio -- 4.2 Gini Function -- 5 Discretization of Attribute Values -- 5.1 Binary Discretization -- 5.2 Multi-interval Discretization -- 5.3 Discretization of Categorical or Symbolical Attributes -- 6 Pruning -- 6.1 Overview about Pruning Methods -- 6.2 An Example of a Pruning Method - Cost-Complexity Pruning -- 7 Fitting Expert Knowledge into the Decision Tree Model, Improvement of Classification Performance, and Feature Subset Selection -- 8 How to Interpret a Learnt Decision Tree? -- 8.1 Quantitative Measures for the Quality of the Decision Tree Model -- 8.2 Comparison of Two Decision Trees -- 9 Conclusions -- References. , Sensory Data Gathering for Road Traffic Monitoring: Energy Efficiency, Reliability, and Fault Tolerance -- 1 Introduction -- 2 Literature Survey -- 3 Convergecast Tree Management Scheme -- 3.1 System Model and Assumptions -- 3.2 Initialization -- 3.3 Tree Maintenance -- 3.4 Convergecast Controller -- 4 Simulation Result -- 5 Conclusion and Future Directions of Research -- References -- Data Aggregation and Forwarding Route Control for Efficient Data Gathering in Dense Mobile Wireless Sensor Networks -- 1 Introduction -- 2 Assumptions -- 2.1 System Environment -- 2.2 Geo-Routing -- 3 Related Work -- 3.1 Location-Based DataManagement in Dense MANETs -- 3.2 Data Gathering Utilizing Correlation of Data in Wireless Sensor Networks -- 4 DGUMA: Our Previous Method -- 4.1 Mobile Agent -- 4.2 Deployment of Mobile Agents -- 4.3 Movement of Mobile Agent -- 4.4 Transmission of Sensor Data -- 5 DGUMA/DA: The Extended Method -- 5.1 Outline -- 5.2 Timer Setting -- 5.3 Transmission of Sensor Data -- 5.4 Forwarding Route Control -- 5.5 Restoring Sensor Readings at the Sink -- 6 Discussion -- 6.1 Overhead Generated by the Forwarding Route Control -- 6.2 Traffic for Data Gathering Using Lengthwise Tree in the Lengthwise Distribution -- 6.3 Traffic for Data Gathering Using Crosswise Tree in the Crosswise Distribution -- 6.4 Traffic Generated by Data Gathering Using Lengthwise Tree in the Crosswise Distribution -- 6.5 The Relation between the Performance Gain and the Overhead Generated by the Forwarding Route Control -- 7 Simulation Experiments -- 7.1 Simulation Model -- 7.2 Validation of the Discussion in Section 6 -- 7.3 Performance Evaluation of DGUMA/DA -- 8 Conclusion -- References -- P2P Data Replication: Techniques and Applications -- 1 Introduction -- 2 P2PSystems -- 3 Data Replication and Update Management in P2P Systems -- 3.1 Data Replication Update Management. , 3.2 Data Replication Techniques in P2P -- 4 Replication Requirements and Solutions for Different Applications -- 4.1 Consistency and Limits to Replication -- 4.2 Context and Uses of Data Replication -- 5 A Fuzzy-Based System for Evaluating Data Replication Factor -- 5.1 Fuzzy Logic -- 5.2 Proposed System -- 5.3 Simulation Results -- 6 Discussion and Analysis -- 6.1 Setting Up a Replication Plan -- 7 Conclusions -- References -- Leveraging High-Performance Computing Infrastructures to Web Data Analytic Applications by Means of Message-Passing Interface -- 1 Introduction -- 2 Data-Centric Parallelisation with MPI -- 3 OMPIJava - Java Bindings for Open MPI -- 4 OMPIJava Performance Evaluation -- 5 Parallelisation of Random Indexing with MPI -- 6 Performance Analysis Tools -- 7 Conclusion and Future Directions -- References -- ReHRS: A Hybrid Redundant System for Improving MapReduce Reliability and Availability -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 The Proposed System -- 3.1 Metadata -- 3.2 State/Metadata Synchronization -- 3.3 Periodical P-Metadata Backup/Update -- 3.4 Failure Detection -- 3.5 Dynamic Warmup Mechanism -- 3.6 Takeover Process -- 4 Performance Evaluation -- 4.1 Takeover Delays Evaluation -- 4.2 Warmup Performance Evaluation -- 5 Conclusion and Future Work -- References -- Analysis and Visualization of Large-Scale Time Series Network Data -- 1 Introduction -- 2 Big Data Applications -- 2.1 Environmental Sustainability -- 2.2 Data Mining for Trend Identification -- 2.3 Sensor Networks and Visualization -- 2.4 Network Application Design -- 2.5 Big Data Analysis for Environmental Sustainability -- 3 Visualization and Pattern Identification in Big Data -- 3.1 Large-Scale Data for Visualization -- 3.2 Time Series Data Analysis -- 3.3 Methodology -- 4 Preparing Big D Data for Analysis. , 5 RapidMiner vs. Weka vs. Orange -- 6 Mining the Data -- 7 Visual Inspectio on of Raw Data -- 8 Visualization an nd Presentation in Context -- 9 Conclusions -- References -- Parallel Coordinates Version of Time-Tunnel (PCTT) and Its Combinatorial Use for Macro to Micro Level Visual Analytics of Multidimensional Data -- 1 Introduction -- 2 Related Work -- 3 Essential Mechanisms of IntelligentBox -- 3.1 Model-Display Object (MD) Structure -- 3.2 Message-Sending Protocol for Slot-Connections -- 4 Time-Tunnel and Its Parallel Coordinates Version -- 4.1 System Configuration -- 4.2 Parallel Coordinates Version of Time-Tunnel (PCTT) -- 4.3 2Dto2D Visualization Functionality -- 5 Network Data Visualization Using PCTT with 2Dto2D Visualization -- 5.1 IP Packet Data -- 5.2 PCTT with 2Dto2D Visualization for IP Packet Data -- 5.3 Intrusion Detection -- 6 Combinatorial Use of PCTT for Macro Level to Micro Level Visual Analytics -- 7 Other Visualization Examples -- 8 Conclusion and Remarks -- References -- Towards a Big Data Analytics Framework for IoT and Smart City Applications -- 1 Introduction -- 2 Background: Big Data and the Internet of Things -- 2.1 The Various Faces of Big Data -- 2.2 Internet of Things -- 3 State of the Art -- 3.1 Big Data -- 3.2 Batch Processing -- 3.3 Real-Time Analytics -- 4 The Big Smart City Integration Challenges -- 4.1 Integration of Batch and Stream Processing -- 4.2 Integration of Heterogeneous Data Sources -- 4.3 Natural Text and Social Media Analysis -- 5 Case Study: Smart Grid Analytics -- 5.1 Power Quality Analytics -- 5.2 Real-Time Grid Monitoring -- 5.3 Forecasting Energy Demand -- 5.4 Lessons Learned -- 6 Unified Big Data Processing -- 6.1 Model Learning in the Batch Layer -- 6.2 Viewing Data Patterns in the Serving Layer -- 6.3 In-Stream Analytics in the Streaming Layer -- 6.4 Accessing the Data in the Application Layer. , 7 Further Research Directions -- 8 Conclusions -- References -- How the Big Data Is Leading the Evolution of ICT Technologies and Processes -- 1 Introduction -- 2 What Is the Big Data -- 2.1 Telecommunication Services -- 2.2 The Social Wave -- 2.3 Science and Research -- 2.4 Government and Public Sector -- 2.5 Internet of Things -- 2.6 Clouds -- 3 The Big Data Opportunity -- 3.1 Bringing Value -- 3.2 The Big Data Value across Sectors -- 4 The Impact of Big Data on Technologies -- 4.1 Big Data and Technologies -- 4.2 Storage Costs and Efficiency -- 5 Big Data Management and Analytics -- 5.1 Database Architectures for Big Data Processing -- 5.2 The MapReduce Paradigm -- 5.3 Hybrid Solutions -- 5.4 The Hadoop Processing Framework -- 5.5 Big Data Analytics -- 5.6 Results Visualization -- 6 Big Data Models -- 7 Conclusion -- References -- Big Data, Unstructured Data, and the Cloud: Perspectives on Internal Controls -- 1 Introduction -- 2 Preliminary Concepts and Definitions -- 3 State of the Art -- 3.1 The Advantages of Cloud Services -- 3.2 The Disadvantages of Cloud Services -- 3.3 Data Storage and the Cloud -- 3.4 The Use and Frequency of Unstructured Data -- 4 Problems, Issues, and Challenges -- 4.1 Self-performed Audit Procedures -- 4.2 Third-Party (Service) Audit Procedures -- 4.3 Other Procedures -- 4.4 Timescales and Logistical Concerns -- 5 Proposed Approach and Solutions -- 5.1 Background to the Survey -- 5.2 The Survey -- 5.3 Survey Results -- 5.4 Interpretation and Analysis of the Results -- 6 Summary Evaluations and Lessons Learned -- 7 Further Research Issues -- 8 Conclusion -- References -- Future Human-Centric Smart Environments -- 1 Introduction -- 2 Main Challenges for Achieving Livable Smart Cities -- 2.1 IoT Technologies -- 2.2 Trusted IoT -- 2.3 Smart City Management and Services -- 2.4 User Involvement -- 3 User Centric IoT Systems. , 3.1 Human Centered Perspective.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...