Data Models for Semistructured Data -- ORA-SS -- Schema Extraction -- Normalization -- Views -- Physical Database Design -- Conclusion.Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design …
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
Regular Papers -- Accountable Anonymous E-Mail -- Protecting Consumer Data in Composite Web Services -- A Decision Matrix Approach -- Assignment of Security Clearances in an Organization -- Tool Supported Management of Information Security Culture -- ERPSEC - A Reference Framework to Enhance Security in ERP Systems -- A New Architecture for User Authentication and Key Exchange Using Password fo…
Typical Group Key Management Schemes -- Tree Based Key Management Schemes -- Dynamic Conferencing Schemes -- Secure Group Communications with Hierarchical Access Control -- SGC Challenges and SGC for Wireless Networks -- Concluding Remarks.This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an over…
Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks -- Towards an Integrated Protein-Protein Interaction Network -- The Factor Graph Network Model for Biological Systems -- Pairwise Local Alignment of Protein Interaction Networks Guided by Models of Evolution -- Finding Nov…
Predicting Genetic Regulatory Response Using Classification: Yeast Stress Response -- Detecting Functional Modules of Transcription Factor Binding Sites in the Human Genome -- Fishing for Proteins in the Pacific Northwest -- PhyloGibbs: A Gibbs Sampler Incorporating Phylogenetic Information -- Application of Kernel Method to Reveal Subtypes of TF Binding Motifs -- Learning Regulatory Network Mo…
Discrimination and Clustering -- Probability Models and Statistical Methods -- Pattern Recognition and Computational Learning -- Time Series Analysis -- Marketing, Retailing, and Marketing Research -- Finance, Capital Markets, and Risk Management -- Production, Logistics, and Controlling -- Medicine and Health Services.
Data Analysis -- Optimization in Symbolic Data Analysis: Dissimilarities, Class Centers, and Clustering -- An Efficient Branch and Bound Procedure for Restricted Principal Components Analysis -- A Tree Structured Classifier for Symbolic Class Description -- A Diversity Measure for Tree-Based Classifier Ensembles -- Repeated Confidence Intervals in Self-Organizing Studies -- Fuzzy and Crisp Maha…
Parte 1 -- Un cifrario del XVIII secolo -- La prima macchina cifrante al mondo -- Damm, Hagelin e Gyldén -- Intercettazione di segnali radio e analisi crittografica prima del 1939 -- Guerra -- Entra in scena Arne Beurling -- La flotta russa del Baltico -- Segnali misteriosi -- Telescriventi -- L’analisi di Beurling -- La G-Schreiber e gli “app” -- Crittoanalisi sistematica -- Esce di sce…
Privacy/Anonymity -- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols -- Personal Attributes and Privacy -- Mobile Security 1 -- Local Management of Credits and Debits in Mobile Ad Hoc Networks -- How Secure are Current Mobile Operating Systems? -- An Overview of Security Issues and Techniques in Mobile Agents -- Mobile Security 2 -- A Secure Channel Protocol for …