Suchergebnisse - Security and privacy Software and applications security Software security engineering
Ähnliche Schlagwörter innerhalb Ihrer Suche.
Ähnliche Schlagwörter innerhalb Ihrer Suche.
- Computational intelligence 5
- Application software 3
- Multimedia information systems 3
- Artificial intelligence 2
- Big data 2
- Computer communication systems 2
- Electronic circuits 2
- Computers and civilization 1
- Data mining 1
- Design 1
- Engineering design 1
- Image processing 1
- Industrial management 1
- Management 1
- Quality of life 1
- Signal processing 1
- Speech processing systems 1
- User interfaces (Computer systems) 1
Andere Suchmöglichkeiten:
- privacy software »
- applications »
-
1
Internet of Things and Big Data Analytics Toward Next-Generation Intelligence
ISBN: 9783319604350ISSN: 2197-6503 ;Veröffentlicht: Cham : Springer International Publishing, 2018.
Elektronisch E-Book -
2
UX Fundamentals for Non-UX Professionals User Experience Principles for Managers, Writers, Designers, and Developers /
ISBN: 9781484238110Veröffentlicht: Berkeley, CA : Apress, 2018.
Elektronisch E-Book -
3
Big Data Analytics Proceedings of CSI 2015 /
ISBN: 9789811066207ISSN: 2194-5357 ;Veröffentlicht: Singapore : Springer Singapore , 2018.Inhaltsangabe: “… Title of the Papers along with the Name of the Authors -- Need for Developing Intelligent Interfaces for Big Data Analytics in the Micro Finance Industry -- Unified Resource Descriptor over KAAS Framework Refining Cloud Dynamics -- An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing -- A Framework for Ontology Learning from Taxonomic Data -- Leveraging Map-Reduce with Column Oriented Stores: Study of Solutions and Benefits -- Hadoop: Solution to Unstructured Data Handling -- Task Based Load Balancing Algorithm by Efficient Utilization of VMs in Cloud Computing -- A Load Balancing Algorithm Based on Processing Capacities of VMs in Cloud Computing -- Package Based Approach for Load Balancing in Cloud Computing -- Workload Prediction of e-Business Websites on Cloud Using Different Methods of ANN -- Data Security in Cloud Based Analytics -- Ontology Based Ranking in Search Engine -- Hidden Data extraction Using URL Templates Processing -- Automatic Generation of Ontology for Extracting Hidden Web Pages -- Importance of SLA in Cloud Computing -- A Survey on Cloud Computing -- Adapting & Reducing Cost in Cloud Paradigm (ARCCP) -- Power Aware Based Workflow Model of Grid Computing Using Ant Based Heuristic Approach -- Image Categorization Using Improved Data Mining Technique -- An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security -- Big Data Analytics: Recent and Emerging Application in Services Industry -- An Analysis of Resource Aware Adaptive Scheduling for HPC Clusters with Hadoop -- Analytical and Perspective Approach of Big Data in Cloud Computing -- Implementation of CouchDB Views -- Evolution of FOAF and SIOC in Semantic Web: A Survey -- Classification of e-Commerce Products Using Rep-Tree And K-Mean Hybrid Approach -- A Study of Factors Affecting MapReduce Scheduling -- Outlier Detection in Agriculture Domain: Application and Techniques -- A Framework for Twitter Data Analysis -- Web Structure Mining Algorithms: A Survey -- Big Data Analytics via IoT with Cloud Service -- A Proposed Contextual Model for Big Data Analysis Using Advanced Analytics -- Ranked Search over Encrypted Cloud Data in Azure Using Secure kNN -- DCI3 Model for Privacy Preserving in Big Data -- Study of Sentiment Analysis Using Hadoop -- OPTIMA(OPinionated Tweet Implied Mining and Analysis) - An Innovative Tool to Automate Sentiment Analysis -- Mobile Agent Based MapReduce Framework for Big Data Processing -- Review of Parallel Apriori Algorithm on Map Reduce Framework for Performance Enhancement -- A Novel Approach to Realize Internet of Intelligent Things -- An Innovative Approach of Web Page Ranking Using Hadoop and MapReduce Based Cloud Framework -- SAASQUAL: A Quality Model for Evaluating SaaS on the Cloud Computing Environment -- Scalable Aspect Based Summarization in the Hadoop Environment -- Parallel Mining of Frequent Itemsets from Memory Mapped Files -- Handling Smurfing Through Big Data -- A Novel Approach for Semantic Prefetching Using Semantic Information and Semantic Association -- Optimized Cost Model with Optimal Resource Usage for Cloud -- Understanding Live Migration Techniques Intended for Resource Interference Minimization in Virtualized Cloud Environment -- Cloud Security Issues and Challenges -- A Novel Approach to Protect Cloud Environments Against DDOS Attacks -- An Approach for Workflow Scheduling in Cloud Using ACO -- Data Type Identification and Extension Validator Framework Model for Public Cloud Storage -- Robust Fuzzy Neuro System for Big Data Analytics -- Deployment of Cloud Using Open Source Virtualization: Study of VM Migration Methods and Benefits -- Implementation of Category-wise Focused Web Crawler -- MAYA: An Approach for Energy and Cost Optimization for Mobile Cloud Computing Environments -- Load Balancing in Cloud - A Systematic Review -- Cloud-Based Big Data Analytics - A Survey of Current Research and Future Directions -- Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler's Theorem and Application in Cloud Computing -- Big Data: Issues, Challenges and Techniques in Business Intelligence -- Cloud Computing in Bioinformatics and Big Data Analytics: Current Status and Future Research -- Generalized Query Processing Mechanism in CDBMS -- Deliberative Study of Security Issues in Cloud Computing -- Green Cloud Computing: An Overview -- Literature Review of QoS with Load Balancing in Cloud Computing Environment -- WAMLB: Weighted Active Monitoring Load Balancing in Cloud Computing -- Applications of Attribute Based Encryption in Cloud Computing Environment -- Query Optimization: Issues and Challenges in Mining of Distributed Data -- Comprehensive Study of Cloud Computing and Related Security Issues -- Healthcare Data Analysis Using R and MongoDB -- Data Mining Tools and Techniques for Mining Software Repositories: A Systematic Review -- SWOT Analysis of Cloud Computing Environment -- A Review on Quality of Service in Cloud Computing -- Association Rule Mining for Finding Admission Tendency of Engineering Student with Pattern Growth Appraoch -- Integrated Effect of Nearest Neighbors and Distance Measures in k-NN Algorithm. …”
Elektronisch E-Book -
4
Frontier Computing Theory, Technologies and Applications FC 2016 /
ISBN: 9789811031878ISSN: 1876-1100 ;Veröffentlicht: Singapore : Springer Singapore , 2018.
Elektronisch E-Book -
5
Frontier Computing Theory, Technologies and Applications (FC 2017) /
ISBN: 9789811073984ISSN: 1876-1100 ;Veröffentlicht: Singapore : Springer Singapore , 2018.
Elektronisch E-Book -
6
Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia...
ISBN: 9783319638560ISSN: 2190-3018 ;Veröffentlicht: Cham : Springer International Publishing, 2018.
Elektronisch E-Book -
7
Fast-track innovation and commercialization : tools and techniques /
ISBN: 9783031303753Veröffentlicht: Cham : Springer, 2023.Inhaltsangabe: “… E.3.8 Security and Privacy Requirements -- E.3.9 System Environment Requirements -- E.3.10 Computer Resource Requirements -- E.3.10.1 Computer Hardware Requirements -- E.3.10.2 Computer Hardware Resource Utilization Requirements -- E.3.10.3 Computer Software Requirements -- E.3.10.4 Computer Communications Requirements -- E.3.11 System Quality Factors -- E.3.12 Design and Construction Constraints -- E.3.13 Personnel Related Requirements -- E.3.14 Training Related Requirements -- E.3.15 Logistics Related Requirements -- E.3.16 Other Requirements -- E.3.17 Packaging Requirements -- E.3.18 Statutory, Regulatory, and Certification Requirements -- E.3.18.1 Statutory Requirements -- E.3.18.2 Regulatory Requirements -- E.3.18.3 Certification Requirements -- E.3.19 Precedence and Criticality of Requirements -- E.3.20 Demilitarization and Disposal -- E.4 Verification Provisions -- E.4.1 Verification Methods -- E.4.1.1 Demonstration -- E.4.1.2 Test -- E.4.1.3 Analysis -- E.4.1.4 Inspection -- E.4.1.5 Special Verification Methods -- E.5 Requirements Traceability -- E.5.1 Traceability to Capability Document or System Specification -- E.5.2 Traceability to Subsystems Requirements -- E.6 Appendix Section -- E.6.1 Appendix A-Acronyms and Definitions -- E.6.2 Appendix B-Key Performance Parameters/Key System Attributes -- E.6.3 Appendix C-Requirements Traceability Matrices -- E.6.4 Appendix D-Verification Matrices -- Appendix F A3 Template -- Appendix G Risk Register -- Index. …”
E-Book

