This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest deve…
Movies will never be the same after you learn how to analyze movie data, including key data mining, text mining and social network analytics concepts. These techniques may then be used in endless other contexts. In the movie application, this topic opens a lively discussion on the current developments in big data from a data science perspective. This book is geared to applied researchers and pr…
This book covers the latest advances in Big Data technologies and provides the readers with a comprehensive review of the state-of-the-art in Big Data processing, analysis, analytics, and other related topics. It presents new models, algorithms, software solutions and methodologies, covering the full data cycle, from data gathering to their visualization and interaction, and includes a set of c…
This book constitutes the thoroughly refereed post-proceedings of the satellite events of the 9th International Conference on the Semantic Web, ESWC 2012, held in Heraklion, Crete, Greece, in May 2012. This volume contains 49 full papers and 13 short papers describing the posters and demonstrations. (SUGGESTION/ HELP needed).
Dr. Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 90 publications (including 6 books) and having presented more than 120 talks and lectures in international conferences and seminars in 20 countries. Holding 2 Ph.Ds his research interests focus on security issues in PBXs (private telephony exchanges), where he has 20 years of experience, as…
The two-volume set LNCS 9366 and 9367 constitutes the refereed proceedings of the 14th International Semantic Web Conference, ISWC 2015, held in Bethlehem, PA, USA, in October 2015. The International Semantic Web Conference is the premier forum for Semantic Web research, where cutting edge scientific results and technological innovations are presented, where problems and solutions are discus…
This book constitutes the refereed proceedings of the Third International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2015, held in Hyderabad, India, in December 2015. The 48 full papers and 8 short papers presented together with 4 doctoral consortium papers were carefully reviewed and selected from 185 submissions. The papers cover a wide range of topics including inform…
This book constitutes the refereed proceedings of the 5th International Conference on Model and Data Engineering, MEDI 2015, held in Rhodes, Greece, in September 2015. The 18 full papers and 9 short papers presented together with 2 invited talks were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections such as modeling and meta modeling; ontology-bas…
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
RMAN is Oracle’s flagship backup and recovery tool, but did you know it’s also an effective database duplication tool? Oracle RMAN Database Duplication is a deep dive into RMAN’s duplication feature set, showing how RMAN can make it so much easier for you as a database administrator to satisfy the many requests from developers and testers for database copies and refreshes for use in their…