Search Results - data integration

Refine Results
  1. 1

    Integrated Methods for Optimization by Hooker, John N.

    Published 2012
    Get full text
    Electronic eBook
  2. 2

    Integrated Methods for Optimization by Hooker, John N.

    Published 2012
    Get full text
    Electronic eBook
  3. 3

    The Integrated Architecture Framework Explained Why, What, How / by van't Wout, Jack

    Published 2010
    Get full text
    Electronic eBook
  4. 4

    The Integrated Architecture Framework Explained Why, What, How / by van't Wout, Jack

    Published 2010
    Get full text
    Electronic eBook
  5. 5

    Sports Data Mining by Schumaker, Robert P.

    Published 2010
    Get full text
    Electronic eBook
  6. 6

    Sports Data Mining by Schumaker, Robert P.

    Published 2010
    Get full text
    Electronic eBook
  7. 7

    Data Science and Engineering

    Open Access
    Electronic Journal
  8. 8

    Data Science and Engineering

    Open Access
    Electronic Journal
  9. 9

    Linked Open Data -- Creating Knowledge Out of Interlinked Data Results of the LOD2 Project /

    Published 2014
    Table of Contents: “…Introduction to LOD2, Sören Auer -- Advances in Large-scale RDF Data -- Knowledge Base Creation, Enrichment and Repair -- Interlinking and Knowledge Fusion -- Facilitating the Exploration and Visualization of Linked Data -- Supporting the Linked Data life cycle using an integrated tool stack -- LOD2 for Media and Publishing -- Building Enterprise Ready Applications Using Linked Open Data -- Lifting Open Data Portals to the Data Web -- Linked Open Data for Public Procurement.…”
    Get full text
    Electronic eBook
  10. 10

    Linked Open Data -- Creating Knowledge Out of Interlinked Data Results of the LOD2 Project /

    Published 2014
    Table of Contents: “…Introduction to LOD2, Sören Auer -- Advances in Large-scale RDF Data -- Knowledge Base Creation, Enrichment and Repair -- Interlinking and Knowledge Fusion -- Facilitating the Exploration and Visualization of Linked Data -- Supporting the Linked Data life cycle using an integrated tool stack -- LOD2 for Media and Publishing -- Building Enterprise Ready Applications Using Linked Open Data -- Lifting Open Data Portals to the Data Web -- Linked Open Data for Public Procurement.…”
    Get full text
    Electronic eBook
  11. 11

    Building the Infrastructure for Cloud Security A Solutions view / by Yeluri, Raghu, Castro-Leon, Enrique

    Published 2014
    Get full text
    Electronic eBook
  12. 12

    Building the Infrastructure for Cloud Security A Solutions view / by Yeluri, Raghu, Castro-Leon, Enrique

    Published 2014
    Get full text
    Electronic eBook
  13. 13

    Dark Web Exploring and Data Mining the Dark Side of the Web / by Chen, Hsinchun

    Published 2012
    Get full text
    Electronic eBook
  14. 14

    Dark Web Exploring and Data Mining the Dark Side of the Web / by Chen, Hsinchun

    Published 2012
    Get full text
    Electronic eBook
  15. 15

    Security Informatics

    Open Access
    Electronic Journal
  16. 16

    Security Informatics

    Open Access
    Electronic Journal
  17. 17
  18. 18
  19. 19

    Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...

    Published 2017
    Table of Contents: “…Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.…”
    Get full text
    Electronic eBook
  20. 20

    Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...

    Published 2017
    Table of Contents: “…Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.…”
    Get full text
    Electronic eBook