You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Stringently reviewed papers presented at the October 1992 meeting held in Cambridge, Mass., address such topics as nonmonotonic logic; taxonomic logic; specialized algorithms for temporal, spatial, and numerical reasoning; and knowledge representation issues in planning, diagnosis, and natural langu
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
This book constitutes the refereed proceedings of the 3rd European Semantic Web Conference, ESWC 2006. The book presents 48 revised full papers with abstracts of 3 invited talks. The papers are organized in topical sections on ontology alignment, engineering, evaluation, evolution and learning, rules and reasoning, searching and querying, semantic annotation, semantic web mining and personalisation, semantic web services, semantic wiki and blogging, as well as trust and policies.
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.
This book constitutes the refereed proceedings of the First International Conference on Trust Management, iTrust 2003, held in Heraklion, Crete, Greece in May 2003. The 24 revised full papers presented were carefully reviewed and selected from 58 submissions. This first book devoted to the emerging interdisciplinary field of trust management spans the whole range of relevant topics, from technical issues in distributed and open systems to legal, social, and philosophical aspects.
The proceedings of the Second International Conference on [title] held in Cambridge, Massachusetts, April 1991, comprise 55 papers on topics including the logical specifications of reasoning behaviors and representation formalisms, comparative analysis of competing algorithms and formalisms, and ana
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
This book constitutes the refereed proceedings of the 20th International Conference on Scientific and Statistical Database Management, SSDBM 2008, held in Hong Kong, China, in July 2008. The 28 revised full papers, 7 revised short papers and 8 poster and demo papers presented together with 3 invited talks were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, data streams, scientific database applications, advanced indexing methods, data mining, as well as advanced queries and uncertain data.
Researchers in data management have recently recognized the importance of a new class of data-intensive applications that requires managing data streams, i.e., data composed of continuous, real-time sequence of items. Streaming applications pose new and interesting challenges for data management systems. Such application domains require queries to be evaluated continuously as opposed to the one time evaluation of a query for traditional applications. Streaming data sets grow continuously and queries must be evaluated on such unbounded data sets. These, as well as other challenges, require a major rethink of almost all aspects of traditional database management systems to support streaming ap...