- Table View
- List View
Data Analytics with Hadoop: An Introduction for Data Scientists
by Benjamin Bengfort Jenny KimReady to use statistical and machine-learning techniques across large data sets? This practical guide shows you why the Hadoop ecosystem is perfect for the job. Instead of deployment, operations, or software development usually associated with distributed computing, you'll focus on particular analyses you can build, the data warehousing techniques that Hadoop provides, and higher order data workflows this framework can produce.Data scientists and analysts will learn how to perform a wide range of techniques, from writing MapReduce and Spark applications with Python to using advanced modeling and data management with Spark MLlib, Hive, and HBase. You'll also learn about the analytical processes and data systems available to build and empower data products that can handle--and actually require--huge amounts of data.Understand core concepts behind Hadoop and cluster computingUse design patterns and parallel analytical algorithms to create distributed data analysis jobsLearn about data management, mining, and warehousing in a distributed context using Apache Hive and HBaseUse Sqoop and Apache Flume to ingest data from relational databasesProgram complex Hadoop and Spark applications with Apache Pig and Spark DataFramesPerform machine learning techniques such as classification, clustering, and collaborative filtering with Spark's MLlib
Data and AI Driving Smart Cities (Studies in Big Data #128)
by Pedro Ponce Therese Peffer Juana Isabel Mendez Garduno Ursula Eicker Arturo Molina Troy McDaniel Edgard D. Musafiri Mimo Ramanunni Parakkal Menon Kathryn Kaspar Sadam HussainThis book illustrates how the advanced technology developed for smart cities requires increasing interaction with citizens to motivate and incentive them. Megacities' needs have been encouraging for the creation of smart cities in which the needs of inhabitants are collected using virtualization and digitalization systems. On the other hand, machine learning algorithms have been implemented to provide better solutions for diverse areas in smart cities, such as transportation and health. Besides, conventional electric grids have transformed into smart grids, improving energy quality. Gamification, serious games, machine learning, dynamic interfaces, and social networks are some elements integrated holistically to provide novel solutions to design and develop smart cities. Also, this book presents in a friendly way the concept of social devices that are incorporated into smart homes and buildings. This book is used to understand and design smart cities where citizens are strongly interconnected so the demand response time can be reduced.
Data and Analytics Strategy for Business: Unlock Data Assets and Increase Innovation with a Results-Driven Data Strategy
by Simon Asplen-TaylorFor many organizations data is a by-product, but for the smarter ones it is the heartbeat of their business. Most businesses have a wealth of data buried in their systems which, if used effectively, could increase revenue, reduce costs and risk and improve customer satisfaction and employee experience. Beginning with how to choose projects which reflect your organization's goals and how to make the business case for investing in data, this book then takes the reader through the five 'waves' of organizational data maturity. It takes the reader from getting started on the data journey with some quick wins, to how data can help your business become a leading innovator which systematically outperforms competitors.Data and Analytics Strategy for Business outlines how to build consistent, high-quality sources of data which will create business value and explores how automation, AI and machine learning can improve performance and decision making. Filled with real-world examples and case studies, this book is a stage-by-stage guide to designing and implementing a results-driven data strategy.
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings (Lecture Notes in Computer Science #9149)
by Pierangela SamaratiThis book constitutes the refereed proceedings of the 29th Annual IFIP WG 11. 3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.
Data and Applications Security and Privacy XXX: 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings (Lecture Notes in Computer Science #9766)
by Vipin Swarup Silvio RaniseThis book constitutes the refereed proceedings of the 30th Annual IFIP WG 11. 3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016. The 17 full papers and 7 short papers presented were carefully reviewed and selected from 54 submissions. Their topics cover a wide range of data and application security and privacy problems including those of mobile devices, collaborative systems, databases, big data, virtual systems, cloud computing, and social networks. The program also included twoinvited talks.
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings (Lecture Notes in Computer Science #10359)
by Giovanni Livraga and Sencun ZhuThis book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017.The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web.
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings (Lecture Notes in Computer Science #10980)
by Florian Kerschbaum Stefano ParaboschiThis book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings (Lecture Notes in Computer Science #11559)
by Simon N. FoleyThis book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018.The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware.
Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings (Lecture Notes in Computer Science #12122)
by Anoop Singhal Jaideep VaidyaThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
Data and Applications Security and Privacy XXXV: 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings (Lecture Notes in Computer Science #12840)
by Ken Barker Kambiz GhazinourThis book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.*The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others.*The conference was held virtually due to the COVID-19 pandemic.
Data and Applications Security and Privacy XXXVI: 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18–20, 2022, Proceedings (Lecture Notes in Computer Science #13383)
by Shamik Sural Haibing LuThis book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022.The 12 full papers and 6 short papers presented were carefully reviewed and selected from 33 submissions. The conference covers research in data and applications security and privacy.
Data and Applications Security and Privacy XXXVII: 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19–21, 2023, Proceedings (Lecture Notes in Computer Science #13942)
by Vijayalakshmi Atluri Anna Lisa FerraraThis volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19–21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.
Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings (Lecture Notes in Computer Science #14901)
by Ram Krishnan Anna Lisa FerraraThis book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15–17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
Data and Communication Networks: Proceedings Of Gucon 2018 (Advances in Intelligent Systems and Computing #847)
by Lakhmi C. Jain Valentina E. Balas Prashant JohriThe book constitutes selected high quality papers presented in International Conference on Computing, Power and Communication Technologies 2018 (GUCON 2018) organised by Galgotias University, India, in September 2018. It discusses issues in electrical, computer and electronics engineering and technologies. The selected papers are organised into three sections - cloud computing and computer networks; data mining and big data analysis; and bioinformatics and machine learning. In-depth discussions on various issues under these topics provides an interesting compilation for researchers, engineers, and students.
Data and Energy Integrated Communication Networks: A Brief Introduction (SpringerBriefs in Computer Science)
by Jie Hu Kun YangThe book discusses data and energy integrated communication networking technologies, including the latest research contributions in this promising area. It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band. It then describes the ubiquitous architecture of DEINs and demonstrates the typical DEIN system and investigates the core issues in both the physical layer and the medium-access-control (MAC) layer in order to coordinate both the WIT and WET in the same RF band. Lastly, the book addresses a number of emerging research topics in the field of DEINs. It promotes joint efforts from both academia and industry to push DEIN a step closer to practical implementation. It is also a valuable resource for students interested in studying cutting-edge techniques in this field.
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by Bruce SchneierYou are under surveillance right now. Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we're offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we've gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by Bruce SchneierYou are under surveillance right now.<P><P> Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.<P> The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.<P> Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
Data and Information in Online Environments: Second EAI International Conference, DIONE 2021, Virtual Event, March 10–12, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #378)
by Edgar Bisset ÁlvarezThis book constitutes the refereed post-conference proceedings of the Second International Conference on Data Information in Online Environments, DIONE 2021, which took place in March 2021. Due to COVID-19 pandemic the conference was held virtually. DIONE 2021 presents theoretical proposals and practical solutions in the treatment, processing and study of data and information produced in online environments, the latest trends in the analysis of network information, media metrics social, data processing technologies and open science. The 40 revised full papers were carefully reviewed and selected from 86 submissions. The papers are grouped in thematical sessions on evaluation of science in social networking environment; scholarly publishing and online communication; and education in online environments.
Data and Information in Online Environments: First EAI International Conference, DIONE 2020, Florianópolis, Brazil, March 19-20, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #319)
by Rogério MugnainiThis book constitutes the refereed post-conference proceedings of the First International Conference on Data and Information in Online Environments, DIONE 2020, which took place in Florianópolis, Brazil, in March 2020. DIONE 2020 handles the growing interaction between the information sciences, communication sciences and computer sciences. The 18 revised full papers were carefully reviewed and selected from 37 submissions and focus on the production, dissemination and evaluation of contents in online environments. The goal is to improve cooperation between data science, natural language processing, data engineering, big data, research evaluation, network science, sociology of science and communication communities.
Data and Information in Online Environments: Third EAI International Conference, DIONE 2022, Virtual Event, July 28-29, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #452)
by Adilson Luiz Pinto Ricardo Arencibia-JorgeThis book constitutes the refereed post-conference proceedings of the Third EAI International Conference on Data and Information in Online Environments, DIONE 2022, held as virtual event, in July 28-29, 2022. Due to COVID-19 pandemic the conference was held virtually.DIONE 2022 aims to bring together academicians and practitioners willing to discuss topics around the intersection of Computer Science, Information Science, and Communication Science. The attractiveness of the scope and topics has brought relevant research results. This proceeding consists of chapters covering deep learning, data management, software design, social networks, natural language processing, and data processing in various contexts like scholarly publishing, health and medicine, higher education, innovation and research, energy and transportation, and organizations.The 18 full papers and 2 short papers were carefully reviewed and selected from 56 submissions. The papers are grouped in thematic sessions as follows: Informational challenges for the study of Science, Technology and Society relationships; and Advances in Artificial Intelligence for data processing and analysis in online social environments.
Data and Information Quality: Dimensions, Principles and Techniques (Data-Centric Systems and Applications #0)
by Carlo Batini Monica ScannapiecoThis book provides a systematic and comparative description of the vast number of research issues related to the quality of data and information. It does so by delivering a sound, integrated and comprehensive overview of the state of the art and future development of data and information quality in databases and information systems. To this end, it presents an extensive description of the techniques that constitute the core of data and information quality research, including record linkage (also called object identification), data integration, error localization and correction, and examines the related techniques in a comprehensive and original methodological framework. Quality dimension definitions and adopted models are also analyzed in detail, and differences between the proposed solutions are highlighted and discussed. Furthermore, while systematically describing data and information quality as an autonomous research area, paradigms and influences deriving from other areas, such as probability theory, statistical data analysis, data mining, knowledge representation, and machine learning are also included. Last not least, the book also highlights very practical solutions, such as methodologies, benchmarks for the most effective techniques, case studies, and examples. The book has been written primarily for researchers in the fields of databases and information management or in natural sciences who are interested in investigating properties of data and information that have an impact on the quality of experiments, processes and on real life. The material presented is also sufficiently self-contained for masters or PhD-level courses, and it covers all the fundamentals and topics without the need for other textbooks. Data and information system administrators and practitioners, who deal with systems exposed to data-quality issues and as a result need a systematization of the field and practical methods in the area, will also benefit from the combination of concrete practical approaches with sound theoretical formalisms.
Data and Text Processing for Health and Life Sciences (Advances in Experimental Medicine and Biology #1137)
by Francisco M. CoutoThis open access book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show how simple command line tools can be used and combined to retrieve data and text from web resources, to filter and mine literature, and to explore the semantics encoded in biomedical ontologies. To store data this book relies on open standard text file formats, such as TSV, CSV, XML, and OWL, that can be open by any text editor or spreadsheet application. The first two chapters, Introduction and Resources, provide a brief introduction to the shell scripting and describe popular data resources in Health and Life Sciences. The third chapter, Data Retrieval, starts by introducing a common data processing task that involves multiple data resources. Then, this chapter explains how to automate each step of that task by introducing the required commands line tools one by one. The fourth chapter, Text Processing, shows how to filter and analyze text by using simple string matching techniques and regular expressions. The last chapter, Semantic Processing, shows how XPath queries and shell scripting is able to process complex data, such as the graphs used to specify ontologies. Besides being almost immutable for more than four decades and being available in most of our personal computers, shell scripting is relatively easy to learn by Health and Life specialists as a sequence of independent commands. Comprehending them is like conducting a new laboratory protocol by testing and understanding its procedural steps and variables, and combining their intermediate results. Thus, this book is particularly relevant to Health and Life specialists or students that want to easily learn how to process data and text, and which in return may facilitate and inspire them to acquire deeper bioinformatics skills in the future.
Data and the Built Environment: A Practical Guide to Building a Better World Using Data (Digital Innovations in Architecture, Engineering and Construction)
by Ian Gordon Neil ThompsonThis book takes a data-first approach to framing the built environment sector’s unique challenges and how industry can address them through better use of data. It describes how the sector has failed to derive value from data, and the common causes underlying this failure. It then provides practical guidance on how to use data to construct and operate built environment assets in a manner that better meets society’s needs. The book examines how industry norms, organizational culture, and our personal behaviours contribute to the successful use of data. It sets out a philosophy and vision for the use of data in the built environment, and how this in turn might help the sector realise better outcomes in terms of cost, schedule, quality, and sustainability. Data is a valuable asset, one that the built environment sector must generate, protect, manage, and exploit. The book works as a holistic primer to data and the built environment, written both for those who are new to data or the built environment, and including deep-dive material that will provide insight to experienced professionals.
Data, Architecture and the Experience of Place
by Anastasia KarandinouThe notion of data is increasingly encountered in spatial, creative and cultural studies. Big data and artificial intelligence are significantly influencing a number of disciplines. Processes, methods and vocabularies from sciences, architecture, arts are borrowed, discussed and tweaked, and new cross-disciplinary fields emerge. More and more, artists and designers are drawing on hard data to interpret the world and to create meaningful, sensuous environments. Architects are using neurophysiological data to improve their understanding of people’s experiences in built spaces. Different disciplines collaborate with scientists to visualise data in different and creative ways, revealing new connections, interpretations and readings. This often demonstrates a genuine desire to comprehend human behaviour and experience and to – possibly – inform design processes accordingly. At the same time, this opens up questions as to why this desire and curiosity is emerging now, how it relates to recent technological advances and how it converses with the cultural, philosophical and methodological context of the disciplines with which it engages. Questions are also raised as to how the use of data and data-informed methods may serve, support, promote and/or challenge political agendas. Data, Architecture and the Experience of Place provides an overview of new approaches on this significant subject and is ideal for students and researchers in digital architecture, architectural theory, design, digital media, sensory studies and related fields.
Data as a Service: A Framework for Providing Reusable Enterprise Data Services
by Pushpak SarkarData as a Service shows how organizations can leverage "data as a service" by providing real-life case studies on the various and innovative architectures and related patterns Comprehensive approach to introducing data as a service in any organization A re-usable and flexible SOA based architecture framework Roadmap to introduce 'big data as a service' for potential clients Presents a thorough description of each component in the DaaS reference architecture so readers can implement solutions