


default search action
CD-ARES 2016: Salzburg, Austria
- Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa

, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9817, Springer 2016, ISBN 978-3-319-45506-8
The International Cross Domain Conference (CD-ARES 2016)
- Iztok Savnik, Kiyoshi Nitta

:
Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-Store. 3-18 - Alberto Bartoli

, Andrea De Lorenzo
, Eric Medvet
, Fabiano Tarlao:
Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews. 19-28 - Michael Hitz, Mirjana Radonjic-Simic

, Julian Reichwald, Dennis Pfisterer:
Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything. 29-44 - Gianfranco Lamperti

, Xiangfu Zhao:
Diagnosis of Complex Active Systems with Uncertain Temporal Observations. 45-62 - Eugenio Cesario

, Francesco Folino, Massimo Guarascio
, Luigi Pontieri
:
A Cloud-Based Prediction Framework for Analyzing Business Process Performances. 63-80 - Andreas Holzinger

, Markus Plass, Katharina Holzinger
, Gloria Cerasela Crisan
, Camelia-Mihaela Pintea
, Vasile Palade:
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach. 81-95 - Francesco Buccafurri, Gianluca Lax

, Serena Nicolazzo
, Antonino Nocera
:
A Threat to Friendship Privacy in Facebook. 96-105 - Rashed Mazumder, Atsuko Miyaji

, Chunhua Su:
A Blockcipher Based Authentication Encryption. 106-123 - Rashed Mazumder, Atsuko Miyaji

, Chunhua Su:
An Efficient Construction of a Compression Function for Cryptographic Hash. 124-140 - Maxim Kolomeets

, Andrey Chechulin
, Igor V. Kotenko
:
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. 141-157 - Angelo Furfaro

, Teresa Gallo, Domenico Saccà:
Modeling Cyber Systemic Risk for the Business Continuity Plan of a Bank. 158-174 - Inger Anne Tøndel, Fredrik Seehusen, Erlend Andreas Gjære, Marie Elisabeth Gaup Moe

:
Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective. 175-190
Special Session on Privacy Aware Machine Learning for Health Data Science (PAML 2016)
- Yoan Miché, Ian Oliver, Silke Holtmanns, Aapo Kalliola, Anton Akusok, Amaury Lendasse, Kaj-Mikael Björk:

Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health Data. 193-203 - Felix Dietze, Johannes Karoff, André Calero Valdez

, Martina Ziefle, Christoph Greven
, Ulrik Schroeder
:
An Open-Source Object-Graph-Mapping Framework for Neo4j and Scala: Renesca. 204-218 - Sigal Shaked, Lior Rokach:

Publishing Differentially Private Medical Events Data. 219-235 - Katerina Zamani, Angelos Charalambidis

, Stasinos Konstantopoulos, Maria Dagioglou, Vangelis Karkaletsis:
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis. 236-250 - Bernd Malle, Peter Kieseberg

, Edgar R. Weippl, Andreas Holzinger
:
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. 251-266

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














