Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything (Englisch)
- Neue Suche nach: Hitz, Michael
- Neue Suche nach: Radonjic-Simic, Mirjana
- Neue Suche nach: Reichwald, Julian
- Neue Suche nach: Pfisterer, Dennis
- Neue Suche nach: Buccafurri, Francesco
- Neue Suche nach: Holzinger, Andreas
- Neue Suche nach: Kieseberg, Peter
- Neue Suche nach: Tjoa, A Min
- Neue Suche nach: Weippl, Edgar
- Neue Suche nach: Hitz, Michael
- Neue Suche nach: Radonjic-Simic, Mirjana
- Neue Suche nach: Reichwald, Julian
- Neue Suche nach: Pfisterer, Dennis
In:
Availability, Reliability, and Security in Information Systems
: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings
;
Kapitel: 3
;
29-44
;
2016
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Buccafurri, Francesco ( Herausgeber:in ) / Holzinger, Andreas ( Herausgeber:in ) / Kieseberg, Peter ( Herausgeber:in ) / Tjoa, A Min ( Herausgeber:in ) / Weippl, Edgar ( Herausgeber:in ) / Hitz, Michael ( Autor:in ) / Radonjic-Simic, Mirjana ( Autor:in ) / Reichwald, Julian ( Autor:in ) / Pfisterer, Dennis ( Autor:in )
-
Kongress:International Conference on Availability, Reliability, and Security ; 2016 ; Salzburg, Austria
-
Erschienen in:Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ; Kapitel: 3 ; 29-44Lecture Notes in Computer Science ; 9817 ; 29-44
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:23.08.2016
-
Format / Umfang:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-StoreSavnik, Iztok / Nitta, Kiyoshi et al. | 2016
- 2
-
Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper ReviewsBartoli, Alberto / De Lorenzo, Andrea / Medvet, Eric / Tarlao, Fabiano et al. | 2016
- 3
-
Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of EverythingHitz, Michael / Radonjic-Simic, Mirjana / Reichwald, Julian / Pfisterer, Dennis et al. | 2016
- 4
-
Diagnosis of Complex Active Systems with Uncertain Temporal ObservationsLamperti, Gianfranco / Zhao, Xiangfu et al. | 2016
- 5
-
A Cloud-Based Prediction Framework for Analyzing Business Process PerformancesCesario, Eugenio / Folino, Francesco / Guarascio, Massimo / Pontieri, Luigi et al. | 2016
- 6
-
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop ApproachHolzinger, Andreas / Plass, Markus / Holzinger, Katharina / Crişan, Gloria Cerasela / Pintea, Camelia-M. / Palade, Vasile et al. | 2016
- 7
-
A Threat to Friendship Privacy in FacebookBuccafurri, Francesco / Lax, Gianluca / Nicolazzo, Serena / Nocera, Antonino et al. | 2016
- 8
-
A Blockcipher Based Authentication EncryptionMazumder, Rashed / Miyaji, Atsuko / Su, Chunhua et al. | 2016
- 9
-
An Efficient Construction of a Compression Function for Cryptographic HashMazumder, Rashed / Miyaji, Atsuko / Su, Chunhua et al. | 2016
- 10
-
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi DiagramsKolomeets, Maxim / Chechulin, Andrey / Kotenko, Igor et al. | 2016
- 11
-
Modeling Cyber Systemic Risk for the Business Continuity Plan of a BankFurfaro, Angelo / Gallo, Teresa / Saccà, Domenico et al. | 2016
- 12
-
Differentiating Cyber Risk of Insurance Customers: The Insurance Company PerspectiveTøndel, Inger Anne / Seehusen, Fredrik / Gjære, Erlend Andreas / Moe, Marie Elisabeth Gaup et al. | 2016
- 13
-
Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health DataMiche, Yoan / Oliver, Ian / Holtmanns, Silke / Kalliola, Aapo / Akusok, Anton / Lendasse, Amaury / Björk, Kaj-Mikael et al. | 2016
- 14
-
An Open-Source Object-Graph-Mapping Framework for Neo4j and Scala: RenescaDietze, Felix / Karoff, Johannes / Calero Valdez, André / Ziefle, Martina / Greven, Christoph / Schroeder, Ulrik et al. | 2016
- 15
-
Publishing Differentially Private Medical Events DataShaked, Sigal / Rokach, Lior et al. | 2016
- 16
-
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical AnalysisZamani, Katerina / Charalambidis, Angelos / Konstantopoulos, Stasinos / Dagioglou, Maria / Karkaletsis, Vangelis et al. | 2016
- 17
-
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge BasesMalle, Bernd / Kieseberg, Peter / Weippl, Edgar / Holzinger, Andreas et al. | 2016