Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite

Linked e-resources

Details

Welcome Message of EIDWT-2017 International Conference Organizers; EIDWT-2017 Steering Committee Chair; EIDWT-2017 General Co-chairs; EIDWT-2017 Program Committee Co-chairs; EIDWT-2017 International Conference Organizers; Honorary Co-chairs; General Co-chairs; Program Co-chairs; Workshops Co-chairs; International Advisory Committee; Publicity Co-chairs; International Liaison Co-chairs; Local Organizing Co-chairs; Web Administrators; Finance Chair; Steering Committee Chair; Track Area Co-chairs ; 1. Internetworking Issues and Challenges; 2. Mobile and Wireless Networks ; Chairs.

3. Network Protocols, Modelling, Optimization and Performance EvaluationChairs; 4. P2P and Grid Computing; Chairs; 5. Distributed and Parallel Systems; Chairs; 6. Ontologies and Metadata Representation; Chairs; 7. Knowledge Discovery and Mining; Chairs; 8. Databases and Data Warehouses; Chairs; 9. Data Centers and IT Virtualization Technologies; Chairs; 10. Web Science and Business Intelligence; Chairs; 11. Data Analytics for Learning and Virtual Organisations; Chairs; 12. Data Management and Information Retrieval; Chairs; 13. Machine Learning on Large Data Sets & Massive Processing; Chairs.

14. Data Modeling, Visualization and Representation ToolsChairs; 15. Nature Inspired Computing for Emerging Collective Intelligence; Chairs; 16. Data Sensing, Integration and Querying Systems and Interfaces; Chairs; 17. Data Security, Trust and Reputation; Chairs; 18. eScience Data Sets, Repositories, Digital Infrastructures; Chairs; 19. Energy-Aware and Green Computing in Data Centers; Chairs; 20. Emerging Trends and Innovations in Inter-networking Data Technologies; Chairs; 21. Bitcoin, Blockchain Techniques and Security; Chairs; Program Committee Members; EIDWT-2017 Reviewers.

EIDWT-2017 Keynote Talks A Security Management with Cyber Insurance-Event Study Approach with Social Network Sentimental Analysis for Cyber Risk Evaluation; Look Back! Earlier Versions will Reveal Weaknesses in Android Apps; Secret Sharing and Its Applications; New Short-Range Communication Technologies over Smartphones: Designs and Implementations; Contents; An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble; Abstract; 1 Introduction; 2 Basic Theory; 2.1 Ensemble Classifiers; 2.2 Rotation Forest; 3 The Proposed Algorithm.

3.1 Basic Classifier3.2 Weight Assignment for Classifiers; 3.3 Determination of dsub and L; 4 Experiment Results; 4.1 Experimental Environment; 4.2 Comparison of Error Rate; 4.3 Comparison of ROC Curve; 4.4 Comparison of Training Time; 5 Conclusion; Acknowledgments; References; Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem; Abstract; 1 Introduction; 2 The Principle of the Proposed Scheme; 3 Experimental Results and Discussions; 4 Conclusion; References; Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network.

Browse Subjects

Show more subjects...

Statistics

from
to
Export