Data Management in Pervasive Systems
β Scribed by Francesco Colace, Massimo De Santo, Vincenzo Moscato, Antonio Picariello, Fabio A. Schreiber, Letizia Tanca (eds.)
- Publisher
- Springer International Publishing
- Year
- 2015
- Tongue
- English
- Leaves
- 380
- Series
- Data-Centric Systems and Applications
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book contributes to illustrating the methodological and technological issues of data management in Pervasive Systems by using the DataBenc project as the running case study for a variety of research contributions: sensor data management, user-originated data operation and reasoning, multimedia data management, data analytics and reasoning for event detection and decision making, context modelling and control, automatic data and service tailoring for personalization and recommendation. The book is organized into the following main parts: i) multimedia information management; ii) sensor data streams and storage; iii) social networks as information sources; iv) context awareness and personalization. The case study is used throughout the book as a reference example.
β¦ Table of Contents
Front Matter....Pages i-xxii
Front Matter....Pages 1-2
The Internet of Things and Value Co-creation in a Service-Dominant Logic Perspective....Pages 3-18
Pervasive Systems Architecture and the Main Related Technologies....Pages 19-42
Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions....Pages 43-65
Front Matter....Pages 67-68
Sensors and Wireless Sensor Networks as Data Sources: Models and Languages....Pages 69-92
Data Streams and Data Stream Management Systems and Languages....Pages 93-111
The Complex Event Processing Paradigm....Pages 113-133
Applying Semantic Interoperability Principles to Data Stream Management....Pages 135-166
Front Matter....Pages 167-168
Multimedia Social Networks for Cultural Heritage Applications: The GIVAS Project....Pages 169-182
Sentiment Detection in Social Networks Using Semantic Analysis: A Tool for Sentiment Analysis and Its Application in Cultural Heritage Realm....Pages 183-193
Security and Privacy Issues in Social Networks....Pages 195-209
Front Matter....Pages 211-212
Data Personalization....Pages 213-234
Context Awareness in Pervasive Information Management....Pages 235-256
Context Awareness in Mobile Systems....Pages 257-287
Front Matter....Pages 289-290
Content-Based Multimedia Retrieval....Pages 291-310
Multimedia Queries in Digital Libraries....Pages 311-325
Multimedia Recommendation and Delivery Strategies....Pages 327-342
Front Matter....Pages 343-343
PATCH: A Portable Context-Aware ATlas for Browsing Cultural Heritage....Pages 345-361
Back Matter....Pages 363-366
β¦ Subjects
Database Management; Computer Communication Networks; Computer Appl. in Arts and Humanities; Cultural Heritage; Multimedia Information Systems
π SIMILAR VOLUMES
<p><b>A comprehensive new edition on mobile computingΒcovering both mobile and sensor data</b></p><p>The new paradigm of pervasive computing was born from the needs of highly mobile workers to access and transfer data while on the go. Significant advances in the technology have lent and will continu
Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made ava
<p><P>The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different se
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security
<p>This book is the sixth of a running series of volumes dedicated to selected topics of information theory and practice. The objective of the series is to proΒ vide a reference source for problem solvers in business, industry, government, and professional researchers and gradute students. The first