You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Studies have indicated that employers across the globe face difficulties in filling critical roles, sparking a worldwide "war for talent." This talent war, once a temporary market condition, has now solidified into the "New Normal." Leaders recognize that success in this era demands the construction of optimal teams for strategic competitive advantage amid global uncertainty and hypercompetition. As explored in detail within the pages of Global Practices on Effective Talent Acquisition and Retention, this book serves as an indispensable guide for scholars and practitioners navigating the intricacies of talent management in the current global scenario. This project aspires to create a comprehensive reference material delving into diverse aspects of current global talent realities. It aims to provide scholars and practitioners with recent empirical, practical, and theoretical research on talent acquisition and retention practices worldwide. The emphasis is on sustainable practices that drive organizational success across multiple industries. The impact of this publication will resonate in both application and the direction of future research.
This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011. The 73 papers included in this book were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on distributed computing, image processing, pattern recognition, applied algorithms, wireless networking, sensor networks, network infrastructure, cryptography, Web security, and application security.
This book constitutes the refereed proceedings of the 5th International Conference on Information Processing, ICIP 2011, held in Bangalore, India, in August 2011. The 86 revised full papers presented were carefully reviewed and selected from 514 submissions. The papers are organized in topical sections on data mining; Web mining; artificial intelligence; soft computing; software engineering; computer communication networks; wireless networks; distributed systems and storage networks; signal processing; image processing and pattern recognition.
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.
Efficiently provisioning the resources in a large computing domain like cloud is challenging due to uncertainty in resource demands and computation ability of the cloud resources. Inefficient provisioning of the resources leads to several issues in terms of the drop in Quality of Service (QoS), violation of Service Level Agreement (SLA), over-provisioning of resources, under-provisioning of resources and so on.
This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011. The 58 revised full papers, 67 revised short papers, and 32 poster papers presented were carefully reviewed and selected from 483 initial submissions. The papers are contributed by innovative academics and industrial experts in the field of computer science, information technology, computational engineering, mobile communication and security and offer a stage to a common forum, where a constructive dialog on theoretical concepts, practical ideas and results of the state of the art can be developed.
This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This book organizes key concepts, theories, standards, methodologies, trends, challenges and applications of data mining and knowledge discovery in databases. It first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. It also gives in-depth descriptions of data mining applications in various interdisciplinary industries.
This well accepted book, now in its second edition, is a time-honoured revision and extension of the previous edition. With improved organization and enriched contents, the book primarily focuses on the concepts of design development of communication protocols or communication software. Beginning with an overview of protocol engineering, the text analyzes important topics such as • TCP/IP suite protocol structure. • Protocol specification. • Protocol specification languages like SDL, SPIN, Estelle, E-LOTOS, CPN, UML, etc. • Protocol verification and validation techniques like semantic models and reachability analysis. • Generating conformance test suite and its application to a run...
This book gathers outstanding research papers presented in the 3rd International Conference on Artificial Intelligence: Advances and Application (ICAIAA 2022), held in Poornima College of Engineering, Jaipur, India, during April 23–24, 2022. This book covers research works carried out by various students such as bachelor, master and doctoral scholars, faculty and industry persons in the area of artificial intelligence, machine learning, deep learning applications in health care, agriculture, and business, security. It also covers research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN, NFV, etc.