You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The purpose of this book is to identify and analyze modern classics in entrepreneurship research with the goal of highlighting cutting-edge themes in the work of various scholars that are pushing the boundaries of the field, post 2000. As the entrepreneurship field matures, it is important to identify the novel contributions that will help shape the next decades of scholarship, by providing scholars with the concepts, frameworks, and approaches needed to help develop the new theories and practices of entrepreneurship. By focusing on emerging key contributions, this book takes a stance that sets it apart from other similar works by scholars that have focused only on existing themes rather than those that will characterize the relationship between entrepreneurship and new technological advances, growing inequalities, gender, diversity and inclusion, and socio-political shifts in the landscape of entrepreneurial ecosystems, allowing for critical and new conversations on entrepreneurship to take shape. This book will provide discussion on emergent themes and approaches that will continue to build the future of entrepreneurship as an exciting and rigorous academic discipline.
This two-volume set (CCIS 158 and CCIS 159) constitutes the refereed proceedings of the International Workshop on Computer Science for Environmental Engineering and EcoInformatics, CSEEE 2011, held in Kunming, China, in July 2011. The 150 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on computational intelligence; computer simulation; computing practices and applications; ecoinformatics; image processing information retrieval; pattern recognition; wireless communication and mobile computing; artificial intelligence and pattern classification; computer networks and Web; computer software, data handling and applications; data communications; data mining; data processing and simulation; information systems; knowledge data engineering; multimedia applications.
This handbook includes the most up to date, evidence-based, and comprehensive coverage of recruitment and retention, as written by the top leaders of recruitment research in the world.
The three-volume set LNCS 13980, 13981 and 13982 constitutes the refereed proceedings of the 45th European Conference on IR Research, ECIR 2023, held in Dublin, Ireland, during April 2-6, 2023. The 65 full papers, 41 short papers, 19 demonstration papers, 12 reproducibility papers consortium papers, 7 tutorial papers, and 10 doctorial consortium papers were carefully reviewed and selected from 489 submissions. The book also contains, 8 workshop summaries and 13 CLEF Lab descriptions. The accepted papers cover the state of the art in information retrieval focusing on user aspects, system and foundational aspects, machine learning, applications, evaluation, new social and technical challenges, and other topics of direct or indirect relevance to search.
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.