You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.
The two-volume set LNCS 3032 and LNCS 3033 constitute the thoroughly refereed post-proceedings of the Second International Workshop on Grid and Cooperative Computing, GCC 2003, held in Shanghai, China in December 2003. The 176 full papers and 173 poster papers presented were carefully selected from a total of over 550 paper submissions during two rounds of reviewing and revision. The papers are organized in topical sections on grid applications; peer-to-peer computing; grid architectures; grid middleware and toolkits; Web security and Web services; resource management, scheduling, and monitoring; network communication and information retrieval; grid QoS; algorithms, economic models, and theoretical models of the grid; semantic grid and knowledge grid; remote data access, storage, and sharing; and computer-supported cooperative work and cooperative middleware.
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber wa...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009...
The two-volume set LNCS 3032 and LNCS 3033 constitute the thoroughly refereed post-proceedings of the Second International Workshop on Grid and Cooperative Computing, GCC 2003, held in Shanghai, China in December 2003. The 176 full papers and 173 poster papers presented were carefully selected from a total of over 550 paper submissions during two rounds of reviewing and revision. The papers are organized in topical sections on grid applications; peer-to-peer computing; grid architectures; grid middleware and toolkits; Web security and Web services; resource management, scheduling, and monitoring; network communication and information retrieval; grid QoS; algorithms, economic models, and theoretical models of the grid; semantic grid and knowledge grid; remote data access, storage, and sharing; and computer-supported cooperative work and cooperative middleware.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.
The publication seeks to establish how information professionals are providing information services in in a sustainable society in an era of information disorder. It also provides the strategic direction to strengthen the global voice of libraries, inspiring and enhancing professional practice as well as enhancing international cooperation and collaboration among LIS educators and practitioners. The contents is divided according to the following key sub-themes that resonate with the title as outlined below: Library and information services in the information age Data and records in an era of information disorder Archives, data curation and preservation in the digital era Data science, analyt...
This book explores various e-Services related to health, learning, culture, media and the news, and the influences the Web and related technologies have had and continue to have in each of these areas, both on service providers and service users. It provides insights into the main technological and human issues regarding healthcare, aging population, recent challenges in the educational environment, the impact of digital technologies on culture and heritage, cultural diversity, freedom of expression, intellectual property, fake news and, last but not least, public opinion manipulation and ethical issues. Its main aim is to bridge the gap between technological solutions, their successful impl...
As a concept, Concurrent Engineering (CE) initiates processes with the goal of improving product quality, production efficiency and overall customer satisfaction. Services are becoming increasingly important to the economy, with more than 60% of the GDP in Japan, the USA, Germany and Russia deriving from service-based activities. The definition of a product has evolved from the manufacturing and supplying of goods only, to providing goods with added value, to eventually promoting a complete service business solution, with support from introduction into service and from operations to decommissioning. This book presents the proceedings of the 20th ISPE International Conference on Concurrent Engineering, held in Melbourne, Australia, in September 2013. The conference had as its theme Product and Service Engineering in a Dynamic World, and the papers explore research results, new concepts and insights covering a number of topics, including service engineering, cloud computing and digital manufacturing, knowledge-based engineering and sustainability in concurrent engineering.