You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutesselected, revised and extended papers of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2019, held in Heraklion, Crete, Greece, in May 2019. The 19 revised full papers presented were carefully reviewed and selected from 102 submissions. The papers included in this book contribute to the understanding of relevant trends of current research on novel approaches to software engineering for the development and maintenance of systems and applications, specically with relation to: model-driven software engineering, requirements engineering, empirical software engineering, service-oriented software engineering, business process management and engineering, knowledge management and engineering, reverse software engineering, software process improvement, software change and configuration management, software metrics, software patterns and refactoring, application integration, software architecture, cloud computing, and formal methods.
This book, in conjunction with the volume CCIS 49, constitutes the refereed proceedings of the Second World Summit, WSKS 2009, held in Chania, Crete, Greece, in September 2008. The 62 revised full papers presented were carefully reviewed and selected from 256 submissions. The papers are deal with information technologies - knowledge management systems - e-business and business, organizational and inter-organizational information systems for the Knowledge Society, knowledge, learning, education, learning technologies and e-learning for the Knowledge Society, social and humanistic computing for the Knowledge Society – emerging technologies for the society and the humanity, culture and cultur...
This book constitutes the refereed proceedings of the 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming, XP 2007, held in Como, Italy in June 2007. It covers managing agile processes, extending agile methodologies, teaching and introducing agile methodologies, methods and tools, empirical studies, and methodology issue.
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipline of Kno- edge Based and Intelligent Engineering Systems, but now extending into other related areas. Through this, KES provides its members with opportunities for publication and beneficial interaction. The focus of KES is research and technology transfer in the area of Intelligent Systems, i.e. computer-based software systems that operate in a manner analogous to the human brain, in order to perform advanced tasks. Recently KES has started to extend its area of interest to encompass the contribution that intelligent systems can make to susta...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on on Signal-Image Technology and Internet-Based Systems, SITIS 2006, held in Hammamet, Tunisia, in December, 2006. The 33 full papers were carefully reviewed and selected from the best papers presented at the conference and are presented in revised and extended form. Part of the papers focus on the emerging modeling, representation and retrieval techniques that take into account the amount, type and diversity of information accessible in distributed computing environment. Other contributions are devoted to emerging and novel concepts, architectures and methodologies for creating an interconnected world in which information can be exchanged easily, tasks can be processed collaboratively, and communities of users with similarly interests can be formed while addressing security threats that are present more than ever before.
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. This includes the international standard for the certification of IT products (software, firmware and hardware) Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations. Without security certification, open source tools and applications are neither secure nor trustworthy. Open Source Systems Security Certification addresses and analyzes the urgency of security certification for security-sensible markets, such as telecommunications, government and the military, through provided case studies. This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking to attract new markets traditionally held by proprietary products or to reduce costs. This book is also suitable for researchers and advanced-level students.
Welcome to the 5th International Conference on Open Source Systems! It is quite an achievement to reach the five-year mark – that’s the sign of a successful enterprise. This annual conference is now being recognized as the primary event for the open source research community, attracting not only high-quality papers, but also building a community around a technical program, a collection of workshops, and (starting this year) a Doctoral Consortium. Reaching this milestone reflects the efforts of many people, including the conference founders, as well as the organizers and participants in the previous conferences. My task has been easy, and has been greatly aided by the hard work of Kevin C...
This book constitutes the refereed proceedings of the 9th Dortmund Fuzzy Days, Dortmund, Germany, 2006. This conference has established itself as an international forum for the discussion of new results in the field of Computational Intelligence. The papers presented here, all thoroughly reviewed, are devoted to foundational and practical issues in fuzzy systems, neural networks, evolutionary algorithms, and machine learning and thus cover the whole range of computational intelligence.
This book constitutes the thoroughly refereed proceedings of the 7th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2015, held in Cotonou, Benin, in December 2015. The 25 papers were carefully selected from 51 submissions and cover topics such as communication infrastructure, access to information, green IT applications and security, health.
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to attacks and unauthorized data access. In the context of this threat, this book provides a comprehensive guide to security and privacy and trust in data management.