You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as part of the 23rd IFIP World Computer Congress, WCC 2015, in Daejeon, Korea, in October 2015. The 35 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers have been organized in the following topical sections: networks and systems architecture; teaching and education; authentication and profiling; data management and information advertizing; applied modeling and simulation; network security; dependable systems and applications, multimedia security; cryptography; big data and text mining, and social impact of EIS and visualization.
This book constitutes the refereed proceedings of the 17th International Conference on Database and Expert Systems Applications, DEXA 2006. The book presents 90 revised full papers together with 1 invited paper. The papers are organized in topical sections on XML, data and information, data mining and data warehouses, database applications, WWW, bioinformatics, process automation and workflow, knowledge management and expert systems, database theory, query processing, and privacy and security.
Featuring a broad geographical range of examples and pan-disciplinary perspectives, The Emerald Handbook of Destination Recovery in Tourism and Hospitality is an essential reference and illuminating guide on developments in the theory and practice of tourism development post-pandemic.
The 2022 International Conference on Information Economy, Data Modeling and Cloud Computing (ICIDC 2022) was successfully held in Qingdao, China from June 17 to 19, 2022. Under the impact of COVID-19, ICIDC 2022 was held adopting a combination of online and offline conference. During this conference, we were greatly honored to have Prof Datuk Dr Hj Kasim Hj Md Mansur from Universiti Malaysia Sabah, Malaysia to serve as our Conference Chairman. And there were 260 individuals attending the conference. The conference agenda was composed of keynote speeches, oral presentations, and online Q&A discussion. The proceedings of ICIDC 2022 cover various topics, including Big Data Finance, E-Commerce a...
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.
This is an open access book. This international conference aims to discuss and provide critical views based on empirical experience and the relevant concepts to the changing trends and future directions of tourism development after the Covid-19 pandemic. Some of the topics that can be raised as discussion material include (but are not limited to): Adaptation strategies of tourism transportation modes to the CHSE standard Adaptation strategies and models of the tourism accommodation industry to the CHSE standard Creative Industry and tourism MSME business models in the post-pandemic period Reactivation and revitalization of community-based tourism businesses Optimizing the use of IT produc...
Seminar Nasional Sanata Dharma Berbagi dengan tema ““Pengembangan, Penerapan, dan Pendidikan 'Sains dan Teknologi' Pasca Pandemi” menghadirkan empat pembicara utama yakni Dr. Rosa Delima, S.Kom., M.Kom. (topik: MODEL OTOMATIS UNTUK ANALISIS, SPESIFIKASI, DAN VALIDASI KEBUTUHAN PERANGKAT LUNAK), Dr. L. N. Harnaningrum, S.Si., M.T. (topik: MODEL PENYIMPANAN DATA KREDENSIAL DI SMARTPHONE UNTUK MENDUKUNG TRANSAKSI MOBILE YANG AMAN), Dr. Iwan Binanto, S.Si., MCs. (topik: MODEL PENGENALAN SENYAWA KIMIA PADA LUARAN LIQUID CHROMATOGRAPY MASS SPECTROMETRY (LCMS) TANAMAN KELADI TIKUS), dan Dr. Ridowati Gunawan, S.Kom., M.T. (topik: PENINGKATAN KUALITAS HIGH-UTILITY ITEMSET MENGGUNAKAN PENDEKATAN SWARM INTELLIGENCE PADA KASUS ANALISIS KERANJANG BELANJA).
DEXA 2005, the 16th International Conference on Database and Expert Systems Applications, was held at the Copenhagen Business School, Copenhagen, Denmark, from August 22 to 26, 2005. The success of the DEXA series has partly been due to the way in which it has kept abreast of recent developments by spawning specialized workshops and conferences each with its own proceedings. In 2005 the DEXA programme was co-located with the 7th International Conference on Data Warehousing and Knowledge Discovery [DaWaK 2005], the 6th International Conference on Electronic Commerce and Web Technologies [EC-Web 2005], the 4th International Conference on Electronic Government [EGOV 2005], the 2nd International...
In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling t