You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.
A persistent challenge infects the vast setting of academic pursuits; the enduring gender gap in science, technology, engineering, and mathematics (STEM). Despite incremental progress, women continue to face formidable obstacles, ranging from entrenched stereotypes to institutional oversights. The urgency of addressing this issue cannot be overstated, as evidenced by UNESCO's revelation that less than 30% of the world's researchers and scientists are women. Exploring Intersectionality and Women in STEM seizes this pivotal moment, unraveling the complexities of the gender gap in STEM and daring to propose transformative solutions. This book is not just an analysis of disparities; it is a dynamic and initiative-taking guide for researchers, STEM students, and practitioners. By immersing oneself in its pages, the reader becomes an agent of change, armed with insights into life sciences, physical sciences, engineering, mathematics, computer science, and health sciences. Through a transdisciplinary lens, the book illuminates a path toward a more inclusive and equitable future.
This two-volume set (LNAI 11683 and LNAI 11684) constitutes the refereed proceedings of the 11th International Conference on Computational Collective Intelligence, ICCCI 2019, held in Hendaye France, in September 2019.The 117 full papers presented were carefully reviewed and selected from 200 submissions. The papers are grouped in topical sections on: computational collective intelligence and natural language processing; machine learning in real-world data; distributed collective intelligence for smart manufacturing; collective intelligence for science and technology; intelligent management information systems; intelligent sustainable smart cities; new trends and challenges in education: the university 4.0; intelligent processing of multimedia in web systems; and big data streaming, applications and security.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Gdańsk, Poland, in conjunction with the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, in June 2012. The 35 full and 17 short revised papers were carefully selected from 104 submissions. The eight workshops were Agility of Enterprise Systems (AgilES), Business/IT Alignment and Interoperability (BUSITAL), Enterprise and Organizational Modeling and Simulation (EOMAS), Governance, Risk and Compliance (GRCIS), Human-Centric Process-Aware Information Systems (HC-PAIS), System and Software Architectures (IWSSA), Ontology, Models, Conceptualization and Epistemology in Social, Artificial and Natural Systems (ONTOSE), and Information Systems Security Engineering (WISSE).
This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 106 revised full papers presented were carefully reviewed and selected from a total of 171 submissions to the workshops. The volume starts with 19 additional revised poster papers of the OTM 2008 main conferences CoopIS and ODBASE. Topics of the workshop papers are ambient data integration (ADI 2008), agents and web services merging in distributed environment (AWeSoMe 2008), community-based evolution of knowledge-intensive systems (COMBEK 2008), enterprise integration, interoperability and networking (EI2N 2008), system/software architectures (IWSSA 2008), mobile and networking technologies for social applications (MONET 2008), ontology content and evaluation in enterprise & quantitative semantic methods for the internet (OnToContent and QSI 2008), object-role modeling (ORM 2008), pervasive systems (PerSys 2008), reliability in decentralized distributed systems (RDDS 2008), semantic extensions to middleware enabling large scale knowledge (SEMELS 2008), and semantic Web and Web semantics (SWWS 2008).
Internet-based information systems, the second covering the large-scale in- gration of heterogeneous computing systems and data resources with the aim of providing a global computing space. Eachofthesefourconferencesencouragesresearcherstotreattheirrespective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more “archival” nature of the main conferences with research results in a number of selected and more “avant-garde” areas rela...
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
This book documents the satellite events run around the 14th European Conference on Object-Oriented Programming, ECOOP 2000 in Cannes and Sophia Antipolis in June 2000. The book presents 18 high-quality value-adding workshop reports, one panel transcription, and 15 posters. All in all, the book offers a comprehensive and thought-provoking snapshot of the current research in object-orientation. The wealth of information provided spans the whole range of object technology, ranging from theoretical and foundational issues to applications in various domains.
Ces contributions tentent d'appréhender la catégorie de "populaire" dans la production littéraire ou audiovisuelle. Elles couvrent des champs fort divers : l'auteur populaire en Espagne au XIXe siècle, la fabrication des telenovelas au Brésil, les romancières populaires sous la IIIe République, la couverture illustrée du roman populaire, l'édition pour la jeunesse en France entre 1910 et 1939...