You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book describes the state-of-the-art in ontology-driven information systems (ODIS) and gives a complete perspective on the problems, solutions and open research questions in this field. The book covers four broad areas: foundations of ODIS, ontological engineering, ODIS architectures, and ODIS applications. It will trigger innovative thought processes and open up significant new domains in ODIS research.
The book promotes the use of formal methods in the creation of new explicit languages for problem solving in architecture and urbanism. Formal methods bring advantages to human actions and involve the use of theoretically driven techniques, expressed in languages stemmed from mathematics. Formalization seeks to guarantee that solutions for daily problems are produced in a manner that ensures their greatest possible adequacy and the least test time in direct confrontation with reality. This book contributes to the progress of formalization in architectural methodologies by finding points of convergence between state of the art research on ontologies in architecture, BIM/VDC, CAD/CAM, cellular automata, GIS, parametric processes, processing and space syntax presented within the 3rd Symposium of Formal Methods in Architecture. The contents reach from millennial geometry to current shape grammars, engaging several formal approaches to architecture and urbanism, with different points of view, fields of application, grades of abstraction and formalization.
Data collection allows todays businesses to cater to each customers individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.
This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
This book constitutes the thoroughly refereed proceedings of the 10th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2015, held in Dublin, Ireland, in May 2015. The 22 full papers, 11 short papers and 10 short papers describing prototypes and products were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on design science research in action; meta perspectives; data mining and analytics; emerging themes; design practice and design thinking; and prototypes.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
Providing a first tentative understanding of novelty and a set of implications for organizations to manage it, this book focuses on the potential offered by emergent novelty, namely novelty which is neither designed nor pursued. The author asks how organizations might increase their abilities and strategies to benefit from its early recognition. Such potential is broken down into positive terms and demonstrates how early recognition is beneficial both to organizations which aim to seize emergent innovations as well as those which aim to avoid emergent disasters. Understanding Novelty in Organizations aims to rethink the structure and strategies of organizations to gain a new balance between design and randomness in the generation of novelty. The varied perspectives presented in this work will engage scholars interested in novelty, innovation and creativity, and emergency management.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.