You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
The 1987 Princeton Workshop on Algorithm, Architecture and Technology Issues for Models of Concurrent Computation was organized as an interdisciplinary work shop emphasizing current research directions toward concurrent computing systems. With participants from several different fields of specialization, the workshop cov ered a wide variety of topics, though by no means a complete cross section of issues in this rapidly moving field. The papers included in this book were prepared for the workshop and, taken together, provide a view of the broad range of issues and alternative directions being explored. To organize the various papers, the book has been divided into five parts. Part I consider...
This book constitutes the proceedings of the International Conference on ENTERprise information systems, held Viana do Castelo, Portugal, in October 2010.
Providing an authoritative assessment of the current landscape of spatial analysis in the social sciences, this cutting-edge Handbook covers the full range of standard and emerging methods across the social science domain areas in which these methods are typically applied. Accessible and comprehensive, it expertly answers the key questions regarding the dynamic intersection of spatial analysis and the social sciences.
Lean production, which has radically benefited traditional manufacturing, can greatly improve the software industry with similar methods and results. This transformation is possible because the same overarching principles that apply in other industries work equally well in software development. The software industry follows the same industrial concepts of production as those applied in manufacturing; however, the software industry perceives itself as being fundamentally different and has largely ignored what other industries have gained through the application of lean techniques.
"This book provides inter-organizational aspects in business integration including managerial and organizational integration, social integration, and technology integration, along with the resources to accomplish this competitive advantage"--Provided by publisher.
Provides extensive information about pervasive computing and its implications from various perspectives so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology.
This book constitutes the refereed proceedings of the Third International Conference on Biometrics, ICB 2009, held in Alghero, Italy, June 2-5, 2009. The 36 revised full papers and 93 revised poster papers presented were carefully reviewed and selected from 250 submissions. Biometric criteria covered by the papers are assigned to face, speech, fingerprint and palmprint, multibiometrics and security, gait, iris, and other biometrics. In addition there are 4 papers on challenges and competitions that currently are under way, thus presenting an overview on the evaluation of biometrics.
"This book investigates various definitions of trust and their characteristics in distributed systems and digital computing, and details how to model and implement trust in a digital system"--Provided by publisher.
Modern critical infrastructures (CIs) (e.g., electricity, water, transportation, telecommunications, and others) form complex systems with a high degree of interdependencies from one CI to the others. Natural disasters (e.g., earthquakes, floods, droughts, landslides, and wildfires), humanmade disasters (e.g., sabotage and terrorism), and system faults (due to structural and equipment failures) will affect not only the directly impacted CI but all interdependent CIs. Risk assessment, therefore, has to be done over the entire system of CIs and should also include the social and personal impacts. According to a 2022 report, 80% of cities have been affected by significant climate change hazards...