You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Mass Customization examines the business opportunities, considerations, and challenges manufacturers in various industries must weigh before committing to the significant investment in machinery and software needed to go to mass customization. For manufacturers who decide that it’s time to take the plunge, the author describes the proven methods and latest technologies for making mass customization work seamlessly and profitably on the factory floor. Mass customization—the automated manufacturing bespoke products, profitably combining the low unit costs of mass production with the flexibility of building custom products to order—has been touted as the next big thing for more than a qua...
Marko Wolf provides a comprehensive overview of the emerging area of vehicular IT security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably.
The book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA in June 2006. The 33 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers focus on distributed computing issues in large-scale networked sensor systems, including systematic design techniques and tools; they cover topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.
This collection contains 296 keynote and summary papers on topics presented at the 11th ASCE Engineering Mechanics Conference, held in Fort Lauderdale, Florida, May 20-22, 1996.
This book constitutes the refereed proceedings of the Third International Conference on Security in Pervasive Computing, SPC 2006, held in York, UK, in April 2006. The 16 revised papers presented together with the extended abstract of 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on protocols, mechanisms, integrity, privacy and security, information flow and access control, and authentication.