You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Fo...
Models in system design follow the general tendency in electronics in terms of size, complexity and difficulty of maintenance. While a model should be a manageable representation of a system, this increasing complexity sometimes forces current CAD-tool designers and model writers to apply modeling techniques to the model itself. Model writers are interested in instrumenting their model, so as to extract critical information before the model is complete. CAD tools designers use internal representations of the design at various stages. The complexity has also led CAD-tool developers to develop formal tools, theories and methods to improve relevance, completeness and consistency of those intern...
This book constitutes the thoroughly refereed post-conference proceedings of the Third IFIP WG 13.6 Working Conference on Human Work Interaction Design, HWID 2012, held in Copenhagen, Denmark, in December 2012. The 16 revised papers presented were carefully selected for inclusion in this volume. The papers reflect many different areas and address many complex and diverse work domains, ranging from medical user interfaces, work and speech interactions at elderly care facilities, greenhouse climate control, navigating through large oil industry engineering models, crisis management, library usability, and mobile probing. They have been organized in the following topical sections: work analysis: dimensions and methods; interactions, models and approaches; and evaluations, interactions and applications.
Collaborative Networks A Tool for Promoting Co-creation and Innovation The collaborative networks paradigm offers powerful socio-organizational mec- nisms, supported by advanced information and communication technologies for p- moting innovation. This, in turn, leads to new products and services, growth of better customer relationships, establishing better project and process management, and building higher-performing consortia. By putting diverse entities that bring different perspectives, competencies, practices, and cultures, to work together, collaborative networks develop the right environment for the emergence of new ideas and more efficient, yet practical, solutions. This aspect is pa...
This book constitutes the refereed proceedings of the 5th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2014, held in Costa de Caparica, Portugal, in April 2014. The 68 revised full papers were carefully reviewed and selected from numerous submissions. They cover a wide spectrum of topics ranging from collaborative enterprise networks to microelectronics. The papers are organized in the following topical sections: collaborative networks; computational systems; self-organizing manufacturing systems; monitoring and supervision systems; advances in manufacturing; human-computer interfaces; robotics and mechatronics, Petri nets; multi-energy systems; monitoring and control in energy; modelling and simulation in energy; optimization issues in energy; operation issues in energy; power conversion; telecommunications; electronics: design; electronics: RF applications; and electronics: devices.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular,as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typ...
The development of new-generation micro-manufacturing technologies and systems has revolutionised the way products are designed and manufactured today with a s- nificant impact in a number of key industrial sectors. Micro-manufacturing techno- gies are often described as disruptive, enabling and interdisciplinary leading to the creation of whole new classes of products that were previously not feasible to ma- facture. While key processes for volume manufacture of micro-parts such as mach- ing and moulding are becoming mature technologies, micro-assembly remains a key challenge for the cost-effective manufacture of complex micro-products. The ability to manufacture customizable micro-products...
A reactive system is one that is in continual interaction with its environment and executes at a pace determined by that environment. Examples of reactive systems are network protocols, air-traffic control systems, industrial-process control systems etc. Reactive systems are ubiquitous and represent an important class of systems. Due to their complex nature, such systems are extremely difficult to specify and implement. Many reactive systems are employed in highly-critical applications, making it crucial that one considers issues such as reliability and safety while designing such systems. The design of reactive systems is considered to be problematic, and p.oses one of the greatest challeng...
The abundance of information and increase in computing power currently enable researchers to tackle highly complicated and challenging computational problems. Solutions to such problems are now feasible using advances and innovations from the area of Artificial Intelligence. The general focus of the AIAI conference is to provide insights on how Artificial Intelligence may be applied in real-world situations and serve the study, analysis and modeling of theoretical and practical issues. This volume contains papers selected for presentation at the 6th IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2010) and held in Larnaca, Cyprus, during October 6–7, 2010. IFI...
Enterprise Architecture, Integration, and Interoperability and the Networked enterprise have become the theme of many conferences in the past few years. These conferences were organised by IFIP TC5 with the support of its two working groups: WG 5. 12 (Architectures for Enterprise Integration) and WG 5. 8 (Enterprise Interoperability), both concerned with aspects of the topic: how is it possible to architect and implement businesses that are flexible and able to change, to interact, and use one another’s s- vices in a dynamic manner for the purpose of (joint) value creation. The original qu- tion of enterprise integration in the 1980s was: how can we achieve and integrate - formation and ma...