You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
As the most comprehensive reference work dealing with decision support systems (DSS), this book is essential for the library of every DSS practitioner, researcher, and educator. Written by an international array of DSS luminaries, it contains more than 70 chapters that approach decision support systems from a wide variety of perspectives. These range from classic foundations to cutting-edge thought, informative to provocative, theoretical to practical, historical to futuristic, human to technological, and operational to strategic. The chapters are conveniently organized into ten major sections that novices and experts alike will refer to for years to come.
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions. The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, cryptographic protocols, implementation of cryptosystems and their integration into secure systems, secure operating systems and trusted computing, applications such as watermarking and code obfuscation.
This book constitutes the thoroughly refereed proceedings of the Third International Conference on Advances in Communication, Network, and Computing, CNC 2012, held in Chennai, India, February 24-25, 2012. The 41 revised full papers presented together with 29 short papers and 14 poster papers were carefully selected and reviewed from 425 submissions. The papers cover a wide spectrum of issues in the field of Information Technology, Networks, Computational Engineering, Computer and Telecommunication Technology, ranging from theoretical and methodological issues to advanced applications.
This book constitutes revised selected papers from the 18th Workshop on e-Business, WeB 2019, which took place in Munich, Germany, in December 2019. The purpose of WeB is to provide a forum for researchers and practitioners to discuss findings, novel ideas, and lessons learned to address major challenges and map out the future directions for e-Business. The WeB 2019 theme was “Smart Business: Technology and Data Enabled Innovative Business Models and Practices.” The 20 papers included in this volume were carefully reviewed and selected from a total of 42 submissions. The contributions are organized in topical sections as follows: crowdfunding and blockchain; business analytics; digital platforms and social media; managing e-Business projects and processes; and global e-Business.
These proceedings represent the work of contributors to the 22nd European Conference on e-Learning (ECEL 2023), hosted by University of South Africa, Pretoria, South Africa on 26-27 October 2023. The Conference Co-Chairs Associate Professor Sarah Jane Johnston and Associate Professor Shawren Singh both from University of South Africa, Pretoria, South Africa. ECEL is now a well-established event on the academic research calendar and now in its 22nd year the key aim remains the opportunity for participants to share ideas and meet the people who hold them. The scope of papers will ensure an interesting two days. The subjects covered illustrate the wide range of topics that fall into this import...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.* The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production pl...