A goldmine of valuable tools for data modelers! Data modelers render raw data-names, addresses, and sales totals, for instance-into information such as customer profiles and seasonal buying patterns that can be used for making critical business deci…
This book is organized in 2 volumes and 6 parts. Part I is Big Data Analytics, which is about new advances of analysis, statistics, coordination and data mining of big data; Part II is Information Systems Management, which is about the development o…
Introduction to key background information on India, its culture and its history as well as its industry.Step-by-step guide through the whole outsourcing process.Guidance from leading managers and industry experts.Each chapter can be used as a prime…
Non-volatile memories (NVMs) have emerged as the primary replacement of hard-disk drives for a variety of storage applications, including personal electronics, mobile computing, intelligent vehicles, enterprise storage, data warehousing, and data-in…
Service Systems Implementation provides the latest applications and practices aimed at improving the key performance indicators of service systems, especially those related to service quality, service productivity, regulatory compliance, and sustain…
This volume constitutes the refereed proceedings of the Third International ICST Conference, ADHOCNETS 2011, held in Paris, France, in September 2011. The 15 revised full papers - selected from 42 submissions - and the 2 invited papers cover several…
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2011, held in Sao Paulo, Brazil, in October 2011. The 61 revised papers presented were carefully selected from numerous submissi…
Model-Driven Architecture (MDA) is an initiative proposedby the Object M- agement Group (OMG) for platform-generic software development. MDA s- arates the speci?cation of system functionality from the implementation on a speci?c platform. It is aime…
The LNCS Transactions on Foundations for Mastering Change, FoMaC, aims to establish a forum for formal-methods-based research, dealing with the nature of today's agile system development, which is characterized by unclear premises, unforeseen change…
This book constitutes the refereed proceedings of the 10th International IFIP WG 2.13 Conference on Open Source Systems, OSS 2014, held in San Jose, Costa Rica, in May 2014. The 16 revised full papers and 16 short papers presented together with 5 po…
Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources.…
The recent explosive growth of our ability to generate and store data has created a need for new, scalable and efficient, tools for data analysis. The main focus of the discipline of knowledge discovery in databases is to address this need. Knowledg…
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.The 60 revised full papers presented were careful…
Systems Science and Collaborative Information Systems: Theories, Practices and New Research examines the impact of new information services on day-to-day activities from a range of contemporary technical and socio-cultural perspectives. This collect…
This book constitutes the refereed proceedings of the 10th International Conference on Model Transformation, ICMT 2017, held as part of STAF 2017, in Marburg, Germany, in July 2017. The 9 full papers and 2 short papers were carefully reviewed and se…
This book contains 13 carefully revised and selected papers from the 6th Workshop on Global Sourcing, held in Courchevel, France, during March 12-15, 2012. They have been selected from 46 submissions and represent both client and supplier perspectiv…
As more and more industries are experiencing digital disruption, using information technology to enable a competitive advantage becomes a critical success factor for all enterprises. This book covers the authors' insights on how AI technologies can…
This book constitutes the refereed proceedings of the 19th Brazilian Symposium on Formal Methods, SBMF 2016, which took place in Natal, Brazil, in November 2016. The 12 papers presented together with two invited talks were carefully reviewed and sel…
Profitieren Sie von den umfangreichen Praxisbeispielen und der zuverl ssigen Gesamtsicht auf alle Aspekte des Projektcontrollings. So bauen Sie ein wirkungsvolles Projektcontrolling auf und integrieren es in das Projektmanagement. Nutzen Sie praxise…
Visual notations and languages continue to play a pivotal role in the design of complex software systems. In many cases visual notations are used to - scribe usage or interaction scenarios of software systems or their components. While representing…
This book constitutes the proceedings of the 11th International Conference on Business Process Management, BPM 2013, held in Beijing, China, in August 2013. The 17 regular papers and 8 short papers included in this volume were carefully reviewed and…
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.The 8 full papers presented in this volume were carefully reviewed and selecte…
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full p…
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FO…
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?…
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.Jurjens pres…
The brain is the most complex computational machine known to science, even though its components (neurons) are slow and unreliable compared to a laptop computer. In this richly illustrated book, Shannon's mathematical theory of information is used t…
This book constitutes the refereed proceedings of the 15th International Conference on Software Process Improvement and Capability Determination, SPICE 2015, held in Gothenburg, Sweden, in June 2015. The 17 revised full papers presented together wit…
Nach einer kompakten Darstellung der Grundlagen der Pressearbeit arbeiten die Autoren die besonderen Aspekte der IT-Pressearbeit heraus. Schwerpunkte des Buches sind der Aufbau der Pressearbeit, die Darstellung moeglicher Aktivitaten und der Instrum…
The general problem addressed in this book is a large and important one: how to usefully deal with huge storehouses of complex information about real-world situations. Every one of the major modes of interacting with such storehouses - querying, dat…
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Smart Card Research and Advanced Applications, CARDIS 2015, held in Bochum, Germany, in November 2015.The 17 revised full papers presen…
This book constitutes the joint refereed proceedings of the 15th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2015, and the 8th Conference on Internet of Things and Smart Spaces, ruSMART 2015, held…
The EUNICE (European Network of Universities and Companies in Information and Communication technology) (http://www.eunice-forum.org) mission is to jointly - velop and promote the best and most compatible standard of European higher edu- tion and pr…
This volumecomprises the ?nal versionsof the technicalpapers presented at the UML 2004 conference held in Lisbon (Portugal), October 11-15, 2004. UML 2004 was the seventh conference in a series of annual UML conferences. The series started in 1998 a…
This book constitutes the refereed proceedings of the 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, held in Bolzano, Italy, in December 2015. The 18 revised full papers presented together with 10 short p…
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in b…
Eine fundierte und praxisorientierte Einf hrung in die IT-basierte Managementunterst tzung. Business Intelligence umfasst mehr als den Bereich Data Warehousing. Ziel ist die Realisierung eines Gesamtkonzeptes. Charakteristika sind eine konsistente,…
"Bessere Leistung zu niedrigeren Kosten." Das gilt mittlerweile auch fur die Informationstechnologie im Unternehmen. Dabei steigt die Komplexitat der Anforderungen, weil Prozesse weltweit ausgerichtet werden mussen und die Veranderungsgeschwindigkei…
This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015.The 17 full papers presented in this volume werecarefully…
This book contains the refereed proceedings of the 17th International Conference on Agile Software Development, XP 2016, held in Edinburgh, UK, in May 2016.While agile development has already become mainstream in industry, this field is still consta…
This book is for programmers, scientists, and engineers who have knowledge of the Python language and know the basics of data science. It is for those who wish to learn different data analysis methods using Python and its libraries. This book contai…
Das Buch beschreibt pragmatische Instrumente und Methoden, die Software-Entwicklern und Fachexperten dabei helfen, ein gemeinsames Problem- und L sungsverst ndnis zu entwickeln und Projekte so zu managen, dass Risiken fair zwischen Auftraggeber und…
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous mate…
Das Buch zeigt praxisnah wie sich IT-Organisationen optimal aufstellen m ssen in dieser sich dynamisch wandelnden Welt und was dies f r die F hrung dieser immer wichtiger werdenden IT bedeutet. Dar ber hinaus wird das Thema F hrung einer IT-Organisa…
"This book offers insight into the computer science aspect of simulation and modeling while integrating the business practices of SM. It includes current issues related to simulation, such as: Web-based simulation, virtual reality, augmented reality…
This second edition includes several new sections and provides a full update on all sections. This book was welcomed when it was first published as an important comprehensive treatment of the subject which is now brought fully up to date. Concentrat…