Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Knowledge Intensive Design Technology is a collection of papers presented at the Fifth Workshop on Knowledge Intensive CAD, which was sponsored by the International Federation for Information Processing (IFIP) Working Group 5.2 and hosted by the Department of Manufacturing Engineering at the University of Malta in July 2002.
Feature-based technology is the key factor towards meeting the increasingly high demands of improving and speeding up the product development process from concept to customer feedback, and is therefore expected to be able to provide for a better approach to integrate the complete product design process chain.
With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. This book covers issues related to security and privacy of information in a range of applications, including: electronic commerce; workflow; privacy; and, mediation.
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. As well as being an interdisciplinary area, Environmental Informatics provides an interface between all involved professional groups.
This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. and computer vision and image understanding.
This book constitutes the refereed proceedings of the 18th International TRIZ Future Conference on Automated Invention for Smart Industries, held in Strasbourg, France, in October 2018 and sponsored by IFIP WG 5.4. The 27 full papers presented were carefully reviewed and selected from numerous submissions.
This book constitutes the refereed proceedings of the Third International Conference on Intelligence Science, ICIS 2018, held in Beijing China, in November 2018. The 44 full papers and 5 short papers presented were carefully reviewed and selected from 85 submissions.
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Goncalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011.
Discusses the social and organizational issues surrounding the implementation and use of new technologies in organizational processes. This book discusses: Implementation of ERP; Electronic commerce; Intranet implementation; The management of standards; Issues of organizational analysis; Understanding BPR tools; and Collaborative technologies.
Formal Methods for Open Object-Based Distributed Systems V brings together research in three important and related fields: Formal methods;
Documents the high quality approaches and results that were presented at the International Workshop on Distributed and Parallel Embedded Systems (DIPES 2000), which was sponsored by the International Federation for Information Processing (IFIP), and organised by IFIP working groups WG10.3, WG10.4 and WG10.5.
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.
Designing Effective and Usable Multimedia Systems presents research and development and industrial experience of usability engineering for multimedia user interfaces.
The theme of the 1997 INTERACT conference, 'Discovering New Worlds ofHCI', signals major changes that are taking place with the expansion of new technologies into fresh areas of work and leisure throughout the world and new pervasive, powerful systems based on multimedia and the internet.
Knowledge-Intensive CAD clarifies and elaborates the concepts of knowledge-intensive design and CAD.
Much existing design research is either totally geometry based or totally non-geometric, and the interface between the two areas is of intense interest to industry, as well as being crucial for the successful development of integrated systems for design and manufacture.
Towards collaborative business ecosystems Last decade was fertile in the emerging of new collaboration mechanisms and forms of dynamic virtual organizations, leading to the concept of dynamic business ecosystem, which is supported (or induced ?) by the progress of the ubiquitous I pervasive computing and networking.
This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA.
We arehappy to welcome you to the IFIP Protocols for High-Speed Networks '96 workshop hosted by INRIA Sophia Antipolis. The workshop focus on problems related to the e:fficient transmission of multimedia application data using high-speed networks and internetworks.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016.The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological.The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process.
Deryn Watson CapBIT 97, Capacity Building for Information Technologies in Education in Developing Countries, from which this publication derives, was an invited IFIP working conference sponsored by Working Groups in secondary (WG 3.
This volume is composed of the best papers submitted to the HOIT2000 conference held in Wolverhampton, U.
This major reference work represents the first attempt to confront, on a world-wide basis, the way computer associations face up to their own responsibilities in an age increasingly dominated by information and communication technology. It is the first book to deal with homogenous codes namely codes of national computer societies.
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management.
FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN.1, TTCN, Z, Automata, Process Algebra, Logic).
Contains the papers presented and discussed at the conference that was held in May/June 1997, in Philadelphia, Pennsylvania, USA, and that was sponsored by Working Group 8.2 of the International Federation for Information Processing. This book is useful for professionals and students working in information systems in a business environment.
The topics covered range from ontology to knowledge representation, making it essential reading for researchers, engineers, and technical managers involved in the development of advanced applications for knowledge management, engineering design, and manufacturing.
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.