You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes revised selected papers from the 8th and 9th IFIP WG 2.6 International Symposium on Data-Driven Process Discovery and Analysis, SIMPDA 2018, held in Seville, Spain, on December 13–14, 2018, and SIMPDA 2019, held in Bled, Slovenia, on September 8, 2019. From 16 submissions received for SIMPDA 2018 and 9 submissions received for SIMPDA 2019, 3 papers each were carefully reviewed and selected for presentation in this volume. They cover theoretical issues related to process representation, discovery, and analysis or provide practical and operational examples of their application.
This book constitutes the thoroughly refereed proceedings of the First International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June/July 2011. The 11 revised full papers were carefully selected from 31 submissions. In addition to the thorough review process, the lively discussions at the event itself also helped the authors to improve their papers and to foster interesting extensions. The selected papers cover a wide range of topics spanning from theoretical issues related to process representation to practical experience in process discovery and analysis.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4–5 September 2008. Previous events in the TrustBus series were held in Zaragoza, Spain (2004), Copenhagen, Denmark (2005), Krakow, Poland (2006), and Regensburg, Germany (2007). TrustBus 2008 brought together academic researchers and industrial developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Turin to parti- pate and debate upon the latest advances in this area. The conference program included one keynote presentation a...
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused...
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The conference was held in Oslo, Norway, during June 23–25, 2008. The event was the ?fth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (SecondInternationalSymposiumonUbiquitousIntelligenceandSmartWorlds) held in December 2005 in Japan, by UIC 2006 (Third International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces) held in September 2006 in Wuhan and Three Gorges, China, and by UIC 2007 held in July 2007 in Hong Kong. Ubiquitous computers, networks and information are paving the road to a smart world in which computational intelligence is distributed throughout the physical environment to provide trustworthy and relevant services to people.
In today’s society, where technology is ubiquitous, protecting ourselves with firewalls is as important as defending ourselves with firepower. New technology is providing criminals with a world of opportunity, while law enforcement agencies all over the world are struggling to cope. E-security is an issue of global importance. In many ways, cybercrime is no different to more traditional types of crime – both involve identifying targets, using surveillance and psychological profiling of potential victims. The major difference is that the perpetrators of cybercrime are increasingly remote to the scene of their crime and that in some cases their victims may not even realize that a crime is taking place. Knowledge of the techniques being used by criminals and the technology and tra- ing available to combat them is essential in fighting cybercrime. Establishing dialogue between crime-fighting agencies, the security industry, researchers and experts can provide a platform from which e-security can be examined from several global p- spectives.
This book constitutes the thoroughly refereed proceedings of the Second International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June 2012. The six revised full papers were carefully selected from 17 submissions. To improve the quality of the contributions the symposium fostered the discussion during the presentation, giving authors the opportunity to improve their work extending the presented results. The selected papers cover topics spanning from theoretical issues related to process representation, discovery and analysis to practical and operational experiences in process discovery and analysis.
This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3–4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this ‘infor- tion society era’ for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohe...
This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC 2006, held in Wuhan, China. The book presents 117 revised full papers together with a keynote paper were carefully reviewed and selected from 382 submissions. The papers are organized in topical sections on smart objects and embedded systems; smart spaces, environments, and platforms; ad-hoc and intelligent networks; sensor networks, and more.