You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Cloud Computing and Services Science, CLOSER 2012, held in Porto, Portugal, in April 2012. The 15 papers were selected from 145 submissions and are presented together with one invited paper. The papers cover the following topics: cloud computing fundamentals, services science foundation for cloud computing, cloud computing platforms and applications, and cloud computing enabling technology.
This book constitutes the refereed proceedings of the First European Conference on Smart Sensing and Context, EuroSSC 2006, held in Enschede, Netherlands in October 2006. The 15 revised full papers and 14 revised short papers presented were carefully reviewed and selected from over 50 submissions.
This volume contains the final versions of the technical papers presented at MoDELS 2005 in Montego Bay, Jamaica, October 2–7, 2005.
The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (EI) research is therefore to address the effectiveness of solutions that will successfully prepare organizations for the advent and uptake of new technologies. This volume outlines results and practical concepts from recent and ongoing European research studies in EI, and examines the results of research and discussions cultivated at the I-ESA 2018 conference, “Smart services and business impact of enterprise interoperability”. The conference, designed to encourage collaboration between academic inquiry and real-world industry applications, addressed a number of advanced multidisciplinary topics including Industry 4.0, Big Data, the Internet of Things, Cloud computing, ontology, artificial intelligence, virtual reality and enterprise modelling for future “smart” manufacturing. Readers will find this book to be a source of invaluable knowledge for enterprise architects in a range of industries and organizations.
Inventing isn’t easy! After identifying and presenting the 12 "valleys of death", the real obstacles limiting the transition from an original idea to an innovative one, including the notion of socially responsible research, Knowledge Production Modes between Science and Applications 2 applies the concepts introduced in Volume 1. The book starts off with 3D printing, which has essentially broken through all barriers by offering remarkable advantages over existing mechanical technology. The situation is different for 4D printing and bio-printing. First of all, we need to tackle the complexity inherent in these processes, and move away from disciplinarity to find robust, applicable solutions, despite the obstacles. This is possible in niche areas, but currently, low profitability still limits their general applicability and the willingness of researchers to embrace interdisciplinary convergence....
Open Distributed Processing contains the selected proceedings of the Third International Conference on Open Distributed Systems, organized by the International Federation for Information Processing and held in Brisbane, Australia, in February 1995. The book deals with the interconnectivity problems that advanced computer networking raises, providing those working in the area with the most recent research, including security and management issues.
Awareness of complexity in science and technology dates back to the 1970s. However, all social systems tend to develop structures that become more complex over time, be it within families, tribes, cities, states, or societal and economic organizations. Complexities 2 covers a broad array of fields, from justice and linguistics to education and organizational management. The aim of this book is to show, without aiming to provide a comprehensive overview, the diversity of approaches and behaviors towards the obstacle of complexity in understanding and achieving human actions. When we see complexity as the incompleteness of knowledge and the uncertainty of the future, we realize that simplifying is not an adequate approach to complexity, even in the humanities and social sciences. This book explores the relationship between order and disorder in this field of knowledge.
This book constitutes the proceedings of the 22nd International Conference on Advanced Information Systems Engineering, CAiSE 2010, held im Hammamet, Tunisia, in June 2010. The 39 papers presented were carefully reviewed and selected from 299 submissions. The topics covered are business process modeling, information systems quality, service modelling, security management, matching and mining, case studies and experiences, conceptual modelling, adaptation, requirements, and process analysis. In addition this volume contains two keynote papers and the abstract of a panel discussion.
The two-volume Advances in Information Systems Development: Bridging the Gap between Academia and Industry constitutes the collected proceedings of the Fourteenth International Conference on Information Systems Development: Methods and Tools, Theory and Practice – ISD’2005 Conference. The focus of these volumes is to examine the exchange of ideas between academia and industry and aims to explore new solutions. The proceedings follow the seven conference tracks highlighted at the Conference: Co-design of Business and IT; Communication and Methods; Human Values of Information Technology; Service Development and IT; Requirements Engineering in the IS Life-Cycle; Semantic Web Approaches and Applications; and Management and IT.
This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011, held in Madrid, Italy, in February 2011. The 18 revised full papers presented together with 3 idea papers were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on model-based security, tools and mechanisms, Web security, security requirements engineering, and authorization.