![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.
This book constitutes the refereed proceedings of the workshops and special session co-located with the 17th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2019, held in Avila, Spain, in June 2019. The total of 26 full and 8 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The book also contains extended abstracts of the doctoral consortium contributions. The papers in this volume stem from the following meetings: Workshop on Agents-Based Solutions for Manufacturing and Supply Chain, AMSC; Second International Workshop on Blockchain Technology for Multi-Agent Systems, BTC4MAS; Workshop on MAS for Complex Networks and Social Computation; CNSC; Workshop on Multi-Agent Based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems, MASGES; Workshop on Smart Cities and Intelligent Agents, SCIA; and Workshop on Swarm Intelligence and Swarm Robotics, SISR; as well as the special session on Software Agents and Virtualization for Internet of Things, SAVIoTS.
This two-volume set LNCS 11588 and 11589 constitutes the refereed proceedings of the 6th International Conference on Business, Government, and Organizations, HCIBGO 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 63 papers presented in these two volumes are organized in topical sections named: Electronic, Mobile and Ubiquitous Commerce, eBanking and Digital Money, Consumer Behaviour, Business Information Systems, Dashboards and Visualization, Social Media and Big Data Analytics in B
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.
* The ideal introductory guide to Microsoft's much anticipated entry into the Customer Relationship Management (CRM) software marketplace
This book presents the latest research into the application of information and communication technologies within the travel and tourism sectors. Readers will find insightful contributions on a wide range of topics, including digital marketing, social media and online travel reviews, mobile computing, augmented and virtual reality, gamification, recommender systems, electronic distribution, online education and learning, and the sharing economy. Particular attention is devoted to the actual and potential impact of big data, and the development and implementation of digital strategies, including digital marketing and the digital economy. In addition to the description of research advances and innovative concepts, a number of informative case studies are presented. The contents of the book are based on the 2018 ENTER eTourism conference, held in Joenkoeping, Sweden. The volume will appeal to all academics and practitioners with an interest in the most recent developments in eTourism.
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes: Infrastructure security model components Systems security categorization Business impact analysis Risk management and mitigation Security configuration management Contingency planning Physical security The certification and accreditation process Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.
This book provides an extensive, up-to-date overview of the ways in which information and communication technologies (ICTs) can be used to develop tourism and hospitality. The coverage encompasses a wide variety of topics within the field, including virtual reality, sharing economy and peer-to-peer accommodation, social media use, hotel technology, big data, robotics, and recommendation systems, to name but a few. The content is based on the 2019 ENTER eTourism conference, organized in Nicosia, Cyprus by the International Federation for Information Technologies and Travel & Tourism (IFITT) - the leading independent global community for the discussion, exchange, and development of knowledge on the use and impact of new ICTs in the travel and tourism industry. The book offers a global perspective and rich source of information on important innovations and novel ideas. Though it will prove especially valuable for academics working in the eTourism field, it will also be of considerable interest to practitioners and students.
This book constitutes the proceedings of the First International Workshop on Dynamic Logic, DALI 2017, held in Brasilia, Brazil, in September 2017. Both its theoretical relevance and practical potential make Dynamic Logic a topic of interest in a number of scientific venues, from wide-scope software engineering conferences to modal logic specific events. The workshop is promoted by an R&D project on dynamic logics for cyber-physical systems. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The workshop is based on the project DaLi - Dynamic logics for cyber-physical systems: towards contract based design.
Blockchain and artificial intelligence are perhaps the two most significant disruptive technologies this century and both will significantly rewire the world of global financial markets and the world in which we live. While blockchain offers a number of significant advantages over traditional forms of finance including lower cost and massive increases in operational efficiencies of traded markets, property records and a whole host of transaction processes, artificial intelligence is moving fast from basic structured machine learning doing menial yet important big data tasks like credit card fraud detection to predictive analysis and real-time real-world risk management and investment decision making. There is still a lot of confusion in the market about cryptocurrencies, bitcoin and the underlying blockchain technology. Blockchain and Artificial Intelligence highlights the underlying technologies of blockchain and the differences between cryptocurrencies and blockchain financial applications. It explores the current AI offerings and gives a vision of the fast-moving developments in this area including the many solutions that are expected to revolutionize the way financial and commodity markets will operate in the future.
This book highlights the latest research articles presented at the Third Digital Marketing & eCommerce Conference in June 2022. Papers include a varied set of digital marketing and eCommerce-related topics such as user psychology and behavior in social commerce, influencer marketing in social commerce, social media monetization strategies and social commerce characteristics. The papers also extends to the topics of branding, business models, user and data privacy, social video marketing and commerce, among others.
The classic programming guide for architects and clients--fully updated and revised Architectural programming is a team effort that requires close cooperation between architects and their clients. "Problem Seeking, Fifth Edition" lays out a five-step procedure that teams can follow when programming any building or series of buildings, from a small house to a hospital complex. This simple yet comprehensive process encompasses the entire range of factors that influence the design of buildings. This "Fifth Edition" of the only programming guide appropriate for both architect and client features new information related to BIM, integrated practice, and sustainable design when programming. Supplemented with more than 120 illustrations and diagrams updated for this edition, this indispensable resource provides revised technical information and faster, easier access to explanations, examples, and tools, including: Guidance on incorporating the latest technological tools when programming A primer on discounted cash flow analysis and net present value analysis Project statement examples organized by project phase and building type Useful techniques for data management, functional relationship analysis, and more
The role of software has changed from simply generating financial
or mechanical data to monitoring and controlling equipment that
directly affects human life and safety. As a result, a more
thorough understanding and familiarity with the specialized
techniques used to achieve and assess the safety and reliability of
software is needed in academia, industry, and government.
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
Reduce the time spent analyzing infrastructure modules while lowering your cost and resources in the process. Most software project teams that develop custom software build the systems from scratch. With limited budgets and time, they often concentrate on the business functionality and try to minimize or ignore the infrastructure functionality. This book shows you how to develop flexible and and reusable modules that can be enhanced over time. Software infrastructure modules are the base modules in any software system. This book examines the key functionality supported by each of them and discusses the essential services for other modules.You'll explore the infrastructure modules required in large enterprise projects and each one will be explained with high-level use-cases, wireframes, and entities. Add Infrastructure Software Modules for Enterprises to your company's library today. What You'll Learn Review infrastructure modules and how they interact together or with other business modules Understand the main functionalities provided by infrastructure modules Explore the design of infrastructure modules via use-cases, wireframes, and entities Who This Book Is For Project team members that implement custom portals or software systems provided by public or private sector organizations.
The book introduces the fundamentals and development of Computer aided design, Computer aided process planning, and Computer aided manufacturing. The integration of CAD/CAPP/CAM, product data management and Concurrent engineering and collaborative design etc. are also illustrated in detail, which make this book be an essential reference for graduate students, scientists and practitioner in the research fields of computer sciences and engineering.
Developments in information communication technologies (ICTs) have altered the fabric of youth culture in terms of a young person's access to information and ability to communicate with a global audience. The conditions, opportunities, and limitations of using digital media are different for marginalized urban youth. In order to harness the educational value of digital media in the lives of disenfranchised youth, we must understand its potential as a means of empowerment. Central to this book is the development of a model for working with youth using ICTs called digital youth praxis (DYP), which offers praxis orientation of ICTs that are critical, creative, and grounded in social justice. This model includes three tenets: the DYP H3 model, used for understanding context and ICT creation practices; the DYP phases, which offers six phases for critical ICT making; and the DYP typology, which offers insight on three different levels of ICT engagement and what they include. The purpose of this model is to clarify concepts and propose interdisciplinary relationships among concepts, provide a context for interpreting the findings, explain observations and creative content, and to encourage theory development that is useful to practice. Providing insight based on community-based fieldwork with marginalized youth, the interdisciplinary nature of Digital Youth Praxis is an excellent guide for formal and informal educators interested or engaged in youth media productions.
DECISION MAKING IN SYSTEMS ENGINEERING AND MANAGEMENT A thoroughly updated overview of systems engineering management and decision making In the newly revised third edition of Decision Making in Systems Engineering and Management, the authors deliver a comprehensive and authoritative overview of the systems decision process, systems thinking, and qualitative and quantitative multi-criteria value modeling directly supporting decision making throughout the system lifecycle. This book offers readers major new updates that cover recently developed system modeling and analysis techniques and quantitative and qualitative approaches in the field, including effective techniques for addressing uncertainty. In addition to Excel, six new open-source software applications have been added to illustrate key topics, including SIPmath Modeler Tools, Cambridge Advanced Modeller, SystemiTool2.0, and Gephi 0.9.2. The authors have reshaped the book's organization and presentation to better support educators engaged in remote learning. New appendices have been added to present extensions for a new realization analysis technique and getting started steps for each of the major software applications. Updated illustrative examples support modern system decision making skills and highlight applications in hardware, organizations, policy, logistic supply chains, and architecture. Readers will also find: Thorough introductions to working with systems, the systems engineering perspective, and systems thinking In-depth presentations of applied systems thinking, including holism, element dependencies, expansive and contractive thinking, and concepts of structure, classification, and boundaries Comprehensive explorations of system representations leading to analysis In-depth discussions of supporting system decisions, including the system decision process (SDP), tradespace methods, multi-criteria value modeling, working with stakeholders, and the system environment Perfect for undergraduate and graduate students studying systems engineering and systems engineering management, Decision Making in Systems Engineering and Management will also earn a place in the libraries of practicing system engineers and researchers with an interest in the topic.
This book constitutes the proceedings of the 5th International Conference on Context-Aware Systems and Applications, ICCASA 2016, held in Thu Dau Mot, Vietnam, in November 2016. The 22 revised full papers presented were carefully selected from 35 submissions and cover a wide spectrum in the area of Context-Aware-Systems (CAS). CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection, where context awareness used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions.
This book constitutes the refereed proceedings of the 11 workshops co-located with the 16th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2018, held in Toledo, Spain, in June 2018. The 47 full papers presented were carefully reviewed and selected from 72 submissions. The volume presents the papers that have been accepted for the following workshops: Workshop on Agents and Multi-agent Systems for AAL and e-HEALTH; Workshop on Agent based Applications for Air Transport; Workshop on Agent-based Artificial Markets Computational Economics; Workshop on Agent-Based Solutions for Manufacturing and Supply Chain; Workshop on MAS for Complex Networks and Social Computation; Workshop on Intelligent Systems and Context Information Fusion; Workshop on Multi-agent based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems; Workshop on Multiagent System based Learning Environments; Workshop on Smart Cities and Intelligent Agents; Workshop on Swarm Intelligence and Swarm Robotics; Workshop on Multi-Agent Systems and Simulation.
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They were organized in topical sections named: safety and security; Ada 202X; handling implicit overhead; real-time scheduling; and new application domains. |
You may like...
Redesigning Innovative Healthcare…
M. Saito, Nilmini Wickramasinghe, …
Hardcover
R6,077
Discovery Miles 60 770
Developing Curriculum for Emergency…
Susana Silva, Paula Peres, …
Hardcover
R5,370
Discovery Miles 53 700
Pedagogy, Presence, and Motivation in…
Aaron Michael Perez, ?Enol Orakc?
Hardcover
R5,333
Discovery Miles 53 330
|