0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (130)
  • R250 - R500 (380)
  • R500+ (2,305)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised... Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Andrew A. Adams, Michael Brenner, Matthew Smith
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4,... Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
George Danezis, Sven Dietrich, Kazue Sako
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009,... Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009, Proceedings (Paperback, 2009 ed.)
Claude Godart, Norbert Gronau, Sushil Sharma, Gerome Canals
R2,697 Discovery Miles 26 970 Ships in 18 - 22 working days

I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent

Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.): Fatos Xhafa, Santi Caballe, Ajith Abraham,... Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.)
Fatos Xhafa, Santi Caballe, Ajith Abraham, Thanasis Daradoumis, Angel A Juan
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments.

The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others.

Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity.

Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI... Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings (Paperback, 2013 ed.)
Louis Marinos, Ioannis Askoxylakis
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.

E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China,... E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China, December 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Michael J. Shaw, Dongsong Zhang, Wei T. Yue
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Workshop on E-Business (WEB 2011), held in Shanghai, China, on December 4, 2011. The 40 papers, which were selected from 88 submissions to the workshop, touch on topics that are diverse yet highly relevant to the challenges faced by today's e-business researchers and practitioners. They are organized in topical sections on social networks, business intelligence, and social computing; economics and organizational implications of electronic markets; and e-business systems and applications.

Mobile Web Information Systems - 10th International Conference, MobiWIS 2013, Paphos, Cyprus, August 26-29, 2013, Proceedings... Mobile Web Information Systems - 10th International Conference, MobiWIS 2013, Paphos, Cyprus, August 26-29, 2013, Proceedings (Paperback, 2013 ed.)
Florian Daniel, George A Papadopoulos, Philippe Thiran
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The 25 papers (20 full research papers, 4 demonstration papers, and one abstract of the keynote speech) presented were carefully reviewed and selected from various submissions. The papers cover the following topics related to mobile Web and Information Systems (WISs), such as mobile Web services, location-awareness, design and development, social computing and society, development infrastructures and services, SOA and trust, UI migration and human factors, and Web of Things and networks.

Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November... Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November 26-27, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Phan Cong-Vinh, Nguyen Manh Hung, Nguyen Thanh Tung, Jun Suzuki
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the first International Conference on Context-Aware Systems and Applications, ICCASA 2012, held in Ho Chi Minh City, Vietnam, in November 2012. The 34 revised full papers presented were carefully selected and reviewed from over 100 submissions. The papers cover a wide spectrum of issues in the area of Context-Aware Systems (CAS). CAS are going to shape networked computing systems of the future

Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Paperback, Softcover reprint of the original... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Paperback, Softcover reprint of the original 1st ed. 2003)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,014 Discovery Miles 40 140 Ships in 18 - 22 working days

Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

Applications of Data Mining to Electronic Commerce (Paperback, Softcover reprint of the original 1st ed. 2001): Ronny Kohavi,... Applications of Data Mining to Electronic Commerce (Paperback, Softcover reprint of the original 1st ed. 2001)
Ronny Kohavi, Foster Provost
R2,618 Discovery Miles 26 180 Ships in 18 - 22 working days

Applications of Data Mining to Electronic Commerce brings together in one place important contributions and up-to-date research results in this fast moving area. Applications of Data Mining to Electronic Commerce serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The... Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jaap-Henk Hoepman, Ingrid Verbauwhede
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the... Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

A research agenda for collaborative networks Purpose. Many practical application experiments and pilot cases nowadays provide evidence on what works and what still remains as a challenge for collaborative networked organizations (CNOs). The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, most efforts in this area are highly fragmented, considering only some partial facets and not a holistic perspective that would be required. We are therefore at a point in which it is necessary to define much more consolidated and sustainable research strategies for a second phase of research and development in this area. This book addresses the main disciplines involved in CNOs. It further synthesizes the views and opinions expressed by a large number of visionaries from the main disciplines involved in CNOs, and offers a comprehensive set of recommendations for the establishment of a research agenda on collaborative networks. As recognized experts in their specific areas, different authors in this book have presented work that is backed by a large number of research results, each focusing on specific facets of collaborative networks, and coming out of a large number of international and national projects.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Paperback, 2009)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

Principles and Practice of Multi-Agent Systems - 15th International Conference, PRIMA 2012, Kuching, Sarawak, Malaysia,... Principles and Practice of Multi-Agent Systems - 15th International Conference, PRIMA 2012, Kuching, Sarawak, Malaysia, September 3-7, 2012, Proceedings (Paperback, 2012 ed.)
Iyad Rahwan, Wayne Wobcke, Sandip Sen, Toshiharu Sugawara
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2012, held in Kuching, Sarawak, Malaysia, in September 2012. The conference was collocated with the 12th Pacific Rim International Conference on Artificial Intelligence, PRICAI. The 17 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on foundations, auctions and negotiation, coalition formation and teamwork, norms and institutions, and applications.

Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International... Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011,... Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Pavel Gladyshev, Marcus K. Rogers
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

Mastering E-Business Infrastructure (Paperback, Softcover reprint of the original 1st ed. 2003): Veljko Milutinovic, Frederic... Mastering E-Business Infrastructure (Paperback, Softcover reprint of the original 1st ed. 2003)
Veljko Milutinovic, Frederic Patricelli
R4,028 Discovery Miles 40 280 Ships in 18 - 22 working days

As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.

Human Interface and the Management of Information. Interacting with Information - Symposium on Human Interface 2011, Held as... Human Interface and the Management of Information. Interacting with Information - Symposium on Human Interface 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011. Proceedings, Part I (Paperback, 2011 ed.)
Michael J. Smith, Gavriel Salvendy
R2,760 Discovery Miles 27 600 Ships in 18 - 22 working days

This two-volume set LNCS 6771 and 6772 constitutes the refereed proceedings of the Symposium on Human Interface 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences. The 137 revised papers presented in the two volumes were carefully reviewed and selected from numerous submissions. The papers accepted for presentation thoroughly cover the thematic area of human interface and the management of information. The 75 papers of this first volume address the following major topics: design and development methods and tools; information and user interfaces design; visualisation techniques and applications; security and privacy; touch and gesture interfaces; adaption and personalisation; and measuring and recognising human behavior.

E-Business Applications - Technologies for Tommorow's Solutions (Paperback, Softcover reprint of the original 1st ed.... E-Business Applications - Technologies for Tommorow's Solutions (Paperback, Softcover reprint of the original 1st ed. 2003)
Jorge Gasos, Klaus-Dieter Thoben
R1,406 Discovery Miles 14 060 Ships in 18 - 22 working days

E-Business has become a fact for almost all companies. But what are the key technologies for economically successful e-commerce? In this book readers will find all concepts that will coin tomorrow's e-business: virtual sales assistants (shopbots), personalized web pages, electronic market places, vendor managed inventory, virtual organizations, supply chain management. Both technical and economic issues of these concepts are discussed in detail. Leading-edge real world applications are presented that will shape e-business mid-term.

This book is a must-read for managers or technical consultants as well as researchers needing in-depth information for strategic business decisions.

Foundations of Web Technology (Paperback, Softcover reprint of the original 1st ed. 2002): Ramesh R. Sarukkai Foundations of Web Technology (Paperback, Softcover reprint of the original 1st ed. 2002)
Ramesh R. Sarukkai
R4,446 Discovery Miles 44 460 Ships in 18 - 22 working days

Foundations of Web Technology covers the basics of Web technology while being specialized enough to add value to experienced professionals working in this field. Most books on the Web focus on programmatic aspects of languages such as Java, JavaScript, or description of standards such as Hypertext Markup Language (HTML) or Wireless Markup Language (WML). A book that covers the concepts behind the infrastructure of the Web would be indispensable to a wide range of audiences interested in learning how the Web works, how techniques in Web technology can be applied to their own problem, and what the emergent technological trends in these areas are.

Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation - An Action Guide for Business and IT Leaders... Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation - An Action Guide for Business and IT Leaders (Paperback, New)
Andrew Thu Pham, David Khoi Pham
R1,349 Discovery Miles 13 490 Ships in 10 - 15 working days

Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders explains how to increase IT delivery capabilities through the use of Agile and Kanban. Factoring in constant change, communication, a sense of urgency, clear and measurable goals, political realities, and infrastructure needs, it covers all the ingredients required for success. Using real-world examples, this practical guide illustrates how to implement Agile and Kanban in software project management and development across the entire IT department. To make things easier for busy IT leaders and executives, the text includes two case studies along with numerous templates to facilitate understanding and kick-start implementation. Explaining how IT and business management can work together to determine business goals that drive this IT-wide undertaking, the book arms you with actionable solutions that can be put to use immediately in any IT department, regardless of size.

Contemporary Research on E-business Technology and Strategy - International Conference, iCETS 2012, Tianjin, China, August... Contemporary Research on E-business Technology and Strategy - International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Vasil Khachidze, Tim Wang, Sohail Siddiqui, Vincent Liu, Sergio Cappuccio, …
R2,775 Discovery Miles 27 750 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.

Web Information Systems and Mining - International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings... Web Information Systems and Mining - International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Wu Lee Wang, Jingsheng Lei, Gong Zhiguo, Xiangfeng Luo
R1,527 Discovery Miles 15 270 Ships in 18 - 22 working days

The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.

Web Information Systems and Technologies - 7th International Conference, WEBIST 2011, Noordwijkerhout, The Netherlands, May... Web Information Systems and Technologies - 7th International Conference, WEBIST 2011, Noordwijkerhout, The Netherlands, May 6-9, 2011, Revised Selected Papers (Paperback, 2012)
Joaquim Filipe, Jose Cordeiro
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

This book contains the thoroughly refereed and revised best papers from the 7th International Conference on Web Information Systems and Technologies, WEBIST 2011, held in Nordwijkerhout, The Netherlands, in May 2011, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC). The 12 papers presented in this book were carefully reviewed and selected from 156 submissions. The papers are grouped into tow parts on "Internet Technology" and "Web Interfaces and Applications". In addition, the three invited presentations are also included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Power System Frequency Control…
Dillip Kumar Mishra, Lili, … Paperback R3,232 Discovery Miles 32 320
How to Write Health Sciences Papers…
Shane A. Thomas Paperback R781 Discovery Miles 7 810
Weber's Electrodynamics
Andre Koch Torres Assis Hardcover R7,108 Discovery Miles 71 080
Eastern's Armageddon - Labor Conflict…
Martha D. Saunders Hardcover R2,537 Discovery Miles 25 370
Efficient Predictive Algorithms for…
Luis Filipe Rosario Lucas, Eduardo Antonio Barros da Silva, … Hardcover R3,285 Discovery Miles 32 850
Safety in Aviation and Astronautics - A…
Simon Ashley Bennett Paperback R1,207 Discovery Miles 12 070
The Spy Coast
Tess Gerritsen Paperback R395 R353 Discovery Miles 3 530
Irreversibility and Dissipation in…
Edgar Roldan Hardcover R4,134 R3,333 Discovery Miles 33 330
Pultrusion - State-of-the-Art Process…
Ismet Baran Paperback R3,930 Discovery Miles 39 300
The Imperfect Murder
James Patterson, J. D. Barker Paperback R370 R330 Discovery Miles 3 300

 

Partners