Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book constitutes the thoroughly refereed proceedings of the Fourth International Symposium on Data-Driven Process Discovery and Analysis held in Riva del Milan, Italy, in November 2014. The five revised full papers were carefully selected from 21 submissions. Following the event, authors were given the opportunity to improve their papers with the insights they gained from the symposium. During this edition, the presentations and discussions frequently focused on the implementation of process mining algorithms in contexts where the analytical process is fed by data streams. The selected papers underline the most relevant challenges identified and propose novel solutions and approaches for their solution.
This book constitutes the thoroughly refereed proceedings of the Third International Symposium on Data-Driven Process Discovery and Analysis held in Riva del Garda, Italy, in August 2013. The six revised full papers were carefully selected from 18 submissions. Following the event, authors were given the opportunity to improve their papers with the insights they gained from the symposium. The selected papers cover theoretical issues related to process representation, discovery and analysis or provide practical and operational experiences in process discovery and analysis.
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
The first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?
|
You may like...
|