In today's dynamic business world, the success of a company increasingly depends on its ability to react to changes in its environment in a quick and flexible way.
This book is thematically positioned at the intersections of Urban Design, Architecture, Civil Engineering and Computer Science, and it has the goal to provide specialists coming from respective fields a multi-angle overview of state-of-the-art work currently being carried out.
An enterprise architecture tries to describe and control an organisation's structure, processes, applications, systems and techniques in an integrated way.
The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government.
Developing educational software requires thinking, problematizing, representing, modeling, implementing and analyzing pedagogical objectives and issues, as well as conceptual models and software architectures.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds.
Wikipedia, Flickr, You Tube, Facebook, LinkedIn are all examples of large community-built databases, although with quite diverse purposes and collaboration patterns.
Für die Printmedienunternehmen haben sich durch das Internet neue Geschäftsfelder eröffnet: Informationen werden sowohl für die Papier- als auch für die Onlineausgabe aufbereitet.
An enterprise architecture tries to describe and control an organisation's structure, processes, applications, systems and techniques in an integrated way.
An enterprise architecture tries to describe and control an organisation's structure, processes, applications, systems and techniques in an integrated way.
An enterprise architecture tries to describe and control an organisation's structure, processes, applications, systems and techniques in an integrated way.
The objective of the present work is to review the existing literature on joint incongruity, cellular mechano-transduction, and computer simulations of mechano-adaptive bone remodelling, and to quantitatively assess the effect of incongruity on load transmission and subchondral mineralisation.
Undeniably widespread and powerful as it is, the Internet is not almighty: it can reach as high as the skies (cloud computing), but it cannot escape competition.
This book collects ECM research from the academic discipline of Information Systems and related fields to support academics and practitioners who are interested in understanding the design, use and impact of ECM systems.
This book demonstrates how an improved strategic management approach, leveraging established management concepts in conjunction with the innovative technology solutions offered by business intelligence, can lead to better performance.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
In very short time, peer-to-peer computing has evolved from an attractive new paradigm into an exciting and vibrant research field bringing together researchers from systems, networking, and theory.
This book was prepared as the Final Publication of COST Action IC0703 "e;Data Traffic Monitoring and Analysis: theory, techniques, tools and applications for the future networks"e;.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book collects a set of chapters of the multi-disciplinary project "e;Games, actions and Social software"e; which was carried out at the Netherlands Institute for Advanced Study in the Humanities and Social Sciences (NIAS) in Wassenaar, from September 2006 through January 2007.
Following the increase in of the information available on the Web, the diversity of its users and the complexity of Web applications, researchers started developing adaptive Web systems that tailored their appearance and behavior to each individual user or user group.
This book constitutes the refereed proceedings of the 4th International Symposium on Medical Data Analysis, ISMDA 2003, held in Berlin, Germany in October 2003.