13E 2006, the 6th in this series of IFIP conferences, marked the congregation of researchers and practitioners in the areas of e-Commerce, e-Business, and e-Government.
The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process.
The rapid growth in Internet, WWW and Intranet systems demands an increased sophistication in established information services, engineeering techniques and methods to improve the development of information services in a World Wide Web environment.
Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
This book contains the papers that have been presented at the ninth Very Large Scale Integrated Systems conference VLSI'97 that is organized biannually by IFIP Working Group 10.
This book contains the papers presented and discussed at the conference that was held in May/June 1997, in Philadelphia, Pennsylvania, USA, and that was sponsored by Working Group 8.
Searching for Semantics: Data Mining, Reverse Engineering Stefano Spaccapietra Fred M aryanski Swiss Federal Institute of Technology University of Connecticut Lausanne, Switzerland Storrs, CT, USA REVIEW AND FUTURE DIRECTIONS In the last few years, database semantics research has turned sharply from a highly theoretical domain to one with more focus on practical aspects.
Multimedia Database Retrieval: A Human-Centered Approach presents thelatest development in user-centered methods and the state-of-the-art invisual media retrieval.
Database Semantics: Semantic Issues in Multimedia Systems reflects the state of the art of emerging research on the meaning of multimedia information, as presented during IFIP's Eighth Data Semantics Working Conference (DS-8), organized by its Working Group 2.
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.
In today's rapidly changing educational and business climate, organizational transformation has become a key area of development for many different and varied environments, both commercial and academic.
CHARM '97 is the ninth in a series of working conferences devoted to the development and use of formal techniques in digital hardware design and verification.
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge.
The primary aim for this book is to gather and collate articles which represent the best and latest thinking in the domain of technology transfer, from research, academia and practice around the world.
Globalization of business, internationalization of trade, and increasing prevalence of multi-cultural interdisciplinary teams are beginning to redefine the nature of office work.
TRACK 1: Innovative Applications in the Public Sector The integration of multimedia based applications and the information superhighway fundamentally concerns the creation of a communication technology to support the ac- tivities of people.
The number of new applications in need of database support is exploding and there is an increasing need to link and access database systems supporting these new applications via computer networks.
Many organisations are using an increased range of information technologies to support a variety of new organisational practices and organisational forms.
Semantic Issues in e-Commerce Systems comprises the proceedings of the Ninth Working Conference on Database Semantics, which was sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in April 2001.
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace.
Signal Processing Methods for Music Transcription is the first book dedicated to uniting research related to signal processing algorithms and models for various aspects of music transcription such as pitch analysis, rhythm analysis, percussion transcription, source separation, instrument recognition, and music structure analysis.
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks.