This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011.
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee.
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy.
A series of workshops devoted to modern cryptography beganin Santa Barbara,California in 1981 and was followed in1982 by a European counterpart in Burg Feuerstein, Germany.
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992.
'I'he int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every year, one in Europe and one in the United States.
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR).
This volume presents the proceedings of a conference covering European activities in the field of distributed memory computing architectures, programming tools, operating systems, programming languages and applications.
A series of open workshops devoted to modem cryptology began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feurstein, Germany.
This volume contains the proceedings of the First International Workshop on Algebraic and Logic Programming held in Gaussig (German Democratic Republic) from November 14 to 18, 1988.
Istio is a powerful service mesh technology that enhances the security, observability, and traffic management of microservices within cloud-native architectures.
This book constitutes the refereed proceedings of the 31th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2024, held in Haifa, Israel in May 2024.
OSP 2 is both an implementation of a modern operating system and a flexible environment for generating implementation projects appropriate for an introductory course in operating system design.
This book constitutes the proceedings of the 36th International Conference on Advanced Information Systems Engineering, CAiSE 2024, which was held in Limassol, Cyprus, during June 3-7, 2024.
SummaryDependency Injection Principles, Practices, and Patterns teaches you to use DI to reduce hard-coded dependencies between application components.
Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break.
This book constitutes the refereed proceedings of the 20th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2024, held in Rome, Italy, during September 26-27, 2024.
In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth.
Practical Usage of MVS REXX provides a concise and complete source of information for the development of applications using the REXX language - IBM's systems application architecture procedural language.
This is the first international conference aimed at bringing the distributed database and distributed AI (DAD experts together, from both academia and industry, in order to discuss the issues of the next generation of knowledge based systems, namely Cooperating Knowledge Based Systems or CKBS for short.
This book gathers together research from three key application themes of modelling in operational research - modelling to support evaluation and change in organisations; modelling within the development and use of organisational information systems; and the use of modelling approaches to support, enable and enhance decision support in organisational contexts.
This book is a translation ofthe accomplishment ofthe French engineer Ammar Attoui, who has set out to bring together the works of computer scientists and automotive engineers.
A very large proportion of commercial and industrial concerns in the UK find their business competitiveness dependent on huge quantities of already installed, legacy IT.
Systems Engineering for Business Process Change: New Directions is a collection of papers resulting from an EPSRC managed research programme set up to investigate the relationships between Legacy IT Systems and Business Processes.
Object-oriented inheritance has been in widespread use for a decade, and it is now realised that although inheritance is a powerful modelling tool with many associated advantages, its benefits are not automatically conferred on systems that simply use it.
This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000.
The two-volume set LNBIP 518 and 519 constitutes the refereed post-conference proceedings of the 25th International Conference on Enterprise Information Systems, ICEIS 2023, which was held in Prague, Czech Republic, during April 2023.