This book delves into integrating sustainable practices within enterprise resource planning (S-ERP) systems framework, particularly in the context of Industry 4.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
Disruptive technologies are revolutionising the supply chain landscape, driving innovation, and unlocking unprecedented value to achieve radical growth and operational excellence.
This book focuses on agentic AI security, providing a comprehensive guide to the theoretical foundations and practical techniques required to secure the increasingly prevalent AI agent systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015.
This book constitutes the thoroughly refereed conference proceedings of the 7th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2013, held in Riva del Garda, Italy, in August 2013 and of the 8th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2014, held in Hangzhou, China, in September 2014, in conjunction with VLDB 2013 and 2014, the International Conference on Very Large Data Bases.
This book constitutes the thoroughly refereed proceedings of the Third International Symposium on Data-Driven Process Discovery and Analysis held in Riva del Garda, Italy, in August 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013.
This book constitutes the refereed proceedings of the Third European Conference on Service-Oriented and Cloud computing, ESOCC 2014, held in Manchester, UK, in September 2014.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013).
This book contains the refereed proceedings of the 4th International Conference on Lean Enterprise Software and Systems, LESS 2013, held in Galway, Ireland, in December 2013.
This book contains 13 papers from the 7th Workshop on Global Sourcing, held in Val d'Isere, France, during March 11-14, 2013, which were carefully reviewed and selected from 40 submissions.
This book constitutes the thoroughly refereed proceedings of the Second International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June 2012.
This book constitutes the thoroughly refereed proceedings of the 17th East-European Conference on Advances in Databases and Information Systems, ADBIS 2013, held in Genoa, Italy, in September 2013.
This book constitutes the joint refereed proceedings of the 13 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 6th Conference on Internet of Things and Smart Spaces, ruSMART 2013, held in St.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA).
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA).
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Theory and Practice of Model Transformations, ICMT 2013, held in Budapest, Hungary, in June 2013.
This book constitutes the refereed proceedings of the 8th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2013, held in Helsinki, Finland, in June 2013.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Valencia, Spain, in conjunction with the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, in June 2013.
This book contains the refereed proceedings of the 14th International Conference on Business Process Modeling, Development and Support (BPMDS 2013) and the 18th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2013), held together with the 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013) in Valencia, Spain, in June 2013.
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Workshop on Web Services and Formal Methods, WS-FM 2012, held in Tallinn, Estonia, in September 2012.
This book constitutes the refereed proceedings of 12 international workshops held in Tallinn, Estonia, in conjunction with the 10th International Conference on Business Process Management, BPM 2012, in September 2012.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This book constitutes revised selected papers of the 8th International Workshop on Formal Aspects of Component Software, FACS 2011, held in Oslo, Norway in September 2011.
This book constitutes the thoroughly refereed post-workshop proceedings and the doctoral symposium of the 12th International Conference on Web Engineering, ICWE 2012, held in Berlin, Germany, in July 2012.
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012.
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
This volume constitutes the proceedings of the combined 7th International Workshop on Trends in Enterprise Architecture Research (TEAR 2012) and the 5th Working Conference on Practice-Driven Research on Enterprise Transformation (PRET-5), held in Barcelona, Spain, October 23-24, 2012, and co-located with The Open Group's Conference on Enterprise Architecture, Cloud Computing, and Security.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012.
This book contains 13 carefully revised and selected papers from the 6th Workshop on Global Sourcing, held in Courchevel, France, during March 12-15, 2012.