This book constitutes the post-conference proceedings of the CAiSE Forum from the 22nd International Conference on Advanced Information Systems Engineering (CAiSE 2010), held in Hammamet, Tunisia, June 9, 2010.
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010).
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.
Value stream design is increasingly asserting itself as the key approach for production optimization, but there has never been a detailed and systematic presentation of the value stream method before - a gap that has now been filled by this book.
Requirements engineering has since long acknowledged the importance of the notion that system requirements are stakeholder goals-rather than system functions-and ought to be elicited, modeled and analyzed accordingly.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?
As intelligent autonomous agents and multiagent system applications become more pervasive, it becomes increasingly important to understand the risks associated with using these systems.
This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009.
In todayis competitive and highly dynamic environment, analyzing data to understand how the business is performing, to predict outcomes and trends, and to improve the effectiveness of business processes underlying business operations has become cri- cal.
The 13th International Conference on Human-Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19-24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human-Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human-Centered Design.
The 13th International Conference on Human-Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19-24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human-Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human Centered Design.
MCDM 2009, the 20th International Conference on Multiple-Criteria Decision M- ing, emerged as a global forum dedicated to the sharing of original research results and practical development experiences among researchers and application developers from different multiple-criteria decision making-related areas such as multiple-criteria decision aiding, multiple criteria classification, ranking, and sorting, multiple obj- tive continuous and combinatorial optimization, multiple objective metaheuristics, multiple-criteria decision making and preference modeling, and fuzzy multiple-criteria decision making.
In the era of continuous changes in internal organizationalsettings and external business environments - such as new regulations and business opportunities - modern enterprises are subject to extensive research and study.
The ATOP (Agent-Based Technologies and Applications for Enterprise Interoperability) workshop series focuses on technologies that support interoperability in networked organizations, on successful applications of these technologies, and on lessons learned.
This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions.
This book constitutes the refereed proceedings of three joint events - the International Workshop on Software Measurement, IWSM 2008, the DASMA Metrik Kongress, Metrikon 2008, and the International Conference on Software Process and Product Measurement, Mensura 2008, held in Munich, Germany, in November 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Agent-Mediated Electronic Commerce, AMEC IX, co-located with the Sixth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2007, held in Honolulu, Hawai, in May 2007, and the 5th Workshop on Trading Agent Design and Analysis, TADA 2007, co-located with the Twenty-Second AAAI Conference on Artificial Intelligence, AAAI 2007, held in Vancouver, Canada, in July 2007.
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Business Process Management, BPM 2008, held in Milan, Italy, in September 2008.
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008.
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held in Torino, Italy, in August/September 2008 within the DEXA 2008 conference cluster.
With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous.
Many applications in government,airport, commercial, defense and law enfor- mentareashaveabasicneedforautomaticauthenticationofhumansbothlocally orremotelyonaroutinebasis.
st The 1 Workshop on Business Intelligence for the Real-Time Enterprise (BIRTE nd 2006) was held on September 11, 2006 in conjunction with the 32 International Conference on Very Large Data Bases (VLDB 2006) in Seoul, Korea.