The bulk of this volume deals with the four main aspects of risk management: market risk, credit risk, risk management - in macro-economy as well as within companies.
This book contains substantially extended and revised versions of the best papers from the 12th International Conference on Enterprise Information Systems (ICEIS 2010), held in Funchal, Madeira, Portugal, June 8-12, 2010.
This book constitutes the joint refereed proceedings of the Third International Workshop on Communication Technologies for Vehicles, Nets4Cars 2011and the First International Workshop on Communication Technologies for Vehicles in the Railway Transportation, Nets4Trains 2011, held in Oberpfaffenhofen, Germany, in March 2011.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010.
This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011.
This book provides cutting-edge research results and application experiences from researchers and practitioners in multiple criteria decision making areas.
After the IPS2 conferences in Cranfield and Linkoping in 2009 and 2010 the 3rd CIRP International Conference on Industrial Product Service Systems (IPS2) 2011 takes place in Braunschweig, Germany.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Web Services and Formal Methods, WS-FM 2010, held in Hoboken, NJ, USA, in September 2010.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the joint post-proceedings of four topical workshops heldas satellite meetings of the 8th International Conference on service-orientedcomputing, ICSOC 2010, held in San Francisco, CA, USA in December 2010.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions.
This book presents the thoroughly refereed post-conference proceedings of the International Conference on Formal Verification of Object-Oriented Software, FoVeOOS 2010, held in Paris, France, in June 2010 - organised by COST Action IC0701.
This book is based on a selection of thoroughly revised and extended best papers from the 8th Workshop on E-Business (WEB 2009) held in Phoenix, AZ, USA, on December 15th, 2009.
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age.
The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy.
It is a great pleasure to share with you the Springer CCIS 111 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
This volume constitutes the proceedings of the 5th International Workshop on Trends in Enterprise Architecture Research (TEAR), held in Delft, The Netherlands, on November 12, 2010.
This book constitutes the post-proceedings of the International Workshop on Ontology, Conceptualization and Epistemology for Information Systems, Software Engineering and Service Sciences (ONTOSE 2010) , held at the CAiSE 2010 conference in Hammamet, Tunisia, June, 2010.
The complexity of distribution systems is augmented by various trends: globalization of the manufacturing industry, rising customer demands, and the reverse flows within closed-loop systems.
The conference series BIR (Business Informatics Research) was established 10 years ago in Rostock as an initiative of researchers from Swedish and German universities.
This edited book is intended for use by students, academics and practitioners who take interest in outsourcing and offshoring of information technology and business pr- esses.
This book constitutes the post-proceedings of the 6th International Workshop on Enterprise and Organizational Modeling and Simulation (EOMAS 2010) , held at the CAiSE 2010 conference in Hammamet, Tunisia, June 7-8, 2010.