This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015.
This book constitutes the thoroughly refereed conference proceedings of the 7th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2013, held in Riva del Garda, Italy, in August 2013 and of the 8th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2014, held in Hangzhou, China, in September 2014, in conjunction with VLDB 2013 and 2014, the International Conference on Very Large Data Bases.
This book constitutes the thoroughly refereed proceedings of the Third International Symposium on Data-Driven Process Discovery and Analysis held in Riva del Garda, Italy, in August 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013.
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014.
This book constitutes the refereed proceedings of the Third European Conference on Service-Oriented and Cloud computing, ESOCC 2014, held in Manchester, UK, in September 2014.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
Erfolgreich im Homeoffice - Arbeiten mit Struktur"e; bietet einen umfassenden Leitfaden fur die Optimierung von Produktivitat und Work-Life-Balance im Kontext des Homeoffice.
Start a "e;How to"e; YouTube Channel With AIYouTube is no longer just a platform for influencers and entertainers it's a global search engine where people go to learn, solve problems, and build new skills.
Die vorliegende Arbeit entstand während meiner Tätigkeit als wissenschaftlicher Mit arbeiter am Fraunhofer-Institut für Produktionstechnik und Automatisierung (lPA), Stuttgart.
Cryptocurrency: The Future of Money in a Digital WorldStep into the world where technology meets finance, where trust is replaced by code, and where the global economy is being reimagined one block at a time.
Top 15 Ways to Make Money with DeepseekUnlock the practical potential of AI with this powerful, no-nonsense guide that shows you exactly how to turn Deepseek into a source of income whether you're a freelancer, entrepreneur, content creator, or small business owner.
Deepseek for Teachers: Cultivating Depth, Curiosity, and Meaning in the ClassroomTeaching is no longer just about delivering content it's about awakening curiosity, nurturing thinking, and creating space for students to explore beyond the obvious.
Master Deepseek in 5 DaysIn a world racing toward automation, intelligence, and innovation, Master Deepseek in 5 Days gives you the exact roadmap you need to harness the full potential of one of the most powerful AI tools available today Deepseek.
This is the Proceedings of the Eighth International Conference on Management Science and Engineering Management (ICMSEM) held from July 25 to 27, 2014 at Universidade Nova de Lisboa, Lisbon, Portugal and organized by International Society of Management Science and Engineering Management (ISMSEM), Sichuan University (Chengdu, China) and Universidade Nova de Lisboa (Lisbon, Portugal).
This is the Proceedings of the Eighth International Conference on Management Science and Engineering Management (ICMSEM) held from July 25 to 27, 2014 at Universidade Nova de Lisboa, Lisbon, Portugal and organized by International Society of Management Science and Engineering Management (ISMSEM), Sichuan University (Chengdu, China) and Universidade Nova de Lisboa (Lisbon, Portugal).
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013).
Ein wesentlicher Teil der Beratungsbranche ist im Bereich Change Management tatig & der strategischen Begleitung und Umsetzung von Veranderungsprozessen in Organisationen.
This book contains the refereed proceedings of the 4th International Conference on Lean Enterprise Software and Systems, LESS 2013, held in Galway, Ireland, in December 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan.
This book contains 13 papers from the 7th Workshop on Global Sourcing, held in Val d'Isere, France, during March 11-14, 2013, which were carefully reviewed and selected from 40 submissions.
This book constitutes the thoroughly refereed proceedings of the Second International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June 2012.
This book constitutes the thoroughly refereed proceedings of the 17th East-European Conference on Advances in Databases and Information Systems, ADBIS 2013, held in Genoa, Italy, in September 2013.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013.
This book constitutes the joint refereed proceedings of the 13 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 6th Conference on Internet of Things and Smart Spaces, ruSMART 2013, held in St.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA).
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA).
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013.
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Theory and Practice of Model Transformations, ICMT 2013, held in Budapest, Hungary, in June 2013.
This book constitutes the refereed proceedings of the 8th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2013, held in Helsinki, Finland, in June 2013.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Valencia, Spain, in conjunction with the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, in June 2013.
This book contains the refereed proceedings of the 14th International Conference on Business Process Modeling, Development and Support (BPMDS 2013) and the 18th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2013), held together with the 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013) in Valencia, Spain, in June 2013.