This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Software Measurement, IWSM-Mensura 2007, held in Palma de Mallorca, Spain, in November 2007.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East Conference on Software Engineering Techniques, CEE-SET 2007, held in Poznan, Poland, in October 2007.
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.
This book contains the best papers of the 8th International Conference on Enterprise Information Systems (ICEIS 2006), held in the city of Paphos (Cyprus), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) in collaboration with the University of Cyprus, Aristotle University of Thessaloniki and Athens University of Economics and Business.
This book presents select proceedings from the International Conference on Civil Engineering Innovative Development in Engineering Advances (ICC IDEA 2025), highlighting holistic innovations in civil engineering for sustainable and smart infrastructure development.
This book contains the best papers of the 9th International Conference on Enterprise Information Systems (ICEIS 2007), held in the city of Funchal, Madeira (Portugal), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) and the University of Madeira, in collaboration with ACM/SIGMIS and AAAI.
Embedded and ubiquitous computing systems have considerably increased their scope of application over the past few years, and they now also include missi- and business-critical scenarios.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4-5 September 2008.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), which took place in Cambridge, Massachusetts, USA on September 15-17.
This textbook is intended for use by SPI (Software Process Improvement) managers and researchers, quality managers, and experienced project and research managers.