This book constitutes the proceedings of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, held in Nîmes, France, in May 2015. The event was organized by the IFIP Working Group 5.8 on Enterprise Interoperability in co-operation with INTEROP-VLab and PGSO (Pole Grand Sud Ouest) from INTEROP-Vlab. The theme for IWEI 2015 was “From Enterprise Interoperabil…
Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches. At the forefront of the field, the authors of this volume draw from years of research and …
This book combines issues several critical ones in the energy field (low-energy technologies, renewable energies such as the hydrogen economy, and geothermal energy). Moving towards a more sustainable world requires a complete revolution in the way we manage energy and resources. However, from an academic perspective, this theme is so broad that most educators and researchers tend to focus o…
This book constitutes the proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2015, which took place in London, UK, in April 2015, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015. The 45 papers included in this volume, consisting of 27 research papers, 2 case-study papers, 7 regular…
The March 11 disaster in 2011, known as the Great East Japan Earthquake and Tsunami, caused extensive damage in various sectors. Through the recovery process, special lessons are being learned and applied in the affected region. This book attempts to draw lessons from different issues and sectors such as policy perspectives (both national and local), the role of international NGOs, fishing indu…
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing…
The critical grounded theory presented in this book offers valuable insights on the social processes and strategies used by Blended English for Academic Purposes Professionals (BLEAPs) at higher education institutions, as they struggle to negotiate the challenges arising from a new focus on recruiting international students and hunting for other resources for their universities. Drawing from in…
This book offers insight into the spread and impact of English language education in China within China’s broader educational, social, economic and political changes. The author's critical perspective informs readers on the connections between language education and political ideologies in the context of globalizing China. The discussion of the implications concerning language education is of…
Demonstrating the latest research and analysis in the area of through-life engineering services (TES), this book utilizes case studies and expert analysis from an international array of practitioners and researchers – who together represent multiple manufacturing sectors: aerospace, railway and automotive – to maximize reader insights into the field of through-life engineering services. …