This book contains extended and revised papers from the 16th International Conference on Enterprise Information Systems, ICEIS 2014, held in Lisbon, Portugal, in April 2014. The 24 papers presented in this volume were carefully reviewed and selected from a total of 313 submissions. The book also contains two full-paper invited talks. The selected papers reflect state-of-the-art research that…
This volume contains a selection of the best papers presented at the 8th International Conference on Industrial Engineering and Industrial Management, XX International Conference on Industrial Engineering and Operations Management, and International IIE Conference 2014, hosted by ADINGOR, ABEPRO and the IIE, whose mission is to promote links between researchers and practitioners from different…
This book examines the role played by domestic and international judges in the “flexibilization” of legal systems through general principles. It features revised papers that were presented at the Annual Conference of the European-American Consortium for Legal Education, held at the University of Parma, Italy, May 2014. This volume is organized in four sections, where the topic is mainly ex…
In A Case-Based Guide to Clinical Endocrinology, Second Edition, a renowned group of distinguished clinicians once again provides stimulating instruction and insights into a wide variety of endocrine topics, teaching readers modern management of the conditions described and offering targeted entry into the literature. Importantly, many of the important elements in the current curriculum for cli…
Pascal Engel investigates how outside directors are incentivized in family firms that are publicly listed but still partly owned by members of the founding family. Owning families significantly influence their firms' corporate conduct with their own set of goals, sometimes in conflict with economically driven goals of the capital markets. The author analyzes how family shareholders exert their …
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
This volume presents selected peer-reviewed contributions from The International Work-Conference on Time Series, ITISE 2015, held in Granada, Spain, July 1-3, 2015. It discusses topics in time series analysis and forecasting, advanced methods and online learning in time series, high-dimensional and complex/big data time series as well as forecasting in real problems. The International Work-C…
Workplace English language training programs represent a corporate investment in language skills enhancement and human capital development. This book evaluates English language training programs in Chinese workplaces by examining a range of training effectiveness variables and identifying the factors that facilitate or hinder effective learning outcomes for workplace English training programs a…
This book presents contributions from researchers, practitioners and professional institutions that published papers in the Proceedings of the Educating Enterprising Engineers and Scientists conference, held in London, UK on 17th June 2015. The topics considered range from educating engineers to giving a business edge and embedding entrepreneurship to achieve integrated education and curriculum…
This text develops the necessary background in probability theory underlying diverse treatments of stochastic processes and their wide-ranging applications. In this second edition, the text has been reorganized for didactic purposes, new exercises have been added and basic theory has been expanded. General Markov dependent sequences and their convergence to equilibrium is the subject of an ent…