Teknologi baru seperti media sosial, komputasi awan, data besar, dan teknologi yang ada di mana-mana dan ambien beroperasi dalam skala global, penggunaannya tidak hanya menyentuh negara tempat asalnya (dalam banyak kasus, Amerika Serikat), tetapi juga individu dan kelompok di seluruh dunia. Pengungkapan baru-baru ini mengenai praktik pengawasan lebih lanjut membuktikan bahwa data pribadi dikomu…
This book introduces the field of data science in a practical and accessible manner, using a hands-on approach that assumes no prior knowledge of the subject. The foundational ideas and techniques of data science are provided independently from technology, allowing students to easily develop a firm understanding of the subject without a strong technical background, as well as being presented wi…
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…
This book constitutes the proceedings of the Third Asia Pacific Conference on Business Process Management held in Busan, South Korea, in June 2015. Overall, 37 contributions from ten countries were submitted. After each submission was reviewed by at least three Program Committee members, 12 full and two short papers were accepted for publication in this volume. These papers cover various top…
This book features a selection of papers presented at the Second IFIP WG 12.6 International Workshop on Artificial Intelligence for Knowledge Management, AI4KM 2014, held in Wroclaw, Poland, in September 2014, in the framework of the Federated Conferences on Computer Science and Information Systems, FedCSIS 2014. The 9 revised and extended papers and one invited paper were carefully reviewed an…
The two-volume set LNAI 9119 and LNAI 9120 constitutes the refereed proceedings of the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2015, held in Zakopane, Poland in June 2015. The 142 revised full papers presented in the volumes, were carefully reviewed and selected from 322 submissions. These proceedings present both traditional artificial intelligence m…
This book constitutes the refereed proceedings of the 11th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2015, held in Bayonne, France, in September 2015. The 35 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers feature highly novel research describing innovative algorithms, systems, tools and…
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities …
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algori…