This highly practical and self-contained guidebook explains the principles and major applications of digital hologram recording and numerical reconstruction (Digital Holography).
"Research on age(ing) and work often draws upon lifespan development perspectives to explain how adults “age successfully,” managing developmental gains and losses and maintaining well-being and functioning over time. There are a multitude of similar theories to consider to this end, which is both a blessing and a curse for researchers. In this chapter, we introduce a conceptual integration…
Volume ini berisi makalah-makalah yang dipresentasikan pada POST 2015: Konferensi ke-4 tentang Prinsip-prinsip Keamanan dan Kepercayaan, yang diadakan selama 16-17 April 2015 di London, Inggris. Prinsip Keamanan dan Kepercayaan adalah forum luas yang terkait dengan aspek teoretis dan mendasar dari keamanan dan kepercayaan. Makalah dari berbagai jenis diterima: hasil teoretis baru, aplikasi prak…
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applicati…
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as par…
This study addresses the most important legal issues when implementing an open access e-infrastructure for research data. It examines the legal requirements for different kinds of usage of research data in an open access infrastructure, such as OpenAIREplus, which links them to publications. The existing legal framework regarding potentially relevant intellectual property (IP) rights is analyse…
This book constitutes the refereed proceedings of the 11th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2015, held in Melbourne, Australia, in March 2015. The 62 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers are organized in the following topical sections: information systems, information modeling and semanti…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …