This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, counte…
The explosive growth in data, computational power, and social media creates new opportunities for innovating the processes and solutions of Information and communications technology (ICT) based policy-making and research. To take advantage of these developments in the digital world, new approaches, concepts, instruments and methods are needed to navigate the societal and computational complexit…
This open access book offers an innovative account of how relief organizations’ visual depiction of Syrian displacement contributes to reproduce and reinforce a securitized account of refugees. Through visual analysis, the book demonstrates how the securitization process takes place in three different ways. First of all, even if marginally, it occurs through the reproduction of mainstream med…
This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel c…
Practical Business Analytics Using SAS: A Hands-on Guide shows SAS users and businesspeople how to analyze data effectively in real-life business scenarios. The book begins with an introduction to analytics, analytical tools, and SAS programming. The authors—both SAS, statistics, analytics, and big data experts—first show how SAS is used in business, and then how to get started programmi…
This highly practical and self-contained guidebook explains the principles and major applications of digital hologram recording and numerical reconstruction (Digital Holography).
"Research on age(ing) and work often draws upon lifespan development perspectives to explain how adults “age successfully,” managing developmental gains and losses and maintaining well-being and functioning over time. There are a multitude of similar theories to consider to this end, which is both a blessing and a curse for researchers. In this chapter, we introduce a conceptual integration…
Volume ini berisi makalah-makalah yang dipresentasikan pada POST 2015: Konferensi ke-4 tentang Prinsip-prinsip Keamanan dan Kepercayaan, yang diadakan selama 16-17 April 2015 di London, Inggris. Prinsip Keamanan dan Kepercayaan adalah forum luas yang terkait dengan aspek teoretis dan mendasar dari keamanan dan kepercayaan. Makalah dari berbagai jenis diterima: hasil teoretis baru, aplikasi prak…
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applicati…
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as par…