Taking a very practical approach, the author describes in detail database conversion techniques, reverse engineering, forward engineering and re-engineering methodologies for information systems, offering a systematic software engineering approach for reusing existing database systems built with “old” technology. He demonstrates how the existing systems can be transformed into the new tech…
In most European countries, the horrific legacy of 1939–45 has made it quite difficult to remember the war with much glory. Despite the Anglo-American memory narrative of saving democracy from totalitarianism and the Soviet epic of the Great Patriotic War, the fundamental experience of war for so many Europeans was that of immense personal losses and often meaningless hardships. The anthology…
This book explains in detail how to define requirements modelling languages – formal languages used to solve requirement-related problems in requirements engineering. It moves from simple languages to more complicated ones and uses these languages to illustrate a discussion of major topics in requirements modelling language design. The book positions requirements problem solving within the…
This book explains in detail how to define requirements modelling languages – formal languages used to solve requirement-related problems in requirements engineering. It moves from simple languages to more complicated ones and uses these languages to illustrate a discussion of major topics in requirements modelling language design. The book positions requirements problem solving within the…
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanaly…
This anthology contributes to creating awareness on how digital ageism operates in relation to the widely spread symbolic representations of old and young age around digital technologies, the (lack of) representation of diverse older individuals in the design, development, and marketing of digital technologies and in the actual algorithms and datasets that constitute them. It also shows how ind…
actions, aesthetics, Argentine tango, awareness, dance studies, enactivism, eros, Falk Heinrich, freedom, grace, movements, performance studies, performative beauty, phenomenology, poiesis, social dancing, somaesthetics
Victims' State is the first integrated account of how Imperial Austria and the successor Austrian Republic responded to the needs of citizen-soldiers and their families in the age of mass politics and the First World War. It shows that compulsory military service and war mobilization changed the mission of the Austrian state and citizens' understanding of what they were entitled to, thus showin…
Gegenstand des Buches ist die Darstellung Otto Bauers als führende Gestalt des Austromarxismus und der SDAP, sowie die kritisch-analytische Lesart seiner philosophisch-historischen, wirtschaftlichen, soziologischen und sozialpolitischen Theorien, die vor dem Hintergrund der damaligen Diskussion in der II. und der III. Internationale, der politischen Ereignisse in der SDAP, der internationalen …
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…