Expert Oracle Application Express, 2nd Edition is newly updated for APEX 5.0 and brings deep insight from some of the best APEX practitioners in the field today. You'll learn about important features in APEX 5.0, and how those can be applied to make your development work easier and with greater impact on your business. Oracle Application Express (APEX) is an entirely web-based development frame…
In this volume, top seismic experts and researchers from Europe and around the world, including the George E. Brown, Jr. Network for Earthquake Engineering Simulation (NEES) in the USA, present the most recent outcome of their work in experimental testing, as well as the results of the transnational access activities of external researchers who have used Europe's seven largest and most advanced…
This book constitutes the refereed proceedings of the 14th International Symposium on Experimental Algorithms, SEA 2015, held in Paris, France, in June/July 2015. The 30 revised full papers presented were carefully reviewed and selected from 76 submissions. The main theme of the symposium is the role of experimentation and of algorithm engineering techniques in the design and evaluation of a…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…
This book focuses on recent research in modern optimization and its implications in control and data analysis. This book is a collection of papers from the conference “Optimization and Its Applications in Control and Data Science” dedicated to Professor Boris T. Polyak, which was held in Moscow, Russia on May 13-15, 2015. This book reflects developments in theory and applications roo…
This book constitutes the refereed proceedings of the 4th International Symposium on Languages, Applications and Technologies, SLATE 2015, held in Madrid, Spain, in June 2015. The 17 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on human-human languages; human-computer languages; computer-computer languages.