This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought in more advertising revenue than any firm, online or off, and had risen to become the most profitable media company on the planet. Today billions …
This book constitutes the proceedings of the 5th Enterprise Engineering Working Conference, EEWC 2015, held in Prague, Czech Republic, during May 15–19, 2015. EEWC aims at addressing the challenges that modern and complex enterprises face in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific s…
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the …
This book investigates the design and implementation of market mechanisms to explore how they can support knowledge- and innovation management within firms. The book uses a multi-method design, combining qualitative and quantitative cases with experimentation. First the book reviews traditional approaches to solving the problem as well as markets as a key mechanism for problem solving. After a …
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.
This book constitutes the refereed proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2015, held in Albacete, Spain, in November 2015. The 31 revised full papers presented were carefully selected from 175 submissions. The papers are organized in topical sections on Bayesian networks and uncertainty modeling; fuzzy logic and soft computing; knowl…
This book constitutes the refereed proceedings of the 6th International Conference of the CLEF Initiative, CLEF 2015, held in Toulouse, France, in September 2015. The 31 full papers and 20 short papers presented were carefully reviewed and selected from 68 submissions. They cover a broad range of issues in the fields of multilingual and multimodal information access evaluation, also included…
Experience Skype to the Max shows you how to make the most of Skype's full range of features on any device. Discover tips and tricks for saving time, saving money, and fostering better communication at work or in your personal projects. Go beyond simple voice calling and discover Skype as a multimedia cross-platform collaboration tool, wherever you are in the world. Learn how to connect to S…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…