This book contains extended and revised papers from the 16th International Conference on Enterprise Information Systems, ICEIS 2014, held in Lisbon, Portugal, in April 2014. The 24 papers presented in this volume were carefully reviewed and selected from a total of 313 submissions. The book also contains two full-paper invited talks. The selected papers reflect state-of-the-art research that…
Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This book constitutes the proceedings of the 7th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2014, held in Sydney, Australia, on December 12, 2014. The workshop spans multiple disciplines, including technical, service, economic, sociological, and behavioral sciences. It reflects on technologically enabled opportunities, implications, and…
Numerical simulation and modelling using High Performance Computing has evolved into an established technique in academic and industrial research. At the same time, the High Performance Computing infrastructure is becoming ever more complex. For instance, most of the current top systems around the world use thousands of nodes in which classical CPUs are combined with accelerator cards in order …
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
This book documents the state of the art in the use of remote sensing to address time-sensitive information requirements. Specifically, it brings together a group of authors who are both researchers and practitioners, who work toward or are currently using remote sensing to address time-sensitive information requirements with the goal of advancing the effective use of remote sensing to supply t…
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing…
This book constitutes the refereed proceedings of the 15th International Conference on Web Engineering, ICWE 2015, held in Rotterdam, The Netherlands, in June 2015. The 26 full research papers, 11 short papers, 7 industry papers, 11 demonstrations, 6 posters and 4 contributions to the PhD symposium presented were carefully reviewed and selected from 100 submissions. Moreover 2 tutorials are …
Nowadays 3D Geoinformation is needed for many planning and analysis tasks. For example, 3D city and infrastructure models are paving the way for complex environmental and noise analyzes. 3D geological sub-surface models are needed for reservoir exploration in the oil-, gas-, and geothermal industry. Thus 3D Geoinformation brings together researchers and practitioners from different fields such …