This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; pr…
This book constitutes the proceedings of the 37th European Conference on IR Research, ECIR 2015, held in Vienna, Austria, in March/April 2015. The 44 full papers, 41 poster papers and 7 demonstrations presented together with 3 keynotes in this volume were carefully reviewed and selected from 305 submissions. The focus of the papers were on following topics: aggregated search and diversity, clas…
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought in more advertising revenue than any firm, online or off, and had risen to become the most profitable media company on the planet. Today billions …
This book constitutes the proceedings of the 5th Enterprise Engineering Working Conference, EEWC 2015, held in Prague, Czech Republic, during May 15–19, 2015. EEWC aims at addressing the challenges that modern and complex enterprises face in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific s…
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the …
This book investigates the design and implementation of market mechanisms to explore how they can support knowledge- and innovation management within firms. The book uses a multi-method design, combining qualitative and quantitative cases with experimentation. First the book reviews traditional approaches to solving the problem as well as markets as a key mechanism for problem solving. After a …
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.
This book constitutes the refereed proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2015, held in Albacete, Spain, in November 2015. The 31 revised full papers presented were carefully selected from 175 submissions. The papers are organized in topical sections on Bayesian networks and uncertainty modeling; fuzzy logic and soft computing; knowl…
This book constitutes the refereed proceedings of the 6th International Conference of the CLEF Initiative, CLEF 2015, held in Toulouse, France, in September 2015. The 31 full papers and 20 short papers presented were carefully reviewed and selected from 68 submissions. They cover a broad range of issues in the fields of multilingual and multimodal information access evaluation, also included…