This book constitutes the proceedings of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, held in Nîmes, France, in May 2015. The event was organized by the IFIP Working Group 5.8 on Enterprise Interoperability in co-operation with INTEROP-VLab and PGSO (Pole Grand Sud Ouest) from INTEROP-Vlab. The theme for IWEI 2015 was “From Enterprise Interoperabil…
This book contains revised papers from the 17th International Conference on Enterprise Information Systems, ICEIS 2015, held in Barcelona, Spain, in April 2015. The 31 papers presented in this volume were carefully reviewed and selected from a total of 327 submissions. The book also contains one full-paper invited talk. The selected papers reflect state-of-the-art research that is oriented …
This book contains extended and revised papers from the 16th International Conference on Enterprise Information Systems, ICEIS 2014, held in Lisbon, Portugal, in April 2014. The 24 papers presented in this volume were carefully reviewed and selected from a total of 313 submissions. The book also contains two full-paper invited talks. The selected papers reflect state-of-the-art research that…
Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This book constitutes the proceedings of the 7th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2014, held in Sydney, Australia, on December 12, 2014. The workshop spans multiple disciplines, including technical, service, economic, sociological, and behavioral sciences. It reflects on technologically enabled opportunities, implications, and…
Numerical simulation and modelling using High Performance Computing has evolved into an established technique in academic and industrial research. At the same time, the High Performance Computing infrastructure is becoming ever more complex. For instance, most of the current top systems around the world use thousands of nodes in which classical CPUs are combined with accelerator cards in order …
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
This book documents the state of the art in the use of remote sensing to address time-sensitive information requirements. Specifically, it brings together a group of authors who are both researchers and practitioners, who work toward or are currently using remote sensing to address time-sensitive information requirements with the goal of advancing the effective use of remote sensing to supply t…
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing…