Agile development practices have been widely adopted in a variety of organizations, yet only a few tools are available to help make the practical process of managing agile teams less painful and more successful. HP Agile Manager is a purpose-built SaaS-based Agile planning tool. HP Agile Manager provides a simpler, smarter way to manage collaborative development. Liran Tal provides a prac…
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th International Workshop on Environments for Multiagent Systems, E4MAS 2014 - 10 years later, held in Paris, France, in May 2014 as an associated event of AAMAS 2014, the 13th International Conference on Autonomous Agents and Multiagent Systems. The 6 revised full papers presented together with 1 roadmap paper a…
This book summarizes the state-of-the-art in unsupervised learning. The contributors discuss how with the proliferation of massive amounts of unlabeled data, unsupervised learning algorithms, which can automatically discover interesting and useful patterns in such data, have gained popularity among researchers and practitioners. The authors outline how these algorithms have found numerous appli…
This book constitutes the refereed proceedings of the 8th China Conference of Wireless Sensor Networks, held in Xi'an, China, in October/November 2014. The 64 revised full papers were carefully reviewed and selected from 365 submissions. The papers are organized in topical sections on power control and management; network architecture and deployment; positioning and location-based services in w…
This book constitutes revised selected papers from the refereed proceedings of the First Human Centered Computing Conference, HCC 2014, that consolidated and further develops the successful ICPCA/SWS conferences on Pervasive Computing and the Networked World. The 54 full papers and 30 short papers presented in this volume were carefully reviewed and selected from 152 submissions. These proceedi…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluati…
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015. The 36 full papers presented together with 11 short papers were carefully reviewed and selected from 62 submissions. The papers are grouped in topical sections on adding intelligence for environment adapt…
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…