International Conference on Applications and Techniques in Cyber Security and Intelligence


Book Description

This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.




Combinatorial Optimization and Applications


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Combinatorial Optimization and Applications, COCOA 2010, held in Kailua-Kona, HI, USA, in December 2010. The 49 revised full papers were carefully reviewed and selected from 108 submissions.







EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation VI


Book Description

This book comprises selected research papers from the 2015 edition of the EVOLVE conference, which was held on June 18–June 24, 2015 in Iași, Romania. It presents the latest research on Probability, Set Oriented Numerics, and Evolutionary Computation. The aim of the EVOLVE conference was to provide a bridge between probability, set oriented numerics and evolutionary computation and to bring together experts from these disciplines. The broad focus of the EVOLVE conference made it possible to discuss the connection between these related fields of study computational science. The selected papers published in the proceedings book were peer reviewed by an international committee of reviewers (at least three reviews per paper) and were revised and enhanced by the authors after the conference. The contributions are categorized into five major parts, which are: Multicriteria and Set-Oriented Optimization; Evolution in ICT Security; Computational Game Theory; Theory on Evolutionary Computation; Applications of Evolutionary Algorithms. The 2015 edition shows a major progress in the aim to bring disciplines together and the research on a number of topics that have been discussed in previous editions of the conference matured over time and methods have found their ways in applications. In this sense the book can be considered an important milestone in bridging and thereby advancing state-of-the-art computational methods.




Software Architecture


Book Description

This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022. The 9 full papers and 6 short papers were carefully selected from 47 submissions. In the Research Track, 11 full papers presented together with 5 short papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections as follows: components, APIs and interface management; architecting for data-driven systems; microservices and middleware; architecture modeling, design and decision making; architecture reconstruction and recovery.




Web Information Systems Engineering - WISE 2008


Book Description

This book constitutes the proceedings of the 9th International Conference on Web Information Systems Engineering, WISE 2008, held in Auckland, New Zealand, in September 2008. The 17 revised full papers and 14 revised short papers presented together with two keynote talks were carefully reviewed and selected from around 110 submissions. The papers are organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; semantic Web; Web information retrieval; Web data integration; queries and peer-to-peer systems; and Web services.




Applied Mathematics, Modeling and Computer Simulation


Book Description

Applied mathematics, together with modeling and computer simulation, is central to engineering and computer science and remains intrinsically important in all aspects of modern technology. This book presents the proceedings of AMMCS 2022, the 2nd International Conference on Applied Mathematics, Modeling and Computer Simulation, held in Wuhan, China, on 13 and 14 August 2022, with online presentations available for those not able to attend in person due to continuing pandemic restrictions. The conference served as an open forum for the sharing and spreading of the newest ideas and latest research findings among all those involved in any aspect of applied mathematics, modeling and computer simulation, and offered an ideal platform for bringing together researchers, practitioners, scholars, professors and engineers from all around the world to exchange the newest research results and stimulate scientific innovation. More than 150 participants were able to exchange knowledge and discuss the latest developments at the conference. The book contains 127 peer-reviewed papers, selected from more than 200 submissions and ranging from the theoretical and conceptual to the strongly pragmatic; all addressing industrial best practice. Topics covered included mathematical modeling and application, engineering applications and scientific computations, and simulation of intelligent systems. The book shares practical experiences and enlightening ideas and will be of interest to researchers and practitioners in applied mathematics, modeling and computer simulation everywhere.




Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications


Book Description

Professionals in the interdisciplinary field of computer science focus on the design, operation, and maintenance of computational systems and software. Methodologies and tools of engineering are utilized alongside computer applications to develop efficient and precise information databases. Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as utility computing, computer security, and information systems applications, this multi-volume book is ideally designed for academicians, researchers, students, web designers, software developers, and practitioners interested in computer systems and software engineering.




Agile Processes in Software Engineering and Extreme Programming – Workshops


Book Description

This open access book constitutes papers from the 5 research workshops, the poster presentations, as well as two panel discussions which were presented at XP 2021, the 22nd International Conference on Agile Software Development, which was held online during June 14-18, 2021. XP is the premier agile software development conference combining research and practice. It is a unique forum where agile researchers, practitioners, thought leaders, coaches, and trainers get together to present and discuss their most recent innovations, research results, experiences, concerns, challenges, and trends. XP conferences provide an informal environment to learn and trigger discussions and welcome both people new to agile and seasoned agile practitioners. The 18 papers included in this volume were carefully reviewed and selected from overall 37 submissions. They stem from the following workshops: 3rd International Workshop on Agile Transformation 9th International Workshop on Large-Scale Agile Development 1st International Workshop on Agile Sustainability 4th International Workshop on Software-Intensive Business 2nd International Workshop on Agility with Microservices Programming.




Security and Privacy


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics.