Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
| Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (VIII, 251 p. 50 illus. in color.) |
| Disciplina | 004 |
| Collana | Lecture Notes in Business Information Processing |
| Soggetto topico |
Electronic data processing - Management
Business information services Computer industry Industrial procurement IT Operations Enterprise Architecture The Computer Industry Procurement |
| ISBN | 3-319-26739-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contents -- Software Sourcing Modes and Software Sourcing Gestalts -- Towards Model-based Strategic Sourcing -- The mediating effect of formal contractual controls in the relationship between experience and contract design -- Applying a Configurational Approach for Explaining the Role of Relationship Quality for Successful Outsourcing Arrangements -- The Role of Social Capital as Antecedent in Clan Formation in Information Systems Outsourcing Project -- Information Technology Outsourcing and the Bottom Line -- Riding for a fall in outsourced ISD: Knowledge transfer challenges between the onshore vendor and the offshored unit -- How to drive innovation within outsourcing relations: The role of performance evaluation and management control systems -- Innovation Offshoring by Small and Medium-Sized Enterprises – Establishing the Research Gap -- Understanding Collaboration in Multisourcing Arrangements: A Social Exchange Theory Perspective -- Multi-Sourcing Governance: in Perception and in Practice -- Using E-markets for globally distributed work -- Building a supply chain ecosystem: how the Enterprise Connectivity Interface (ECI) will enable and support interorganisational collaboration -- The importance of IT energy efficiency in outsourcing decision making: a survey in the Dutch outsourcing infrastructure market. |
| Record Nr. | UNINA-9910299258503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
| Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | New York, NY : , : Springer US : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (246 p.) |
| Disciplina | 004.6 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Computer networks
Data structures (Computer science) Information theory Electronic data processing - Management Computer Communication Networks Data Structures and Information Theory IT Operations |
| ISBN |
9780387094908
0387094903 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Reconfiguration and Optimization Networks -- End To End QoS Mapping Between Metroethernet and WiMAX -- A Mobility Model for Personal Networks (PN) -- Replicated Random Walks for Service Advertising in Unstructured Environments -- Sensor Networks -- ACF: An Autonomic Communication Framework for Wireless Sensor Networks -- An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks -- FlowerNet — How to design a user friendly Sensor Network -- Distributed Policy Management Protocol for Self-Configuring Mobile Ad Hoc Networks -- Routing Algorithms and Protocols I -- Performance Evaluation of a Protocol for Fair P2P Auctions over MANETs -- A Scalable Adaptation of the OLSR Protocol for Large Clustered Mobile Ad hoc Networks -- Security and Privacy -- Securing Multihop Vehicular Message Broadcast using Trust Sensors -- Scalable Exchange of Packet Counters in OLSR -- Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms -- Security for Context-Aware ad-hoc Networking Applications -- MAC Protocols -- No Ack in IEEE 802.11e Single-Hop Ad-Hoc VoIP Networks -- Constraining the network topology in IEEE 802.15.4 -- Throughput and Delay Bounds for Cognitive Transmissions -- Wireless Broadcast with Network Coding: Dynamic Rate Selection -- Routing Algorithms and Protocols II -- A Reactive Wireless Mesh Network Architecture -- MEA-DSR: A Multipath Energy-aware Routing Protocol for Wireless Ad Hoc Networks -- A New Energy Efficient Multicast Routing Approach in MANETs. |
| Record Nr. | UNINA-9910483112703321 |
| New York, NY : , : Springer US : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener
| Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener |
| Edizione | [1st ed. 1999.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999 |
| Descrizione fisica | 1 online resource (XII, 648 p.) |
| Disciplina | 005.82 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Coding theory Information theory Cryptography Data encryption (Computer science) Algorithms Electronic data processing - Management Computer networks Data and Information Security Coding and Information Theory Cryptology IT Operations Computer Communication Networks |
| ISBN | 3-540-48405-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization -- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications -- Invited Lecture -- Information-Theoretic Cryptography -- Secure Communication and Computation -- Information Theoretically Secure Communication in the Limited Storage Space Model -- The All-or-Nothing Nature of Two-Party Secure Computation -- Distributed Cryptography -- Adaptive Security for Threshold Cryptosystems -- Two Party RSA Key Generation -- Robust Distributed Multiplication without Interaction -- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting -- Secret-Key Cryptography -- Truncated Differentials and Skipjack -- Fast Correlation Attacks Based on Turbo Code Techniques -- Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality -- Message Authentication Codes -- UMAC: Fast and Secure Message Authentication -- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions -- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions -- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier -- Public-Key Cryptanalysis II -- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97 -- Weakness in Quaternion Signatures -- Cryptanalysis of “2R” Schemes -- Factoring N = p r q for Large r -- Traitor Tracing -- An Efficient Public Key Traitor Tracing Scheme -- Dynamic Traitor Tracing -- Efficient Methods for Integrating Traceability and Broadcast Encryption -- Differential Power Analysis -- Differential Power Analysis -- Towards Sound Approaches to Counteract Power-Analysis Attacks -- Signature Schemes -- Separability andEfficiency for Generic Group Signature Schemes -- A Forward-Secure Digital Signature Scheme -- Abuse-Free Optimistic Contract Signing -- Zero Knowledge -- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK -- On Concurrent Zero-Knowledge with Pre-processing -- Asymmetric Encryption -- On the Security Properties of OAEP as an All-or-Nothing Transform -- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization -- Secure Integration of Asymmetric and Symmetric Encryption Schemes -- Electronic Cash -- Auditable, Anonymous Electronic Cash -- Protocols and Broadcasting -- Oblivious Transfer with Adaptive Queries -- Compressing Cryptographic Resources -- Coding Constructions for Blacklisting Problems without Computational Assumptions -- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. |
| Record Nr. | UNINA-9910143649403321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
| Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch |
| Edizione | [1st ed. 2004.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
| Descrizione fisica | 1 online resource (XII, 630 p.) |
| Disciplina | 005.82 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Operating systems (Computers) Algorithms Computer science - Mathematics Discrete mathematics Electronic data processing - Management Cryptology Computer Communication Networks Operating Systems Discrete Mathematics in Computer Science IT Operations |
| ISBN |
1-280-30737-4
9786610307371 3-540-24676-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups. |
| Record Nr. | UNINA-9910144186503321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
| Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (X, 223 p. 23 illus.) |
| Disciplina | 658.054 |
| Collana | Lecture Notes in Business Information Processing |
| Soggetto topico |
Electronic data processing - Management
Software engineering Industrial organization Industrial procurement IT Operations Software Engineering Organization Procurement |
| ISBN | 3-642-40951-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | IT Global Delivery Model Efficiency: An Exploratory Case Study to Identify Input and Output Factors -- Relative and Joint Dependence in IS Outsourcing Relationships – A Model of Effects on Relational Facets and Exchange Performance -- The Role of Organizational Standards in IT Outsourcing Relations -- Vendor Capabilities in ITO Research: A Systematization and Critical Review -- The Middle Management of Offshoring: Understanding Offshoring Strategy Implementation at a Meso Level -- Offshore BPO Decisions and Institutional Influence on Senior Managers -- Cloud Computing as Innovation: Studying Diffusion -- Towards Improvement of Information Systems Governance: Reorganization of Software Applications Hosting -- Coordinating Tensions in Orchestrating Blended Modes of Sharing and Outsourcing of Services -- Can Agile Software Tools Bring the Benefits of a Task Board to Globally Distributed Teams? -- KAIWA: Towards a Method for Knowledge Transfer in the Transition Phase of Offshore Outsourced Projects -- Opaque Indifference and Corporate Social Responsibility: A Moral License for Offshore BPO? -- Business Process Outsourcing in Suriname: Call Center Services. |
| Record Nr. | UNINA-9910437958303321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki
| Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XII, 299 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Operating systems (Computers) Electronic data processing - Management Computers and civilization Computer networks Algorithms Data and Information Security Operating Systems IT Operations Computers and Society Computer Communication Networks |
| ISBN | 3-540-89598-1 |
| Classificazione | 54.30 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self–healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security. |
| Record Nr. | UNINA-9910484474203321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider
| Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XXIX, 294 p. 54 illus., 42 illus. in color.) |
| Disciplina | 658.4038 |
| Collana | Lecture Notes in Information Systems and Organisation |
| Soggetto topico |
Business information services
Software engineering - Management Electronic data processing - Management Application software Business Information Systems Software Management IT Operations Computer and Information Systems Applications |
| ISBN | 3-031-87880-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Scaling Product Acceptance Analysis Using Annotation Systems Based on Large Language Models -- Chapter 2. Strategies for Effective Remote Retrospectives: Exploring Retrospective Games, Anonymity, and Continuous Reflection -- Chapter 3. Self-Sovereign Identities: Brief History and Survey of the Field -- Chapter 4. A Framework for Rigorous Execution and Presentation of Expert Interviews in IS and Digital Transformation Research -- Chapter 5. Growing Pains of Digital Transformation: Navigating the Challenges in Non-Profits -- Chapter 6. Digital Innovation, Strategic and Lean Management as Success Factors in IT -- Chapter 7. A Solution for Developing Corpora for Polish Speech Enhancement in Complex Acoustic Environments -- Chapter 8. Data-Driven Assessment of Practical Skills in Cybersecurity Challenges -- Chapter 9. A Circular Digital Twin for Climate-Smart Soils through Community Composting -- Chapter 10. Design Principles for Food Heritage Digital Twins -- Chapter 11. Beyond Agile Methodologies: Exploring the Business Analyst’s Role in Agile Software Development -- Chapter 12. Assessing Operational Business-IT Alignment for Architecture Improvement -- Chapter 13. An EBNF-Based Grammar for Use Case Specification -- Chapter 14. Changes in Node.js Server-Side Application Performance Characteristics Over Time Under Load. |
| Record Nr. | UNINA-9911007485803321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Information Systems Development : Information Systems Development, Organizational Aspects, and Societal Trends / / edited by Alberto Rodrigues da Silva, Miguel Mira da Silva, Jacinto Estima, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
| Advances in Information Systems Development : Information Systems Development, Organizational Aspects, and Societal Trends / / edited by Alberto Rodrigues da Silva, Miguel Mira da Silva, Jacinto Estima, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (232 pages) |
| Disciplina | 004 |
| Collana | Lecture Notes in Information Systems and Organisation |
| Soggetto topico |
Business information services
Electronic data processing - Management Application software Database management IT in Business IT Operations Computer and Information Systems Applications Database Management System |
| ISBN | 3-031-57189-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Core Operational Business-IT Alignment: Current Trends and Open Challenges -- Unveiling the User Experience: A Synthesis of Cognitive Neuroscience Methods in Digital Product Design -- A New Architecture for Data Analysis on Blockchain Without Data Replication -- Exploring Barriers and Engagement in Digital Workplaces: An Analysis Spanning the Periods Before, During, and After COVID -- The Influence of Hybrid Agile-adaptive and Traditional IT Governance Mechanisms on Digital Transformation and Organizational Performance in the Indonesian Banking and Insurance Industries -- Does participation matter? Exploring upper secondary school students’ expectations and perceptions of value in is outreach programs -- Ontology-based Digital Twin Framework Using Contextual Affordances for Worker Assistance in Smart Factories -- Enriched Discretisation: Information Fusion from Supervised and Unsupervised Processing -- The Neural Network Regression Model Supported by Multi-Criteria Methods for Ranking Prediction in Sustainable Development Assessment -- Emerging Trends in XR-mediated Virtual Team Collaboration in Digital Workspaces: A Systematic Literature Review. |
| Record Nr. | UNINA-9910874666903321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Learning Software Organizations : 6th International Workshop, LSO 2004, Banff, Canada, June 20-21, 2004, Proceedings / / edited by Grigori Melnik, Harald Holz
| Advances in Learning Software Organizations : 6th International Workshop, LSO 2004, Banff, Canada, June 20-21, 2004, Proceedings / / edited by Grigori Melnik, Harald Holz |
| Edizione | [1st ed. 2004.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
| Descrizione fisica | 1 online resource (X, 174 p.) |
| Disciplina | 005.1 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Software engineering
Electronic data processing - Management User interfaces (Computer systems) Human-computer interaction Artificial intelligence Education - Data processing Software Engineering IT Operations User Interfaces and Human Computer Interaction Artificial Intelligence Computers and Education |
| ISBN |
1-280-30783-8
9786610307838 3-540-25983-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Research on Learning Software Organizations – Past, Present, and Future -- Experience-Based Information Systems -- Learning How to Manage Risks Using Organizational Knowledge -- Building Ontology Based Tools for a Software Development Environment -- REBUILDER: A CBR Approach to Knowledge Management in Software Design -- COTS Evaluation Supported by Knowledge Bases -- Embedding Experiences in Micro-didactical Arrangements -- Software Maintenance -- Learning Software Maintenance Organizations -- How to Manage Knowledge in the Software Maintenance Process -- Learning from HOMER, a Case-Based Help Desk Support System -- Communities of Practice -- Tool Support for Inter-team Learning in Agile Software Organizations -- Knowledge Acquisition and Communities of Practice: An Approach to Convert Individual Knowledge into Multi-organizational Knowledge -- Impreciseness and Its Value from the Perspective of Software Organizations and Learning -- Planning LSOs -- A Framework for Managing Concurrent Business and ICT Development -- Case Studies and Experience Reports -- Agile Knowledge Management in Practice -- Co-knowledge Acquisition of Software Organizations and Academia -- Effects of Software Process in Organization Development – A Case Study -- Knowledge Networks – Managing Collaborative Knowledge Spaces. |
| Record Nr. | UNINA-9910144151203321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
| Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen |
| Edizione | [1st ed. 2002.] |
| Pubbl/distr/stampa | New York, NY : , : Springer US : , : Imprint : Springer, , 2002 |
| Descrizione fisica | 1 online resource (218 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | DeckerBart de <1958-> |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Computer science
Microprocessors Computer architecture Computer networks Electronic commerce Electronic data processing - Management Theory of Computation Processor Architectures Computer Communication Networks e-Commerce and e-Business IT Operations |
| ISBN |
1-280-20490-7
9786610204908 0-306-46958-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification. |
| Record Nr. | UNINA-9910780042403321 |
| New York, NY : , : Springer US : , : Imprint : Springer, , 2002 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||