MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...
Oracle WebCenter Suite is the industry's most comprehensive enterprise portal platform designed for business users, unified with business applications, Enterprise 2.0 services, and social communities. It incorporates Web 2.0 content, collaboration, and communication services. However, without proper guidance on developing...
Code re-use is the Holy Grail of software development. Countless hours of refactoring, countless books, countless software development tools, components, IDEs, and platforms have been dedicated to pursue this elusive quality.
Why is this? As software consumers, we are used to seeing very rapid advancements in technology. Every...
Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model...
Due to the fast growth of the Web and the difficulties in finding desired information, efficient and effective information retrieval systems have become more important than ever, and the search engine has become an essential tool for many people.
The ranker, a central component in every search engine, is responsible for the...
Adaptive Hypermedia has emerged as an important area of both academic and deployed research. It encompasses a broad range of research that will enable personalized, adaptive hypermedia systems to play an even more effective role in people’s lives. The Web has enabled the widespread use of many personalized systems, such as recommenders,...
This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...
This book describes a use case–driven UML-based method for the modeling and
design of software architectures, including object-oriented software architectures,
client/server software architectures, service-oriented architectures, componentbased
software architectures, concurrent and real-time software architectures, and
software...
LET ’ S FACE IT: Shipping great software is diffi cult. Is it rewarding? Yes. Is it profi table? Yes. Does it
mix art and engineering? Yes. Is it easy? No.
Yet some companies and organizations do ship great software. They deliver products that their
customers love. They do it on time and on budget. They deliver solutions...
Audiovisual storytelling has a long, well-developed history. As far back as
the earliest known prehistoric times, human beings have communicated the
essence of story through the use of pictures and sound: whether it’s cave paintings
of the hunt, a poet proclaiming the epic adventures of Odysseus, Greek
actors performing tragedy...
I knew the Internet before it got famous. There were places but no paths, no
maps, no search engines. Entry required a key in the form of an IP address
and an incantation in the language of UNIX. It was a small world that felt big
because it was so easy to get lost in the shadowy realm of texts and data, completely
devoid of color....
Investing in a business application—be it managing one's customers, tracking inventory, coordinating global resources, or just being able to get real-time visibility to cash flow—has never been so important. Gone are the days when companies invested in business applications, such as CRM and ERP, to simply streamline their...