The traditional project coaching takes place mostly in a number of face-to-face coaching sessions. However, under conditions of time pressure in IT projects, a physical presence of coaches could form a bottleneck. These facts led to the idea of using Internet technologies to support the project coaching. The benefits of the web based...
This book outlines an integrative framework for business-model innovation in the paradigm of the Internet of Things. It elaborates several tools and methodologies for the quantitative, qualitative, analytical and effectual evaluation, and analyzes their applicability and efficiency for several phases of the business-model innovation process. As...
Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...
The implementation of a TMS solution is a highly complex and mission critical project. If executed correctly a good TMS can deliver a number of benefits to the organization in terms of optimization, greater efficiency, reduced errors and improved revenue through accurate invoicing. However a number of projects fail to realize these...
Essential Anesthesia is a concise, accessible introduction to anesthetic practice. Now in its second edition, it provides a thorough overview of the science and practice of anesthesia. Part I describes the evaluation of the patient, the different approaches to anesthesia, and the post-operative care of the patient in pain. Part II introduces...
The annual Workshop on Algorithm Engineering and Experiments (ALENEX) provides a forum for the presentation of original research in all aspects of algorithm engineering, including the implementation and experimental evaluation of algorithms and data structures. The workshop was sponsored by SIAM, the Society for Industrial and Applied...
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Designing Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers working in the multidisciplinary area of speech technology applications. The approach is systematic and the focus is on the utility of developing and designing speech related products....
The creation and consumption of content, especially visual content, is ingrained into our modern world. This book contains a collection of texts centered on the evaluation of image retrieval systems. To enable reproducible evaluation we must create standardized benchmarks and evaluation methodologies. The individual chapters in this book...
In recent years, serine proteases and matrix metalloproteinases (MMPs) have gained considerable attention in tumor biology. For most of these proteases, their expression is a reliable indication of ongoing tissue remodeling. This book provides a comprehensive evaluation of the mechanisms of action of proteases and their inhibitors in tumor...
The World Wide Web has undergone tremendous growth since the first edition of Web Wisdom: How to Evaluate and Create Information Quality on the Web was conceived and written in the mid to late 1990s. The phenomenal global expansion of the internet, together with the increasing sophistication of online technologies and software...
Like the first edition, the second edition of Musculoskeletal Imaging Companion is primarily designed for students and radiology trainees to provide the basics on imaging of common musculoskeletal diseases. However, this...