E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...
"How are you going to get rid of your Air Sandwich if you don't even know what it is? Provocative and practical at the same time."
--Seth Godin, author of Linchpin
Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...
The complexity of modern supply chains requires decision makers in logistics to work with a set of efficient (Pareto optimal) solutions, mainly to catch different economic aspects for which one optimal solution related to a single objective function is not able to capture entirely. Motivated by this, and by recent changes in global markets and the...
This book stems from my experience over the last few years in designing high-speed digital logic using ASIC design flows. I discovered that while it is possible to significantly improve performance in ASIC implementations with deep pipelining and careful physical design, a speed penalty still had to be paid due to their exclusive use of...
Silicon is a material where the extraordinary is made ordinary.1 This statement
has been prompted by the rapid (exponential) development of the industry
based on manufacturing silicon devices, which has seen enormous performance
improvements and cost reductions over the last fifty years. Coming
after the stone, iron, and...
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open...
There is no single technique for achieving excellence
at work. High performance is attained through a
combination of understanding yourself and your
strengths and limitations; knowing what you want
to achieve; and ensuring you are in an environment
where you enjoy working and have some freedom to
achieve what you want....