|
Encyclopedia of healthcare information systems
|
Nilmini Wickramasinghe,Eliezer Geisler |
"This book provides an extensive and rich compilation of international research, discussing the use, adoption, design, and diffusion of information communication technologies (ICTs) in healthcare, in… |
OL16933564W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Health information systems
|
Joel Rodrigues |
"This reference set provides a complete understanding of the development of applications and concepts in clinical, patient, and hospital information systems"--Provided by publisher. |
OL18353112W |
|
Information retrieval
|
William R. Hersh |
This work covers the theory, implementation and evaluation of information retrieval (IR) systems in health and biomedicine. The three sections cover the basic concepts of IR, the current state-of-the… |
OL18757577W |
|
Ad-hoc, Mobile, and Wireless Network
|
Jacek Cichoń |
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. The 27 … |
OL19823798W |
|
Advanced Computer Systems
|
Jerzy Sołdek |
Advanced Computer Systems is a collection of forty selected papers presented to the Eighth International Conference on Computer Systems, October 2001 in Mielno, Poland. These papers provide a compreh… |
OL19823894W |
|
Advanced Infocomm Technology
|
Vincent Guyot |
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Advanced Infocomm Technology, ICAIT 2012, held in Paris, France, July 2012. The 32 rev… |
OL19823948W |
|
Advanced Technologies Applied to Training Design
|
Robert J. Seidel |
'User-friendly...contain[s] clear and useful illustrations....should stimulate discussion and experimentation among training communities world wide.' -Ergonomics. |
OL19824059W |
|
Advances in Cryptology – ASIACRYPT 2012
|
Xiaoyun Wang |
<p>This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in… |
OL19824322W |
|
Computer-Supported Collaboration
|
Fadi P. Deek |
Computer-Supported Collaboration with Applications to Software Development reviews the theory of collaborative groups and the factors that affect collaboration, particularly collaborative software de… |
OL19836762W |
|
Contemporary Research on E-business Technology and Strategy
|
Vasil Khachidze |
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were careful… |
OL19837565W |
|
Contemporary Trends in Systems Development
|
Maung K. Sein |
This book is a result of ISD2000 - The Ninth International Conference on Information Systems Development: Methods and Tools, Theory and Practice, held August 14-16, in Kristiansand, Norway. The paper… |
OL19837584W |
|
Counterterrorism and Cybersecurity
|
Newton Lee |
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. coun… |
OL19838272W |
|
Critical Infrastructure Protection VI
|
Jonathan Butts |
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking… |
OL19838658W |
|
Databases and Information Systems II
|
Hele-Mai Haav |
The rapid growth of the Internet has dramatically changed the capabilities of information systems (IS) and the role of database management. They have become vital components of successful inter-netwo… |
OL19840013W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Digital Forensics and Cyber Crime
|
Pavel Gladyshev |
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, … |
OL19843249W |
|
Formal Aspects of Component Software
|
Farhad Arbab |
<p>This book constitutes revised selected papers of the 8th International Workshop on Formal Aspects of Component Software, FACS 2011, held in Oslo, Norway in September 2011. </p><p>The 18 full paper… |
OL19850807W |
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
|
Michael Fellows |
This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Ma… |
OL19851497W |
|
Game Theory for Networks
|
Vikram Krishnamurthy |
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Game Theory for Networks (GameNets 2012) held in Vancouver, Canada, May 24-26, 2012.… |
OL19852136W |