|
Encyclopedia of healthcare information systems
|
Nilmini Wickramasinghe,Eliezer Geisler |
"This book provides an extensive and rich compilation of international research, discussing the use, adoption, design, and diffusion of information communication technologies (ICTs) in healthcare, in… |
OL16933564W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Information retrieval
|
William R. Hersh |
This work covers the theory, implementation and evaluation of information retrieval (IR) systems in health and biomedicine. The three sections cover the basic concepts of IR, the current state-of-the… |
OL18757577W |
|
Ad-hoc, Mobile, and Wireless Network
|
Jacek Cichoń |
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. The 27 … |
OL19823798W |
|
Computer-Supported Collaboration
|
Fadi P. Deek |
Computer-Supported Collaboration with Applications to Software Development reviews the theory of collaborative groups and the factors that affect collaboration, particularly collaborative software de… |
OL19836762W |
|
Digital Forensics and Cyber Crime
|
Pavel Gladyshev |
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, … |
OL19843249W |
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
|
Michael Fellows |
This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Ma… |
OL19851497W |
|
Information Assurance and Security Education and Training
|
Ronald C. Dodge |
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6… |
OL19857418W |
|
Information Security Management & Small Systems Security
|
Jan H. P. Eloff |
This book presents a state-of-the-art review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. … |
OL19857526W |
|
Information Systems
|
R. Traunmüller |
This state-of-the art book deals with innovative trends in e-Commerce, e-Business and e-Government. Information Systems: The e-Business Challenge presents recent results of research and development i… |
OL19857573W |
|
Perspectives on the Future of Software Engineering
|
Jürgen Münch |
The dependence on quality software in all areas of life is what makes software engineering a key discipline for today’s society. Thus, over the last few decades it has been increasingly recognized th… |
OL19894154W |
|
Practical Performance Modeling
|
Khalid Begain |
Practical Performance Modeling: Application of the MOSEL Language introduces the new and powerful performance and reliability modeling language MOSEL (MOdeling, Specification and Evaluation Language)… |
OL19896081W |
|
Research Advances in Database and Information Systems Security
|
Vijay Atluri |
Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information … |
OL19899658W |
|
Security and Privacy in User Modeling
|
Jörg Schreck |
With a Foreword by Alfred Kobsa. The research on user modeling has developed a broad range of elaborated algorithms and techniques to support user adaptive applications with information about their u… |
OL19901289W |
|
Security Protocols XVII
|
Bruce Christianson |
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers pres… |
OL19901291W |
|
Software Language Engineering
|
Krzysztof Czarnecki |
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Software Language Engineering, SLE 2012, held in Dresden, Germany, in September 2012. The 17 pape… |
OL19902758W |
|
Systems and Software Variability Management
|
Rafael Capilla |
The success of product line engineering techniques in the last 15 years has popularized the use of software variability as a key modeling approach for describing the commonality and variability of sy… |
OL19905486W |
|
Transactions on Pattern Languages of Programming III
|
James Noble |
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the… |
OL19907685W |
|
Trusting Records
|
Heather MacNeil |
A trustworthy record is one that is both an accurate statement of facts and a genuine manifestation of those facts. Record trustworthiness thus has two qualitative dimensions: reliability and authent… |
OL19908077W |
|
Evaluating the organizational impact of healthcare information systems
|
James G. Anderson,Carolyn E. Aydin |
A guide for evaluating the organizational impacts of computer systems in health care institutions. This book is useful to physicians, nurses, health care administrators, information systems personnel… |
OL20891576W |