|
Books > Computing & IT > General theory of computing
Enterprise information systems touch every process of an
organization as new functionalities in previously existing and
upcoming solutions are created every day. ""Social, Managerial, and
Organizational Dimensions of Enterprise Information Systems""
discusses the technological developments, main issues, challenges,
opportunities, and trends impacting every part of small to medium
sized enterprises. A leading resource for academicians, managers,
and researchers, this advanced publication provides an integrated
and progressive view into the benefits and applications of
enterprise information systems.
Internal migration serves as one of the key contributing factors to
population change involving not only change in the numbers of
people, but also a change in composition and structure of local
populations. Technologies for Migration and Population Analysis:
Spatial Interaction Data Applications addresses the technical and
data-related side of studying population flows and provides a
selection of substantive case studies and applications to exemplify
research currently being carried out. With expert international
contributors currently working in the field, this authoritative
book allows readers to better understand interaction data and ways
knowledge of population flows can be put to use.
Tools of data comparison and analysis are critical in the field of
archaeology, and the integration of technological advancements such
as geographic information systems, intelligent systems, and virtual
reality reconstructions with the teaching of archaeology is crucial
to the effective utilization of resources in the field.
""E-Learning Methodologies and Computer Applications in
Archaeology"" presents innovative instructional approaches for
archaeological e-learning based on networked technologies,
providing researchers, scholars, and professionals a comprehensive
global perspective on the resources, development, application, and
implications of information communication technology in
multimedia-based educational products and services in archaeology.
The second volume in a series which aims to focus on advances in
computational biology. This volume discusses such topics as:
statistical analysis of protein sequences; progress in large-scale
sequence analysis; and the architecture of loops in proteins.
Television, since its invention, has been considered to be a social
link between people. Continually enhanced by innovation, the next
frontier for this technological phenomenon will focus on the actual
natural capabilities of the medium. Social Interactive Television:
Immersive Shared Experiences and Perspectives combines academic and
industry research to provide the first publication of its kind to
discuss the future emergence of experiences and services through
interactive television. Concentrating on system and interaction
design, as well as evaluation methods that focus on social
experiences around interactive television, this book provides
practitioners, academicians, researchers, and developers with the
most relevant, current, and interesting findings on the topic.
Cyber-physical systems (CPS) can be defined as systems in which
physical objects are represented in the digital world and
integrated with computation, storage, and communication
capabilities and are connected to each other in a network. The goal
in the use of the CPS is integrating the dynamics of the physical
processes with those of the software and networking, providing
abstractions and modelling, design, and analysis techniques for the
integrated whole. The notion of CPS is linked to concepts of
robotics and sensor networks with intelligent systems proper of
computational intelligence leading the pathway. Recent advances in
science and engineering improve the link between computational and
physical elements by means of intelligent systems, increasing the
adaptability, autonomy, efficiency, functionality, reliability,
safety, and usability of cyber-physical systems. The potential of
cyber-physical systems will spread to several directions, including
but not limited to intervention, precision manufacturing,
operations in dangerous or inaccessible environments, coordination,
efficiency, Maintenance 4.0, and augmentation of human
capabilities. Design, Applications, and Maintenance of
Cyber-Physical Systems gives insights about CPS as tools for
integrating the dynamics of the physical processes with those of
software and networking, providing abstractions and modelling,
design, and analysis techniques for their smart manufacturing
interoperation. The book will have an impact upon the research on
robotics, mechatronics, integrated intelligent multibody systems,
Industry 4.0, production systems management and maintenance,
decision support systems, and Maintenance 4.0. The chapters discuss
not only the technologies involved in CPS but also insights into
how they are used in various industries. This book is ideal for
engineers, practitioners, researchers, academicians, and students
who are interested in a deeper understanding of cyber-physical
systems (CPS), their design, application, and maintenance, with a
special focus on modern technologies in Industry 4.0 and
Maintenance 4.0.
As society rushes to digitize sensitive information and services,
it is imperative to adopt adequate security protections. However,
such protections fundamentally conflict with the benefits we expect
from commodity computers. In other words, consumers and businesses
value commodity computers because they provide good performance and
an abundance of features at relatively low costs. Meanwhile,
attempts to build secure systems from the ground up typically
abandon such goals, and hence are seldomadopted. In this book, I
argue that we can resolve the tension between security and features
by leveraging the trust a user has in one device to enable her to
securely use another commodity device or service, without
sacrificing the performance and features expected of commodity
systems. At a high level, we support this premise by developing
techniques to allow a user to employ a small, trusted, portable
device to securely learn what code is executing on her local
computer. Rather than entrusting her data to the mountain of buggy
code likely running on her computer, we construct an on-demand
secure execution environment which can perform security-sensitive
tasks and handle private data in complete isolation from all other
software (and most hardware) on the system. Meanwhile,
non-security-sensitive software retains the same abundance of
features and performance it enjoys today. Having established an
environment for secure code execution on an individual computer, we
then show how to extend trust in this environment to network
elements in a secure and efficient manner. This allows us to
reexamine the design of network protocols and defenses, since we
can now execute code on endhosts and trust the results within the
network. Lastly, we extend the user's trust one more step to
encompass computations performed on a remote host (e.g., in the
cloud). We design, analyze, and prove secure a protocol that allows
a user to outsource arbitrary computations to commodity computers
run by an untrusted remote party (or parties) who may subject the
computers to both software and hardware attacks. Our protocol
guarantees that the user can both verify that the results returned
are indeed the correct results of the specified computations on the
inputs provided, and protect the secrecy of both the inputs and
outputs of the computations. These guarantees are provided in a
non-interactive, asymptotically optimal (with respect to CPU and
bandwidth) manner. Thus, extending a user's trust, via software,
hardware, and cryptographic techniques, allows us to provide strong
security protections for both local and remote computations on
sensitive data, while still preserving the performance and features
of commodity computers.
This book sets out to define and consolidate the field of
bioinformation studies in its transnational and global dimensions,
drawing on debates in science and technology studies, anthropology
and sociology. It provides situated analyses of bioinformation
journeys across domains and spheres of interpretation. As
unprecedented amounts of data relating to biological processes and
lives are collected, aggregated, traded and exchanged,
infrastructural systems and machine learners produce real
consequences as they turn indeterminate data into actionable
decisions for states, companies, scientific researchers and
consumers. Bioinformation accrues multiple values as it transverses
multiple registers and domains, and as it is transformed from
bodies to becoming a subject of analysis tied to particular social
relations, promises, desires and futures. The volume harnesses the
anthropological sensibility for situated, fine-grained,
ethnographically grounded analysis to develop an interdisciplinary
dialogue on the conceptual, political, social and ethical
dimensions posed by bioinformation.
Virtual teams are a relatively new phenomenon and by definition
work across time, distance, and organizations through the use of
information and communications technology. Virtual Teams: Projects,
Protocols and Processes gathers the best of academic research on
real work-based virtual teams into one book. It offers a series of
chapters featuring practical research, insight and recommendations
on how virtual team projects can be better managed, as well as in
depth discussion on issues critical to virtual team success,
including the place of virtual teams in organizations, leadership,
trust and relationship building, best use of technology, and
knowledge sharing.
The wireless medium is a shared resource. If nearby devices
transmit at the same time, their signals interfere, resulting in a
collision. In traditional networks, collisions cause the loss of
the transmitted information. For this reason, wireless networks
have been designed with the assumption that interference is
intrinsically harmful and must be avoided. This book, a revised
version of the author's award-winning Ph.D. dissertation, takes an
alternate approach: Instead of viewing interference as an
inherently counterproductive phenomenon that should to be avoided,
we design practical systems that transform interference into a
harmless, and even a beneficial phenomenon. To achieve this goal,
we consider how wireless signals interact when they interfere, and
use this understanding in our system designs. Specifically, when
interference occurs, the signals get mixed on the wireless medium.
By understanding the parameters of this mixing, we can invert the
mixing and decode the interfered packets; thus, making interference
harmless. Furthermore, we can control this mixing process to create
strategic interference that allow decodability at a particular
receiver of interest, but prevent decodability at unintended
receivers and adversaries. Hence, we can transform interference
into a beneficial phenomenon that provides security. Building on
this approach, we make four main contributions: We present the
first WiFi receiver that can successfully reconstruct the
transmitted information in the presence of packet collisions. Next,
we introduce a WiFi receiver design that can decode in the presence
of high-power cross-technology interference from devices like baby
monitors, cordless phones, microwave ovens, or even unknown
technologies. We then show how we can harness interference to
improve security. In particular, we develop the first system that
secures an insecure medical implant without any modification to the
implant itself. Finally, we present a solution that establishes
secure connections between any two WiFi devices, without having
users enter passwords or use pre-shared secret keys.
Tourism is one of the leading industries worldwide. The magnitude
of growth in tourism will bring both opportunities and problems to
source and destination markets in years to come, especially in the
internal and external exchange of information in the industry.
""Information and Communication Technologies in Support of the
Tourism Industry"" examines the process of transformation as it
relates to the tourism industry, and the changes to that industry
from modern electronic communications. ""Information and
Communication Technologies in Support of the Tourism Industry""
covers not only geographically supportive technologies in
communication, but also in terms of culture, economics, marketing,
social, and regional issues. In-depth analyses range from the use
of the Internet to supply information to the emerging patterns of
tourist decision making and investments.
Modern optimization approaches have attracted an increasing number
of scientists, decision makers, and researchers. As new issues in
this field emerge, different optimization methodologies must be
developed and implemented. Exploring Critical Approaches of
Evolutionary Computation is a vital scholarly publication that
explores the latest developments, methods, approaches, and
applications of evolutionary models in a variety of fields. It also
emphasizes evolutionary models of computation such as genetic
algorithms, evolutionary strategies, classifier systems,
evolutionary programming, genetic programming, and related fields
such as swarm intelligence and other evolutionary computation
techniques. Highlighting a range of pertinent topics such as neural
networks, data mining, and data analytics, this book is designed
for IT developers, IT theorists, computer engineers, researchers,
practitioners, and upper-level students seeking current research on
enhanced information exchange methods and practical aspects of
computational systems.
Get the most out of your computer with our quick and easy 6-page
laminated guide focusing on configuration and management of your
system for you, with guidance for setting up and securing other
users that may use your computer. Joan Lambert, author of multiple
books on the Microsoft Office Suite, creator of many Lynda.com
videos and an experienced corporate trainer used her experience and
knowledge to cover the most relevant functions for users at
different levels. Suggested uses: Workplace -- easy access at a
moments notice to find a function you need to use; Company Training
-- reduce help-desk calls and keep productivity flowing for a team
or for your entire company; Family & Shared -- admin and set up
secure family accounts to keep things separated while controlling
time spent on the computer; Students/Teachers/Parents -- help with
the learning curve in a classroom or at home; College Students --
make sure you are set-up, secure and using features that can make
your life easier.
|
|