0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (120)
  • R250 - R500 (371)
  • R500+ (2,271)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011,... Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011, Wollongong, Australia, November 14, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Stephen Cranefield, Insu Song
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November. The workshops were, Workshop on Agent Based Simulation for a Sustainable Society (ABSSS 2011) and International Workshop on Multi-Agent Smart Computing (MASmart 2011). The 8 papers presented were carefully reviewed and selected from various submissions. The papers cover topics from agent based simulation for a sustainable society and on multi-agent smart computing.

Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland,... Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland, January 21-24, 2014 (Paperback, 2013 ed.)
Zheng Xiang, Iis Tussyadiah
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

The papers presented in this volume advance the state-of-the-art research on social media and Web 2.0, electronic tourism marketing, website development and evaluation, search engine marketing and optimization, IT adoption and diffusion, virtual travel communities, mobile technologies, management information systems in tourism, eLearning, recommender systems for tourism businesses and destinations and electronic distribution for hospitality and travel products. This book covers the most significant topics contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in e-Tourism.

Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback,... Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback, 2013 ed.)
Berthold Voecking
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.

Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003): Alvin T. S. Chan, Stephen Chan,... Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003)
Alvin T. S. Chan, Stephen Chan, Hong Va Leong, Vincent Ng
R4,005 Discovery Miles 40 050 Ships in 18 - 22 working days

The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule.

Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004): Godfried B. Williams Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Godfried B. Williams
R2,605 Discovery Miles 26 050 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Human-Centered e-Business (Paperback, Softcover reprint of the original 1st ed. 2003): Rajiv Khosla, Ernesto Damiani, William... Human-Centered e-Business (Paperback, Softcover reprint of the original 1st ed. 2003)
Rajiv Khosla, Ernesto Damiani, William Grosky
R4,023 Discovery Miles 40 230 Ships in 18 - 22 working days

Human-Centered e-Business focuses on analysis, design and development of human-centered e-business systems. The authors illustrate the benefits of the human-centered approach in intelligent e-sales recruitment application, integrating data mining technology with decision support model for profiling transaction behavior of internet banking customers, user-centered context dependent data organization using XML, knowledge management, and optimizing the search process through human evaluation in an intelligent interactive multimedia application. The applications described in this work, facilitates both e-business analysis from a business professional's perspective, and human-centered system design from a system development perspective. These applications employ a range of internet and soft computing technologies.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Google Apps For Dummies (Paperback): R Teeter Google Apps For Dummies (Paperback)
R Teeter
R711 R640 Discovery Miles 6 400 Save R71 (10%) Ships in 18 - 22 working days

Google Apps are Web-based, low-cost (or free ) office productivity tools that do everything those expensive applications do -- and you can access them from any computer with an Internet connection. "Google Apps For Dummies" boosts your "app-titude" by giving you the low-down on choosing, setting up, and using these nifty and powerful gadgets for work or play.

Whether you're an individual who wants to take advantage of iGoogle or an organization looking for an enterprise-wide training solution for users at all levels, this comprehensive, practical guide brings you up to speed with all of the basic information and advanced tips and tricks you need to make good use of every Google Apps's tool and capability. Discover how to: Get productive fast with free or inexpensive Web-based appsDesign your perfect Start Page layoutChoose among the different editionsUse Gmail and Google TalkWork with Google Docs and spreadsheet documentsCreate and collaborate on documentsImport events into your calendarBuild dazzling presentationsUse Dashboard to create and manage user accountsCreate a Web page with a unique domain setting

Google Apps are poised to shatter the primacy of the current way of working with PCs, saving businesses, schools, government agencies, and individuals big bucks on software, network infrastructure, and administration. "Google Apps For Dummies" is your key to making this revolutionary new approach work for you and your organization.

Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed.... Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Hans-Arno Jacobsen
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, and a tutorial-like introduction to middleware systems. The second part is comprised of a set of chapters that study solutions to leverage the trade-off between a transparent programming model and application-level enabled resource control. The third part of this book presents three detailed distributed application case studies and demonstrates how standard middleware platforms fail to adequately cope with resource control needs of the application designer in these three cases: -An electronic commerce framework for software leasing over the World Wide Web; -A remote building energy management system that has been experimentally deployed on several building sites; -A wireless computing infrastructure for efficient data transfer to non-stationary mobile clients that have been experimentally validated.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues  9th International Workshop, RFIDsec... Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Michael Hutter, Joern-Marc Schmidt
R1,754 Discovery Miles 17 540 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.): Robert... The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.)
Robert Neumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This study approaches the difficult problem of providing Internet users with a completely transparent view on electronic markets from a product information accessibility point of view. Robert Neumann analyzes economic, ecological, and societal gains of openly accessible product information in the form of theoretical models. Though many aspects of very different research disciplines have to be investigated to gain a holistic view on the Internet of Products, this thesis reduces the range of involved research topics to product information discoverability related questions."

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings... Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings (Paperback, 2012 ed.)
Li Xu, Elisa Bertino, Yi Mu
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Paperback, Softcover reprint of the original 1st ed. 2001)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,617 Discovery Miles 26 170 Ships in 18 - 22 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking -- Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Agile Transformation - Using the Integral Agile Transformation Framework to Think and Lead Differently (Paperback): Michael... Agile Transformation - Using the Integral Agile Transformation Framework to Think and Lead Differently (Paperback)
Michael Spayd, Michele Madore
R712 Discovery Miles 7 120 Ships in 10 - 15 working days

Lead Agile Transformations that Scale and Succeed across the Entire Organization Most organizational leaders know agility is paramount to survival in a world of unprecedented volatility, uncertainty, complexity, and ambiguity (VUCA). This is why so many keep attempting Agile transformations even after previous initiatives have failed. But the truth is, both organizations and leaders need new ways of thinking--they need to upgrade their organizational "operating system." Built on the proven Integral Agile Transformation Framework (TM) (IATF), Agile Transformation offers a fresh perspective and systemic approach that can operate on all levels, from individual to enterprise. Learn how to use IATF to combine what you know subjectively ("heart") with what you can measure objectively ("data"). Even if you are already using leadership or culture models, scaled frameworks, or other techniques, IATF helps you place them in context, overcome their limitations, and gain more value from them. As it has in many other organizations, IATF can help you become an authentic Transformational Leader and finally build an organization that is truly Agile. Gain crucial new perspective for leading your Agile transformation: insight into your world, organization, work, and yourself Understand what your current Agile methods do and don't do, how they interact or conflict, and where you need something more Structure existing models and frameworks into an understandable meta-framework Master a unified and practical system for mapping what's going on and what needs to change Discover practical ways to successfully lead both human and organizational aspects of change Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Understanding High-Dimensional Spaces (Paperback, 2012 ed.): David B Skillicorn Understanding High-Dimensional Spaces (Paperback, 2012 ed.)
David B Skillicorn
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by its attributes, with each record represented as a point in the space with its position depending on its attribute values. Such spaces are not easy to work with because of their high dimensionality: our intuition about space is not reliable, and measures such as distance do not provide as clear information as we might expect.

There are three main areas where complex high dimensionality and large datasets arise naturally: data collected by online retailers, preference sites, and social media sites, and customer relationship databases, where there are large but sparse records available for each individual; data derived from text and speech, where the attributes are words and so the corresponding datasets are wide, and sparse; and data collected for security, defense, law enforcement, and intelligence purposes, where the datasets are large and wide. Such datasets are usually understood either by finding the set of clusters they contain or by looking for the outliers, but these strategies conceal subtleties that are often ignored. In this book the author suggests new ways of thinking about high-dimensional spaces using two models: a skeleton that relates the clusters to one another; and boundaries in the empty space between clusters that provide new perspectives on outliers and on outlying regions.

The book will be of value to practitioners, graduate students and researchers."

Dynamic Flexible Constraint Satisfaction and its Application to AI Planning (Paperback, Softcover reprint of the original 1st... Dynamic Flexible Constraint Satisfaction and its Application to AI Planning (Paperback, Softcover reprint of the original 1st ed. 2004)
Ian Miguel
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

First, I would like to thank my principal supervisor Dr Qiang Shen for all his help, advice and friendship throughout. Many thanks also to my second supervisor Dr Peter Jarvis for his enthusiasm, help and friendship. I would also like to thank the other members of the Approximate and Qualitative Reasoning group at Edinburgh who have also helped and inspired me. This project has been funded by an EPSRC studentship, award num ber 97305803. I would like, therefore, to extend my gratitude to EPSRC for supporting this work. Many thanks to the staff at Edinburgh University for all their help and support and for promptly fixing any technical problems that I have had . My whole family have been both encouraging and supportive throughout the completion of this book, for which I am forever indebted. York, April 2003 Ian Miguel Contents List of Figures XV 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. 1 Solving Classical CSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. 2 Applicat ions of Classical CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 3 Limitations of Classical CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1. 3. 1 Flexible CSP 6 1. 3. 2 Dynamic CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1. 4 Dynamic Flexible CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1. 5 Flexible Planning: a DFCSP Application . . . . . . . . . . . . . . . . . . 8 1. 6 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1. 7 Contributions and their Significance 11 2 The Constraint Satisfaction Problem 13 2. 1 Constraints and Constraint Graphs . . . . . . . . . . . . . . . . . . . . . . . 13 2. 2 Tree Search Solution Techniques for Classical CSP . . . . . . . . . . 16 2. 2. 1 Backtrack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2. 2. 2 Backjumping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2. 2. 3 Conflict-Directed Backjumping . . . . . . . . . . . . . . . . . . . . . 19 2. 2. 4 Backmarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Internet Applications in Product Design and Manufacturing (Paperback, Softcover reprint of the original 1st ed. 2003): George... Internet Applications in Product Design and Manufacturing (Paperback, Softcover reprint of the original 1st ed. 2003)
George Q. Huang, K.L. Mak
R1,407 Discovery Miles 14 070 Ships in 18 - 22 working days

This book deals with Web applications in product design and manufacture, thus filling an information gap in digital manufacturing in the Internet era. It helps both developers and users to appreciate the potentials, as well as difficulties, in developing and adopting Web applications. The objective is to equip potential users and practitioners of Web applications with a better appreciation of the technology. In addition, Web application developers and new researchers in this field will gain a clearer understanding of the selection of system architecture and design, development and implementation techniques, and deployment strategies. The book is divided into two main parts. The first part gives an overview of Web and Internet and the second explains eight typical Web applications.

Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of... Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of the original 1st ed. 2003)
Walter R.J. Baets, Gert Van Der Linden
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Over the past years, business schools have been experimenting with distance learning and online education. In many cases this new technology has not brought the anticipated results. Questions raised by online education can be linked to the fundamental problem of education and teaching, and more specifically to the models and philosophy of education and teaching. Virtual Corporate Universities: A Matrix of Knowledge and Learning for the New Digital Dawn offers a source for new thoughts about those processes in view of the use of new technologies. Learning is considered as a key-strategic tool for new strategies, innovation, and significantly improving organizational effectiveness. The book blends the elements of knowledge management, as well as organizational and individual learning. The book is not just a treatment of technology, but a fusion of a novel dynamic learner (student)-driven learning concept, the management and creation of dynamic knowledge, and next-generation technologies to generic business, organizational and managerial processes, and the development of human capital. Obviously, the implications of online learning go far beyond the field of business as presented in this book.

Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises... Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises (PRO-VE'03) October 29-31, 2003, Lugano, Switzerland (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R2,729 Discovery Miles 27 290 Ships in 18 - 22 working days

Processes and Foundations for Virtual Organizations contains selected articles from PRO-VE'03, the Fourth Working Conference on Virtual Enterprises, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lugano, Switzerland in October 2003. This fourth edition includes a rich set of papers revealing the progress and achievements in the main current focus areas: -VO breeding environments; -Formation of collaborative networked organizations; -Ontologies and knowledge management; -Process models and interoperability; -Infrastructures; -Multi-agent approaches. In spite of many valid contributions in these areas, many research challenges remain. This is clearly stated in a number of papers suggesting a new research agenda and strategic research roadmaps for advanced virtual organizations. With the selected papers included in this book, PRO-VE pursues its double mission as a forum for presentation and discussion of achievements as well as a place to discuss and suggest new directions and research strategies.

Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto,... Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto, ON, Canada, May 10, 2010, and TADA 2010, Cambridge, MA, USA, June 7, 2010, Revised Selected Papers (Paperback, 2012 ed.)
Esther David, Kate Larson, Alex Rogers, Onn Shehory, Sebastian Stein
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce. They were originally presented at the 12th International Workshop on Agent-Mediated Electronic Commerce (AMEC 2010), collocated with AAMAS 2010 in Toronto, Canada, or the 2010 Workshop on Trading Agent Design and Analysis (TADA 2010), collocated with EC 2010 in Cambridge, MA, USA. The papers examine emerging topics such as ad auctions and supply chains, or the interactions between competing markets, and present novel algorithms and rigorous theoretical results. Several of them evaluate their results using real data from large e-commerce sites or from experiments with human traders.

Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings... Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings (Paperback, 2012 ed.)
Nils Aschenbruck, Peter Martini, Michael Meier, Jens Toelle
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012. The 78 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on supply chain and critical infrastructure protection; security situational awareness; crisis management; security for critical infrastructure and urban areas; sensor technology; social, psychological and political aspects; cyber defense and information security; maritime and border security; detection of hazardous materials; food chain security; aviation security; ergonomic aspects.

Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12,... Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Sara Foresti, Moti Yung, Fabio Martinelli
R1,575 Discovery Miles 15 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

E-Commerce and Web Technologies - 13th International Conference, EC-Web 2012, Vienna, Austria, September 4-5, 2012, Proceedings... E-Commerce and Web Technologies - 13th International Conference, EC-Web 2012, Vienna, Austria, September 4-5, 2012, Proceedings (Paperback, 2012 ed.)
Christian Huemer, Pasquale Lops
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Vienna, Austria, in September 2012. The 15 full and four short papers accepted for EC-Web, selected from 45 submissions, were carefully reviewed based on their originality, quality, relevance, and presentation. They are organized into topical sections on recommender systems, security and trust, mining and semantic services, negotiation, and agents and business services.

Targeted Advertising Technologies in the ICT Space - A Use Case Driven Analysis (Paperback, 2013 ed.): Christian Schlee Targeted Advertising Technologies in the ICT Space - A Use Case Driven Analysis (Paperback, 2013 ed.)
Christian Schlee
R2,185 Discovery Miles 21 850 Ships in 18 - 22 working days

In recent years, the field of information and communication technology has started to change dramatically. Carriers are threatened by high revenue losses requiring them to identify new revenue potentials beyond their core business. Targeted advertising can be one of these revenue opportunities. Christian Schlee provides a broad overview of the latest developments and trends in targeted advertising in the ICT space. The author focuses on the technological aspects of targeted advertising, but also covers business and legal aspects. He analyzes the most interesting use cases in the Web, IPTV, the mobile environment, and in converged scenarios and examines important technological key building blocks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
iOS Code Testing - Test-Driven…
Abhishek Mishra Paperback R2,700 Discovery Miles 27 000
The Oxford Handbook of Quantitative…
Todd D. Little Hardcover R5,961 Discovery Miles 59 610
Encyclopedia of Right-Wing Extremism in…
Stephen E Atkins Hardcover R3,190 R2,883 Discovery Miles 28 830
Handbook of Research on Geoinformatics
Hassan A. Karimi Hardcover R6,681 Discovery Miles 66 810
The Life Inside - A Memoir of Prison…
Andy West Hardcover R496 R453 Discovery Miles 4 530
Asynchronous Programming with SwiftUI…
Peter Friese Paperback R1,434 R1,187 Discovery Miles 11 870
Interdisciplinarity
John Aldrich Hardcover R3,850 Discovery Miles 38 500
Pro iOS Table Views - for iPhone, iPad…
Tim Duckett Paperback R1,123 R951 Discovery Miles 9 510
Integrating Quantitative and Qualitative…
George R. Taylor Hardcover R2,387 Discovery Miles 23 870
Encyclopedia of Percussion
John H. Beck Hardcover R6,787 Discovery Miles 67 870

 

Partners