0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (114)
  • R250 - R500 (362)
  • R500+ (2,316)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto,... Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto, ON, Canada, May 10, 2010, and TADA 2010, Cambridge, MA, USA, June 7, 2010, Revised Selected Papers (Paperback, 2012 ed.)
Esther David, Kate Larson, Alex Rogers, Onn Shehory, Sebastian Stein
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce. They were originally presented at the 12th International Workshop on Agent-Mediated Electronic Commerce (AMEC 2010), collocated with AAMAS 2010 in Toronto, Canada, or the 2010 Workshop on Trading Agent Design and Analysis (TADA 2010), collocated with EC 2010 in Cambridge, MA, USA. The papers examine emerging topics such as ad auctions and supply chains, or the interactions between competing markets, and present novel algorithms and rigorous theoretical results. Several of them evaluate their results using real data from large e-commerce sites or from experiments with human traders.

iOS 11 Swift Programming Cookbook (Paperback): Vandad Nahavandipoor iOS 11 Swift Programming Cookbook (Paperback)
Vandad Nahavandipoor
R1,484 Discovery Miles 14 840 Ships in 18 - 22 working days

iOS 11, Swift 4, and Xcode 9 provide many new APIs for iOS developers. With this cookbook, you'll learn more than 170 proven solutions for tackling the latest features in iOS 11 and watchOS 4, including new ways to use Swift and Xcode to make your day-to-day app development life easier. This collection of code-rich recipes also gets you up to speed on continuous delivery and continuous integration systems. Ideal for intermediate and advanced iOS developers looking to work with the newest version of iOS, these recipes include reusable code on GitHub, so you can put them to work in your project right away. Among the topics covered by this book: New features in Swift 4 and Xcode 9 Tools for continuous delivery and continuous integration Snapshot testing and test automation Creating document-based applications Updated Map view and Core Location features iOS 11's Security and Password Autofill Data storage with Apple's Core Data Creating lively user interfaces with UI Dynamics Building iMessage applications and sticker packages Integrating Siri into your apps with Siri Kit Creating fascinating apps for Apple Watch

Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings... Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings (Paperback, 2012 ed.)
Nils Aschenbruck, Peter Martini, Michael Meier, Jens Toelle
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012. The 78 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on supply chain and critical infrastructure protection; security situational awareness; crisis management; security for critical infrastructure and urban areas; sensor technology; social, psychological and political aspects; cyber defense and information security; maritime and border security; detection of hazardous materials; food chain security; aviation security; ergonomic aspects.

E-Commerce and Web Technologies - 13th International Conference, EC-Web 2012, Vienna, Austria, September 4-5, 2012, Proceedings... E-Commerce and Web Technologies - 13th International Conference, EC-Web 2012, Vienna, Austria, September 4-5, 2012, Proceedings (Paperback, 2012 ed.)
Christian Huemer, Pasquale Lops
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Vienna, Austria, in September 2012. The 15 full and four short papers accepted for EC-Web, selected from 45 submissions, were carefully reviewed based on their originality, quality, relevance, and presentation. They are organized into topical sections on recommender systems, security and trust, mining and semantic services, negotiation, and agents and business services.

Targeted Advertising Technologies in the ICT Space - A Use Case Driven Analysis (Paperback, 2013 ed.): Christian Schlee Targeted Advertising Technologies in the ICT Space - A Use Case Driven Analysis (Paperback, 2013 ed.)
Christian Schlee
R2,185 Discovery Miles 21 850 Ships in 18 - 22 working days

In recent years, the field of information and communication technology has started to change dramatically. Carriers are threatened by high revenue losses requiring them to identify new revenue potentials beyond their core business. Targeted advertising can be one of these revenue opportunities. Christian Schlee provides a broad overview of the latest developments and trends in targeted advertising in the ICT space. The author focuses on the technological aspects of targeted advertising, but also covers business and legal aspects. He analyzes the most interesting use cases in the Web, IPTV, the mobile environment, and in converged scenarios and examines important technological key building blocks.

Multidisciplinary Research and Practice for Informations Systems - IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference... Multidisciplinary Research and Practice for Informations Systems - IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings (Paperback, 2012 ed.)
Gerald Quirchmayer, Josef Basl, Ilsun You, Li Da Xu, Edgar Weippl
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.

Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.):... Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.)
Yongheng Wang, Xiaoming Zhang
R1,514 Discovery Miles 15 140 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Workshop on Internet of Things, IOT 2012, held in Changsha, China, during August 17-19. The 95 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless sensor networks; RFID; sensors and equipments; data processing; security; applications and others.

Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25,... Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Salvatore J Stolfo, Angelos Stavrou, Charles V. Wright
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,425 Discovery Miles 14 250 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Knowledge and Technologies in Innovative Information Systems - 7th Mediterranean Conference on Information Systems, MCIS 2012,... Knowledge and Technologies in Innovative Information Systems - 7th Mediterranean Conference on Information Systems, MCIS 2012, Guimaraes, Portugal, September 8-10, 2012, Proceedings (Paperback, 2012 ed.)
Hakikur Rahman, Anabela Mesquita, Isabel Ramos, Barbara Pernici
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012. MCIS 2012 comprised theories, research, and practices based on knowledge management and innovations in organizations, society, and businesses. The 18 full papers presented in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections on: emerging and innovative information systems, enterprise systems and enterprise engineering, Web 2.0 enabled business models, information quality management and data accuracy in innovative IS, and ICT applications in healthcare.

Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September... Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings (Paperback, 2012 ed.)
Davide Balzarotti, Salvatore J Stolfo, Marco Cova
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.

User Modeling, Adaptation, and Personalization - 20th International Conference, UMAP 2012, Montreal, Canada, July 16-20, 2012... User Modeling, Adaptation, and Personalization - 20th International Conference, UMAP 2012, Montreal, Canada, July 16-20, 2012 Proceedings (Paperback, 2012 ed.)
Judith Masthoff, Bamshad Mobasher, Michel Desmarais, Roger Nkambou
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 20 th International Conference on User Modeling, Adaptation, and Personalization, held in Montreal, Canada, in July 2012. The 22 long and 7 short papers of the Research Paper Track presented were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on user engagement; trust; user motivation, attention, and effort; recommender systems (including topics such as matrix factorization, critiquing, noise and spam in recommender systems); user centered design and evaluation; educational data mining; modeling learners; user models in microblogging; and visualization. The Industry Paper Track covered innovative commercial implementations or applications of UMAP technologies, and experience in applying recent research advances in practice. 2 long and 1 short papers were accepted of 5 submissions.

Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September... Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings (Paperback, 2012 ed.)
Bart De Decker, David W. Chadwick
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.

Business System Management and Engineering - From Open Issues to Applications (Paperback, 2012 ed.): Claudio Agostino Ardagna,... Business System Management and Engineering - From Open Issues to Applications (Paperback, 2012 ed.)
Claudio Agostino Ardagna, Ernesto Damiani, Leszek A Maciaszek, Michele Missikoff, Michael Parkin
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

The next generation of Business Process Management (BPM) methods and tools will support the development of a new generation of service-enabled applications that change and evolve over time. The trend is moving from relatively stable, organization-specific applications to dynamic ones supporting business processes. This book is an outcome of the International Workshop on Business System Management and Engineering (BSME 2010), held in Malaga, Spain, in June/July 2010, in conjunction with the TOOLS 2010 federated conferences and under the aegis of the EU Network of Excellence on Service Software and Systems (S-Cube). The goal of the workshop was to bring together experts in the fields of business process management, service-oriented architectures, and service security to discuss the current state of research and identify new issues, challenges, and research directions. The results of these discussions are reflected in this book.

Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013,... Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings (Paperback, 2013 ed.)
Jason Crampton, Sushil Jajodia, Keith Mayes
R1,547 Discovery Miles 15 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised... Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Andrew A. Adams, Michael Brenner, Matthew Smith
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4,... Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
George Danezis, Sven Dietrich, Kazue Sako
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009,... Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009, Proceedings (Paperback, 2009 ed.)
Claude Godart, Norbert Gronau, Sushil Sharma, Gerome Canals
R2,697 Discovery Miles 26 970 Ships in 18 - 22 working days

I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent

Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.): Fatos Xhafa, Santi Caballe, Ajith Abraham,... Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.)
Fatos Xhafa, Santi Caballe, Ajith Abraham, Thanasis Daradoumis, Angel A Juan
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments.

The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others.

Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity.

Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI... Human Aspects of Information Security, Privacy and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings (Paperback, 2013 ed.)
Louis Marinos, Ioannis Askoxylakis
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.

E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China,... E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China, December 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Michael J. Shaw, Dongsong Zhang, Wei T. Yue
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Workshop on E-Business (WEB 2011), held in Shanghai, China, on December 4, 2011. The 40 papers, which were selected from 88 submissions to the workshop, touch on topics that are diverse yet highly relevant to the challenges faced by today's e-business researchers and practitioners. They are organized in topical sections on social networks, business intelligence, and social computing; economics and organizational implications of electronic markets; and e-business systems and applications.

Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November... Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November 26-27, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Phan Cong-Vinh, Nguyen Manh Hung, Nguyen Thanh Tung, Jun Suzuki
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the first International Conference on Context-Aware Systems and Applications, ICCASA 2012, held in Ho Chi Minh City, Vietnam, in November 2012. The 34 revised full papers presented were carefully selected and reviewed from over 100 submissions. The papers cover a wide spectrum of issues in the area of Context-Aware Systems (CAS). CAS are going to shape networked computing systems of the future

Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany,... Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings (Paperback, 2013 ed.)
Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
R1,828 Discovery Miles 18 280 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Intelligent Collaborative e-Learning Systems and Applications (Paperback, 2010 ed.): Thanasis Daradoumis, Santi Caballe, Joan... Intelligent Collaborative e-Learning Systems and Applications (Paperback, 2010 ed.)
Thanasis Daradoumis, Santi Caballe, Joan Manuel Marques, Fatos Xhafa
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Intelligent Collaborative e-Learning Systems and Applications is a major research theme in CSCL and CSCW research community. It comprises a variety of research topics that focus on developing systems that are more powerful and flexible and also more adaptable to the learning process and thus provide better answers to the paradigmatic principles of on-line collaborative learning and work. The chapters collected in this book provide new insights, findings and approaches both on the analysis and the development of more powerful e-collaboration settings. Researchers will find in this book the latest trends in these research topics. On the other hand, academics will find practical insights on how to use conceptual and experimental approaches in their daily tasks. Finally, developers from CSCL community can be inspired and put in practice the proposed models and evaluate them for the specific purposes of their own work and context.

Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Words and Power - Computers, Language…
Bernadette Longo Hardcover R1,014 Discovery Miles 10 140
Corpus Linguistics 25 Years on
Roberta Facchinetti Hardcover R4,012 Discovery Miles 40 120
Formal Models in the Study of Language…
Joanna Blochowiak, Cristina Grisot, … Hardcover R4,249 Discovery Miles 42 490
Topics in Grammatical Inference
Jeffrey Heinz, Jose M. Sempere Hardcover R3,367 Discovery Miles 33 670
Bayesian Natural Language Semantics and…
Henk Zeevat, Hans-Christian Schmitz Hardcover R3,359 Discovery Miles 33 590
Multiword Expressions Acquisition - A…
Carlos Ramisch Hardcover R3,602 R3,341 Discovery Miles 33 410
Quantitative Approaches to Universality…
Makoto Yamazaki, Haruko Sanada, … Hardcover R2,909 Discovery Miles 29 090
Foundation Models for Natural Language…
Gerhard Paaß, Sven Giesselbach Hardcover R884 Discovery Miles 8 840
The Temporal Structure of Multimodal…
Laszlo Hunyadi, Istvan Szekrenyes Hardcover R2,653 Discovery Miles 26 530
Yearbook of Corpus Linguistics and…
Jesus Romero-Trillo Hardcover R3,419 Discovery Miles 34 190

 

Partners