0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (123)
  • R250 - R500 (375)
  • R500+ (2,349)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.):... Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.)
Yongheng Wang, Xiaoming Zhang
R1,719 Discovery Miles 17 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Workshop on Internet of Things, IOT 2012, held in Changsha, China, during August 17-19. The 95 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless sensor networks; RFID; sensors and equipments; data processing; security; applications and others.

Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012,... Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings (Paperback, 2012 ed.)
Adam Smith
R2,037 Discovery Miles 20 370 Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Knowledge and Technologies in Innovative Information Systems - 7th Mediterranean Conference on Information Systems, MCIS 2012,... Knowledge and Technologies in Innovative Information Systems - 7th Mediterranean Conference on Information Systems, MCIS 2012, Guimaraes, Portugal, September 8-10, 2012, Proceedings (Paperback, 2012 ed.)
Hakikur Rahman, Anabela Mesquita, Isabel Ramos, Barbara Pernici
R2,037 Discovery Miles 20 370 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012. MCIS 2012 comprised theories, research, and practices based on knowledge management and innovations in organizations, society, and businesses. The 18 full papers presented in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections on: emerging and innovative information systems, enterprise systems and enterprise engineering, Web 2.0 enabled business models, information quality management and data accuracy in innovative IS, and ICT applications in healthcare.

Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September... Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings (Paperback, 2012 ed.)
Davide Balzarotti, Salvatore J Stolfo, Marco Cova
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.

User Modeling, Adaptation, and Personalization - 20th International Conference, UMAP 2012, Montreal, Canada, July 16-20, 2012... User Modeling, Adaptation, and Personalization - 20th International Conference, UMAP 2012, Montreal, Canada, July 16-20, 2012 Proceedings (Paperback, 2012 ed.)
Judith Masthoff, Bamshad Mobasher, Michel Desmarais, Roger Nkambou
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20 th International Conference on User Modeling, Adaptation, and Personalization, held in Montreal, Canada, in July 2012. The 22 long and 7 short papers of the Research Paper Track presented were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on user engagement; trust; user motivation, attention, and effort; recommender systems (including topics such as matrix factorization, critiquing, noise and spam in recommender systems); user centered design and evaluation; educational data mining; modeling learners; user models in microblogging; and visualization. The Industry Paper Track covered innovative commercial implementations or applications of UMAP technologies, and experience in applying recent research advances in practice. 2 long and 1 short papers were accepted of 5 submissions.

Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September... Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings (Paperback, 2012 ed.)
Bart De Decker, David W. Chadwick
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.

Business System Management and Engineering - From Open Issues to Applications (Paperback, 2012 ed.): Claudio Agostino Ardagna,... Business System Management and Engineering - From Open Issues to Applications (Paperback, 2012 ed.)
Claudio Agostino Ardagna, Ernesto Damiani, Leszek A Maciaszek, Michele Missikoff, Michael Parkin
R1,468 Discovery Miles 14 680 Ships in 10 - 15 working days

The next generation of Business Process Management (BPM) methods and tools will support the development of a new generation of service-enabled applications that change and evolve over time. The trend is moving from relatively stable, organization-specific applications to dynamic ones supporting business processes. This book is an outcome of the International Workshop on Business System Management and Engineering (BSME 2010), held in Malaga, Spain, in June/July 2010, in conjunction with the TOOLS 2010 federated conferences and under the aegis of the EU Network of Excellence on Service Software and Systems (S-Cube). The goal of the workshop was to bring together experts in the fields of business process management, service-oriented architectures, and service security to discuss the current state of research and identify new issues, challenges, and research directions. The results of these discussions are reflected in this book.

Towards the Knowledge Society - eCommerce, eBusiness and eGovernment The Second IFIP Conference on E-Commerce, E-Business,... Towards the Knowledge Society - eCommerce, eBusiness and eGovernment The Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002) October 7-9, 2002, Lisbon, Portugal (Paperback, Softcover reprint of the original 1st ed. 2003)
Joao L. Monteiro, Paula M.C. Swatman, L.Valadares Tavares
R6,158 Discovery Miles 61 580 Ships in 10 - 15 working days

BE 2002 is the second in a series of conferences on eCommerce, eBusiness, and eGovemment organised by the three IFIP committees TC6, TC8, and TCll. As BE 2001 did last year in Zurich, BE 2002 continues to provide a forum for users, engineers, and researchers from academia, industry and government to present their latest findings in eCommerce, eBusiness, and eGovernment applications and the underlying technologies which support those applications. This year's conference comprises a main track with sessions on eGovernment, Trust, eMarkets, Fraud and Security, eBusiness (both B2B and B2C), the Design of systems, eLearning, Public and Health Systems, Web Design, and the Applications of and Procedures for eCommerce and eBusiness, as well as two associated Workshops (not included in these proceedings): eBusiness Models in the Digital Online Music and Online News Sectors; and eBusiness Standardisation - Challenges and Solutions for the Networked Economy. The 47 papers accepted for presentation in these sessions and published in this book of proceedings were selected from 80 submissions. They were rigorously reviewed (all papers were double-blind refereed) before being selected by the International Programme Committee. This rejection rate of almost 50% indicates just how seriously the Committee took its quality control activities.

Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4,... Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
George Danezis, Sven Dietrich, Kazue Sako
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the... Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R4,589 Discovery Miles 45 890 Ships in 10 - 15 working days

A research agenda for collaborative networks Purpose. Many practical application experiments and pilot cases nowadays provide evidence on what works and what still remains as a challenge for collaborative networked organizations (CNOs). The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, most efforts in this area are highly fragmented, considering only some partial facets and not a holistic perspective that would be required. We are therefore at a point in which it is necessary to define much more consolidated and sustainable research strategies for a second phase of research and development in this area. This book addresses the main disciplines involved in CNOs. It further synthesizes the views and opinions expressed by a large number of visionaries from the main disciplines involved in CNOs, and offers a comprehensive set of recommendations for the establishment of a research agenda on collaborative networks. As recognized experts in their specific areas, different authors in this book have presented work that is backed by a large number of research results, each focusing on specific facets of collaborative networks, and coming out of a large number of international and national projects.

Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009,... Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009, Proceedings (Paperback, 2009 ed.)
Claude Godart, Norbert Gronau, Sushil Sharma, Gerome Canals
R3,071 Discovery Miles 30 710 Ships in 10 - 15 working days

I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent

Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.): Fatos Xhafa, Santi Caballe, Ajith Abraham,... Computational Intelligence for Technology Enhanced Learning (Paperback, 2010 ed.)
Fatos Xhafa, Santi Caballe, Ajith Abraham, Thanasis Daradoumis, Angel A Juan
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments.

The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others.

Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity.

E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China,... E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China, December 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Michael J. Shaw, Dongsong Zhang, Wei T. Yue
R1,648 Discovery Miles 16 480 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Workshop on E-Business (WEB 2011), held in Shanghai, China, on December 4, 2011. The 40 papers, which were selected from 88 submissions to the workshop, touch on topics that are diverse yet highly relevant to the challenges faced by today's e-business researchers and practitioners. They are organized in topical sections on social networks, business intelligence, and social computing; economics and organizational implications of electronic markets; and e-business systems and applications.

Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November... Context-Aware Systems and Applications - First International Conference, ICCASA 2012, Ho Chi Minh City, Vietnam, November 26-27, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Phan Cong-Vinh, Nguyen Manh Hung, Nguyen Thanh Tung, Jun Suzuki
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the first International Conference on Context-Aware Systems and Applications, ICCASA 2012, held in Ho Chi Minh City, Vietnam, in November 2012. The 34 revised full papers presented were carefully selected and reviewed from over 100 submissions. The papers cover a wide spectrum of issues in the area of Context-Aware Systems (CAS). CAS are going to shape networked computing systems of the future

Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2011, Taipei,... Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2011, Taipei, Taiwan, May 2, 2011, and TADA 2011, Barcelona, Spain, July 17, 2011, Revised Selected Papers (Paperback, 2013 ed.)
Esther David, Valentin Robu, Onn Shehory, Sebastian Stein, Andreas Symeonidis
R1,468 Discovery Miles 14 680 Ships in 10 - 15 working days

This volume contains ten thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce. They were originally presented at the 13th International Workshop on Agent-Mediated Electronic Commerce (AMEC 2011), collocated with AAMAS 2011 in Taipei, Taiwan, or at the 2011 Workshop on Trading Agent Design and Analysis (TADA 2011), collocated with IJCAI 2011 in Barcelona, Spain.The papers presented at these two workshops illustrate both the depth and broad range of research topics in this field. They range from providing solutions to open theoretical problems in online scheduling and bargaining under uncertainty, to designing bidding agents in a wide area of application areas, such as electronic commerce, supply chain management, or keyword advertising, to designing agents that can successfully replicate actual human behaviors in realistic games.

Reputation Transfer to Enter New B-to-B Markets - Measuring and Modelling Approaches (Paperback, 2010 ed.): Christine Falkenreck Reputation Transfer to Enter New B-to-B Markets - Measuring and Modelling Approaches (Paperback, 2010 ed.)
Christine Falkenreck
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

An increasing number of products and services are not differentiated by inherent features, but by the vendors, particularly their reputation and marketing commu- cation. Consequently, a positive reputation provides competing vendors with a virtually inimitable competitive advantage. Contemporary research concerning antecedents and consequences of reputation in the domain of marketing is dominated by branding and line extension issues. Organizations' communication efforts and the relation of reputation and the c- munication media are not fully understood; nor have they been challenged up to now. Moreover, customers' perception of reputation is clearly embedded in their cultural context. However, contemporary marketing research restricts both conceptual and empirical considerations to Western-type cultures. Frequently, even the differences in Western-type cultures are neglected. Considering these shortcomings in contemporary marketing research, Dr. Christine Falkenreck investigates the opportunities and limits, and also the potential bene?ts and dangers of transferring a vendor's positive reputation to product categories never produced or offered by the considered vendor. Embedding the empirical investigation of both reputation management and reputation transfer in a coherent theoretical framework, which is grounded in the Commitment-Trust theory, is her merit. She derives and validates an integrated model that appears to be valid in all cultures considered in her study. The results of this analysis contribute substantially to our understanding of reputation measuring and managing. These results are not restricted to academic interests and they provided practitioners with a variety of new insights. Thus, this thesis will ho- fully be widely discussed in both academia and management practice.

Intelligent Collaborative e-Learning Systems and Applications (Paperback, 2010 ed.): Thanasis Daradoumis, Santi Caballe, Joan... Intelligent Collaborative e-Learning Systems and Applications (Paperback, 2010 ed.)
Thanasis Daradoumis, Santi Caballe, Joan Manuel Marques, Fatos Xhafa
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

Intelligent Collaborative e-Learning Systems and Applications is a major research theme in CSCL and CSCW research community. It comprises a variety of research topics that focus on developing systems that are more powerful and flexible and also more adaptable to the learning process and thus provide better answers to the paradigmatic principles of on-line collaborative learning and work. The chapters collected in this book provide new insights, findings and approaches both on the analysis and the development of more powerful e-collaboration settings. Researchers will find in this book the latest trends in these research topics. On the other hand, academics will find practical insights on how to use conceptual and experimental approaches in their daily tasks. Finally, developers from CSCL community can be inspired and put in practice the proposed models and evaluate them for the specific purposes of their own work and context.

Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Paperback, 2010 ed.): Hsinchun Chen,... Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Paperback, 2010 ed.)
Hsinchun Chen, Daniel Zeng, Ping Yan
R5,349 Discovery Miles 53 490 Ships in 10 - 15 working days

Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step forward in disease surveillance. Infectious Disease Informatics: Syndromic Surveillance for Public Health and Bio-Defense is an in-depth monograph that analyzes and evaluates the outbreak modeling and detection capabilities of existing surveillance systems under a unified framework, and presents the first book-length coverage of the subject from an informatics-driven perspective. Individual chapters consider the state of the art, including the facilitation of data collection, sharing and transmission; a focus on various outbreak detection methods; data visualization and information dissemination issues; and system assessment and other policy issues. Eight chapters then report on several real-world case studies, summarizing and comparing eight syndromic surveillance systems, including those that have been adopted by many public health agencies (e.g., RODS and BioSense). The book concludes with a discussion of critical issues and challenges, with a look to future directions. This book is an excellent source of current information for researchers in public health and IT. Government public health officials and private-sector practitioners in both public health and IT will find the most up-to-date information available, and students from a variety of disciplines, including public health, biostatistics, information systems, computer science, and public administration and policy will get a comprehensive look at the concepts, techniques, and practices of syndromic surveillance.

Foundations of Web Technology (Paperback, Softcover reprint of the original 1st ed. 2002): Ramesh R. Sarukkai Foundations of Web Technology (Paperback, Softcover reprint of the original 1st ed. 2002)
Ramesh R. Sarukkai
R5,070 Discovery Miles 50 700 Ships in 10 - 15 working days

Foundations of Web Technology covers the basics of Web technology while being specialized enough to add value to experienced professionals working in this field. Most books on the Web focus on programmatic aspects of languages such as Java, JavaScript, or description of standards such as Hypertext Markup Language (HTML) or Wireless Markup Language (WML). A book that covers the concepts behind the infrastructure of the Web would be indispensable to a wide range of audiences interested in learning how the Web works, how techniques in Web technology can be applied to their own problem, and what the emergent technological trends in these areas are.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Paperback, Softcover reprint of the original... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Paperback, Softcover reprint of the original 1st ed. 2003)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,576 Discovery Miles 45 760 Ships in 10 - 15 working days

Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

Applications of Data Mining to Electronic Commerce (Paperback, Softcover reprint of the original 1st ed. 2001): Ronny Kohavi,... Applications of Data Mining to Electronic Commerce (Paperback, Softcover reprint of the original 1st ed. 2001)
Ronny Kohavi, Foster Provost
R2,980 Discovery Miles 29 800 Ships in 10 - 15 working days

Applications of Data Mining to Electronic Commerce brings together in one place important contributions and up-to-date research results in this fast moving area. Applications of Data Mining to Electronic Commerce serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Paperback, 2009)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

Web Information Systems and Mining - International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings... Web Information Systems and Mining - International Conference, WISM 2012, Chengdu, China, October 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Wu Lee Wang, Jingsheng Lei, Gong Zhiguo, Xiangfeng Luo
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.

Principles and Practice of Multi-Agent Systems - 15th International Conference, PRIMA 2012, Kuching, Sarawak, Malaysia,... Principles and Practice of Multi-Agent Systems - 15th International Conference, PRIMA 2012, Kuching, Sarawak, Malaysia, September 3-7, 2012, Proceedings (Paperback, 2012 ed.)
Iyad Rahwan, Wayne Wobcke, Sandip Sen, Toshiharu Sugawara
R1,468 Discovery Miles 14 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2012, held in Kuching, Sarawak, Malaysia, in September 2012. The conference was collocated with the 12th Pacific Rim International Conference on Artificial Intelligence, PRICAI. The 17 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on foundations, auctions and negotiation, coalition formation and teamwork, norms and institutions, and applications.

Agent and Multi-Agent Systems: Technologies and Applications - 6th KES International Conference, KES-AMSTA 2012, Dubrovnik,... Agent and Multi-Agent Systems: Technologies and Applications - 6th KES International Conference, KES-AMSTA 2012, Dubrovnik, Croatia, June 25-27, 2012. Proceedings (Paperback, 2012)
Gordan Jezic, Mario Kusek, Ngoc Thanh Nguyen, Robert J. Howlett, Lakhmi C. Jain
R1,713 Discovery Miles 17 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th KES International Conference on Agent and Multi-Agent Systems, KES-AMSTA 2012, held in Dubrovnik, Croatia, in June 2012.
The conference attracted a substantial number of researchers and practitioners from all over the world who submitted their papers for ten main tracks covering the methodology and applications of agent and multi-agent systems, one workshop (TRUMAS 2012) and five special sessions on specific topics within the field. The 66 revised papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on virtual organizations, knowledge and learning agents, intelligent workflow, cloud computing and intelligent systems, self-organization, ICT-based alternative and augmentative communication, multi-agent systems, mental and holonic models, assessment methodologies in multi-agent and other paradigms, business processing agents, Trumas 2012 (first international workshop), conversational agents and agent teams, digital economy, and multi-agent systems in distributed environments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Uncomfortable Truth About South…
Wandile Sihlobo, Johann Kirsten Paperback R290 R239 Discovery Miles 2 390
Consumer Behavior Change and Data…
Pantea Keikhosrokiani Hardcover R8,815 Discovery Miles 88 150
Pulling a Rabbit Out of a Hat - The…
Ross Anderson Hardcover R3,381 Discovery Miles 33 810
Computational and Methodological…
Andriette Bekker, (Din) Ding-Geng Chen, … Hardcover R4,360 Discovery Miles 43 600
Dragon Ball Z: The Official Advent…
Insight Editions Hardcover R803 R710 Discovery Miles 7 100
Group Statements: Volume 2…
Paperback R1,258 R1,155 Discovery Miles 11 550
OCA Java SE 8 Programmer I Exam Guide…
Kathy Sierra, Bert Bates Paperback R1,475 Discovery Miles 14 750
Mixed Mode Oscillations (MMOs…
Zdzislaw Trzaska Hardcover R5,012 Discovery Miles 50 120
The Unified Process Inception Phase…
Scott W Ambler, Larry Constantine Paperback R1,539 Discovery Miles 15 390
100 Mandela Moments
Kate Sidley Paperback R250 R223 Discovery Miles 2 230

 

Partners