![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
Today’s publishing infrastructure is rapidly changing. As electronic journals, digital libraries, collaboratories, logic servers, and other knowledge infrastructures emerge on the internet, the key aspects of this transformation need to be identified. Here, the author details the implications that this transformation is having on the creation, dissemination and organization of academic knowledge. The author shows that many established publishing principles need to be given up in order to facilitate this transformation. The text provides valuable insights for knowledge managers, designers of internet-based knowledge infrastructures, and professionals in the publishing industry. Researchers will find the scenarios and implications for research processes stimulating and thought-provoking.
Just like the industrial society of the last century depended on natural resources, today s society depends on information and its exchange. Semantic Web technologies address the problem of information complexity by providing advanced support for representing and processing distributed information, while peer-to-peer technologies address issues of system complexity by allowing flexible and decentralized information storage and processing. Systems that are based on Semantic Web and peer-to-peer technologies promise to combine the advantages of the two mechanisms. A peer-to-peer style architecture for the Semantic Web will avoid both physical and semantic bottlenecks that limit information and knowledge exchange. Staab and Stuckenschmidt structured the selected contributions into four parts: Part I, "Data Storage and Access," prepares the semantic foundation, i.e. data modelling and querying in a flexible and yet scalable manner. These foundations allow for dealing with the organization of information at the individual peers. Part II, "Querying the Network," considers the routing of queries, as well as continuous queries and personalized queries under the conditions of the permanently changing topological structure of a peer-to-peer network. Part III, "Semantic Integration," deals with the mapping of heterogeneous data representations. Finally Part IV, "Methodology and Systems," reports experiences from case studies and sample applications. The overall result is a state-of-the-art description of the potential of Semantic Web and peer-to-peer technologies for information sharing and knowledge management when applied jointly. It serves researchers in academia and industry as an excellent and lasting reference and source of inspiration.
Web Systems Design and Online Consumer Behavior takes and interdisciplinary approach toward systems design in the online environment by providing an understanding of how consumers behave while shopping online and how certain system design elements may impact consumers' perceptions, attitude, intentions, and actual behavior. This book contains theoretical and empirical research from expert scholars in a number of areas including communications, psychology, marketing and advertising, and information systems. This book provides an integrated look at the subject area as described above to further our understanding of the linkage among various disciplines inherently connected with one another in electronic commerce.
In the foreword to this volume of conference proceedings for IFIP Working Group 8.4, it is appropriate to review the wider organization to which the Working Group belongs. The International Federation of Information Processing (IFIP) is a non-governmental, non-profit umbrella organization for national societies working in the field of information processing that was established in 1960 under the auspices of UNESCO. IFIP's mission is to be the leading, truly international, apolitical organization which encourages and assists in the development, exploitation and application of Information Technology for the benefit of all people. At the heart of IFIP lie its Technical Committees that, between them, count on the active participation of some two thousand people world-wide. These Groups work in a variety of ways to share experience and to develop their specialised knowledge. Technical Committees include: TC 1. Foundations of Computer Science; TC 2: Software: Theory and Practice; TC 3: Education; TC 6: Communication Systems; TC 7: System Modelling and Optimization; TC 9: Relationship between Computers and Society; TC 11: Security and Protection in Information Processing Systems; TC 12: Artificial Intelligence and TC 13: Human-Computer Interaction. The IFIP website www.ifip.org) has further details. Technical Committee 8 (TC8) is concerned with Information Systems in organisations. Within TC8 there are different Working Groups focusing on particular aspects of Information Systems.
This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.
Jerome McGann has been at the forefront of the digital revolution in the humanities. His pioneering critical projects on the World Wide Web have redefined traditional notions about interpreting literature. In this trailblazing book, McGann explores the profound implications digital media have for the core critical tasks of the humanities.Drawing on his work as editor of the acclaimed hypertext project The Rossetti Archive, he sets the foundation for a new critical practice for the digital age. Digital media, he demonstrates, can do much more than organize access to great works of literature and art. Beyond their acknowledged editorial and archival capabilities, digital media are also critical tools of unprecedented power. In McGann’s practical vision, digital tools give scholars a flexible, dynamic means for interpreting expressive works—especially those that combine text and image. Radiant Textuality demonstrates eloquently how new technologies can deepen our understanding of complex, multi-layered works of the human imagination in ways never before thought possible.
The book provides a comprehensive investigation of the performance and problems of the TCP/IP protocol stack, when data is transmitted over GSM, GPRS and UMTS. It gives an introduction to the protocols used for Internet access today, and also the Wireless Application Protocol (WAP). The basics of GSM, GPRS and UMTS are given, which are necessary for understanding the main topic, TCP performance over GSM, GPRS and UMTS. We describe at length the problems that TCP has when operating over a mobile radio link, and what has been proposed to remedy these problems. We derive the optimum TCP packet length for maximum data throughput on wireless networks, analytically and by simulation. Results on the throughput and various other parameters of TCP over mobile networks are given. This book gives valuable advice to network operators and application programmers to maximize data throughput, and which protocols, transmission modes, and coding schemes to use and which to avoid.
As virtual reality approaches mainstream consumer use, new research and innovations in the field have impacted how we view and can use this technology across a wide range of industries. Advancements in this technology have led to recent breakthroughs in sound, perception, and visual processing that take virtual reality to new dimensions. As such, research is needed to support the adoption of these new methods and applications. Cases on Immersive Virtual Reality Techniques is an essential reference source that discusses new applications of virtual reality and how they can be integrated with immersive techniques and computer resources. Featuring research on topics such as 3D modeling, cognitive load, and motion cueing, this book is ideally designed for educators, academicians, researchers, and students seeking coverage on the applications of collaborative virtual environments.
Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration
Despite the pervasiveness of the Internet and its importance to a wide range of state functions, we still have little understanding of its implications in the context of International Relations. Combining the Philosophy of Technology with IR theories of power, this study explores state power in the information age.
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history of podcasting from its roots in radio; the variety of genres, topics and styles of today's podcasts (both individual and corporate); and the steps required to build your own podcast. The handbook covers all the elements needed to create a successful podcast including platform options, programming, advertising and sponsorships. Supplemental essays from professionals in various industries provide information and tips to enhance the podcasting experience. The structure of the book is easily adapted into lesson plans, and the exercises included for readers make it a book well suited for classes on podcasting.
Mining the World Wide Web: An Information Search Approach explores the concepts and techniques of Web mining, a promising and rapidly growing field of computer science research. Web mining is a multidisciplinary field, drawing on such areas as artificial intelligence, databases, data mining, data warehousing, data visualization, information retrieval, machine learning, markup languages, pattern recognition, statistics, and Web technology. Mining the World Wide Web presents the Web mining material from an information search perspective, focusing on issues relating to the efficiency, feasibility, scalability and usability of searching techniques for Web mining. Mining the World Wide Web is designed for researchers and developers of Web information systems and also serves as an excellent supplemental reference to advanced level courses in data mining, databases and information retrieval.
The Semantic Web has evolved as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegating tasks to software agents. Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking communicates relevant recent research in Semantic Web-based personalization as applied to the context of information systems. This book reviews knowledge engineering for organizational applications, and Semantic Web approaches to information systems and ontology-based information systems research, as well as the diverse underlying database and knowledge representation aspects that impact personalization and customization.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.
What the international phenomenon of The Rules did for conventional dating, The Rules for Online Dating does for the search for love on the Internet. You'll never hit the "reply" button the same way again. Millions of women around the world are meeting men on the Internet, or they've met in person and are corresponding by e-mail. But though e-mail and Net-based dating services have revolutionized the dating landscape, they've created their own pitfalls and challenges. Women need new strategies that will improve their chances of capturing Mr. Right. Boasting the same time-tested formula and romantic spirit that made The Rules an international bestseller and launched thousands of women down the path to committed relationships, The Rules for Online Dating shows all women -- regardless of age, status, or computer savvy -- how to use electronic communication to relate to men in a way that maintains self-esteem and leads to a healthy relationship. Here is a comprehensive list of dos and don'ts that will help every woman conduct an e-courtship safely and successfully; find and keep the interest of suitable mates; and save time, energy, and potential heartache by weeding out dead wood. The Rules for Online Dating takes women through the process -- step by step, Rule by Rule -- to the ultimate goal: a relationship based on mutual attraction, interest, and respect.
Internet gambling is a rapidly growing phenomenon, which has profound social, psychological, economic, political, and policy implications. Until recently, Internet gambling has been understudied by the research community, but now a growing body of literature is emerging, on all aspects of Internet gambling and its attendant implications. As jurisdictions around the world grapple to understand the best way to respond to Internet gambling from a commercial, regulatory, and social perspective, scholarly studies of Internet gambling are becoming an ever more crucial resource. The Handbook of Internet Gambling consolidates this emerging body of literature into a single reference volume. Its twenty chapters comprise groundbreaking contributions from the world s leading authorities in the commercial, clinical, political and social aspects of Internet gambling. It is sure to be a foundational resource for academics, students, regulators, politicians, policy makers, commercial providers, and health care professionals who have an interest in understanding the history, dynamics, and impacts of Internet gambling in a global context.
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, ""Cyber Terrorism: Political and Economic Implications"" puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.
Semantics, Web services, and Web processes promise better re-use, universal interoperability and integration. Semantics has been recognized as the primary tool to address the challenges of a broad spectrum of heterogeneity and for improving automation through machine understandable descriptions. Semantic Web Services, Processes and Applications brings contributions from researchers who study, explore and understand the semantic enabling of all phases of semantic Web processes. This encompasses design, annotation, discovery, choreography and composition. Also this book presents fundamental capabilities and techniques associated with ontological modeling or services, annotation, matching and mapping, and reasoning. This is complemented by discussion of applications in e-Government and bioinformatics. Special bulk rates are available for course adoption through Publishing Editor.
|
![]() ![]() You may like...
Total Quality Management: an Internal…
David L. Goetsch, Rigard Steenkamp
Paperback
![]() R1,346 Discovery Miles 13 460
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Indian Emigrants to Sugar Colonies - A…
Sutapa Das Dhar, Chandralekha Basu Ghosh
Hardcover
R1,029
Discovery Miles 10 290
Imaginative Teaching through Creative…
Amy Ash, Michael Dean Clark, …
Hardcover
R3,384
Discovery Miles 33 840
|