![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. The 5.4 Working Group of IFIP aims at defining the scientific foundation of Computer Aided Innovation systems and at identifying state of the art and trends of CAI tools and methods. These Proceedings derive from the second Topical Session on Computer- Aided Innovation organized within the 20th World Computer Congress of IFIP. The goal of the Topical Session is to provide a survey of existing technologies and research activities in the field and to identify opportunities of integration of CAI with other PLM systems. According to the heterogeneous needs of innovation-related activities, the papers published in this volume are characterized by multidisciplinary contents and complementary perspectives and scopes. Such a richness of topics and disciplines will certainly contribute to the promotion of fruitful new collaborations and synergies within the IFIP community. Gaetano Cascini th Florence, April 30 20 08 CAI Topical Session Organization The IFIP Topical Session on Computer-Aided Innovation (CAI) is a co-located conference organized under the auspices of the IFIP World Computer Congress (WCC) 2008 in Milano, Italy Gaetano Cascini CAI Program Committee Chair [email protected]
This book offers a clear, yet comprehensive guide to how to structure a design project, focusing in particular on the key questions designers, architects, policy makers and health professionals should consider when working towards inclusion through design. The book is based on a series of lessons held by the author and his colleague Avril Accolla, whose aim was to train technicians at all levels to be capable of catering for the needs of the elderly. It clearly draws the outline of their "Ask the Right Question" approach, whose purpose is to help convey the notions in question appropriately to people with such widely different backgrounds, curricula, interests and cultures. Using a minimalist approach, based mainly on the discussion of eye-catching real-life examples placed in logical order and a crystal clear, engaging style, this book is a must-have for designers, technicians, customers and health practitioners, as well as social scientists and policy makers who deal with inclusive design at different levels and anyone interested in topics related to technological evolution and social integration.
MUSIC 2013 will be the most comprehensive text focused on the various aspects of Mobile, Ubiquitous and Intelligent computing. MUSIC 2013 provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of intelligent technologies in mobile and ubiquitous computing environment. MUSIC 2013 is the next edition of the 3rd International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC-12, Vancouver, Canada, 2012) which was the next event in a series of highly successful International Workshop on Multimedia, Communication and Convergence technologies MCC-11 (Crete, Greece, June 2011), MCC-10 (Cebu, Philippines, August 2010).
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
In this book, the capability map, a novel general representation of the kinematic capabilities of a robot arm, is introduced. The capability map allows to determine how well regions of the workspace are reachable for the end effector in different orientations. It is a representation that can be machine processed as well as intuitively visualized for the human. The capability map and the derived algorithms are a valuable source of information for high- and low-level planning processes. The versatile applicability of the capability map is shown by examples from several distinct application domains. In human-robot interaction, a bi-manual interface for tele-operation is objectively evaluated. In low-level geometric planning, more human-like motion is planned for a humanoid robot while also reducing the computation time. And in high-level task reasoning, the suitability of a robot for a task is evaluated.
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.
Rapid advancement of interactive technologies during the past two decades has made access to information easier though at the expense of a clear digital divide. There is a generation who grew up with these technologies and another generation who find many modern electronic systems counter intuitive and have no use for them in their daily life. This digital divide becomes more prominent in developing countries as state-of-the-art interactive systems were not and are still not affordable to a large number of users. "Inclusive Human Machine Interaction for India" presents an end-to-end case study of developing interactive technology for the common people of India. With a foreword from Prof Ashok Juhunjhunwala (Professor, Indian Institute of Technology Madras), this book investigates problems of middle-aged and elderly users in adopting interactive technologies and proposes new user interfaces and interaction techniques. It pioneers in introducing state-of-the-art eye-gaze tracking based interaction to everyday computing tasks and presents a detailed literature survey and user studies on user modelling and eye-gaze tracking. Technologies presented in this book will not only be relevant for developing countries but will also find useful applications in developed countries.
Quality is not a fixed or universal property of software; it depends on the context and goals of its stakeholders. Hence, when you want to develop a high-quality software system, the first step must be a clear and precise specification of quality. Yet even if you get it right and complete, you can be sure that it will become invalid over time. So the only solution is continuous quality control: the steady and explicit evaluation of a product's properties with respect to its updated quality goals. This book guides you in setting up and running continuous quality control in your environment. Starting with a general introduction on the notion of quality, it elaborates what the differences between process and product quality are and provides definitions for quality-related terms often used without the required level of precision. On this basis, the work then discusses quality models as the foundation of quality control, explaining how to plan desired product qualities and how to ensure they are delivered throughout the entire lifecycle. Next it presents the main concepts and techniques of continuous quality control, discussing the quality control loop and its main techniques such as reviews or testing. In addition to sample scenarios in all chapters, the book is rounded out by a dedicated chapter highlighting several applications of different subsets of the presented quality control techniques in an industrial setting. The book is primarily intended for practitioners working in software engineering or quality assurance, who will benefit by learning how to improve their current processes, how to plan for quality, and how to apply state-of-the-art quality control techniques. Students and lecturers in computer science and specializing in software engineering will also profit from this book, which they can use in practice-oriented courses on software quality, software maintenance and quality assurance.
Since the publication of the companion volume Researching Learning in Virtual Worlds in 2010, there has been a growth not only in the range and number of educational initiatives taking place in virtual worlds, but also in the depth of analysis of the nature of that education. Understanding Learning in Virtual Worlds reflects those changes through a collection of chapters that are extended versions of research presented at the second Researching Learning in Virtual Environments conference (ReLIVE 11), an international conference hosted by the Open University UK. Included in this book are chapters that explore the philosophical and methodological underpinnings of understanding learning in virtual worlds, identify and analyse the factors that support learning in these environments, and present case studies that demonstrate some of the various ways in which virtual worlds can be applied to facilitate learning and teaching. The links between learning in a virtual world and learning in the physical world are made apparent throughout, and the authors reveal how understanding learning in one informs the other. Understanding Learning in Virtual Worlds is an important book not only to those who teach in virtual worlds, but to anyone for whom understanding learning, in all its forms, is of interest.
This volume explains how advances in computer technology will augment communication in person-to-person, organizational, and educational settings. It describes the convergence of virtual reality and group decision support, and how these will serve educational and organizational effectiveness. Contributors--experts from business and academia--examine what the computing/communications world will look like in the near future, what the specific needs of various industries will be, and how innovations will fit into organizations and society. These three topics are addressed with attention to the following questions: What will be the size of initial and future markets for advanced computer and communications technology? What will be the future computing environment in manufacturing operations, in the executive suite, in the office, in the field and on the road, at the point of service, for the computer-integrated enterprise, at home, in the school, and in the global marketplace?
This book examines agile approaches from a management perspective by focusing on matters of strategy, implementation, organization and people. It examines the turbulence of the marketplace and business environment in order to identify what role agile management has to play in coping with such change and uncertainty. Based on observations, personal experience and extensive research, it clearly identifies the fabric of the agile organization, helping managers to become agile leaders in an uncertain world. The book opens with a broad survey of agile strategies, comparing and contrasting some of the major methodologies selected on the basis of where they lie on a continuum of ceremony and formality, ranging from the minimalist technique-driven and software engineering focused XP, to the pragmatic product-project paradigm that is Scrum and its scaled counterpart SAFe (R), to the comparatively project-centric DSDM. Subsequently, the core of the book focuses on DSDM, owing to the method's comprehensive elaboration of program and project management practices. This work will chiefly be of interest to all those with decision-making authority within their organizations (e.g., senior managers, line managers, program, project and risk managers) and for whom topics such as strategy, finance, quality, governance and risk management constitute a daily aspect of their work. It will, however, also be of interest to those readers in advanced management or business administration courses (e.g., MBA, MSc), who wish to engage in the management of agile organizations and thus need to adapt their skills and knowledge accordingly.
Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.
This research monograph explores the rapidly expanding field of networked music making and the ways in which musicians of different cultures improvise together online. It draws on extensive research to uncover the creative and cognitive approaches that geographically dispersed musicians develop to interact in displaced tele-improvisatory collaboration. It presents a multimodal analysis of three tele-improvisatory performances that examine how cross-cultural musician's express and perceive intentionality in these interactions, as well as their experiences of distributed agency and tele-presence. Tele-Improvisation: Intercultural Interaction in the Online Global Music Jam Session will provide essential reading for musician's, postgraduate students, researchers and educators, working in the areas of telematic performance, musicology, music cognition, intercultural communication, distance collaboration and learning, digital humanities, Computer Supported Cooperative Work and HCI.
Based on more than 10 years of teaching experience, Blanken and his coeditors have assembled all the topics that should be covered in advanced undergraduate or graduate courses on multimedia retrieval and multimedia databases. The single chapters of this textbook explain the general architecture of multimedia information retrieval systems and cover various metadata languages such as Dublin Core, RDF, or MPEG. The authors emphasize high-level features and show how these are used in mathematical models to support the retrieval process. For each chapter, there 's detail on further reading, and additional exercises and teaching material is available online.
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This book contains the collection of papers presented at the conference of the International Federation for Information Processing Working Group 8.2 "Information and Organizations." The conference took place during June 21-24, 2009 at the Universidade do Minho in Guimaraes, Portugal. The conference entitled "CreativeSME - The Role of IS in Leveraging the Intelligence and Creativity of SME's" attracted high-quality submissions from across the world. Each paper was reviewed by at least two reviewers in a double-blind review process. In addition to the 19 papers presented at the conference, there were five panels and four workshops, which covered a range of issues relevant to SMEs, creativity and information systems. We would like to show our appreciation of the efforts of our two invited keynote speakers, Michael Dowling of the University of Regensburg, Germany and Carlos Zorrinho, Portuguese coordinator of the Lisbon Strategy and the Technological Plan. The following organizations supported the conference through financial or other contributions and we would like to thank them for their engagement: "
This book explores the usefulness of looking at very small aspects of human behavior in order to understand computer-human interaction difficulties with hypertext. The focus is on both mechanical actions and talk as social action. While this approach has been used fruitfully to study human-human interaction, Gray has constructed a unique study of human interaction with machines.
Mixed Reality is moving out of the research-labs into our daily lives. It plays an increasing role in architecture, design and construction. The combination of digital content with reality creates an exciting synergy that sets out to enhance engagement within architectural design and construction. State-of-the-art research projects on theories and applications within Mixed Reality are presented by leading researchers covering topics in architecture, design collaboration, construction and education. They discuss current projects and offer insight into the next wave of Mixed Reality possibilities.
This volume is a collection of research studies on the modeling of emotions in complex autonomous systems. Several experts in the field are reporting their efforts and reviewing the literature in order to shed lights on how the processes of coding and decoding emotional states took place in humans, which are the physiological, physical, and psychological variables involved, invent new mathematical models and algorithms to describe them, and motivate these investigations in the light of observable societal changes and needs, such as the aging population and the cost of health care services. The consequences are the implementation of emotionally and socially believable machines, acting as helpers into domestic spheres, where emotions drive behaviors and actions. The contents of the book are highly multidisciplinary since the modeling of emotions in robotic socially believable systems requires a holistic perspective on topics coming from different research domains such as computer science, engineering, sociology, psychology, linguistic, and information communication. The book is of interest both to experts and students since last research works on a so complex multidisciplinary topic are described in a neat and didactical scientific language.
This volume presents a collection of research studies on sophisticated and functional computational instruments able to recognize, process, and store relevant situated interactional signals, as well as, interact with people, displaying reactions (under conditions of limited time) that show abilities of appropriately sensing and understanding environmental changes, producing suitable, autonomous, and adaptable responses to various social situations. These social robotic autonomous systems will improve the quality of life of their end-users while assisting them on several needs, ranging from educational settings, health care assistance, communicative disorders, and any disorder impairing either their physical, cognitive, or social functional activities. The multidisciplinary themes presented in the volume will be interesting for experts and students coming from different research fields and with different knowledge and backgrounds. The research reported is particularly relevant for academic centers, and Research & Development Institutions.
This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions..
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion. |
You may like...
Wacky Facts Word Search - 50 US States
Scott Peters, The Puzzle Kid
Paperback
R355
Discovery Miles 3 550
Rwanda Revisited - Genocide, Civil War…
Phillip Drew, Bruce Oswald, …
Hardcover
R2,893
Discovery Miles 28 930
Citizen Militia - Patriotic Civilians…
Rear Admiral Joseph H. Miller, Cathy Miller Cnrn
Hardcover
R777
Discovery Miles 7 770
Girlwonder - Every Girl's Guide to the…
Holly Hartman, Information Please
Paperback
|