![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
This book offers a comprehensive guide to implementing SAP and HANA on private, public and hybrid clouds. Cloud computing has transformed the way organizations run their IT infrastructures: the shift from legacy monolithic mainframes and UNIX platforms to cloud based infrastructures offering ubiquitous access to critical information, elastic provisioning and drastic cost savings has made cloud an essential part of every organization's business strategy. Cloud based services have evolved from simple file sharing, email and messaging utilities in the past, to the current situation, where their improved technical capabilities and SLAs make running mission-critical applications such as SAP possible. However, IT professionals must take due care when deploying SAP in a public, private or hybrid cloud environment. As a foundation for core business operations, SAP cloud deployments must satisfy stringent requirements concerning their performance, scale and security, while delivering measurable improvements in IT efficiency and cost savings. The 2nd edition of "SAP on the Cloud" continues the work of its successful predecessor released in 2013, providing updated guidance for deploying SAP in public, private and hybrid clouds. To do so, it discusses the technical requirements and considerations necessary for IT professionals to successfully implement SAP software in a cloud environment, including best-practice architectures for IaaS, PaaS and SaaS deployments. The section on SAP's in-memory database HANA has been significantly extended to cover Suite on HANA (SoH) and the different incarnations of HANA Enterprise Cloud (HEC) and Tailored Datacenter Integration (TDI). As cyber threats are a significant concern, it also explores appropriate security models for defending SAP cloud deployments against modern and sophisticated attacks. The reader will gain the insights needed to understand the respective benefits and drawbacks of various deployment models and how SAP on the cloud can be used to deliver IT efficiency and cost-savings in a secure and agile manner.
This book is based on contributions to the Seventh European Summer School on Language and Speech Communication that was held at KTH in Stockholm, Sweden, in July of 1999 under the auspices of the European Language and Speech Network (ELSNET). The topic of the summer school was "Multimodality in Language and Speech Systems" (MiLaSS). The issue of multimodality in interpersonal, face-to-face communication has been an important research topic for a number of years. With the increasing sophistication of computer-based interactive systems using language and speech, the topic of multimodal interaction has received renewed interest both in terms of human-human interaction and human-machine interaction. Nine lecturers contri buted to the summer school with courses on specialized topics ranging from the technology and science of creating talking faces to human-human communication, which is mediated by computer for the handicapped. Eight of the nine lecturers are represented in this book. The summer school attracted more than 60 participants from Europe, Asia and North America representing not only graduate students but also senior researchers from both academia and industry."
Data visualization has emerged as a serious scholarly topic, and a wide range of tools have recently been developed at an accelerated pace to aid in this research area. Examining different ways of analyzing big data can result in increased efficiency for many corporations and organizations. Data Visualization and Statistical Literacy for Open and Big Data highlights methodological developments in the way that data analytics is both learned and taught. Featuring extensive coverage on emerging relevant topics such as data complexity, statistics education, and curriculum development, this publication is geared toward teachers, academicians, students, engineers, professionals, and researchers that are interested in expanding their knowledge of data examination and analysis.
Edited by thought leaders in the fields of urban informatics and urban interaction design, this book brings together case studies and examples from around the world to discuss the role that urban interfaces, citizen action, and city making play in the quest to create and maintain not only secure and resilient, but productive, sustainable and viable urban environments. The book debates the impact of these trends on theory, policy and practice. The individual chapters are based on blind peer reviewed contributions by leading researchers working at the intersection of the social / cultural, technical / digital, and physical / spatial domains of urbanism scholarship. The book will appeal not only to researchers and students, but also to a vast number of practitioners in the private and public sector interested in accessible content that clearly and rigorously analyses the potential offered by urban interfaces, mobile technology, and location-based services in the context of engaging people with open, smart and participatory urban environments.
The core message of this book is: computer games best realise affective interaction. This book brings together contributions from specialists in affective computing, game studies, game artificial intelligence, user experience research, sensor technology, multi-modal interfaces and psychology that will advance the state-of-the-art in player experience research; affect modelling, induction, and sensing; affect-driven game adaptation and game-based learning and assessment. In 3 parts the books covers Theory, Emotion Modelling and Affect-Driven Adaptation, and Applications. This book will be of interest to researchers and scholars in the fields of game research, affective computing, human computer interaction, and artificial intelligence.
How can we design better experiences? Experience Design brings together leading international scholars to provide a cross-section of critical thinking and professional practice within this emerging field. Contributors writing from theoretical, empirical and applied design perspectives address the meaning of 'experience'; draw on case studies to explore ways in which specific 'experiences' can be designed; examine which methodologies and practices are employed in this process; and consider how experience design interrelates with other academic and professional disciplines. Chapters are grouped into thematic sections addressing positions, objectives and environments, and interactions and performances, with individual case studies addressing a wide range of experiences, including urban spaces, the hospital patient, museum visitors, mobile phone users, and music festival and restaurant goers.
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
From security training simulations to war games to role-playing
games, to sports games to gambling, playing video games has become
a social phenomena, and the increasing number of players that cross
gender, culture, and age is on a dramatic upward trajectory.
"Playing Video Games: Motives, Responses, and Consequences"
integrates communication, psychology, and technology to examine the
psychological and mediated aspects of playing video games. It is
the first volume to delve deeply into these aspects of computer
game play. It fits squarely into the media psychology arm of
entertainment studies, the next big wave in media studies. The book
targets one of the most popular and pervasive media in modern
times, and it will serve to define the area of study and provide a
theoretical spine for future research.
Starting with novel algorithms for optimally updating bounding volume hierarchies of objects undergoing arbitrary deformations, the author presents a new data structure that allows, for the first time, the computation of the penetration volume. The penetration volume is related to the water displacement of the overlapping region, and thus corresponds to a physically motivated and continuous force. The practicability of the approaches used is shown by realizing new applications in the field of robotics and haptics, including a user study that evaluates the influence of the degrees of freedom in complex haptic interactions. New Geometric Data Structures for Collision Detection and Haptics closes by proposing an open source benchmarking suite that evaluates both the performance and the quality of the collision response in order to guarantee a fair comparison of different collision detection algorithms. Required in the fields of computer graphics, physically-based simulations, computer animations, robotics and haptics, collision detection is a fundamental problem that arises every time we interact with virtual objects. Some of the open challenges associated with collision detection include the handling of deformable objects, the stable computation of physically-plausible contact information, and the extremely high frequencies that are required for haptic rendering. New Geometric Data Structures for Collision Detection and Haptics presents new solutions to all of these challenges, and will prove to be a valuable resource for researchers and practitioners of collision detection in the haptics, robotics and computer graphics and animation domains.
The term risk is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.
In the years since Jakob Nielsen's classic collection on
interface consistency first appeared, much has changed, and much
has stayed the same. On the one hand, there's been exponential
growth in the opportunities for following or disregarding the
principles of interface consistency-more computers, more
applications, more users, and of course the vast expanse of the
Web. On the other, there are the principles themselves, as
persistent and as valuable as ever.
Cognition, Communication and Interaction examines the theoretical and methodological research issues that underlie the design and use of interactive technology. Present interactive designs are addressing the multi-modality of human interaction and the multi-sensory dimension of how we engage with each other. This book aims to provide a trans-disciplinary research framework and methodology for interaction design. The analysis directs attention to three human capacities that our engagement with interactive technology has made salient and open to constant redefinition. These capacities are human cognition, communication and interaction. In this book examination of these capacities is embedded in understanding the following foundations for design: concepts of communication and interaction and their application (Part 1); conceptions of knowledge and cognition (Part 2); the role of aesthetics and ethics in design (Part 3).
This practically-focused text presents a hands-on guide to making biometric technology work in real-life scenarios. Extensively revised and updated, this new edition takes a fresh look at what it takes to integrate biometrics into wider applications. An emphasis is placed on the importance of a complete understanding of the broader scenario, covering technical, human and implementation factors. This understanding may then be exercised through interactive chapters dealing with educational software utilities and the BANTAM Program Manager. Features: provides a concise introduction to biometrics; examines both technical issues and human factors; highlights the importance of a broad understanding of biometric technology implementation from both a technical and operational perspective; reviews a selection of freely available utilities including the BANTAM Program Manager; considers the logical next steps on the path from aspiration to implementation, and looks towards the future use of biometrics in context.
Exploring Digital Design takes a multi-disciplinary look at digital design research where digital design is embedded in a larger socio-cultural context. Working from socio-technical research areas such as Participatory Design (PD), Computer Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI), the book explores how humanities offer new insights into digital design, and discusses a variety of digital design research practices, methods, and theoretical approaches spanning established disciplinary borders. The aim of the book is to explore the diversity of contemporary digital design practices in which commonly shared aspects are interpreted and integrated into different disciplinary and interdisciplinary conversations. It is the conversations and explorations with humanities that further distinguish this book within digital design research. Illustrated with real examples from digital design research practices from a variety of research projects and from a broad range of contexts Exploring Digital Design offers a basis for understanding the disciplinary roots as well as the interdisciplinary dialogues in digital design research, providing theoretical, empirical, and methodological sources for understanding digital design research. The first half of the book Exploring Digital Design is authored as a multi-disciplinary approach to digital design research, and represents novel perspectives and analyses in this research. The contributors are Gunnar Liestol, Andrew Morrison and Christina Moertberg in addition to the editors. Although primarily written for researchers and graduate students, digital design practioners will also find the book useful. Overall, Exploring Digital Design provides an excellent introduction to, and resource for, research into digital design.
This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus on both the algorithmic and practical parts of the artificial intelligence approaches in IoT applications that are enabled and supported by wireless sensor networks and cellular networks. Targeted readers are from varying disciplines who are interested in implementing the smart planet/environments vision via intelligent wireless/wired enabling technologies. Includes the most up-to-date research and applications related to IoT artificial intelligence (AI); Provides new and innovative operational ideas regarding the IoT artificial intelligence that help advance the telecommunications industry; Presents AI challenges facing the IoT scientists and provides potential ways to solve them in critical daily life issues.
Human-CenteredSoftwareEngineering: BridgingHCI,UsabilityandSoftwareEngineering From its beginning in the 1980's, the ?eld of human-computer interaction (HCI) has beende?nedasamultidisciplinaryarena. BythisImeanthattherehas beenanexplicit recognition that distinct skills and perspectives are required to make the whole effort of designing usable computer systems work well. Thus people with backgrounds in Computer Science (CS) and Software Engineering (SE) joined with people with ba- grounds in various behavioral science disciplines (e. g. , cognitive and social psych- ogy, anthropology)inaneffortwhereallperspectiveswereseenasessentialtocreating usable systems. But while the ?eld of HCI brings individuals with many background disciplines together to discuss a common goal - the development of useful, usable, satisfying systems - the form of the collaboration remains unclear. Are we striving to coordinate the varied activities in system development, or are we seeking a richer collaborative framework? In coordination, Usability and SE skills can remain quite distinct and while the activities of each group might be critical to the success of a project, we need only insure that critical results are provided at appropriate points in the development cycle. Communication by one group to the other during an activity might be seen as only minimally necessary. In collaboration, there is a sense that each group can learn something about its own methods and processes through a close pa- nership with the other. Communication during the process of gathering information from target users of a system by usability professionals would not be seen as so- thing that gets in the way of the essential work of software engineering professionals.
Voice recognition is here at last. Alexa and other voice assistants have now become widespread and mainstream. Is your app ready for voice interaction? Learn how to develop your own voice applications for Amazon Alexa. Start with techniques for building conversational user interfaces and dialog management. Integrate with existing applications and visual interfaces to complement voice-first applications. The future of human-computer interaction is voice, and we'll help you get ready for it. For decades, voice-enabled computers have only existed in the realm of science fiction. But now the Alexa Skills Kit (ASK) lets you develop your own voice-first applications. Leverage ASK to create engaging and natural user interfaces for your applications, enabling them to listen to users and talk back. You'll see how to use voice and sound as first-class components of user-interface design. We'll start with the essentials of building Alexa voice applications, called skills, including useful tools for creating, testing, and deploying your skills. From there, you can define parameters and dialogs that will prompt users for input in a natural, conversational style. Integrate your Alexa skills with Amazon services and other backend services to create a custom user experience. Discover how to tailor Alexa's voice and language to create more engaging responses and speak in the user's own language. Complement the voice-first experience with visual interfaces for users on screen-based devices. Add options for users to buy upgrades or other products from your application. Once all the pieces are in place, learn how to publish your Alexa skill for everyone to use. Create the future of user interfaces using the Alexa Skills Kit today. What You Need: You will need a computer capable of running the latest version of Node.js, a Git client, and internet access.
In today's rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro level, these changes have started to reshape society, leading some to speak of the "Network Society" and "The Information Age." This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It includes papers that consider ways of analyzing virtual work in terms of work processes. Following that, the book takes a look at group processes within virtual teams, focusing in particular on leadership and group identity. The book goes on to consider the role of knowledge in virtual settings and other implications of the role of fiction in structuring virtuality.
Virtual Interaction: Interaction in Virtual Inhabited 3D Worlds answers the basic research questions involved in the development of user-friendly interfaces, such as:
This book covers all topics relevant for the design of haptic
interfaces and teleoperation systems. The book provides the basic
knowledge required for understanding more complex approaches and
more importantly it introduces all issues that must be considered
for designing efficient and safe haptic interfaces. Topics covered
in this book provide insight into all relevant components of a
haptic system. The introduction chapter positions the haptic interfaces within
the virtual reality context. In order to design haptic interfaces
that will comply with human capabilities at least basic
understanding of human sensors-motor system is required. An
overview of this topic is provided in the chapter related to human
haptics. The book does not try to introduce the state-of-the-art
haptic interface solutions because these tend to change quickly.
Only a careful selection of different kinematic configurations is
shown to introduce the reader into this field.
"Service Design and Delivery" provides a comprehensive overview of the increasingly important role played by the service industry. Focusing on the development of different processes employed by service organizations, the book emphasizes management of service in relation to products. It not only explores the complexity of this relationship, but also introduces strategies used in the design and management of service across various sectors, highlighting where tools, techniques and processes applicable to one sector may prove useful in another. The implementation methods introduced in the book also illustrate how and why companies can transform themselves into service organizations. While the book is primarily intended as a text for advanced-level courses in service design and delivery, it also contains theoretical and practical knowledge beneficial to both practitioners in the service sector and those in manufacturing contemplating moving towards service delivery.
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
Within a scenario of globalised markets, where the capacity to efficiently cooperate with other firms starts to become essential in order to remain in the market in an economically, socially and environmentally cost-effective manner, it can be seen how the most innovative enterprises are beginning to redesign their business model to become interoperable. This goal of interoperability is essential, not only from the perspective of the individual enterprise but also in the new business structures that are now emerging, such as supply chains, virtual enterprises, interconnected organisations or extended enterprises, as well as in mergers and acquisitions. Composed of over 40 papers, Enterprise Interoperability V ranges from academic research through case studies to industrial and administrative experience of interoperability. The international nature of the authorship contnues to broaden. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas. The I-ESA'12 Conference from which this book is drawn was organized by Polytechnic University of Valencia, on behalf INTERVAL, and the European Virtual Laboratory for Enterprise Interoperability (INTEROP-VLab) and sponsored by the International Federation for Information Processing (IFIP) and the International Federation of Automatic Control (IFAC). A concise reference to the state of the art in systems interoperability, Enterprise Interoperability V will be of great value to engineers and computer scientists working in manufacturing and other process industries and to software engineers and electronic and manufacturing engineers working in the academic environment.
This book clarifies the role and relevance of the body in social interaction and cognition from an embodied cognitive science perspective. Theories of embodied cognition have during the last decades offered a radical shift in explanations of the human mind, from traditional computationalism, to emphasizing the way cognition is shaped by the body and its sensorimotor interaction with the surrounding social and material world. This book presents a theoretical framework for the relational nature of embodied social cognition, which is based on an interdisciplinary approach that ranges historically in time and across different disciplines. It includes work in cognitive science, artificial intelligence, phenomenology, ethology, developmental psychology, neuroscience, social psychology, linguistics, communication and gesture studies. The theoretical framework is illustrated by empirical work that provides some detailed observational fieldwork on embodied actions captured in three different episodes of spontaneous social interaction and cognition in situ. Furthermore, the theoretical contributions and implications of the study of embodied social cognition are discussed and summed up. Finally, the issue what it would take for an artificial system to be socially embodied is addressed and discussed, as well as the practical relevance for applications to artificial intelligence (AI) and socially interactive technology. |
You may like...
Dependence, Development, and State…
George Lopez, Michael Stohl
Hardcover
R2,542
Discovery Miles 25 420
Lost Causes - Confederate Demobilization…
Bradley R Clampitt
Hardcover
R1,315
Discovery Miles 13 150
Machine Learning and Artificial…
Benjamin Moseley, Lion Krischer
Hardcover
R5,114
Discovery Miles 51 140
Musculoskeletal Injuries in the Military
Kenneth L Cameron, Brett D. Owens
Hardcover
R3,395
Discovery Miles 33 950
Terrorists in Our Midst - Combating…
Yonah. Alexander
Hardcover
|