![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.
This book attempts to rethink the concept of technological literacy in a modern context, not only in terms of a subject area taught in schools, but also as an important general concept that all citizens should engage with. As this book will illustrate, the concept of technological literacy has no universally agreed definition.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.
This book constitutes the proceedings of the 19th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Wellington, New Zealand, in October/November 2013. The 18 revised papers presented together with 4 progress papers were carefully reviewed and selected from 34 submissions. They are organized into six thematic sessions as follows social media, social networks, crowdsourcing, learning, collaboration design and software development.
This two volume set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
This book constitutes the proceedings of the 8th International and Interdisciplinary Conference on Modeling and Using Context, CONTEXT 2013, held in Annecy, France, in October/November 2013. The 23 full papers and 9 short papers presented were carefully reviewed and selected from numerous submissions. In addition the book contains two keynote speeches and 9 poster papers. They cover cutting-edge results from the wide range of disciplines concerned with context, including: Cognitive Sciences (Linguistics, Psychology, Computer Science, Neuroscience), and computer science (artificial intelligence, logics, ubiquitous and pervasive computing, context-awareness systems), and the Social Sciences and Organizational Sciences, as well as the Humanities and all application areas, including Medicine and Law.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the workshops held withthe 17th International Conference on Image Analysis and Processing, ICIAP 2013, held in Naples, Italy, in September 2013. The proceedings include papers from the five individual workshops focusing on topics of interest to the pattern recognition, image analysis, and computer vision communities, exploring emergent research directions or spotlight cross-disciplinary links with related fields and / or application areas."
This book examines the struggles over technology's use in education, digging into what the purpose of education is, how we should achieve it, who the stakeholders are, and whose voices win out. Drawing on theoretical and empirical work, it lays bare the messy realities of technology use in education and their implications for contemporary society.
This book constitutes the refereed proceedings of the 4th International Conference on Serious Games Development and Applications, SGDA 2013, held in Trondheim, Norway, in September 2013. The 32 papers (23 full papers, 9 short papers/posters and 2 invited keynotes) presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on games for health, games for education and training, games for other purposes, game design and theories, gaming interface, policy matters.
This book constitutes the refereed proceedings of the 8th
International Conference on Haptic and Audio Interaction Design,
HAID 2013, held in Daejeon, Korea, in April 2013.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The 25 papers (20 full research papers, 4 demonstration papers, and one abstract of the keynote speech) presented were carefully reviewed and selected from various submissions. The papers cover the following topics related to mobile Web and Information Systems (WISs), such as mobile Web services, location-awareness, design and development, social computing and society, development infrastructures and services, SOA and trust, UI migration and human factors, and Web of Things and networks.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
This book constitutes the refereed proceedings of the Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013. The 19 revised full papers presented were carefully reviewed and selected for inclusion in this volume. They focus on the currently most sensitive areas in the field, such as identity management as a core component in any e-government or participation system, open data, mobile government applications as well as intelligent and learning systems.The papers are organized in the following topical sections: identity management in e-government; intelligent systems in e-government; e-government cases; mobile government; open government data; and e-participation.
This book constitutes the refereed proceedings of the 10th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2013, held in Palma de Mallorca, Spain, in September 2013. The 34 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover all the topics of cooperative engineering, basic theories, methods and technologies that support CDVE, cooperative design, visualization and applications. There are special contributions dealing with the cooperative issues brought by the Internet of things - such as the situation in the ambient assisted living systems. Other papers in the volume cover a wide range of cooperative application topics such as cooperative e-learning, cooperative decision making and cooperative simulation etc.
This two volumes set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.
This book constitutes the refereed proceedings of the 14th International Conference on Product-Focused Software Process Improvement, PROFES 2013, held in Paphos, Cyprus, in June 2013. The 22 revised full papers presented together with 10 short papers and 2 tutorial papers were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on empirical software engineering, software process improvement, managing software processes, software measurement, decision support in software engineering, safety-critical software engineering, and software maintenance.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
Providing a comprehensive introduction into an overview of the field of pervasive healthcare applications, this volume incorporates a variety of timely topics ranging from medical sensors and hardware infrastructures, to software platforms and applications and addresses issues of user experience and technology acceptance. The recent developments in the area of information and communication technologies have laid the groundwork for new patient-centred healthcare solutions. While the majority of computer-supported healthcare tools designed in the last decades focused mainly on supporting care-givers and medical personnel, this trend changed with the introduction of pervasive healthcare technologies, which provide supportive and adaptive services for a broad variety and diverse set of end users. With contributions from key researchers the book integrates the various aspects of pervasive healthcare systems including application design, hardware development, system implementation, hardware and software infrastructures as well as end-user aspects providing an excellent overview of this important and evolving field.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013. The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis.
This book constitutes the refereed proceedings of the 11th German Conference on Multiagent System Technologies, MATES 2013, held in Koblenz, Germany, in September 2013. The 29 revised full papers and 3 keynote talks presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest ranging from issues of agent-based coordination to simulation to negotiation. |
![]() ![]() You may like...
Children and Childhood in Bioarchaeology
Patrick Beauchesne, Sabrina C. Agarwal
Hardcover
R2,906
Discovery Miles 29 060
Ethnic Peace in the American City…
Edward Taehan Chang, Jeannette Diaz-Veizades
Hardcover
R2,587
Discovery Miles 25 870
Ethnographies of Conservation…
David G. Anderson, Eeva Berglund
Paperback
|