![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This is the first of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: HCI design approaches, methods and techniques; usability methods, techniques and studies; universal access and eInclusion; multimodal and ambient interaction; cognitive and psychological aspects of interaction; perception and interaction; ergonomic and human modelling issues; capturing gaze, biosignals and brainwaves; development environments; product design, marketing and advertisement.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
This book constitutes the proceedings of the 12th German Conference on Multiagent System Technologies, MATES 2014, held in Stuttgart, Germany, in September 2014. The 9 full papers and 7 short papers included in this volume were carefully reviewed and selected from 31 submissions. The book also contains 2 invited talks. The papers are organized in topical sections named: mechanisms, negotiation, and game theory; multiagent planning, learning, and control; and multiagent systems engineering, modeling and simulation.
This book contains the refereed proceedings of the 5th Scandinavian Conference on Information Systems, SCIS 2014, held in Ringsted, Denmark, in August 2014. The theme for this book as well as for the conference is "Designing Human Technologies." The theme combines the interplay of people with technology-a classic theme in Scandinavian information systems research-with a growing interest within the IS research field in design and design science research. The nine papers accepted for SCIS 2014 were selected from 22 submissions.
This book constitutes the refereed proceedings of the 5th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 65 papers included in this volume are organized in topical sections on modeling posture and motion; anthropometry, design and ergonomics; ergonomics and human modeling in work and everyday life environments; advances in healthcare; rehabilitation applications; risk, safety and emergency.
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.
The four-volume set LNCS 8517, 8518, 8519 and 8520 constitutes the proceedings of the Third International Conference on Design, User Experience and Usability, DUXU 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 256 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 66 papers included in this volume are organized in topical sections on design theories, methods and tools; user experience evaluation; heuristic evaluation; media and design; design and creativity.
This volume, intended for students and business professionals, provides an introduction to Computer Supported Cooperative Work (CSCW). The authors illustrate CSCW in action and discuss general trends in computer support systems including artificial intelligence, extended realities, and new strategies for interacting with technology. The changing job and worker requirements that accompany CSCW are examined from both a behavioral and technical standpoint. In addition, the authors discuss the implications for various aspects of human resource management including personnel selection, training, leadership, and performance appraisal. Written for the non-computer specialist, the book is easy to understand and will be useful to students in business, psychology, and computer courses and to business professionals implementing CSCW technologies.
This book constitutes the thoroughly refereed proceedings of the Second International Conference, GreeNets 2012, held in Gaudia, Spain, in October 2012. The 11 revised full papers presented were carefully selected and reviewed. These papers represent 23.68% of the submissions and cover topics such as communications and networking, energy-efficient network architecture and protocols, systems and technologies, and energy-efficient management.
This is the second of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: learning and education; health and medicine; media, art and culture; transport; Web and social media; information search and retrieval; work, collaboration and creativity; text and storytelling; agents, avatars and robots; smart environments; virtual and mixed environments; security and privacy.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains three full-paper length invited papers and 7 corrected and extended papers from the First International Workshop on Smart Grid Security, SmartGridSec 2012, which brought together researchers from different communities from academia and industry in the area of securing the Future Smart Grid and was held in Berlin, Germany, on December 3, 2012.
This book constitutes the refereed proceedings of the 5th International Conference on Well-Being in the Information Society, WIS 2014, held in Turku, Finland, in September 2014. The 24 revised full papers presented were carefully reviewed and selected from 64 submissions. The core topic is livability and quality of (urban) living with safety and security. The papers address topics such as secure and equal use of information resources, safe and secure work environments and education institutions, cyberaggression and cybersecurity as well as impact of culture on urban safety and security.
This book constitutes the refereed proceedings of the Workshops which complemented the 11th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2013, held in Salamanca, Spain, in May 2013. This volume presents the papers that have been accepted for the workshops: Workshop on Agent-based Approaches for the Transportation Modeling and Optimization, Workshop on Agent-Based Solutions for Manufacturing and Supply Chain, Workshop on User-Centric Technologies and Applications, Workshop on Conflict Resolution in Decision Making, Workshop on Multi-Agent System Based Learning Environments, Workshop on Multi-agent based Applications for Sustainable Energy Systems, Workshop on Agents and multi-agent Systems for AAL and e-Health
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 251 contributions included in the UAHCI proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 51 papers included in this volume are organized in the following topical sections: design for all methods, techniques, and tools; development methods and tools for universal access; user models, adaption and personalization; natural, multimodal and multisensory interaction and brain-computer interfaces.
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects from educational and game theories, human-computer interaction, computer graphics, artificial intelligence, and systems design. This issue contains a special section on serious games with 8 outstanding contributions from the VS-Games 2011 conference; furthermore, there are 13 regular papers. These contributions clearly demonstrate the use of serious games and virtual worlds for edutainment applications and form a basis for further exploration and new ideas.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
How could Finance benefit from AI? How can AI techniques provide an edge? Moving well beyond simply speeding up computation, this book tackles AI for Finance from a range of perspectives including business, technology, research, and students. Covering aspects like algorithms, big data, and machine learning, this book answers these and many other questions.
This book constitutes the refereed proceedings of the workshops co-located with the 4th International Joint Conference on Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013. The 33 revised full papers presented were carefully reviewed and selected from numerous submissions to the following workshops: 5th International Workshop on Intelligent Environments Supporting Healthcare and Well-being (WISHWell 13) 3d International workshop on Pervasive and Context-Aware Middleware (PerCAM 13), 2nd International Workshop on Adaptive Robotic Ecologies (ARE'13), International Workshop on Aesthetic Intelligence (AxI'13), First International Workshop on Uncertainty in Ambient Intelligence (UAmI13). The papers are organized in topical sections on intelligent environments supporting healthcare and well-being; adaptive robotic ecologies; uncertainty in ambient intelligence; aesthetic intelligence; pervasive and context-aware middleware."
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
This book constitutes the refereed proceedings of the 5th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2013, held in Koblenz, Germany, in September 2013. The 13 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers cover a wide range of research in both social and technological scientific domains, seeking to demonstrate new theories, concepts, methods and styles of eParticipation with the support of innovative ICT. They have been organized in the following topical sections: research directions, social media and eParticipation, and online deliberation.
This book constitutes the refereed proceedings of the 9th International Conference on Persuasive Technology, PERSUASIVE 2014, held in Padua, Italy, in May 2014. The 27 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 58 submissions. In addition to the themes of persuasive technology dealt with in the previous editions of the conference, this edition highlighted a special theme, i.e. persuasive, motivating, empowering videogames.
This volume constitutes the refereed proceedings of the 7th International Conference on Multimedia Communications, Services and Security, MCSS 2014, held in Krakow, Poland, in June 2014. The 21 full papers included in the volume were selected from numerous submissions. The papers cover ongoing research activities in the following topics: audiovisual systems, novel multimedia architectures, multimedia data fusion, acquisition of multimedia content, quality of experience management, watermarking technology and applications, content searching methods, interactive multimedia applications, cybercrime countermeasures, cryptography, biometry, as well as privacy protection solutions.
This book constitutes revised selected papers from the following SEFM 2012 satellite events: InSuEdu, the First International Symposium on Innovation and Sustainability in Education; MokMaSD, the First International Symposium on Modelling and Knowledge Management for Sustainable Development and Open Cert, the 6th International Workshop on Foundations and Techniques for Open Source Software Certification, held in Thessaloniki, Greece, in October 2012. The total of 14 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 35 submissions. The papers cover the topics related to the use of Information and Communication Technology (ICT) and Open Source Software (OSS) as tools to foster and support Education, Innovation and Sustainability. |
You may like...
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, …
Paperback
R1,872
Discovery Miles 18 720
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R3,245
Discovery Miles 32 450
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,337
Discovery Miles 93 370
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, …
Hardcover
R6,212
Discovery Miles 62 120
|